Watchguard WSM User guide

Type
User guide
WatchGuard
®
System Manager
User Guide
WatchGuard System Manager v9.1
Fireware® v9.1
Fireware® Pro v9.1
Revised: 09/24/2007
ii WatchGuard System Manager
ADDRESS:
505 Fifth Avenue South
Suite 500
Seattle, WA 98104
SUPPORT:
www.watchguard.com/support
U.S. and Canada +877.232.3531
All Other Countries +1.206.521.3575
SALES:
U.S. and Canada +1.800.734.9905
All Other Countries +1.206.613.0895
ABOUT WATCHGUARD
WatchGuard is a leading provider of network security solutions for small- to mid-
sized enterprises worldwide, delivering integrated products and services that are
robust as well as easy to buy, deploy and manage. The company’s Firebox X family of
expandable integrated security appliances is designed to be fully upgradeable as an
organization grows and to deliver the industry’s best combination of security,
performance, intuitive interface and value. WatchGuard Intelligent Layered Security
architecture protects against emerging threats effectively and efficiently and provides
the flexibility to integrate additional security functionality and services offered
through WatchGuard. Every WatchGuard product comes with an initial LiveSecurity
Service subscription to help customers stay on top of the security landscape with
vulnerability alerts, software updates, expert security instruction and superior
customer care. For more information, please call (206) 613 6600 or visit
www.watchguard.com
.
Notice to Users
Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are
fictitious unless otherwise noted. No part of this guide may be reproduced or transmitted in any form or by any means,
electronic or mechanical, for any purpose, without the express written permission of WatchGuard Technologies, Inc.
Copyright, Trademark, and Patent Information
Copyright© 1998 - 2007 WatchGuard Technologies, Inc. All rights reserved.
All trademarks or trade names mentioned herein, if any, are the property of their respective owners.
Management Software: 9.1
Appliance Software: Fireware® 9.1 and Fireware Pro 9.1
Document Version: 9.1-352-2832-001-2
Complete copyright, trademark, patent, and licensing
information can be found in the appendix of this User
Guide.
User Guide iii
Contents
CHAPTER 1
Introduction
....................................................................................................................... 1
WatchGuard System Manager Tools ........................................................................... 2
About the WatchGuard System Manager Window .................................................... 2
Device Status ................................................................................................................ 2
Device Management ..................................................................................................... 4
About WatchGuard Servers ........................................................................................... 4
About Fireware and Fireware Pro ................................................................................ 5
CHAPTER 2
Getting Started
................................................................................................................ 7
Installing WatchGuard System Manager ..................................................................... 7
Installation requirements ............................................................................................... 8
Collecting network information ...................................................................................... 8
Selecting a firewall configuration mode ........................................................................ 9
Selecting where to install server software ................................................................... 11
Setting up the management station ............................................................................ 11
Backing up your previous configuration ...................................................................... 12
Quick Setup Wizard ...................................................................................................... 12
Quick Setup Wizard .................................................................................................... 13
Web Quick Setup Wizard ........................................................................................... 13
Putting the Firebox into Operation .............................................................................. 14
Starting WatchGuard System Manager ..................................................................... 15
Connecting to a Firebox .............................................................................................. 16
Disconnecting from a Firebox ..................................................................................... 16
Starting security applications ...................................................................................... 16
After Your Installation .................................................................................................... 17
Customizing your security policy ................................................................................. 17
Features of the LiveSecurity Service .......................................................................... 18
Upgrading to a New Version of Fireware ................................................................... 18
Downgrading to WSM 9.0 or Earlier .......................................................................... 19
iv
WatchGuard System Manager
Installation Topics .......................................................................................................... 19
Installing WSM and keeping an older version ............................................................. 19
Installing WatchGuard Servers on computers with desktop firewalls ......................... 19
Adding secondary networks to your configuration ...................................................... 20
Dynamic IP support on the external interface ............................................................. 20
Entering IP addresses ................................................................................................. 21
Installing the Firebox cables ....................................................................................... 22
CHAPTER 3
Service and Support
................................................................................................. 23
LiveSecurity Service Solutions .................................................................................... 23
LiveSecurity Service Broadcasts ................................................................................ 24
Activating LiveSecurity Service ................................................................................... 24
LiveSecurity Service Self Help Tools ......................................................................... 25
WatchGuard Users Forum ........................................................................................... 26
Product Documentation ................................................................................................ 26
Technical Support .......................................................................................................... 26
LiveSecurity Service technical support ....................................................................... 26
LiveSecurity Gold ........................................................................................................ 27
Firebox Installation Service ......................................................................................... 27
VPN Installation Service .............................................................................................. 27
Training and Certification ............................................................................................. 28
CHAPTER 4
Firebox Status Monitoring
.................................................................................... 29
Starting Firebox System Manager .............................................................................. 29
Connecting to a Firebox .............................................................................................. 29
Opening Firebox System Manager ............................................................................. 30
Firebox System Manager Menus and Toolbar .......................................................... 31
Setting refresh interval and pausing the display ......................................................... 32
Basic Firebox and Network Status ............................................................................. 33
Using the Security Traffic display ................................................................................ 33
Monitoring status information ...................................................................................... 34
Setting the center interface ......................................................................................... 34
Monitoring traffic, load, and status .............................................................................. 34
Firebox and VPN tunnel status ................................................................................... 35
Firebox Traffic ................................................................................................................ 37
Setting the maximum number of log messages .......................................................... 37
Using color for log messages ...................................................................................... 38
Copying log messages ................................................................................................ 39
Learning more about a traffic log message ................................................................ 39
Bandwidth Usage .......................................................................................................... 39
Policies ............................................................................................................................ 41
Traffic and Performance Statistics .............................................................................. 43
Authenticated Users ..................................................................................................... 44
Blocked Sites ................................................................................................................. 45
Security Services .......................................................................................................... 46
HostWatch ...................................................................................................................... 48
User Guide v
The HostWatch window .............................................................................................. 48
Controlling the HostWatch window ............................................................................. 50
Changing HostWatch view properties ......................................................................... 50
Blocking a site from HostWatch .................................................................................. 51
Pausing the HostWatch display .................................................................................. 51
Performance Console ................................................................................................... 51
