WatchGuard Technologies FireboxTM System 4.6 User Manual

Browse online or download User Manual for Networking WatchGuard Technologies FireboxTM System 4.6. WatchGuard Technologies FireboxTM System 4.6 User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 170
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - User Guide

WatchGuard®Firebox™ System User GuideFirebox System 4.6

Page 2 - Disclaimer

xCHAPTER 15 Reviewing and Working with log files ...103Viewing files with LogViewer ...

Page 3 - End-User License Agreement

Configuring CRYPTOCard server authentication90On the RADIUS Server1 Add the IP address of the Firebox where appropriate according to the RADIUS server

Page 4

VPN Manager Guide 91Configuring SecurID authentication8 Enter the value of the shared secret between the Firebox and the CRYPTOCard server.This is the

Page 5 - Declaration of Conformity

Using authentication to define remote user VPN access927 If you are using a backup server, enable the Specify backup SecurID server checkbox. Enter th

Page 6 - CE Notice

User Guide 93CHAPTER 14 Monitoring Firebox ActivityAn important part of an effective network security policy is the monitoring of network events. Moni

Page 7 - Table of Contents

Firebox Monitors94Setting Firebox Monitors view propertiesYou can configure Firebox Monitors to display traffic at different speeds, intervals, and am

Page 8

User Guide 95Firebox MonitorsPacket countsThe number of packets allowed, denied, and rejected between status queries. Rejected packets are denied pack

Page 9 - User Guide ix

Firebox Monitors96Block Network 123.152.24.64/28 eth2Logging optionsLogging options configured with either the QuickSetup wizard or by adding and conf

Page 10

User Guide 97Firebox Monitors42 http-serve S 1052 536 476 37241 fwcheck S 716 288 296 23243 http-proxy S 1072 660 580 47222121 smtp-proxy S 984 360 53

Page 11 - Introduction

HostWatch98198.148.32.0 * 255.255.255.0 U 1500 0 129eth1:0127.0.0.0 * 255.0.0.0 U 3584 0 9 lodefault 207.54.9.30 * UG 1500 0 95eth0ARP tableA snapshot

Page 12 - WatchGuard security suite

User Guide 99HostWatchThe HostWatch display uses the logging settings configured for your Firebox using the Policy Manager. For instance, to see all d

Page 13 - Minimum requirements

User Guide 1PART IIntroductionWelcome to WatchGuardThe WatchGuard Firebox System consists of:• A suite of management and security software tools• A Pl

Page 14 - Hardware requirements

HostWatch1002 Browse to locate and select the Logdb file.By default, log files are stored in the WatchGuard installation directory at C:\Program Files

Page 15 - Services

User Guide 101HostWatch4In the New User field, enter the user ID of the authenticated user to watch. Click Add. Repeat for each authenticated user tha

Page 16

HostWatch102

Page 17 - LiveSecurity Service

User Guide 103CHAPTER 15 Reviewing and Working with Log FilesLog entries are stored on the primary and backup LiveSecurity Event Processor. By default

Page 18 - LiveSecurity broadcasts

Viewing files with LogViewer1042 Configure LogViewer display preferences as you choose.For a description of each control on the General tab, right-cli

Page 19 - User Guide 9

VPN Manager Guide 105Displaying and hiding fieldsDisplaying and hiding fieldsUse the Preferences dialog box to show or hide columns displayed in LogVi

Page 20

Working with log files106IP header lengthLength, in octets, of the IP header for this packet. A header length that is not equal to 20 indicates that I

Page 21 - Technical Support

VPN Manager Guide 107Working with log files4 Enter the destination for the files in the Copy to This Directory box.5Click Merge.The log files are merg

Page 22 - Getting telephone support

Working with log files108

Page 23 - Training

User Guide 109CHAPTER 16 Generating Reports of Network ActivityHistorical Reports is a reporting tool that creates summaries and reports of Firebox lo

Page 24 - Online Help

WatchGuard Firebox System components2•Security suite• LiveSecurity ServiceWatchGuard FireboxThe Firebox family of appliances are specially designed an

Page 25 - Searching for topics

Specifying report sections110Creating a new reportFrom Historical Reports:1Click Add.2 Enter the report name.The report name will appear in Historical

Page 26 - Context-sensitive Help

User Guide 111Specifying a report time span2 Enable the checkboxes for sections to be included in the report.For a description of each section, see “R

Page 27 - WatchGuard Options

Exporting reports1123 Enter the number of elements to rank in the table.Default is 100.4 Select the style of graph to use in the report.5 Select the m

Page 28 - Obtaining WatchGuard options

User Guide 113Using report filtersExporting a report to a text fileWhen you select Text Export from the Setup tab on the Report Properties dialog box,

Page 29 - Configuring a Security Policy

Scheduling and running reports114Editing a filterAt any time, you can modify the properties of an existing filter. From the Filters dialog box in Hist

Page 30

User Guide 115Report sections and consolidated sectionsManually running a reportAt any time, you can run one or more reports using Historical Reports.

