
• If the traffic through a NIC does not match the CAG criteria, and the connection isolation
option is enabled, the traffic is blocked.
Figure 18: Network connection isolation
As examples of using the connection isolation option, consider two settings: a corporate
environment and a hotel. The active firewall rules list contains rules and groups in this order:
1 Rules for basic connection
2 VPN connection rules
3 CAG with corporate LAN connection rules
4 CAG with VPN connection rules.
Configuring Firewall Policies
Overview of Firewall policies
53McAfee Host Intrusion Prevention 7.0 Product Guide for use with ePolicy Orchestrator 4.0
Kommentare zu diesen Handbüchern