Define Add-Ons for multiple Single Firewalls
On the Define Add-Ons for the Firewalls page, you can define settings for TLS inspection, transparent user identification, browser-based user authentication, and anti-malware for the Firewalls.
For more details about the product and how to configure features, click Help or press F1.
Steps
Browser-Based User Authentication dialog box
Use this dialog box to change browser-based user authentication settings for a Firewall.
Option | Definition |
---|---|
General tab | |
HTTP | Allows authentication using plain HTTP connections. |
Port
(Optional) |
Change the port settings if you want to use a different port for the authentication interface. The default ports are:
|
HTTPS | Allows authentication using encrypted HTTPS connections. |
Always Use HTTPS | Redirects connections to the HTTPS port and enforces the use of HTTPS if the engine also listens on other ports. |
Listen on Interfaces | Restricts the interfaces that users can authenticate through.
|
User Authentication Page | Select the User Authentication Page element that defines the look of the logon page, challenge page, and status page shown to end users when they authenticate. |
Enable Session Handling | Enables cookie-based strict session handling. |
Refresh Status Page Every | Defines how often the status page is automatically refreshed. |
Option | Definition |
---|---|
HTTPS Certificate tab | |
Common Name (CN) | The fully qualified domain name (FQDN) of the authentication page as it appears in the certificate. |
Organization (O)
(Optional) |
The name of your organization as it appears in the certificate. |
Organizational Unit (OU)
(Optional) |
The name of your department or division as it appears in the certificate. |
Country/Region (C)
(Optional) |
Standard two-character country code for the country of your organization. |
State/Province (ST)
(Optional) |
The name of state or province as it appears in the certificate. |
City/Locality (L)
(Optional) |
The name of the city as it appears in the certificate. |
Key Length | Length of the key for the generated public-private key pair.
The default is 1024 bits. |
Sign | |
With External Certificate Authority | Select this option if you want to create a certificate request that another certificate authority signs. |
Internally with | Select this option to sign the certificate using an Internal CA for Gateways. If more than one valid internal certificate authority is available, select the internal CA that
signs the certificate request. There can be multiple valid internal CAs for Gateways in the following cases:
|
Generate Request | Generates the request or the internal certificate details. |
Certificate Request section (External certificate authority) |
|
Subject Name | The identifier of the certified entity. |
Export | Opens the Export Certificate Request dialog box. |
Import Certificate | Opens the Import Certificate dialog box. |
Delete | Deletes the certificate request. |
Sign Internally | Signs the certificate with the chosen Internal CA. The Certificate Request details are displayed. |
Certificate section (Internal certificate authority) |
|
Subject Name | The identifier of the certified entity. |
Valid From | Shows start date of certificate validity. |
Valid To | Shows end date of certificate validity. |
Fingerprint (SHA-1) | Shows the certificate fingerprint using the SHA-1 algorithm. |
Fingerprint (MD5) | Shows the certificate fingerprint using the MD5 algorithm. |
Fingerprint (SHA-512) | Shows the certificate fingerprint using the SHA-512 algorithm. |
Export | Opens the Export Certificate dialog box. |
Delete | Deletes the certificate. |
Sidewinder Proxy Settings dialog box
Use this dialog box to enable and configure Sidewinder Proxies on the engine.
Option | Definition |
---|---|
Enable | When selected, enables Sidewinder Proxy. |
Sidewinder Logging Profile | The selected Sidewinder Logging Profile element for the engine. Click Select to open the Select Element dialog box, where you can select a Sidewinder Logging Profile. |
SSH Proxy | Settings specific to the SSM SSH Proxy. |
SSH Known Hosts Lists | The selected SSH Known Hosts List elements for the engine. |
Add | Opens the SSH Known Hosts Lists dialog box, where you can select an SSH Known Hosts List. |
Remove | Removes the selected element from the list. |
Host Keys | The SSH host keys used by the firewall when it acts as the SSH server in a connection that uses the SSM SSH Proxy. |
Key Type | Shows the signature algorithm used for the host key. |
Key Length | Shows the length of the host key. |
SHA256 Fingerprint | Shows the SHA256 fingerprint of the host key. |
SSH Proxy Services | The SSH Proxy Service element with which the host key is used. Double-click the field to open the Select Element dialog box, where you can select a Service element. |
Comment (Optional) |
A comment for your own reference. |
Add | Opens the Generate New Host Key dialog box. |
Remove | Removes the selected host key from the list. |
Import | Opens the Import Host Key dialog box, where you can import an existing host key. |
Advanced Settings | Opens the Advanced Sidewinder Proxy Settings dialog box. |
Anti-Malware Settings dialog box
Use this dialog box to change the anti-malware settings.