Page 31 - Firebox Basics

Report sections and consolidated sections116Session Summary – Packet FilteredA table, and optionally a graph, of the top incoming and outgoing session

Page 32 - Internet

User Guide 117Report sections and consolidated sectionsDenied Outgoing Packet DetailA list of denied outgoing packets, sorted by time. The fields are

Page 33 - Saving a configuration file

Report sections and consolidated sections118Reports attempts to resolve the server port to a table to represent the service name. If resolution fails,

Page 34 - Resetting Firebox passphrases

User Guide 119PART VWatchGuard® Virtual Private NetworkingA virtual private network (VPN) allows the secure tunneling of data between two networks (or

Page 35 - Install Guide

User Guide 3Minimum requirementsLiveSecurity ServiceThe innovative LiveSecurity Service subscription makes it easy to maintain the security of an orga

Page 37 - Using the WatchGuard Control

User Guide 121CHAPTER 17 Configuring Branch Office Virtual Private NetworkingBranch office virtual private networking (VPN) creates a secure tunnel, o

Page 38 - Firebox and VPN tunnel status

Using DVCP to connect to devices122• IP network addresses for the networks communicating with one another.• A common passphrase, known as a shared sec

Page 39 - Red exclamation point

User Guide 123Using DVCP to connect to devicesNote also that if you configure a SOHO for both Basic and Enhanced DVCP, the gateway names must be diffe

Page 40 - Changing the polling rate

Branch office VPN with IPSec124You can also change the network range of a WatchGuard client. However, when you save the configuration to the server, i

Page 41 - Policy Manager

User Guide 125Branch office VPN with IPSecand how WatchGuard implements branch office VPN with IPSec, see the Network Security Handbook.From Policy Ma

Page 42 - LogViewer

Branch office VPN with IPSec126Removing a gatewayFrom the Configure Gateways dialog box:1 Click the gateway. 2Click Remove.Configuring a tunnel with m

Page 43 - LiveSecurity Event Processor

User Guide 127Branch office VPN with IPSec5Use the Authentication drop list to select an authentication method.Options include: None (no authenticatio

Page 44

Branch office VPN with IPSec12811 After you add all tunnels for this gateway, click OK.The Configure Gateways dialog box appears.12 To configure more

Page 45 - Configuring a Network

User Guide 129Branch office VPN with IPSec9Use the Protocol drop list to limit the protocol used by the policy.Options include: * (specify ports but n

Page 46 - Install Guide

Minimum requirements4Hardware requirementsMinimum hardware requirements are the same as for the operating system on which the WatchGuard Firebox Syste

Page 47 - Setting up a routed network

Configuring WatchGuard VPN130Allow VPN access to any servicesTo allow all traffic from VPN connections, add the Any service to the Services Arena and

Page 48 - Defining a network route

User Guide 131Configuring WatchGuard VPN4In the Local Firebox IP field, enter an IP address from a reserved network not in use on the local or remote

Page 49 - Setting the default gateway

Configuring WatchGuard VPN132Configuring incoming services to allow VPNBecause users on the remote Firebox are technically outside the trusted network

Page 50 - Adding a new subnet

User Guide 133CHAPTER 18 Configuring the Firebox for Remote User VPNRemote user virtual private networking (RUVPN) establishes a secure connection bet

Page 51 - Removing a Subnet

Configuring shared servers for RUVPN134• The IP addresses of the DNS and WINS servers in the trusted network that perform IP address lookup on host al

Page 52

User Guide 135Configuring services to allow incoming RUVPN3 Enter the username and password.Firebox usernames are case sensitive.4 To add the user to

Page 53 - Blocking Sites and Ports

Configuring the Firebox for Remote User PPTP136 -From: Selected - To: pptp_users or ipsec_usersConfiguring the Firebox for Remote User PPTPConfiguring

Page 54 - Blocking a site permanently

User Guide 137Configuring the Firebox for Mobile User VPNFrom the Remote User Setup dialog box:1Click the PPTP tab.2Click Add.3Use the Choose Type dro