Types of counters ........................................................................................................ 51
Defining counters ........................................................................................................ 52
Viewing the performance graph .................................................................................. 54
Working with more than one Performance Console graph ......................................... 55
Certificates on the Firebox ........................................................................................... 55
Feature Keys on the Firebox ....................................................................................... 56
Communication Log ...................................................................................................... 57
Performing Operations in Firebox System Manager ............................................... 57
Synchronizing time ...................................................................................................... 57
Clearing the ARP cache .............................................................................................. 57
Clearing alarms ........................................................................................................... 58
Rekeying BOVPN tunnels ........................................................................................... 58
High Availability ........................................................................................................... 58
Changing passphrases ............................................................................................... 58
CHAPTER 5
Basic Firebox Administration
............................................................................ 61
Working with Feature Keys .......................................................................................... 61
Getting feature keys .................................................................................................... 61
Adding feature keys to the Firebox ............................................................................. 62
Deleting a feature key ................................................................................................. 63
Seeing the active features .......................................................................................... 63
Seeing the properties of a feature key ........................................................................ 64
Downloading a feature key ......................................................................................... 64
Setting NTP Servers ..................................................................................................... 64
Setting a Friendly Name and Time Zone ................................................................... 65
Working with SNMP ...................................................................................................... 65
Enabling SNMP polling ............................................................................................... 66
Enabling SNMP traps .................................................................................................. 66
Using MIBs .................................................................................................................. 67
Changing the Firebox Passphrases ........................................................................... 67
Recovering a Firebox ................................................................................................... 68
Resetting a Firebox X e-Series device ....................................................................... 68
Resetting a Firebox X Core or Peak (non e-Series) ................................................... 68
CHAPTER 6
Basic Configuration Setup
................................................................................... 71
Opening a Configuration File ...................................................................................... 71
Opening a working configuration file ........................................................................... 72
Opening a local configuration file ................................................................................ 73
Making a new configuration file ................................................................................... 74
Saving a Configuration File ......................................................................................... 74
Saving a configuration to the Firebox ......................................................................... 74
Saving a configuration to a local hard drive ................................................................ 75
vi
WatchGuard System Manager
About Firebox Backup Images .................................................................................... 75
Creating a Firebox backup image ............................................................................... 75
Restoring a Firebox backup image ............................................................................. 76
Working with Aliases ..................................................................................................... 76
Alias members ............................................................................................................ 77
Creating an alias ......................................................................................................... 77
Using Global Settings ................................................................................................... 79
Defining ICMP error handling global settings ............................................................. 79
Enabling TCP SYN checking ...................................................................................... 80
Defining TCP maximum segment size adjustment global settings ............................. 80
Disabling Traffic Management and QoS ..................................................................... 80
Using Global VPN Settings .......................................................................................... 81
Creating Schedules ...................................................................................................... 82
Managing a Firebox from a Remote Location .......................................................... 83
CHAPTER 7
Logging and Notification
....................................................................................... 87
Setting Up the Log Server ........................................................................................... 87
Changing the Log Server encryption key .................................................................... 88
Setting up the Firebox for a Designated Log Server ............................................... 89
Adding a Log Server for a Firebox .............................................................................. 89
Setting Log Server priority .......................................................................................... 90
Activating syslog logging ............................................................................................. 90
Enabling advanced diagnostics .................................................................................. 91
Disabling performance statistic logging ...................................................................... 92
Starting and stopping the Log Server ......................................................................... 93
Setting Global Logging and Notification Preferences .............................................. 93
Log file size and rollover frequency ............................................................................ 93
Setting when log files rollover ..................................................................................... 94
Scheduling automated reports .................................................................................... 95
Controlling notification ................................................................................................. 95
Setting Logging and Notification Preferences in Policy Manager ......................... 96
Logging and Notification in Proxy Definitions ........................................................... 97
Configuring log messages and notification for a proxy policy ..................................... 98
Configuring log messages and alarms for a proxy rule .............................................. 98
About Log Messages ................................................................................................... 98
Types of log messages ............................................................................................... 98
Log file names and locations ...................................................................................... 99
Consolidating log files ................................................................................................. 99
Updating .wgl log files to .xml format ........................................................................ 100
Using LogViewer ......................................................................................................... 101
LogViewer settings .................................................................................................... 102
Creating a search rule ............................................................................................... 103
Searching in LogViewer ............................................................................................ 104
Viewing the current log file in LogViewer .................................................................. 105
Copying LogViewer data ........................................................................................... 105
CHAPTER 8
Network Setup and Configuration
................................................................ 107
Configuring Firebox Interfaces .................................................................................. 108
User Guide vii
Configuring the external interface ............................................................................. 110
Adding Secondary Networks ..................................................................................... 113
Adding WINS and DNS Server Addresses ............................................................. 114
Configuring Dynamic DNS ......................................................................................... 115
Creating a DynDNS account ..................................................................................... 115
Setting up the Firebox for dynamic DNS .................................................................. 115
Configuring Routes ..................................................................................................... 116
Adding a network route ............................................................................................. 117
Adding a host route ................................................................................................... 117
Configuring Advanced Settings for an Interface ..................................................... 118
Setting Firebox Interface Speed and Duplex ............................................................ 118
Setting maximum bandwidth and marking type ........................................................ 119
