Start the Create Multiple Firewall Clusters wizard
Start the Create Multiple Firewall Clusters wizard and define general settings for the Firewall Cluster elements.
Before you begin
You must have an existing Firewall Cluster element on which to base the configuration.
For more details about the product and how to configure features, click Help or press F1.
Steps
Create Multiple Firewall Clusters wizard
Use this wizard to create multiple Firewall Cluster elements at the same time.
Option | Definition |
---|---|
Number of Firewall Clusters | Specifies the number of Firewall Cluster elements. |
Base Configuration on | Specifies the Firewall Cluster on which you want to base the configuration. |
Previous | Navigates back to the previous wizard page. |
Next | Navigates to the following wizard page. |
Option | Definition |
---|---|
Define Basic Firewall Information page | |
Name Prefix | Specifies the common name prefix. |
Log Server | Specifies the log server to which the engine sends event data. |
DNS IP Addresses
(Optional) |
Specifies the IP addresses of the DNS servers that the engine uses to resolve:
For DNS relay, specifies the IP addresses of external DNS servers to which the engine forwards DNS requests from clients in the internal network. |
Add | Adds one or more IP addresses using the following options:
|
Remove | Removes the selected IP address from the DNS IP Addresses list. |
Location | Specifies the location for the engine if there is a NAT device between the engine and other SMC components. |
Category (Optional) |
Includes the element in predefined categories. Click Select to select a category. |
Tools Profile | Adds custom commands to the element's right-click menu.
|
Comment (Optional) |
A comment for your own reference. |
Nodes | |
Disabled | When selected, disables the node. |
Add Node | Adds an engine node to the Nodes list. |
Edit Node | Opens the Engine Node Properties dialog box. |
Remove Node | Removes the selected engine node from the Nodes list. |
Review and Edit Names and Comments | Shows a summary of the information you entered on the previous page. |
Option | Definition |
---|---|
Define Interfaces for the Multiple Firewall Elements page | |
Add | Specifies the interface type:
|
Edit | Allows you to change the properties of the interface or IP address. |
Remove | Removes the selected interface or IP address from the table. |
Options
(Optional) |
Opens the Interface Options dialog box. |
ARP Entries | Allows you to add ARP entries for the engine elements. |
Multicast Routing | Allows you to configure the multicast routing properties. |
Review and Edit Firewall Interfaces | Shows a summary of the information you entered on the previous page. |
Option | Definition |
---|---|
Define Routing for the Multiple Firewall Elements page — On this page, you can see the routing of the original engine that you are basing your engines on. Changes that you make are reflected in all engines that you are creating. | |
Review and Edit Routing View for the Multiple Firewall Elements | On this page, you can make changes to the individual engines that you are creating. |
Routing for | Select the engine that you want to edit. |
Option | Definition |
---|---|
Define NAT Definitions for the Firewalls page | |
Use Default NAT Address for Traffic from Internal Networks
(Optional) |
When selected, the engine uses the default NAT address as the Public IP Address if there is not a more specific NAT definition that matches the traffic. When you select this option, a NAT rule is generated at the end of the NAT rules in the Firewall Policy. If no NAT rule matches the traffic, no NAT is applied unless you enable the Default NAT Address. |
Show Details
(Optional) |
Opens the Default NAT Address Properties dialog box. |
Add NAT Definition | Creates a NAT Definition element and opens the NAT Definition Properties dialog box. |
Edit NAT Definition | Opens the NAT Definition Properties dialog box for an existing NAT Definition element. |
Remove NAT Definition | Removes the selected row from the table. |
Option | Definition |
---|---|
Select Additional Configuration Options page | |
Define Additional Firewall Properties | When selected, you can specify advanced properties for the engine.
If you do not select this option, clicking Next takes you to the Summary page. |
Option | Definition |
---|---|
Define Tester Settings for the Firewalls page | |
Alert Interval | Specifies the time in minutes the system waits before sending a new alert when the same test keeps failing repeatedly. The default value is 60 minutes.
Note: If the interval is too short, the alerts can overload the system or the alert recipient.
|
Delay After | Specifies the time in seconds that the engine waits before it resumes running the tests after the listed events. The delays prevent false test failures that can occur due to variations in how quickly different processes and subsystems can start and stop.
Note: The maximum value for all options is 1800.
|
Auto Recovery | When selected, the engine automatically goes back online when a previously failed test completes successfully.
Note: Make sure to run the test in both online and offline states.
|
Boot Recovery | When selected, the engine automatically goes back online after a restart, or after an event such as a power failure or system crash, if all offline tests report a success. |
Set to Default | Returns tester changes to the default settings. |
Add | Adds the test to the test entry table:
|
Edit | Allows you to change the test properties. |
Remove | Removes the test from the test entry table. |
Option | Definition |
---|---|
Define Permissions for the Firewalls page | |
Add | Adds the element to the Access Control Lists table. |
Remove | Removes the elements from the Access Control Lists table. |
Add Permission | Adds the permission to the Permissions table. |
Remove Permission | Removes the permission from the Permissions table. |
Add | Adds an element to the Allowed Policies list. |
Set to Any | Allows the installation of any policy. |
Remove | Removes the elements from the Allowed Policies list. |
Option | Definition |
---|---|
Define Add-Ons for the Firewalls page | |
Client Protection Certificate Authority | Select the Client Protection Certificate Authority element for client protection. |
Add | Allows you to add a Server Protection Credentials element for server protection. |
Remove | Removes the selected item. |
User Identification Service | Specifies the Forcepoint User ID Service, McAfee Logon Collector, or Integrated User ID Service that associates IP addresses with users for transparent user identification. The Integrated User ID Service is primarily meant for demonstration purposes and proof-of-concept testing of user identification services.