Page 55 - Blocking a port permanently

Configuring the Firebox for Mobile User VPN138automatically included in the Policy Manager software, to activate the feature a license for each instal

Page 56

User Guide 139Configuring the Firebox for Mobile User VPN10 Use the Encryption drop list to select an encryption method.Options available with the str

Page 57 - Configuring Services

User Guide 5PART IIWatchGuard® ServicesThe WatchGuard Firebox System is considerably more than a piece of hardware. This section describes two WatchGu

Page 58 - Creating a new service

Configuring debugging options140The packages are located on the WatchGuard LiveSecurity Service Web site at http://www.watchguard.com/support.Enter th

Page 59

User Guide 141CHAPTER 19 Preparing a Host for Remote User VPNRemote user virtual private networking (RUVPN) establishes a secure connection between an

Page 60 - Working with wg_ icons

Preparing the client computers142• Public IP addressRemote host operating systemThe remote client must be running Windows and have the most recent MSD

Page 61 - Deleting a service

User Guide 143Preparing the client computers5 Enter the domain name you are connecting to.This should be the same as the “Log on to Windows NT domain”

Page 62 - Setting up proxy services

Preparing the client computers1449Click Dial Out Only. Click Continue.10 Click OK. 11 Restart the machine.Adding a domain name to a Windows NT worksta

Page 63

User Guide 145Configuring the remote host for RUVPN with PPTP9In the Initial Connection window that appears, click Yes.10 Click Properties. The Virtua

Page 64 - Add masquerading options

Using Remote User PPTP14610 Click OK. Click OK again.11 Restart the computer.Installing a VPN adapter on Windows NTFrom the Windows NT Desktop of the

Page 65 - User Guide 55

User Guide 147Configuring debugging options3 Double-click the RUVPN connection.If you configured the client computer as described in “Windows 95/98 pl

Page 66

Configuring debugging options148

Page 67 - Service precedence

User Guide 149IndexAAccesscontrolling83Access rulesdefining49Accessing known issues 12ActivatingLiveSecurity Service8Active connections 95FTP 95Active

Page 69 - Controlling Web Traffic

150CChangingan interface IP address39IPSec policy order 129remote network entries on VPN 131Checklist, branch office VPN 121ClientDVCP122Client for Mi

Page 70 - Activating WebBlocker

User Guide 151characteristics 36configuration 36DVCPClient Wizard122introduction 122Dynamic NATadding entries64described 63disabling 65enabling 63, 65

Page 71

152monitors 2, 32, 93BandwidthMeter 94opening configuration file 23opening configuration file from 23PPP timeout disconnects 81reinitializing 25resett

Page 72

User Guide 153exporting reports as 112HTTP 48, 60, 94, 99protocol 55proxied 60proxy 59types of services 55HTTP proxy 112HTTP proxy reportsHTTP detail1

Page 73 - Translation

154for blocked sites 44global preferences 75LogViewer 103options 96PPTP 137replaying a file 99searching log files 103setting for a service 77setting u

Page 74 - Using simple dynamic NAT

User Guide 155NavigatingControl Center27Netscape Communicator 3Networkbroadcast2changing range of client 124configuration 95configuring 35configuring

Page 75 - Using service-based NAT

156pull-down menus 32services arena 32Status Bar 32toolbar 32Policy orderchanging IPSec129Polling ratechanging30Port address translation. See also Dyn

Page 76 - Adding external IP addresses

User Guide 157adding a domain name to an NT workstation144adding new domain for NT workstation 144installing a VPN adaptor for Windows 95/98145install

Page 77 - User Guide 67

158introduction 37Routes 97network configuration 37RUVPN 147activating remote user PPTP 136adding a domain name for NT 144adding members to built-in u

Page 78

User Guide 159Software Update 7SOHOediting tunnel properties123rebooting 124removing tunnel 124SpamScreen 18Security Parameter Indexsee alsoSPI (Secur

Page 79 - Notification

User Guide 7CHAPTER 1 LiveSecurity ServiceNo Internet security solution is complete without systematic updates. From the latest hacker techniques to t

Page 80

160manager 17mobile user 18multiple-box configuration 130preventing IP spoofing 131remote user 119removing IPSec gateway 126running with PPTP 147two-b

Page 81 - Enabling Syslog logging

LiveSecurity broadcasts8accompany each transmission for easy installation. These convenient transmissions relieve you of the burden of tracking the la