Setting DF bit for IPSec (external interfaces only) .................................................... 119
Using a Firebox with a Drop-in Configuration ......................................................... 119
Configuring related hosts .......................................................................................... 120
Virtual Local Area Networks (VLANs) ...................................................................... 121
Tagging ...................................................................................................................... 122
Defining a New VLAN ................................................................................................ 122
Using DHCP .............................................................................................................. 125
Using DHCP relay ..................................................................................................... 125
Specifying VLANs for an Interface ............................................................................ 125
CHAPTER 9
Network Setup with Multiple External Interfaces
.............................. 127
Multi-WAN Requirements and Conditions ............................................................... 127
Multi-WAN Options ...................................................................................................... 128
About the WAN Failover method .............................................................................. 128
About multi-WAN in round-robin order ..................................................................... 128
About multi-WAN with the routing table .................................................................... 128
About the Interface Overflow method ....................................................................... 129
Configuring the Multi-WAN Routing Table Option .................................................. 130
Looking at the Firebox route table ............................................................................ 130
Configuring the Multi-WAN Round-robin Option .................................................... 131
Configuring the Multi-WAN Failover Option ............................................................ 132
Configuring the Multi-WAN Interface Overflow Option .......................................... 134
Checking WAN Interface Status ................................................................................ 135
Configuring Advanced Multi-WAN Settings ............................................................ 137
Sticky Connections .................................................................................................... 137
Failback ..................................................................................................................... 138
CHAPTER 10
Network Address Translation (NAT)
........................................................... 141
Types of NAT ............................................................................................................... 141
Using Dynamic NAT .................................................................................................... 142
Adding firewall dynamic NAT entries ........................................................................ 142
Reordering dynamic NAT entries .............................................................................. 143
Using 1-to-1 NAT ......................................................................................................... 144
Defining a 1-to-1 NAT rule ......................................................................................... 144
viii
WatchGuard System Manager
Configuring firewall 1-to-1 NAT ................................................................................. 145
Configuring Policy-Based Dynamic or 1-to-1 NAT ................................................. 146
Configuring policy-based 1-to-1 NAT ........................................................................ 146
Configuring policy-based dynamic NAT .................................................................... 146
Configuring Static NAT ............................................................................................... 148
Server Load Balancing ............................................................................................... 149
Configuring Server Load Balancing ......................................................................... 149
CHAPTER 11
Authentication
............................................................................................................. 153
How User Authentication Works ............................................................................... 153
Using authentication from the external network ........................................................ 154
Using authentication through a gateway Firebox to another Firebox ....................... 154
About Authentication Timeout Values ...................................................................... 155
Defining global authentication timeouts .................................................................... 155
Closing a session before timeout occurs .................................................................. 155
Using a Custom Default Start Page ......................................................................... 156
Allowing Multiple Concurrent Logins ........................................................................ 156
Authentication Server Types ..................................................................................... 156
Using a backup authentication server ....................................................................... 157
Configuring the Firebox as an Authentication Server ............................................ 157
Authentication types .................................................................................................. 157
Defining a new user for Firebox authentication ........................................................ 159
Defining a new group for Firebox authentication ...................................................... 160
Using a local user account for Firewall user, PPTP, and MUVPN authentication .... 161
Configuring RADIUS Server Authentication ........................................................... 161
Configuring SecurID Authentication ......................................................................... 163
Configuring LDAP Authentication ............................................................................. 164
Using LDAP optional settings ................................................................................... 166
Configuring Active Directory Authentication .......................................................... 168
Using Active Directory optional settings ................................................................... 169
Defining Users and Groups for Policy Definitions .................................................. 169
Defining users and groups for Firebox authentication .............................................. 170
Defining users and groups for third-party authentication .......................................... 170
Using users and groups in policy definitions ............................................................. 171
CHAPTER 12
Firewall Intrusion Detection and Prevention
........................................ 173
Using Default Packet Handling Options .................................................................. 173
Spoofing attacks ........................................................................................................ 174
IP source route attacks ............................................................................................. 174
Port space and address space attacks ..................................................................... 175
Flood attacks ............................................................................................................. 175
Unhandled packets ................................................................................................... 175
Distributed denial of service attacks ......................................................................... 176
Setting logging and notification for packet handling ................................................. 176
Setting Blocked Sites .................................................................................................. 176
Blocking a site permanently ...................................................................................... 177
Blocking spyware sites .............................................................................................. 178
User Guide ix
Using an external list of blocked sites ....................................................................... 178
Creating exceptions to the Blocked Sites list ............................................................ 179
Using an external list of blocked sites exceptions .................................................... 180
Setting logging and notification for blocked sites ...................................................... 180
Blocking sites temporarily with policy settings .......................................................... 180
Blocked sites and Traffic Monitor .............................................................................. 180
Blocking Ports .............................................................................................................. 181
Blocking a port permanently ..................................................................................... 182
Automatically blocking IP addresses that try to use blocked ports ........................... 182
Setting logging and notification for blocked ports ..................................................... 182
CHAPTER 13
Policies
............................................................................................................................. 183
Using Policies in your Network ................................................................................. 183
About Policy Manager ................................................................................................ 184
Opening Policy Manager ........................................................................................... 184
About the Policy Manager window ............................................................................ 184
Changing the Policy Manager View .......................................................................... 185
Selecting colors for Policy Manager text ................................................................... 187
Finding a policy ......................................................................................................... 188
Adding Policies to Policy Manager ........................................................................... 189
Seeing the list of policy templates ............................................................................. 189
Adding a policy from the list of policy templates ....................................................... 190
Adding more than one policy of the same type ......................................................... 191
Seeing and modifying policy templates .................................................................... 192
