Manuals
/
WatchGuard Technologies
/
Computer Equipment
/
Network Router
WatchGuard Technologies
FireboxTM System 4.6
manual
Models:
FireboxTM System 4.6
1
94
170
170
Download
170 pages
21.61 Kb
91
92
93
94
95
96
97
98
Install
Setting the default gateway
Connecting to a Firebox
Opening a configuration file
Known issues
Resetting Firebox passphrases
Adding remote access users
Select Setup =Time Zone
Setting privileges
What is
Page 94
Image 94
84
Page 93
Page 95
Page 94
Image 94
Page 93
Page 95
Contents
WatchGuard Firebox System User Guide
Disclaimer
Copyright and Patent Information
WatchGuard Firebox System WFS End-User License Agreement
Page
Declaration of Conformity
Watchguard
CE Notice
FCC Certification
CSA Statement
Table of Contents
Using the WatchGuard Control Center
Setting Up Network Address Translation
149
Welcome to WatchGuard
Part I Introduction
WatchGuard Firebox System components
WatchGuard Control Center
WatchGuard Firebox
WatchGuard security suite
Software requirements
LiveSecurity Service
Minimum requirements
Web browser requirements
Hardware requirements
CPU
WatchGuard Optional Features
Part II WatchGuard Services
LiveSecurity Service
Technical Support
Page
LiveSecurity broadcasts
LiveSecurity Service
Software Update
Information Alert
Support Flash
Activating the LiveSecurity Service
Editorial
Virus Alert
Minimize or close your Web browser
LiveSecurity broadcasts
Accessing frequently asked questions FAQ
Technical Support
Getting Internet technical support
Known issues
Click the LSS/SOHO Known Issues link on the left
Getting telephone support
Training
WatchGuard Interactive Training System Wits
Online Help
WatchGuard users group
Instructor-led courses
Copying the Help system to additional platforms
Starting WatchGuard Online Help
Searching for topics
Online Help system requirements
Context-sensitive Help
VPN Manager
WatchGuard Options
Currently available options
High Availability
Mobile User VPN
Obtaining WatchGuard options
SpamScreen
Part III Configuring a Security Policy
Set up logging and notification
Set up network address translation NAT
Connect with out-of-band management
What is a Firebox?
Firebox Basics
Placing a Firebox within a network
Opening a configuration from the Firebox
Opening a configuration file
Saving a configuration file
Opening a configuration from a local hard disk
Saving a configuration to the Firebox
Resetting Firebox passphrases
Saving a configuration to the local hard disk
Tips for creating secure passphrases
Select Setup =Time Zone
Setting the time zone
Reinitializing a misconfigured Firebox
Reinitialize the Firebox using the QuickSetup wizard
Booting from the system area
Navigating the WatchGuard Control Center
Using the WatchGuard Control Center
Starting the Control Center and connecting to a Firebox
Control Center components
Front panel
QuickGuide
Firebox and VPN tunnel status
Expanding and collapsing the display
IPSec
Remote VPN tunnels
Red exclamation point
Working with the Control Center
Connecting to a Firebox
Setting the maximum number of log messages
Traffic Monitor
Manipulating the Traffic Monitor
Policy Manager
Opening WatchGuard Firebox System tools
LogViewer
Firebox Monitors
Changing the Policy Manager view
Historical Reports
HostWatch
LiveSecurity Event Processor
LiveSecurity Event Processor
Trusted
Configuring a Network
Running the QuickSetup wizard
External
Setting up a drop-in network
Setting up a routed network
Defining a network route
Select Network = Configuration
Adding a secondary network
Select Network = Routes
Defining a host route
Setting the default gateway
Select Network = Default Gateway
Changing an interface IP address
Entering Wins and DNS server addresses
Select Network = Configuration. Click the General tab
Select Network = Configuration. Click the Dhcp Server tab
Defining a Firebox as a Dhcp server
Removing a Subnet
Modifying an existing subnet
Click the subnet to remove it. Click Remove Click OK
Defining a Firebox as a Dhcp server
Select Setup = Default Packet Handling
Configuring default packet handling
Blocking Sites and Ports
Changing the auto-block duration
Blocking a site permanently
Removing a blocked site
Logging and notification for blocked sites
Logging and notification for blocked ports
Blocking a port permanently
Removing a blocked port
Category list, click Blocked Sites
Configuring a service to temporarily block sites
Blocking sites temporarily with service settings
Viewing the Blocked Sites list
Adding an existing service
Configuring Services
Click OK to close the Properties dialog box
Secure
Creating a new service
Ignore
Port
Defining service properties
Adding incoming service properties
Adding addresses to service properties
Adding outgoing service properties
Working with wg icons
Deleting a service
Configuring services for authentication
Modifying a service
Under Internal Hosts, click Add
Configuring the incoming Smtp proxy
Setting up proxy services
Configuring an Smtp proxy service
Click Yes
Protecting your mail server against relaying
Selecting content types
Adding address patterns
Select headers to allow
Click Outgoing
Configuring an FTP proxy service
Configuring the outgoing Smtp proxy
Add masquerading options
Configuring an Http proxy service
Service precedence
From Rank Any List
Service precedence
How WebBlocker works
Controlling Web Traffic
Reverting to old WebBlocker databases
Logging and WebBlocker
Configuring the WebBlocker service
Prerequisites to using WebBlocker
Activating WebBlocker
Creating WebBlocker exceptions
Setting privileges
Scheduling operational and non-operational hours
Click the WebBlocker Controls tab
Manually downloading the WebBlocker database
Debug- Outputs debugging information
Setting Up Network Address Translation
What is dynamic NAT?