Page 82 - Reordering Event Processors

User Guide 9LiveSecurity broadcasts• The License Key number is located on the WatchGuard LiveSecurity Agreement License Key Certificate. Enter the num

Page 83 - User Guide 73

iiDisclaimerInformation in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless ot

Page 84 - Viewing the Event Processor

LiveSecurity broadcasts10

Page 85 - User Guide 75

User Guide 11CHAPTER 2 Technical SupportDeveloping and implementing a network security policy can be a challenge. In addition to familiarity with the

Page 86 - Controlling notification

Getting Internet technical support12Known issuesAnother source of information about the WatchGuard Firebox System is the Known Issues page on the Tech

Page 87 - User Guide 77

User Guide 13TrainingWhen you call WatchGuard Technical Support, you are prompted for your LiveSecurity License key. We use this key to track the info

Page 88

WatchGuard users group14Instructor-led coursesWatchGuard offers a series of courses supporting our product line. Current titles include a two-day cour

Page 89 - Management

User Guide 15Online HelpStarting WatchGuard Online HelpWatchGuard Online Help can be started either from the WatchGuard Management Station or directly

Page 90 - Install the modem

Online Help16Context-sensitive HelpIn addition to the regular online Help system, context-sensitive or What’s This? Help is also available. What’s Thi

Page 91 - OOB time-out disconnects

User Guide 17CHAPTER 3 WatchGuard OptionsThe WatchGuard Firebox System is enhanced by optional features designed to accommodate the needs of different

Page 92

Obtaining WatchGuard options18Mobile User VPNMobile User VPN is the WatchGuard IPSec implementation of remote user virtual private networking. Mobile

Page 93 - VPN Manager Guide 83

User Guide 19PART IIIConfiguring a Security PolicyThis section describes how to configure your security system. Its primary focus is on using the Watc

Page 94

User Guide iiiWatchGuard Technologies, Inc.Firebox System Software End-User License AgreementWatchGuard Firebox System (WFS) End-User License Agreemen

Page 95 - Implementing Authentication

20you to exert fine control over the type of Web sites users on your Trusted network are allowed to view.Set up network address translation (NAT)Hide

Page 96 - Removing a host alias

User Guide 21CHAPTER 4 Firebox BasicsThis chapter describes the following tasks, which require direct interaction between the Management Station and t

Page 97 - What is user authentication?

What is a Firebox?22Placing a Firebox within a networkThe most common location for a Firebox is directly behind the Internet router, as pictured below

Page 98

VPN Manager Guide 23Opening a configuration fileOpening a configuration filePolicy Manager is a comprehensive software tool for creating, modifying, a

Page 99 - VPN Manager Guide 89

Resetting Firebox passphrases24Saving a configuration to the local hard diskFrom Policy Manager in the Advanced view:1 Select File => Save => A

Page 100

VPN Manager Guide 25Setting the time zone• Don’t use words in standard dictionaries, even if you use them backward or in a foreign language. Create yo

Page 101 - VPN Manager Guide 91

Reinitializing a misconfigured Firebox264 When you complete the QuickSetup wizard, remove the loopback cable (assuming your Firebox has one) and retu

Page 102

User Guide 27CHAPTER 5 Using the WatchGuard Control CenterThe WatchGuard Control Center combines access to WatchGuard Firebox System applications and

Page 103 - Monitoring Firebox Activity

Control Center components28• A real-time monitor of traffic through the Firebox.QuickGuideThe top part of the display just below the title bar is the

Page 104 - Reference Guide

User Guide 29Control Center components•IPSec•DVCP• WatchGuard VPNThe first line of the tunnel entry shows the name that was assigned when the tunnel w

Page 105 - Firebox Monitors

iv(D) Transfer this license to another party unless (i) the transfer is permanent, (ii) the third party recipient agrees to the terms of this AGREEMEN

Page 106

Working with the Control Center30When you expand an entry that has a red exclamation point, another exclamation point appears next to the specific dev

Page 107 - User Guide 97

User Guide 31Policy Managermuch more appropriate tool for tracking logs; Traffic Monitor just provides a real-time view of what the Firebox activity.

