Installation guide
16
Chapter 2 Planning the Installation
Introduction to McAfee IPS and Layer 2 Firewall
A McAfee IPS or Layer 2 Firewall system consists of the McAfee Security Management Center
(SMC) and one or more IPS engines and/or Layer 2 Firewall engines, and one or more Master
Engines, Virtual IPS engines and/or Virtual Layer 2 Firewall engines. IPS engines, Layer 2
Firewalls, Virtual IPS engines, and Virtual Layer 2 Firewalls pick up network traffic, inspect it,
and create event data for further processing by the Log Server.
The following table describes the installation modes for IPS engines, Layer 2 Firewalls, and
Master Engines that host Virtual IPS engines or Virtual Layer 2 Firewalls.
Table 2.1 Installation Modes for IPS Engines and Layer 2 Firewalls
NGFW Role Mode Description
IPS
Inline
In an inline installation, the traffic flows through the IPS engine.
The IPS engine has full control over the traffic flow and can be
used to automatically block any traffic. An inline IPS engine can
also enforce blacklisting commands received from other
components. Fail-open network cards can be used to ensure
traffic flow is not disrupted when the IPS engine is offline. An
inline IPS engine also provide access control and logging for any
Ethernet traffic (layer 2).
Capture
In a capture installation, external equipment duplicates the
traffic flow for inspection, and the IPS engine just “listens in”.
The IPS engine does not have direct control over the traffic flow,
but it can respond to selected threats by sending packets that
reset the connections. An IDS-only IPS engine can send
blacklisting requests to other IPS engines, Layer 2 Firewalls, or
Firewalls, but it cannot enforce blacklisting requests from other
components.
Layer 2 Firewall
Inline
In an inline installation, the traffic flows through the Layer 2
Firewall. The Layer 2 Firewall has full control over the traffic flow
and can be used to automatically block any traffic. An inline
Layer 2 Firewall can also enforce blacklisting commands received
from other components. An inline Layer 2 Firewall also provides
access control and logging for any Ethernet traffic (layer 2).
Capture
(Passive
Firewall)
In a capture (Passive Firewall) installation, external equipment
duplicates the traffic flow for inspection to the Layer 2 Firewall,
and the Layer 2 Firewall just “listens in”. The Layer 2 Firewall
does not have direct control over the traffic flow, but it can
respond to selected threats by sending packets that reset the
connections. A Layer 2 Firewall in Passive Firewall mode can
send blacklisting requests to other Layer 2 Firewalls, IPS
engines, or Firewalls, but it cannot enforce blacklisting requests
from other components.