Create ECA Configuration elements
ECA Configuration elements contain the Trusted Certificate Authority element used to secure communication between the NGFW Engine and the Forcepoint One Endpoint clients.
Before you begin
For more details about the product and how to configure features, click Help or press F1.
Steps
Next steps
ECA Configuration Properties dialog box
Use this dialog box to define settings for integrating Forcepoint One Endpoint with Forcepoint NGFW.
Option | Definition |
---|---|
Name | The name of the element. |
ECA Configuration CAs | The Trusted Certificate Authority elements that are used to secure communication between the NGFW Engine and the Forcepoint One Endpoint clients. Click Add to add an element to the table, or Remove to remove the selected element. |
Advertise Firewall's Contact Address to ECA Clients | When selected, the NGFW Engine can send ICMP or ICMPv6 discovery messages to endpoint clients that are not aware that the
contact address for the NGFW Engine has changed or that the NGFW Engine can
receive Forcepoint One Endpoint metadata. The ICMP message is Destination Unreachable, and the type is Communication Administratively
Prohibited. If the NGFW Engine detects connections from networks that contain endpoint clients and there is a match for an Access rule that requires Forcepoint One Endpoint metadata, but the connections do not include Forcepoint One Endpoint metadata information, the NGFW Engine sends ICMP or ICMPv6 discovery messages to the network, advertising the contact address for the Firewall. The messages contain the shared secret that is also defined in the XML configuration file that is deployed to the endpoint clients. If a client responds and successfully authenticates, the NGFW Engine sends the latest XML configuration file to the client. |
Category (Optional) |
Includes the element in predefined categories. Click Select to select a category. |
Comment (Optional) |
A comment for your own reference. |