Option | Definition |
---|---|
Enable | Enables anti-malware checks. |
Malware Log Level | The log level for anti-malware events.
|
Alert | When Alert is selected, specifies the Alert element that is sent. |
Option | Definition |
---|---|
Malware Signature Update Settings section | |
Update Frequency | Defines how often the engine checks for updates to the anti-malware database.
|
Option | Definition |
---|---|
Malware Signature Mirror Settings section | |
Mirror(s) | Enter the URL of the anti-malware database mirror that the engine contacts to update the anti-malware database. Separate multiple addresses with commas. |
Use HTTP Proxy
(Optional) |
Specifies that the Firewall uses an HTTP proxy to connect to the anti-malware database mirrors. |
Host | The IP address or DNS name of the HTTP proxy. |
Port | The listening port of the HTTP proxy. |
Username | The user name for authenticating to the HTTP proxy. |
Password | The password for authenticating to the HTTP proxy. |
Hide | Prevents the password from being shown as plain text. Deselect this option to show the password. Selected by default. |
Sandbox Settings dialog box
Use this dialog box to select and configure sandbox servers.
Option | Definition |
---|---|
Sandbox Type | Specifies which type of sandbox the engine uses for sandbox file reputation scans.
|
Option | Definition |
---|---|
When Sandbox Type is Cloud Sandbox - Forcepoint Advanced Malware Detection | |
License Key | The license key for the connection to the cloud sandbox server. Note: The license defines the home data
center where files are analyzed. Enter the key and license token for the data center that you want to use as the home
data center.
CAUTION: The license key and license token allow access to confidential analysis
reports. Handle the license key and license token securely.
|
License Token | The license token for the connection to the cloud sandbox server. |
Sandbox Service | Click Select to select a Sandbox Service element. Specifies the cloud sandbox
data center that the firewall contacts to request file reputation scans.
Note: If the data center that the firewall contacts does not match the home data center that is specified in the
license, files are forwarded to the home data center for analysis and stored in the home data center.
|
HTTP Proxies (Optional) |
When specified, file reputation requests are sent through an HTTP proxy instead of the engine accessing the external
network directly. Add — Allows you to add an HTTP Proxy to the list. Remove — Removes the selected HTTP Proxy from the list. Note: You can only
use one HTTP proxy for the connection to the sandbox service. If you select more than one HTTP proxy, the additional
HTTP proxies are ignored.
|
Option | Definition |
---|---|
When Sandbox Type is Local Sandbox - Forcepoint Advanced Malware Detection | |
License Key | The license key for the connection to the local sandbox server. |
License Token | The license token for the connection to the local sandbox server. |
Sandbox Service | Click Select to select a Sandbox Service element. |
HTTP Proxies (Optional) |
When specified, file reputation requests are sent through an HTTP proxy instead of the engine accessing the external
network directly. Add — Allows you to add an HTTP Proxy to the list. Remove — Removes the selected HTTP Proxy from the list. Note: You can only
use one HTTP proxy for the connection to the sandbox service. If you select more than one HTTP proxy the additional
HTTP proxies are ignored.
|
File Reputation Settings dialog box
Use this dialog box to enable file reputation services for file filtering.
Option | Definition |
---|---|
File Reputation Service |
Select the file reputation service to use.
|
Option | Definition |
---|---|
>When File Reputation Service is Threat Intelligence Exchange (TIE) | |
ePO Server | Shows the selected McAfee ePO Server element. The McAfee ePO server handles the request for DXL credentials initiated by the SMC. |
Select | Opens the Select Element dialog box, where you can select an ePO Server element. |
DXL Certificates | Shows the currently valid DXL certificates. |
Generate DXL Certificates | Generates new certificates. |
Option | Definition |
---|---|
>When File Reputation Service is Global Threat Intelligence (GTI) | |
HTTP Proxies | When specified, the engine uses an HTTP proxy to connect to the McAfee Global Threat Intelligence file reputation service.
Note: You can only use one HTTP proxy for the connection to the McAfee Global Threat Intelligence file reputation service. If you select more than one
proxy, the additional HTTP proxies are ignored.
|