Disabling a policy ...................................................................................................... 192
Deleting a policy ........................................................................................................ 192
About Custom Policies ............................................................................................... 192
Creating a custom policy template ............................................................................ 193
Adding a custom policy from the list of policy templates .......................................... 194
Importing and exporting custom policy templates .................................................... 194
Setting Policy Properties ............................................................................................ 195
Setting sources and destinations for a policy ........................................................... 196
About policy-based routing ...................................................................................... 198
Setting a proxy action ................................................................................................ 200
Setting a custom idle timeout .................................................................................... 200
Setting logging properties ......................................................................................... 201
Configuring static NAT for a policy ............................................................................ 201
Configuring server load balancing for a policy .......................................................... 203
Setting an operating schedule .................................................................................. 203
Applying Traffic Management actions ....................................................................... 203
Setting ICMP error handling ...................................................................................... 204
Applying NAT rules ................................................................................................... 205
Using QoS Marking for a policy ................................................................................ 205
Setting traffic priority for a policy ............................................................................... 206
Enabling sticky connections for a policy ................................................................... 206
Setting Policy Precedence ......................................................................................... 207
Using automatic order ............................................................................................... 207
Setting precedence manually .................................................................................... 208
x
WatchGuard System Manager
CHAPTER 14
Proxy Policies
.............................................................................................................. 209
Working with WatchGuard Proxies ........................................................................... 209
About rules and rulesets ........................................................................................... 210
About proxy actions ................................................................................................... 210
Predefined and user-defined proxy actions .............................................................. 210
Adding a Proxy to your Firebox Configuration ........................................................ 211
SMTP Proxy ................................................................................................................. 213
SMTP proxy: General settings .................................................................................. 213
SMTP proxy: Greeting rules ...................................................................................... 215
SMTP proxy: ESMTP settings .................................................................................. 216
SMTP proxy: Authentication ..................................................................................... 217
SMTP proxy: Content types ...................................................................................... 217
SMTP proxy: File names ........................................................................................... 218
SMTP proxy: Mail From/Mail To ................................................................................ 219
SMTP proxy: Headers ............................................................................................... 219
SMTP proxy: Antivirus responses ............................................................................. 220
SMTP proxy: Deny message .................................................................................... 220
SMTP proxy: Intrusion prevention ............................................................................. 221
SMTP proxy: spamBlocker ....................................................................................... 221
SMTP proxy: Proxy and AV alarms ........................................................................... 221
SMTP proxy: Finishing and saving the configuration ............................................... 221
POP3 Proxy ................................................................................................................. 222
POP3 proxy: General settings .................................................................................. 222
POP3 proxy: Authentication ...................................................................................... 223
POP3 proxy: Content types ...................................................................................... 224
POP3 proxy: File names ........................................................................................... 225
POP3 proxy: Headers ............................................................................................... 226
POP3 proxy: Antivirus responses ............................................................................. 227
POP3 proxy: Deny message ..................................................................................... 228
POP3 proxy: Intrusion prevention ............................................................................. 229
POP3 proxy: spamBlocker ........................................................................................ 230
POP3 proxy: Proxy and AV alarms ........................................................................... 231
POP3 proxy: Finishing and saving the configuration ................................................ 232
FTP Proxy ................................................................................................................... 232
FTP proxy: General settings ..................................................................................... 233
FTP proxy: Commands ............................................................................................. 234
FTP proxy: Download ................................................................................................ 234
FTP proxy: Upload .................................................................................................... 235
FTP proxy: Antivirus responses ................................................................................ 235
FTP proxy: Intrusion prevention ................................................................................ 236
FTP proxy: Proxy and AV alarms .............................................................................. 236
FTP proxy: Finishing and saving the configuration ................................................... 237
HTTP Proxy .................................................................................................................. 237
HTTP requests: General settings .............................................................................. 238
HTTP requests: Request methods ............................................................................ 239
HTTP requests: URL paths ....................................................................................... 240
HTTP requests: Header fields ................................................................................... 240
HTTP requests: Authorization ................................................................................... 241
HTTP responses: General settings ........................................................................... 241
HTTP responses: Header fields ................................................................................ 242
User Guide xi
HTTP responses: Content types ............................................................................... 242
HTTP responses: Cookies ........................................................................................ 243
HTTP responses: Body content types ...................................................................... 243
HTTP proxy: Exceptions ........................................................................................... 244
HTTP proxy: Antivirus responses ............................................................................. 244
HTTP proxy: Deny message ..................................................................................... 244
HTTP proxy: Intrusion prevention ............................................................................. 246
HTTP proxy: Proxy and AV alarms ........................................................................... 246
Finishing and saving the HTTP configuration ........................................................... 246
DNS Proxy .................................................................................................................... 246
DNS proxy: General settings .................................................................................... 247
DNS proxy: OPcodes ................................................................................................ 247
DNS proxy: Query types ........................................................................................... 248
DNS proxy: Query names ......................................................................................... 249
DNS proxy: Intrusion prevention ............................................................................... 250
DNS proxy: Alarms .................................................................................................... 250
Finishing and saving the DNS configuration ............................................................. 250
TCP Proxy .................................................................................................................... 250
TCP proxy: General settings ..................................................................................... 250
TCP proxy: Intrusion prevention ............................................................................... 251
Finishing and saving the TCP configuration ............................................................. 251
Working with Rules and Rulesets ............................................................................. 251
Simple and advanced views ..................................................................................... 251
Adding rules (simple view) ........................................................................................ 253