Page 108 - HostWatch

Firebox Monitors32The Policy Manager display includes:Pull-down menusMenus that provide access to most configuration and administration tasks.ToolbarA

Page 109 - Replaying a log file

User Guide 33HostWatchHostWatchThe HostWatch application displays active connections occurring on a Firebox in real time. It can also graphically repr

Page 110 - Viewing authenticated users

LiveSecurity Event Processor34

Page 111 - Modifying view properties

User Guide 35CHAPTER 6 Configuring a NetworkConfiguring a network refers to setting up the three Firebox interfaces. To do this, you need to:• Enter t

Page 112

Setting up a drop-in network36The QuickSetup wizard also writes a basic configuration file called wizard.cfg to the hard disk of the Management Statio

Page 113 - Viewing files with LogViewer

User Guide 37Setting up a routed network• The Trusted interface ARP address replaces the router’s ARP address.• All three Firebox interfaces are assig

Page 114 - Exporting log data

Adding a secondary network38Adding a secondary networkA secondary network is a network on the same physical wire as a Firebox interface that has an ad

Page 115 - Displaying and hiding fields

User Guide 39Defining a host routeDefining a host routeConfigure a host route if there is only one host behind the router. Enter the IP address of tha

Page 116 - Working with log files

User Guide vsubdivision (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013, or in subdivision (c)(1) and

Page 117 - Firebox IP

Entering WINS and DNS server addresses40Entering WINS and DNS server addressesSeveral advanced features of the Firebox, such as DHCP and Remote User V

Page 118

User Guide 41Defining a Firebox as a DHCP serverModifying an existing subnetFrom Policy Manager:1 Select Network => Configuration. Click the DHCP S

Page 119 - Activity

Defining a Firebox as a DHCP server42

Page 120 - Specifying report sections

User Guide 43CHAPTER 7 Blocking Sites and PortsMany types of network security attacks are easily identified by patterns found in packet headers. Port

Page 121 - Setting report properties

Blocking a site permanently442 Modify the default packet-handling properties according to your security policy preferences.For a description of each c

Page 122 - Exporting reports

User Guide 45Blocking a port permanently2In the Category list, click Blocked Sites.3 Modify the logging and notification parameters according to your

Page 123 - Filter Name

Blocking sites temporarily with service settings46Blocking sites temporarily with service settingsUse service properties to automatically and temporar

Page 124 - Scheduling a report

User Guide 47CHAPTER 8 Configuring ServicesThe Services Arena of Policy Manager displays an icon for each configured service. A service represents a p

Page 125 - Manually running a report

Creating a new service487 You can add multiple services to the Services Arena while the Services dialog box is open. When you finish adding services,

Page 126

User Guide 49Defining service properties8In the Port text box, enter the well-known port number for this service.For a list of well-known services and

Page 127 - Consolidated Sections

viFCC CertificationThis device has been tested and found to comply with limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. Ope

Page 128

Defining service properties506Click OK.Adding outgoing service propertiesFrom Policy Manager:1 In the Services Arena, double-click the service. Click

Page 129 - Networking

User Guide 51Configuring services for authenticationConfiguring services for authenticationOne way to create effective user authentication environment

Page 130

Setting up proxy services522 On the toolbar, click the Delete Service icon (it appears as an “X”).You can also select Edit => Delete. A verificati

Page 131 - Private Networking

User Guide 53Setting up proxy services3Click Incoming.The Incoming SMTP Proxy dialog box appears, displaying the General tab.4 Modify general properti

Page 132 - Basic and Enhanced DVCP

Setting up proxy services54Configuring the outgoing SMTP proxyUse the Outgoing SMTP Proxy dialog box to set the parameters for traffic going from your

Page 133 - Editing a tunnel to a device

User Guide 55Setting up proxy services5Click OK.6Click F i l e => S a v e => T o F i r e b o x to save your changes to the Firebox. Specify

Page 134 - Branch office VPN with IPSec

Service precedence563 If you are using the HTTP proxy service because you want to use WebBlocker, follow the procedure in the next section. Otherwise,

Page 135 - Configuring a gateway

User Guide 57Service precedence“IP” refers to exactly one host IP address; “List” refers to multiple host IP addresses, a network address, or an alias

Page 136 - Removing a gateway

Service precedence58

Page 137 - User Guide 127

User Guide 59CHAPTER 9 Controlling Web TrafficWebBlocker is a feature of the Firebox System that works in conjunction with the HTTP proxy to provide W

Page 138 - Creating an IPSec policy

User Guide viiTable of ContentsPART IIntroduction ...1Welcome to WatchGua

Page 139 - Changing IPSec policy order

Configuring the WebBlocker service60Logging and WebBlockerWebBlocker logs attempts to access sites blocked by WebBlocker. The log that is generated di