Note:
McAfee Logon Collector is only supported in Forcepoint NGFW version 5.8 or higher. For Forcepoint NGFW version 6.4 or higher, we recommend that you use the Forcepoint User ID Service.
|
User Authentication | Opens the Browser-Based User Authentication dialog box. |
Anti-Malware | Opens the Anti-Malware Settings dialog box. |
Anti-Spam Settings | The Anti-Spam feature is no longer supported in NGFW version 6.2.0 and later. |
Sandbox | Opens the Sandbox Settings dialog box. Note: McAfee Advanced Threat Defense is no longer supported in NGFW version 6.4.0 and later. We recommend
that you use Forcepoint Advanced Malware Detection instead.
|
File Reputation | Opens the GTI File Reputation Settings dialog box. |
Option | Definition |
---|---|
Define Advanced Settings for the Firewalls page | |
Encrypt Configuration Data | By default, the configuration of the engine is stored in an encrypted format. Disable the encryption only if instructed to do so by Forcepoint support. |
Contact Node Timeout | The maximum amount of time the Management Server tries to connect to an engine.
A consistently slow network connection might require increasing this value. The default value is 60 seconds. Note: Setting the timeout value too short or too long can delay or prevent contact between the Management Server and the engines.
|
Auto Reboot Timeout | Specifies the length of time after which an error situation is non-recoverable and the engine automatically restarts. The default value is 10 seconds.
Note: Set to 0 to disable.
|
Policy Handshake | When selected, the nodes automatically roll back to using the previously installed policy if connectivity is lost after installing a new policy.
Without this feature, you must switch to the previous configuration manually through the engine's boot menu.
Note: We recommend adjusting the timeout rather than disabling this feature completely.
|
Rollback Timeout | The time the engine waits for a management connection before it rolls back to the previously installed policy when the Policy Handshake option is active. The default value is 60 seconds. |
Automated Node Certificate Renewal | When selected, the engine's certificate for system communications is automatically renewed before it expires. Otherwise, the certificate must be renewed manually.
Each certificate for system communications is valid for 3 years. If the certificate expires, other components refuse to communicate with the engine.
Note: Does not renew VPN certificates. Automatic certificate renewal for internally signed VPN certificates is set separately in the engine's VPN settings.
|
FIPS-Compatible Operating Mode | When selected, activates a mode that is compliant with the FIPS (Federal Information Processing Standard) 140-2. Note: You must also select FIPS-specific
settings in the NGFW Initial Configuration Wizard on the command line of the NGFW Engine. For more information, see How to install Forcepoint NGFW in FIPS mode.
|
Log Handling | Specifies the settings related to adjusting logging when the log spool on the engines fills up or when the number of Antispoofing and Discard logs grows too high.
Note: You can adjust the logging of Antispoofing and Discard logs also for specific interfaces.
|
Clustering | Specifies the settings related to the communications between cluster members and load-balancing between the nodes. |
Connection Tracking Mode | When connection tracking is enabled, reply packets are allowed as part of the allowed connection without an explicit Access rule.
You can override this engine-specific setting and configure connection tracking for TCP, UDP, and ICMP traffic in Access rules.
|
Virtual Defragmenting | When selected, fragmented packets are sent onwards using the same fragmentation as when they arrived at the engine.
When the engine receives fragmented packets, it defragments the packets for inspection. The original fragments are queued on the engine until the inspection is finished. If the option is not selected, the packets are sent onwards as if they had arrived unfragmented. |
Strict TCP Mode for Deep Inspection | This option is included for backward compatibility with legacy Forcepoint NGFW software versions. Selecting this option has no effect on Forcepoint NGFW version 5.8.0 or later. |
Concurrent Connection Limit | A global limit for the number of open connections. When the set number of connections is reached, the engine stops the next connection attempts until a previously open connection is closed. |
Default Connection Termination in Inspection Policy | Defines how connections that match rules with the
Terminate action in the Inspection Policy are handled.
|
VPN Settings | Opens the VPN Settings dialog box. |
Policy Routing | Opens the Policy Routing dialog box. |
Idle Timeouts | Opens the Idle Timeouts dialog box. |
SYN Rate Limits | Opens the Default SYN Rate Limits dialog box. |
Scan Detection | Opens the Scan Detection Settings dialog box. |
DoS Protection | Opens the DoS Protection Settings dialog box. |
Summary | Shows you a summary of the options that you have selected. |
Finish | Completes the creation of multiple Firewall Clusters. |