Adding rules (advanced view) ................................................................................... 253
Cutting and pasting rule definitions ........................................................................... 254
Changing the order of rules ...................................................................................... 254
Modifying the default rule .......................................................................................... 255
Import and Export Functions for Proxies ................................................................. 255
Importing and exporting user-defined proxy actions ................................................. 256
Importing and exporting rulesets .............................................................................. 256
CHAPTER 15
Historical Reports
..................................................................................................... 259
Creating and Editing Reports .................................................................................... 259
Starting Historical Reports ......................................................................................... 259
Starting a new report ................................................................................................. 260
Editing an existing report .......................................................................................... 261
Deleting a report ........................................................................................................ 261
Viewing the reports list .............................................................................................. 261
Backing up report definition files ............................................................................... 262
Setting Report Properties .......................................................................................... 262
Specifying a report time span .................................................................................... 262
Specifying report sections ......................................................................................... 262
Consolidating report sections .................................................................................... 263
Setting report preferences ........................................................................................ 264
Viewing network interface relationships .................................................................... 265
Using Report Filters .................................................................................................... 265
Creating a new report filter ........................................................................................ 266
Editing a report filter .................................................................................................. 266
Deleting a report filter ................................................................................................ 267
xii
WatchGuard System Manager
Applying a report filter ............................................................................................... 267
Running Reports ......................................................................................................... 267
Exporting Reports ....................................................................................................... 267
Exporting reports to HTML format ............................................................................. 268
Exporting reports to NetIQ format ............................................................................. 268
Report Sections and Consolidated Sections .......................................................... 268
Report sections ......................................................................................................... 268
Consolidated sections ............................................................................................... 271
CHAPTER 16
Management Server Setup and Administration
................................. 273
Installing the Management Server ............................................................................ 273
WatchGuard Management Server Passphrases .................................................... 273
Setting Up the Management Server ......................................................................... 275
Changing the Management Server Configuration ................................................. 276
Adding or removing a Management Server license .................................................. 276
Recording diagnostic log messages for the Management Server ............................ 277
Configuring the Certificate Authority ........................................................................ 277
Configuring properties for the CA certificate ............................................................. 277
Configuring properties for client certificates .............................................................. 278
Configuring properties for the Certificate Revocation List (CRL) ............................. 279
Recording diagnostic log messages for the Certificate Authority service ................. 279
Backing up or Restoring the Management Server Configuration ........................ 280
Moving the WatchGuard Management Server to a New Computer .................... 280
Connecting to a Management Server ...................................................................... 280
CHAPTER 17
Device Management Setup
................................................................................ 283
Configuring Fireboxes as Managed Clients ............................................................ 283
Configuring a Firebox X Core or X Peak running Fireware as a managed client ..... 283
Configuring a Firebox III or Firebox X Core running WFS as a managed client ...... 285
Configuring Edges and SOHOs as Managed Clients ........................................... 286
Preparing a new or factory default Firebox X Edge for management ...................... 287
Importing Firebox X Edge devices into a Management Server ................................ 288
Preparing an installed Firebox X Edge for management .......................................... 288
Configuring a Firebox SOHO 6 as a managed client ............................................... 290
Adding Devices ............................................................................................................ 291
CHAPTER 18
Device Management Properties
..................................................................... 295
Viewing the Managed Devices .................................................................................. 295
Viewing the Device Management Page ................................................................... 296
Configuring Device Management Properties .......................................................... 297
Updating a Device ....................................................................................................... 302
Removing a Device ..................................................................................................... 302
Network Setup (Edge devices only) ......................................................................... 302
Adding a VPN Resource ............................................................................................ 303
User Guide xiii
Starting Firebox and Edge Tools ............................................................................... 303
VPN Tunnels ................................................................................................................ 304
Using the Firebox X Edge Policy Section ................................................................ 304
CHAPTER 19
Firebox X Edge Templates and Aliases
.................................................... 305
Scheduling Firebox X Edge Firmware Updates ..................................................... 305
Seeing and deleting firmware updates ..................................................................... 307
Creating and Applying Edge Configuration Templates ......................................... 308
Adding a pre-defined policy with the Add Policy wizard ........................................... 310
Adding a custom policy with the Add Policy wizard .................................................. 310
Cloning an Edge Configuration Template ................................................................. 312
Applying an Edge Configuration Template to devices .............................................. 312
Removing an Edge from the device list .................................................................... 314
Using Aliases ............................................................................................................... 314
Naming aliases on the Management Server ............................................................. 315
Defining aliases on a Firebox X Edge ....................................................................... 316
CHAPTER 20
Managed BOVPN Tunnels
................................................................................... 319
About Managed BOVPN Tunnels ............................................................................. 319
VPN Failover ............................................................................................................. 319
Global VPN settings .................................................................................................. 320
VPN Resources and Templates ................................................................................ 320
Configuring a Firebox as a Managed Firebox Client ............................................. 320
Adding VPN Resources ............................................................................................. 320
Getting the current resources from a device ............................................................. 321
Creating a new VPN resource .................................................................................. 321
Adding more hosts or networks ................................................................................ 322
Adding VPN Firewall Policy Templates .................................................................... 322
Adding Security Templates ........................................................................................ 323
Making Tunnels Between Devices ........................................................................... 325
Editing a Tunnel ........................................................................................................... 326
Removing Tunnels and Devices ............................................................................... 327
Removing a tunnel .................................................................................................... 327
Removing a device .................................................................................................... 327
CHAPTER 21
Manual BOVPN Tunnels
....................................................................................... 329
About Manual VPN Tunnels ...................................................................................... 329
VPN and failover ....................................................................................................... 329
Global VPN settings .................................................................................................. 329