Page 140 - Configuring WatchGuard VPN

User Guide 61Configuring the WebBlocker serviceProcessor regularly and automatically updates the WebBlocker database stored on your Firebox. From Poli

Page 141 - User Guide 131

Manually downloading the WebBlocker database622In the Allowed Exceptions section, click Add to add either a network or host IP address to be allowed a

Page 142

User Guide 63CHAPTER 10 Setting Up Network Address TranslationNetwork address translation (NAT) hides internal network addresses from hosts on an exte

Page 143 - Remote User VPN

Using simple dynamic NAT64Using simple dynamic NATIn the majority of networks, the preferred security policy is to globally apply network address tran

Page 144 - Adding remote access users

User Guide 65Using service-based NATUsing service-based NATUsing service-based NAT, you can set outgoing dynamic NAT policy on a service-by-service ba

Page 145 - Using the Any service

Configuring a service for incoming static NAT66Configuring a service for incoming static NATStatic NAT works on a port-to-host basis. Incoming packets

Page 146 - Activating Remote User PPTP

User Guide 67Configuring a service for incoming static NAT6 Enter the internal IP address.The internal IP address is the final destination on the Trus

Page 147 - User Guide 137

Configuring a service for incoming static NAT68

Page 148 - Entering license keys

User Guide 69CHAPTER 11 Setting Up Logging and NotificationLogging and notification are crucial to an effective network security policy. Together, the

Page 149 - User Guide 139

viiiResetting Firebox passphrases ...24Setting the time zone ...

Page 150 - Configuring debugging options

WatchGuard logging architecture70log messages to the second Event Processor. It continues through the list until it finds an Event Processor capable o

Page 151 - User VPN

User Guide 71Designating Event Processors for a Fireboxyou run the QuickSetup wizard. You can specify a different primary Event Processor as well as m

Page 152 - Remote host operating system

Designating Event Processors for a Firebox72Removing an Event ProcessorRemove an Event Processor when you no longer want to use it for any logging pur

Page 153 - User Guide 143

User Guide 73Setting up the LiveSecurity Event ProcessorAnother way to set the Event Processor (and domain controller) clocks is to use an independent

Page 154

Setting up the LiveSecurity Event Processor74Windows NT service. The default method on installation is for it to run as a Windows NT service.As a Wind

Page 155 - User Guide 145

User Guide 75Setting global logging and notification preferencesStarting and stopping the Event ProcessorThe Event Processor starts automatically when

Page 156 - Using Remote User PPTP

Customizing logging and notification by service or option763 For a record size, enable the By Number of Entries checkbox. Use the scroll control or en

Page 157

User Guide 77Customizing logging and notification by service or optionSend NotificationEnable this checkbox to enable notification on the event type;

Page 158

Customizing logging and notification by service or option78From Policy Manager:1 Double-click a service in the Services Arena.The Properties dialog bo

Page 159

User Guide 79CHAPTER 12 Connect with Out-of-Band ManagementThe WatchGuard Firebox System out-of-band (OOB) management feature enables the Management S

Page 160

User Guide ixService precedence ... 56CHAPTER 9 Controlling Web Traffic ...

Page 161 - User Guide 151

Enabling the Management Station80Preparing a Windows NT Management Station for OOBInstall the Microsoft Remote Access Server (RAS) on the Management S

Page 162

User Guide 81Configuring the Firebox for OOB5 Enter a name for your connection.This can be anything that reminds you of the icon’s purpose — VPN Conne

Page 163 - User Guide 153

Establishing an OOB connection82

Page 164

VPN Manager Guide 83PART IVAdministering a Security PolicyNetwork security is more than just designing and implementing a security policy and copying

Page 166

VPN Manager Guide 85CHAPTER 13 Creating Aliases and Implementing AuthenticationAliases are shortcuts used to identify groups of hosts, networks, or us

Page 167 - User Guide 157

Using host aliases86Adding a host aliasFrom Policy Manager:1 Select Setup => Authentication.The Member Access and Authentication Setup dialog box a

Page 168

VPN Manager Guide 87What is user authentication?What is user authentication?User authentication allows the tracking of connections based on name rathe

Page 169 - User Guide 159

Configuring Firebox authentication88Configuring Firebox authenticationYou can use the WatchGuard Firebox System to define users and groups for authent

Page 170

VPN Manager Guide 89Configuring RADIUS server authentication2 Under Authentication Enabled Via, click the NT Service option.WatchGuard activates the W

Comments to this Manuals

No comments