Next Generation Firewall
Next Generation Firewall
Virtual
IPsecVPN. Operating Roles
FW/VPN IPS L2FW Software
Figure 1. McAfee Next Generation Firewall adapts to multiple roles and installations.
Data Sheet
High Scalability and Availability to Secure McAfee Next Generation Firewall uses a
Business-Critical Applications variety of techniques on network traffic to
Todays businesses demand fully resilient identify applications and users at a granular
network security solutions. McAfee Next level. Security policies can then be applied
Generation Firewall delivers high scalability and based on strict business rules. Then McAfee
availability in three powerful ways: Next Generation Firewall performs specialized
deep packet inspection, including advanced
Native active clustering: Up to 16 techniques such as full stack normalization and
nodes can be clustered together, horizontal data stream-based inspection. These
providing superior performance and techniques normalize traffic flows, enabling
resiliency when running demanding McAfee to expose AETs and traffic anomalies
security applications, such as deep that other NGFWs miss. Only after traffic
packet inspection and VPNs. has been fully normalized can it be properly
Transparent session failover: Provides inspected across all protocols and layers for
industry-leading availability and threats and malware. And only McAfee Next
serviceability of security systems. Generation Firewall has been successfully
McAfee Next Generation Firewall tested against more than 800 million AETs.
even supports transparent failover
for multiple software and hardware Knowledge Is Power
versions within the same cluster. Point security solutions restrict knowledge
McAfee Multi-Link: Extends high sharing, weakening their ability to recognize
availability coverage to network and and block threats. The Security Connected
IPsec VPN connections. Provides threat ecosystem enables rapid sharing
the confidence of non-stop security of extensive real-time threat information,
along with high performance for every empowering organizations to defeat
deployment. cybercrime with the latest global and local
threat knowledge. Security Connected enables
McAfee Next Generation Firewall to leverage
Unmatched Protection to Keep Your
threat information from a wide variety of third
Business in Business
party sources, as well as other McAfee security
Its no secret. Every day attackers get better at
solutions including:
penetrating enterprise networks, applications,
data centers, and endpoints. Once inside, ePolicy Orchestrator (McAfee
they can steal intellectual property, customer ePO) software: Allows McAfee Next
information, and other sensitive data, causing Generation Firewall to obtain contextual
irreparable damage to your business and global information from users and their host
reputation. systems, providing valuable insights
into endpoint security postures. This
Unknown to many security administrators,
information can also be used to simplify
determined attackers can use advanced
workflows when troubleshooting or
evasion techniques (AETs) to bypass most of
investigating threats or problems.
todays security devices. AETs deliver advanced
persistent threats (APTs) through advanced McAfee Enterprise Security Manager:
techniques such as masking and obfuscation. Ensures continuous monitoring and
Once inside your network, threats are alerting of compliance status, providing
reassembled. Here they can hide, execute, and real-time situational awareness while
propagate unchallenged. improving security posture and
reducing event response times.
URL Filtering
Protocols HTTP, HTTPS
Engine Webroot category-based URL filtering, blacklist/whitelist
Database More than 280 million top-level domains and sub-pages (billions of URLs)
Support for more than 43 languages, 82 categories
Management and Monitoring
Centralized Management Enterprise-level centralized management, logging and reporting system. See the McAfee
Security Management Center data sheet for more details.
SNMP Monitoring SNMPv1, SNMPv2c, and SNMPv3
Traffic Capturing Console tcpdump, remote capture through SMC
High Security Management 256-bit security strength in enginemanagement communication
Communication
Security Certifications Common Criteria EAL4+, FIPS 140-2 crypto certificate, CSPN by ANSSI
(First Level Security Certification)
1
Supported encryption algorithms depend on license used.
2
Available soon.
3
Ibid.
4
Firewall/VPN role only.
5
Ibid.
McAfee. Part of Intel Security. Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee and the McAfee logo are registered
2821 Mission College Boulevard trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property
Santa Clara, CA 95054 of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are
888 847 8766 provided without warranty of any kind, express or implied. Copyright 2014 McAfee, Inc. 61327ds_ngfw_1114_fnl_ETMG
www.intelsecurity.com