Configuring Gateways ................................................................................................ 330
Defining the credential method ................................................................................. 331
Defining gateway endpoints ...................................................................................... 332
Configuring mode and transforms (Phase 1 settings) .............................................. 334
Adding a Phase 1 transform ..................................................................................... 335
Editing and deleting gateways .................................................................................. 336
Making Tunnels between Gateway Endpoints ....................................................... 336
xiv
WatchGuard System Manager
Configuring routes for the tunnel ............................................................................... 337
Adding new routes .................................................................................................... 338
Configuring Phase 2 settings .................................................................................... 339
Adding a Phase 2 proposal ....................................................................................... 341
Editing and deleting a tunnel ..................................................................................... 342
Changing order of tunnels ......................................................................................... 342
Making a Tunnel Policy .............................................................................................. 343
Setting up Outgoing Dynamic NAT through a BOVPN Tunnel ............................ 343
About VPN Failover .................................................................................................... 344
Configuring multiple gateway pairs ........................................................................... 345
Forcing a BOVPN Tunnel Rekey .............................................................................. 346
To rekey one BOVPN tunnel ..................................................................................... 346
To rekey all BOVPN tunnels ...................................................................................... 347
CHAPTER 22
Certificates and the Certificate Authority
............................................... 349
Creating a New Certificate ......................................................................................... 349
Creating a certificate with Firebox System Manager ................................................ 349
Creating a certificate with CA Manager .................................................................... 351
Completing a Certificate Signing Request .............................................................. 352
Importing a Certificate ................................................................................................ 353
Firebox authentication ............................................................................................... 354
Mobile User VPN (MUVPN) tunnel authentication ................................................... 355
Branch Office VPN (BOVPN) authentication ............................................................ 356
Managing Certificates ................................................................................................. 356
Using the web-based CA Manager ........................................................................... 356
Using WSM to manage certificates ........................................................................... 358
Using FSM to manage certificates ............................................................................ 358
CHAPTER 23
Remote User VPN with PPTP
........................................................................... 361
Configuration Checklist .............................................................................................. 361
Encryption levels ....................................................................................................... 361
Configuring WINS and DNS Servers ....................................................................... 362
Enabling RUVPN with PPTP ..................................................................................... 363
Enabling RADIUS authentication .............................................................................. 364
Setting encryption for PPTP tunnels ......................................................................... 364
Defining timeout settings for PPTP tunnels .............................................................. 365
Adding IP Addresses for RUVPN Sessions ............................................................ 365
Adding New Users to the PPTP_Users Authentication Group ........................... 366
Configuring policies to allow RUVPN traffic .............................................................. 367
Preparing the Client Computers ............................................................................... 367
Installing MSDUN and service packs ........................................................................ 367
Creating and Connecting a PPTP RUVPN from a Windows Vista Client .......... 368
Establishing the PPTP connection ............................................................................ 369
Creating and Connecting a PPTP RUVPN on Windows XP ................................ 369
Creating and Connecting a PPTP RUVPN on Windows 2000 ............................ 369
Running RUVPN and Accessing the Internet ......................................................... 370
User Guide xv
Making outbound PPTP connections from behind a Firebox ................................... 371
CHAPTER 24
WebBlocker
................................................................................................................... 373
Installing the Feature Key .......................................................................................... 373
Getting Started with WebBlocker .............................................................................. 373
Automating WebBlocker database downloads ......................................................... 374
Activating WebBlocker ............................................................................................... 375
Configuring WebBlocker ............................................................................................ 378
Adding new servers ................................................................................................... 379
Selecting categories to block .................................................................................... 379
Defining advanced WebBlocker options ................................................................... 380
Defining WebBlocker Exceptions ............................................................................. 381
Components of exception rules ................................................................................ 382
Exceptions with part of a URL ................................................................................... 382
Adding exceptions ..................................................................................................... 382
Defining the action for sites that do not match exceptions ....................................... 384
Changing the order of exception rules ...................................................................... 384
Importing or exporting exception rules ...................................................................... 385
WebBlocker Actions .................................................................................................... 386
Adding WebBlocker actions to a policy ..................................................................... 387
Scheduling WebBlocker actions ............................................................................... 387
CHAPTER 25
spamBlocker
................................................................................................................. 389
About spamBlocker ..................................................................................................... 389
spamBlocker requirements ....................................................................................... 389
spamBlocker actions ................................................................................................. 390
spamBlocker tags ...................................................................................................... 390
spamBlocker categories ............................................................................................ 390
Installing the spamBlocker Feature Key .................................................................. 391
Activating spamBlocker .............................................................................................. 391
Configuring spamBlocker ........................................................................................... 393
Using spamBlocker Exception Rules ....................................................................... 395
Adding spamBlocker exception rules ........................................................................ 395
Changing the order of exception rules ...................................................................... 396
Importing or exporting exception rules ...................................................................... 396
Logging exceptions ................................................................................................... 397
Setting Global spamBlocker Parameters ................................................................ 398
Using an HTTP proxy server ..................................................................................... 399
Adding trusted email forwarders ............................................................................... 399
Creating Rules for Bulk and Suspect Email on Email Clients .............................. 401
Sending spam or bulk email to special folders in Outlook ........................................ 401
Reporting False Positives and False Negatives ..................................................... 402
Monitoring spamBlocker Activity ............................................................................... 402
Customizing spamBlocker Using Multiple Proxies ................................................. 402
xvi
WatchGuard System Manager
CHAPTER 26
Quarantine Server
..................................................................................................... 403
About the Quarantine Server .................................................................................... 403
Starting the Quarantine Server ................................................................................. 404
Installing server components .................................................................................... 404
Running the setup wizard ......................................................................................... 404
Entering the server location ...................................................................................... 404
Configuring the Quarantine Server .......................................................................... 405
