iv Firebox X Edge e-Series
Set your computer to connect to the Edge................................................................................................ 17
Use DHCP ........................................................................................................................................................... 17
Use a static IP address ................................................................................................................................... 18
Chapter 3 Configuration Pages Overview .............................................................................................. 21
About Edge Configuration Pages .................................................................................................................. 21
Connect to the Firebox X Edge....................................................................................................................... 21
Navigating the Firebox X Edge User Interface .......................................................................................... 23
System Status page........................................................................................................................................ 23
Network page................................................................................................................................................... 24
Firebox Users page......................................................................................................................................... 25
Administration page...................................................................................................................................... 26
Firewall page .................................................................................................................................................... 27
Logging page ................................................................................................................................................... 28
WebBlocker page............................................................................................................................................ 29
spamBlocker page .......................................................................................................................................... 30
Gateway AV/IPS page.................................................................................................................................... 31
VPN page............................................................................................................................................................ 32
Wizards page .................................................................................................................................................... 32
ARP table............................................................................................................................................................ 33
Authentications ............................................................................................................................................... 34
Connections...................................................................................................................................................... 34
Proxy filter connections ........................................................................................................................... 34
Packet filter connections......................................................................................................................... 34
Components list .............................................................................................................................................. 35
DHCP leases ...................................................................................................................................................... 35
Dynamic DNS.................................................................................................................................................... 36
Hostile sites ....................................................................................................................................................... 36
Interfaces............................................................................................................................................................ 36
License ................................................................................................................................................................ 37
LiveSecurity....................................................................................................................................................... 37
Memory .............................................................................................................................................................. 37
Processes............................................................................................................................................................ 37
Protocols ............................................................................................................................................................ 38
Routes ................................................................................................................................................................. 38
Security Services.............................................................................................................................................. 39
Syslog .................................................................................................................................................................. 39
Traffic Control................................................................................................................................................... 39
Wireless statistics ............................................................................................................................................ 40
Chapter 4 Configuration and Management Basics ................................................................................ 41
About basic configuration and management tasks................................................................................ 41
About the Edge backup configuration file................................................................................................. 41
Before You Begin........................................................................................................................................ 42
See the Configuration File ........................................................................................................................... 42
Create a backup configuration file ...................................................................................................... 43
Restore your Edge configuration .............................................................................................................. 43
Before You Begin........................................................................................................................................ 43
Restore your configuration from a backup file ............................................................................... 43
Reconnect the Firebox X Edge to a management server............................................................ 44
Related questions ........................................................................................................................................... 45
About feature keys .............................................................................................................................................. 47
When you purchase a new feature...................................................................................................... 47
Get a current feature key......................................................................................................................... 47