Enabling simple dynamic NAT
Using simple dynamic NAT
Select Setup = NAT
Adding dynamic NAT entries
Enabling service-based NAT
Using service-based NAT
Configuring service-based NAT exceptions
Select Network = Configuration. Click the External tab
Configuring a service for incoming static NAT
Setting static NAT for a service
Adding external IP addresses
Checkbox
Enter the internal IP address
Click OK to close the Add Static NAT dialog box
Configuring a service for incoming static NAT
Setting Up Logging Notification
Ensure logging with failover logging
Designating Event Processors for a Firebox
WatchGuard logging architecture
LiveSecurity Event Processor
Adding an Event Processor
Editing an Event Processor setting
Select Setup = Logging
Enabling Syslog logging
Synchronizing Event Processors
Removing an Event Processor
Reordering Event Processors
For Windows NT Event Processors
Running an Event Processor on Windows
Setting up the LiveSecurity Event Processor
Installing the Event Processor program
Running an Event Processor on Windows NT or Windows
Viewing the Event Processor
As a Windows NT or Windows 2000 Service
Interactive mode from a DOS window
Click WG LiveSecurity Event Processor. Click Startup
Setting the interval for log rollover
Setting global logging and notification preferences
Setting the log encryption key
Starting and stopping the Event Processor
Controlling notification
Customizing logging and notification by service or option
Scheduling log reports
Category
Setting logging and notification for a service
Setting Launch Interval and Repeat Count
Setting logging and notification for blocked sites and ports
Select Setup = Blocked Sites
Connect with Out-of-Band Management
Connecting a Firebox with OOB management
Enabling the Management Station
Preparing a Windows NT Management Station for OOB
Install the modem
Configure the dial-up connection
Preparing a Windows 95/98 Management Station for OOB
Configuring PPP for connecting to a Firebox
Configuring the Firebox for OOB
Select Network = Configuration. Click the OOB tab
Establishing an OOB connection
Establishing an OOB connection
Firebox Activity Monitors
Part IV Administering a Security Policy
Aliases and Authentication
Network Activity Reports
Page
Creating Aliases Implementing Authentication
Using host aliases
Modifying a host alias
Adding a host alias
Removing a host alias
User authentication types
What is user authentication?