Setting general server parameters ............................................................................ 406
Configuring the expiration settings ............................................................................ 406
Adding and removing user domains ......................................................................... 407
Configuring the notification settings .......................................................................... 408
Configuring rules ....................................................................................................... 409
Managing Messages .................................................................................................. 410
Setting viewing options ............................................................................................. 411
Saving messages ...................................................................................................... 411
Manually deleting messages ..................................................................................... 412
Automatically deleting messages .............................................................................. 412
Managing Users .......................................................................................................... 412
Adding users ............................................................................................................. 413
Removing users ........................................................................................................ 414
Changing notification option for a user ..................................................................... 414
Getting Statistics on Quarantine Server Activity ..................................................... 414
Viewing statistics from specific dates ........................................................................ 415
Viewing specific types of messages ......................................................................... 415
Grouping data ........................................................................................................... 415
Exporting and printing statistics ................................................................................ 416
CHAPTER 27
Signature-Based Security Services
............................................................ 417
Installing and Updating Security Services ............................................................... 417
About Gateway AntiVirus ........................................................................................... 417
Activating Gateway AntiVirus .................................................................................... 418
Activating Gateway AV with a wizard ........................................................................ 418
Activating Gateway AV from proxy definitions .......................................................... 420
Configuring Antivirus Actions .................................................................................... 421
Creating alarms or log entries for antivirus actions .................................................. 423
Unlocking a file locked by Gateway AntiVirus ........................................................... 423
Global Gateway AntiVirus Settings .......................................................................... 424
Configuring Gateway AV engine settings ................................................................. 424
Configuring the update server ................................................................................... 424
Connecting to the update server through an HTTP proxy server ............................. 425
Activating Intrusion Prevention Service (IPS) ......................................................... 426
Configuring Intrusion Prevention .............................................................................. 429
Configuring intrusion prevention for HTTP or TCP ................................................... 430
Configuring Intrusion Prevention for FTP, SMTP, POP3, or DNS ............................. 432
Configuring the IPS update server ............................................................................ 432
Configuring signature exceptions .............................................................................. 432
Copying IPS settings to other policies ...................................................................... 433
User Guide xvii
Getting Gateway AV/IPS Status and Updates ........................................................ 433
Seeing service status ................................................................................................ 433
Updating signatures or engines manually ................................................................. 434
Seeing the update history ......................................................................................... 435
CHAPTER 28
Dynamic Routing
....................................................................................................... 437
Routing Daemon Configuration Files ....................................................................... 437
Using RIP ..................................................................................................................... 438
RIP Version 1 ............................................................................................................ 438
RIP Version 2 ............................................................................................................ 440
Using OSPF ................................................................................................................. 442
OSPF daemon configuration ..................................................................................... 442
Configuring Fireware Pro to use OSPF .................................................................... 445
Using BGP .................................................................................................................... 446
CHAPTER 29
Traffic Management and Quality of Service
.......................................... 451
About Traffic Management and QoS ........................................................................ 451
Guaranteeing bandwidth ........................................................................................... 451
Restricting bandwidth ................................................................................................ 452
QoS Marking ............................................................................................................. 452
Traffic priority ............................................................................................................. 452
Configuring Outgoing Interface Bandwidth ............................................................. 452
Using Traffic Management Actions .......................................................................... 453
Defining a Traffic Management action ...................................................................... 453
Applying the Traffic Management action to a policy ................................................. 454
Setting traffic priority in a policy ................................................................................ 455
Using Traffic Management actions in a multi-WAN environment ............................. 455
Setting Connection and Bandwidth Limits ............................................................... 456
About QoS Marking .................................................................................................... 456
Per-interface and per-policy QoS Marking ................................................................ 457
Marking types and values ......................................................................................... 457
Enabling QoS Marking for an interface ..................................................................... 458
Enabling QoS Marking for a policy ............................................................................ 459
QoS Marking and IPSec traffic .................................................................................. 460
CHAPTER 30
High Availability
......................................................................................................... 461
About WatchGuard High Availability ........................................................................ 461
High Availability Requirements ................................................................................. 462
Selecting a Primary High Availability Firebox ......................................................... 462
Configuring High Availability ...................................................................................... 463
Manually Controlling High Availability ...................................................................... 464
Backing up an HA configuration ................................................................................ 465
Upgrading Software in an HA Configuration ........................................................... 465
Using HA with Proxy Sessions .................................................................................. 465
xviii
WatchGuard System Manager
APPENDIX A
Copyright and Licensing
..................................................................................... 467
WatchGuard Firebox Software End-User License Agreement ............................ 467
WatchGuard Technologies, Inc. Add-on Product/Service
Customer Agreement/End-User License Agreement
........................................... 469
Copyright and Trademarks ........................................................................................ 471
Patents .......................................................................................................................... 471
Licenses ........................................................................................................................ 471
SSL Licenses ............................................................................................................ 472
Apache Software License, Version 2.0, January 2004 ............................................. 473
PCRE License ........................................................................................................... 474
GNU Lesser General Public License ........................................................................ 475
GNU General Public License .................................................................................... 479
Sleepycat License ..................................................................................................... 481
Sourcefire License .................................................................................................... 482
Expat-MIT HTML Parser Toolkit License .................................................................. 485
Curl Software MIT-X License .................................................................................... 485
APPENDIX B
WatchGuard File Locations
............................................................................... 487
Default File Locations ................................................................................................. 488
APPENDIX C
Types of Policies
........................................................................................................ 491
