cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Highlighted

Different location awareness for ENS Firewall

Jump to solution

ePO 5.9.1

ENS 10.5.3

Hello.

We are migrating SEP to ENS, and in SEP Firewall we have location awarness group of rules for Corporate and NonCorporate networks.

I have no problem configuring the Corporate network, because in ENS there are an option to check the DNS Suffix, and if match the corporate DNS suffix, it aplies the asociate rlues.

But, when I tried to configure the Non Corporate group of rules, I dont see an equivalent option that I have in SEP, because in SEP I configure the following:

"If DNS Suffix is NOT corporate.dns.com, then aplies this rules"

Is there an alternative in ESN to detect that the client is NOT in the corporate network?

1 Solution

Accepted Solutions
Highlighted

Re: Different location awareness for ENS Firewall

Jump to solution

Hi mgamarra,

I'm currently in the middle of doing a Proof of Concept (PoC) with ENS Firewall, we're migrating from VSE 8.8 to ENS Threat Prevention and need to block some outbound ports (25 and mDNS), so we're testing the ENS Firewall at the moment.

What I discovered is the ENS firewall Location Awareness only seems to apply the rules under it if certain conditions are met, such as a Connection-Specific DNS suffix (i.e. abc.com). There isn't a way that I can see to do the opposite of this, such as identify a "public" network , etc. What it looks like you have to do is set a default "standard" firewall rules which apply everywhere that is considered public/private, and then create a Location Aware Group (LAG) with rules that apply when you are in domain. To simplify, think of it was Trusted vs Untrusted network. By default your firewall rules would be for "untrusted" networks, but if your system is on the domain, then the rules under the LAG apply and it appears as if you system is now in a "trusted" network.

View solution in original post

1 Reply
Highlighted

Re: Different location awareness for ENS Firewall

Jump to solution

Hi mgamarra,

I'm currently in the middle of doing a Proof of Concept (PoC) with ENS Firewall, we're migrating from VSE 8.8 to ENS Threat Prevention and need to block some outbound ports (25 and mDNS), so we're testing the ENS Firewall at the moment.

What I discovered is the ENS firewall Location Awareness only seems to apply the rules under it if certain conditions are met, such as a Connection-Specific DNS suffix (i.e. abc.com). There isn't a way that I can see to do the opposite of this, such as identify a "public" network , etc. What it looks like you have to do is set a default "standard" firewall rules which apply everywhere that is considered public/private, and then create a Location Aware Group (LAG) with rules that apply when you are in domain. To simplify, think of it was Trusted vs Untrusted network. By default your firewall rules would be for "untrusted" networks, but if your system is on the domain, then the rules under the LAG apply and it appears as if you system is now in a "trusted" network.

View solution in original post

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community