How user authentication works
Under Authentication Enabled Via, click the Firebox option
Configuring Firebox authentication
Configuring Windows NT Server authentication
To close the Setup Remote User dialog box, click Close
Configuring Radius server authentication
Click the Windows NT Server tab
On the Radius Server
Configuring CRYPTOCard server authentication
Enter the administrator password
Enter or accept the time-out in seconds
Configuring SecurID authentication
Using authentication to define remote user VPN access
Example Configuring a service for Remote User VPN
Starting Firebox Monitors and connecting to a Firebox
Monitoring Firebox Activity
Bandwidth Meter
Setting Firebox Monitors view properties
ServiceWatch
StatusReport
Log and notification hosts
Network configuration
Packet counts
Blocked Sites list
Memory
Authentication host information
Logging options
Load average
Routes
Interfaces
Interface the Firebox uses for each destination address
Blocked Sites list
Authentication list
ARP table
Select File = Connect
Replaying a log file
HostWatch display
Select File = Open
Viewing specific hosts
Viewing authenticated users
Controlling the HostWatch display
Viewing specific ports
Modifying view properties
Add
HostWatch 102
Viewing files with LogViewer
Setting LogViewer preferences
Reviewing and Working with Log Files
Starting LogViewer and opening a log file
Searching for specific entries
Copying and exporting LogViewer data
Displaying and hiding fields
Working with log files
Consolidating logs from multiple locations
Forcing the rollover of log files
Setting log encryption keys
Copying log files
From LiveSecurity Event Processor
Working with log files 108
Creating and editing reports
Generating Reports of Network Activity
Starting Historical Reports
Viewing the reports list
Editing an existing report
Specifying report sections
Creating a new report
Deleting a report
Specifying a report time span
Setting report properties
Consolidating report sections
Exporting a report to WebTrends for Firewalls and VPNs
Exporting reports
Exporting reports to Html format
Enter the number of elements to rank in the table
Exporting a report to a text file
Using report filters
Creating a new filter
Deleting a filter
Scheduling and running reports
Editing a filter
Applying a filter
Report sections and consolidated sections
Manually running a report
Host Summary Proxied Traffic
Session Summary Packet Filtered
Time Summary Proxied Traffic
Proxy Summary
Consolidated Sections
118
Branch office virtual private network
Part V WatchGuard Virtual Private Networking
Remote user virtual private network
120
Configuring Branch Office Virtual Private Networking
Configuration checklist
Basic and Enhanced Dvcp
Using Dvcp to connect to devices
How does Dvcp work?
Creating a tunnel to a Soho or SOHOtc
Telecommuter IP Address
Editing a tunnel to a device
Select Network = Branch Office VPN = Basic Dvcp
Soho Private Network
Defining a Firebox as an Enhanced Dvcp Client
Branch office VPN with IPSec
Removing a tunnel to a device
Select the tunnel policy. Click Edit
Adding a gateway
Configuring a gateway
Select Network = Branch Office VPN = IPSec
Click Gateways
Using Encapsulated Security Protocol ESP
Configuring a tunnel with manual security
Incoming Settings for Outgoing checkbox
Removing a gateway
Click Key. Enter a passphrase. Click OK
Configuring a tunnel with dynamic security
Using Authenticated Headers AH
Click the Dynamic Security tab
Bypass
Creating an IPSec policy
Block
Dst Port field, enter the remote host port
Src Port field, enter the local host port
Configuring services for branch office VPN with IPSec
Changing IPSec policy order
Incoming
Setting up WatchGuard VPN
Configuring WatchGuard VPN
WatchGuard VPN configuration models
Allow VPN access to any services
Preventing IP spoofing with WatchGuard VPN
Enable the Activate WatchGuard VPN checkbox
Changing remote network entries
Enter the encryption key. Click Make Key
Configuring incoming services to allow VPN
Verifying successful WatchGuard VPN configuration
Remote User Pptp
Configuring the Firebox for Remote User VPN
Mobile User VPN
Adding remote access users
Configuring shared servers for Ruvpn
Adding a member to built-in Ruvpn user groups
By individual service
Configuring services to allow incoming Ruvpn
Using the Any service
Entering IP addresses for Remote User sessions
Configuring the Firebox for Remote User Pptp
Activating Remote User Pptp
Select Network = Remote User. Click the Pptp tab
Purchasing a Mobile User VPN license
Configuring the Firebox for Mobile User VPN
Rules for valid Remote User Pptp addresses
Defining a new mobile user
Preparing Mobile User VPN configuration files
Entering license keys
Select Network = Remote User. Click the Mobile User VPN tab
Modifying an existing Mobile User VPN entry
Saving the configuration to a Firebox
Distributing the software and configuration files
Select Network = Remote User
Debugging Mobile User VPN
Configuring debugging options
Debugging Remote User VPN Pptp
Preparing a Host for Remote User VPN
Preparing the client computers
Windows 95/98 platform preparation
Remote host operating system
Click the Identification tab
Installing Dial-Up Adapter #2 VPN Support
Installing Client for Microsoft Networks
Windows NT platform preparation
Adding a domain name to a Windows NT workstation
Setting up Ruvpn for Windows
Click Dial Out Only. Click Continue
Select Computer Browser
Initial Connection window that appears, click Yes
Configuring the remote host for Ruvpn with Pptp
Installing a VPN adapter on Windows 95/98
Click Obtain an IP Address Automatically. Click OK
Installing a VPN adapter on Windows NT
Using Remote User Pptp
Starting Remote User Pptp
Double-click the Ruvpn connection
Enter the remote client username and password
Running Remote User Pptp
Click Connect
Configuring debugging options 148
Index
150
User Guide 151
152
User Guide 153
154
User Guide 155
156
User Guide 157
158
User Guide 159
160
Top
Page
Image
Contents