Installing the Firebox SSL VPN Gateway for the First Time

To configure TCP/IP Settings Using Network Cables

The Firebox SSL VPN Gateway has two network adapters installed. One network adapter communicates with the Internet and client computers that are not inside the corporate network. The other network adapter communicates with the internal network.

WatchGuard recommends that both network adapters be configured for maximum security. If only one network adapter is used, it has to be routable for internal resources using Network Address Translation (NAT). Also, if only one network adapter is used, throughput of network traffic is cut in half and can cause a bottleneck of network traffic.

You can install the Firebox SSL VPN Gateway and configure TCP/IP settings using network cables, such as two RJ-45 network cables, or cross-over cables. The RJ-45 cables are connected to a network switch and to the Firebox SSL VPN Gateway. The cross-over cables are connected to a Windows computer and the Firebox SSL VPN Gateway.

To configure TCP/IP settings using network cables

1Power on the Firebox SSL VPN Gateway.

After about three minutes, the Firebox SSL VPN Gateway is ready for its initial configuration with your network.

2Open a Web browser and type https://10.20.30.40:9001 to open the Administration Portal. Use the default user name and password of root and rootadmin.

3On the Downloads tab, under Firebox SSL VPN Gateway Administration Tool, click Install the

Firebox SSL VPN Gateway Administration Tool.

Follow the prompts to complete installation.

4Log on to the Administration Tool using the default user name and password.

5On the Firebox SSL VPN Gateway Cluster tab, open the window for the Firebox SSL VPN Gateway.

6On the General Networking tab, under Interface 0 and Interface 1, next to IP Address, type the new IP addresses of the appliance.

7In Subnet mask, enter the subnet mask that is appropriate for the IP address entered for the interface(s).

8In External FQDN, type the fully qualified domain name.

Note

Important: The FQDN must match what is on the digital certificate and the license for the Firebox SSL VPN Gateway.

9In Duplex Mode select the direction of the transmission data. The default setting is auto. You can also select full duplex or half duplex.

10 In Speed Mode select the network speed of the adapter.

The default setting is auto. You can also select 10Mbps, 100Mbps, or 1000Mbps.

11 In Maximum Transmission Unit (MTU), select the maximum transmission unit that defines the maximum size of the transmitted packet.

The default setting is 1500.

12In Port, select the incoming port that is used for connections. The default is 443.

13To configure a default gateway, in IP address, type the IP address of the gateway. In Interface, select the network adapter on the Firebox SSL VPN Gateway with which the Default Gateway communicates.

The IP address is the default gateway device, such as the main router, firewall, or server load balancers, depending on your network configuration. This should be the same as the Default Gateway setting that is on computers on the same subnet.

Administration Guide

23

Page 33
Image 33
WatchGuard Technologies manual To configure TCP/IP Settings Using Network Cables, Power on the Firebox SSL VPN Gateway

SSL VPN specifications

WatchGuard Technologies offers a robust SSL VPN solution designed for secure remote access to corporate networks. As businesses increasingly rely on a remote workforce, the need for secure and reliable connectivity has never been more critical. WatchGuard's SSL VPN features advanced security technologies that ensure data integrity and confidentiality while enabling seamless access to applications and resources.

One of the standout features of WatchGuard's SSL VPN is its user-friendly interface. The solution is designed to simplify the user experience, enabling employees to connect to the VPN with minimal complexity. With a straightforward setup process, users can quickly establish secure connections from various devices, including laptops, smartphones, and tablets. This flexibility supports a diverse workforce, allowing employees to work from different locations without compromising security.

In addition to its ease of use, WatchGuard's SSL VPN is built on robust security technologies. It employs end-to-end encryption to safeguard data in transit, ensuring that only authorized users can access sensitive information. By utilizing SSL (Secure Sockets Layer) protocols, the VPN creates a secure tunnel between the user’s device and the corporate network, protecting against potential threats such as eavesdropping or man-in-the-middle attacks.

Moreover, WatchGuard Technologies includes multiple authentication options, adding another layer of security. The solution supports multi-factor authentication (MFA), requiring users to provide additional verification beyond just a password. This could involve mobile device verification or biometric authentication, significantly reducing the risk of unauthorized access.

Another key characteristic of WatchGuard’s SSL VPN is its integration with other WatchGuard security solutions. Businesses can benefit from a comprehensive security posture by leveraging firewalls and intrusion prevention systems along with the SSL VPN. This holistic approach ensures that remote connections are continually monitored and secured against evolving cyber threats.

Scalability is also a crucial aspect of WatchGuard's SSL VPN, accommodating growing organizations with changing needs. The solution can easily scale to support an increasing number of remote users without compromising performance. With robust performance metrics, businesses can ensure that even during peak usage times, the VPN remains responsive and reliable.

In summary, WatchGuard Technologies' SSL VPN solution combines ease of use, robust security, flexible authentication, and scalability. These features make it an ideal choice for organizations seeking to provide secure remote access to their employees while maintaining a strong defense against cyber threats. With WatchGuard, businesses can confidently navigate the challenges of a digital landscape, ensuring their network remains secure as they embrace remote work.