
| McAfee® Host Intrusion Prevention 6.1 Product Guide | Firewall Policies | 
| 
 | Overview | 
5
| Protocol | Description of handling | 
| 
 | 
 | 
| TCP | TCP protocol works on the  | 
| 
 | initiates a new connection, it sends a packet to its target with a SYN bit that is | 
| 
 | set, indicating a new connection. The target responds by sending a packet to | 
| 
 | the client with a  | 
| 
 | with an ACK bit set and the stateful connection is established. All outgoing | 
| 
 | packets are allowed, but only incoming packets that are part of the established | 
| 
 | connection are allowed. An exception is when the firewall first queries the TCP | 
| 
 | protocol and adds all  | 
| 
 | |
| 
 | The TCP connection timeout, which is set with the Firewall Options policy, is | 
| 
 | enforced only when the connection is not established. | 
| 
 | A second or forced TCP timeout applies to established TCP connections only. | 
| 
 | This timeout is controlled by a registry setting and has a default value of one | 
| 
 | hour. Every four minutes the firewall queries the TCP stack and discards | 
| 
 | connections that are not reported by TCP. | 
| 
 | 
 | 
| DNS | There is query/response matching to ensure DNS responses are only allowed to | 
| 
 | the local port that originated the query and only from a remote IP address that | 
| 
 | has been queried within the UDP Virtual Connection Timeout interval. Incoming | 
| 
 | DNS responses are allowed if: | 
| 
 |  The connection in the state table has not expired. | 
| 
 |  The response comes from the same remote IP address and port where the | 
| 
 | request was sent. | 
| 
 | 
 | 
| DHCP | There is query/response matching to ensure that return packets are allowed | 
| 
 | only for legitimate queries, Thus incoming DHCP responses are allowed if: | 
| 
 |  The connection in the state table has not expired. | 
| 
 |  The response transaction ID matches the one from the request. | 
| 
 | 
 | 
| FTP |  The firewall performs stateful packet inspection on TCP connections opened | 
| 
 | on port 21. Inspection occurs only on the control channel, the first | 
| 
 | connection opened on this port. | 
| 
 |  FTP inspection is performed only on the packets that carry new information. | 
| 
 | Retransmitted packets are ignored. | 
| 
 |  Dynamic rules are created depending on direction (client/server) and mode | 
| 
 | (active/passive): | 
| 
 | |
| 
 | parsing the incoming port command, provided the port command RFC 959 | 
| 
 | compliant. The rule is deleted when the server initiates the data connection | 
| 
 | or the rule expires. | 
| 
 | |
| 
 | parsing the incoming port command. | 
| 
 | |
| 
 | when it reads the PASV command response sent by the FTP server, | 
| 
 | provided it has previously seen the PASV command from the FTP client and | 
| 
 | the PASV command is RFC 959 compliant. The rule is deleted when the | 
| 
 | client initiates the data connection or the rule expires. | 
| 
 | |
| 
 | 
 | 
Firewall rule groups and connection-aware  groups
You can group rules for easier management. Normal rule groups do not affect the way Host Intrusion Prevention handles the rules within them; they are still processed from top to bottom.
Host Intrusion Prevention also supports a type of rule group that does affect how rules are handled. These groups are called 
74
