01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Operating system<br />

Introduction<br />

Filtering rules on the <strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> appliance 1<br />

The subsystems of the appliance rely on the functions of its operating system, which is MLOS (<strong>McAfee</strong><br />

Linux Operating System) version 1.0.<br />

The operating system provides functions for executing the actions that the filtering rules trigger, file<br />

and network reading and writing, and access control.<br />

A configuration daemon (sysconfd daemon) implements changed configuration settings in the operating<br />

system.<br />

Filtering rules on the <strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> appliance<br />

Rules control the filtering process on the appliance. Reviewing these rules lets you understand what the<br />

appliance does to ensure web security. You need not set up these rules yourself, a wizard can do this<br />

for you, according to your instructions, or a default system of rules is implemented. You can then still<br />

modify every detail of the implemented system.<br />

It is the job of the filtering rules to look at web objects before users of your network are allowed to<br />

access them and also at these users. These rules check the properties of objects and users and if, for<br />

example, an object is virus-infected or a user not in an allowed user group, they block access to the<br />

object or let the user not complete further activities.<br />

Rule sets for filtering<br />

A rule usually works with other rules to do its job. For example, a whitelisting rule can work with a few<br />

blocking rules to do URL filtering. The whitelisting rule says which URLs are allowed and the blocking<br />

rules say which are not. Together, these rules are in a URL filtering rule set.<br />

The implemented system of rule sets is displayed on the Rule Sets tab of the user interface. When you<br />

review it, you will see rule sets there for URL filtering, virus and malware filtering, media type filtering,<br />

and other purposes. When you open a rule set, you will see the individual rules that are contained in it.<br />

Even a rule that works on its own, like a global whitelisting rule might do, is embedded in a rule set.<br />

Some rule sets have other rule sets nested within them. This way, for example, media type filtering can<br />

be split up between a nested rule set that filters media type uploads and another nested rule set that<br />

filters the downloads.<br />

Lists and modules for filtering<br />

Rules are interested in the properties of web objects and users. A blocking rule for URLs needs to know<br />

which categories URLs belong to, so it can block, for example, a URL that is in the online-shopping<br />

category and prevent the users of your network from accessing it.<br />

To get at the information they need, rules rely on:<br />

• Filter lists — A list can, for example, contain URLs of web sites for online shopping. When a user<br />

requests access to a particular URL, a blocking rule goes through the list to see if that URL is on it.<br />

• Special modules — Information on URL categories can be retrieved from the Global Threat<br />

Intelligence system. A module on the appliance communicates with this system and tells the blocking<br />

rule about its findings.<br />

Other modules scan web objects for infections, inspect certificates, check user credentials for<br />

authentication, or perform other activities related to web and user filtering.<br />

<strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong> 17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!