Packet Filter Policies .................................................................................................. 491
Any ............................................................................................................................ 491
archie ......................................................................................................................... 491
auth ........................................................................................................................... 492
BGP ........................................................................................................................... 492
Citrix .......................................................................................................................... 492
Clarent-Command ..................................................................................................... 492
Clarent-Gateway ....................................................................................................... 493
CU-SeeMe ................................................................................................................ 493
DHCP-Server or DHCP-Client .................................................................................. 494
DNS ........................................................................................................................... 494
Entrust ....................................................................................................................... 494
finger ......................................................................................................................... 494
FTP ............................................................................................................................ 494
Gopher ...................................................................................................................... 495
GRE ........................................................................................................................... 495
HBCI .......................................................................................................................... 495
HTTP ......................................................................................................................... 495
HTTPS ....................................................................................................................... 496
IDENT ........................................................................................................................ 496
IGMP ......................................................................................................................... 496
IMAP .......................................................................................................................... 496
IPSec ......................................................................................................................... 497
IRC ............................................................................................................................ 497
Intel Video Phone ...................................................................................................... 497
Kerberos v 4 and Kerberos v 5 ................................................................................. 497
L2TP .......................................................................................................................... 497
User Guide xix
LDAP ......................................................................................................................... 498
LDAP-SSL ................................................................................................................. 498
Lotus Notes ............................................................................................................... 498
MS-SQL-Monitor ....................................................................................................... 498
MS-SQL-Server ......................................................................................................... 498
MS-Win-Media .......................................................................................................... 499
NetMeeting ................................................................................................................ 499
NFS ........................................................................................................................... 499
NNTP ......................................................................................................................... 499
NTP ........................................................................................................................... 499
OSPF ......................................................................................................................... 500
pcAnywhere .............................................................................................................. 500
Ping ........................................................................................................................... 500
POP2 and POP3 ....................................................................................................... 500
PPTP ......................................................................................................................... 501
RADIUS and RADIUS-RFC ...................................................................................... 501
RADIUS-Accounting and RADIUS-Acct-RFC ........................................................... 501
RDP ........................................................................................................................... 501
RIP ............................................................................................................................ 502
RSH ........................................................................................................................... 502
RealPlayerG2 ............................................................................................................ 502
Rlogin ........................................................................................................................ 502
SecurID ..................................................................................................................... 502
SMB (Windows Networking) ..................................................................................... 503
SMTP ........................................................................................................................ 503
SNMP ........................................................................................................................ 503
SNMP-Trap ............................................................................................................... 503
SQL*Net .................................................................................................................... 504
SQL-Server ............................................................................................................... 504
SSH ........................................................................................................................... 504
SunRPC .................................................................................................................... 504
Syslog ........................................................................................................................ 504
TACACS .................................................................................................................... 505
TACACS+ .................................................................................................................. 505
TCP ........................................................................................................................... 505
TCP-UDP .................................................................................................................. 505
Telnet ......................................................................................................................... 505
Timbuktu .................................................................................................................... 506
Time ........................................................................................................................... 506
Traceroute ................................................................................................................. 506
UDP ........................................................................................................................... 506
UUCP ........................................................................................................................ 507
WAIS ......................................................................................................................... 507
WinFrame .................................................................................................................. 507
WG-Auth ................................................................................................................... 507
WG-Firebox-Mgmt ..................................................................................................... 508
WG-Logging .............................................................................................................. 508
WG-Mgmt-Server ...................................................................................................... 508
WG-SmallOffice-Mgmt .............................................................................................. 508
WG-WebBlocker ....................................................................................................... 508
WHOIS ...................................................................................................................... 509
X11 ............................................................................................................................ 509
Proxy Policies .............................................................................................................. 509
xx
WatchGuard System Manager
DNS-proxy ................................................................................................................. 509
FTP-proxy ................................................................................................................. 509
HTTP-proxy ............................................................................................................... 510
POP3-proxy ............................................................................................................... 510
SMTP-proxy .............................................................................................................. 510
TCP-proxy ................................................................................................................. 511
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448
  • Page 449 449
  • Page 450 450
  • Page 451 451
  • Page 452 452
  • Page 453 453
  • Page 454 454
  • Page 455 455
  • Page 456 456
  • Page 457 457
  • Page 458 458
  • Page 459 459
  • Page 460 460
  • Page 461 461
  • Page 462 462
  • Page 463 463
  • Page 464 464
  • Page 465 465
  • Page 466 466
  • Page 467 467
  • Page 468 468
  • Page 469 469
  • Page 470 470
  • Page 471 471
  • Page 472 472
  • Page 473 473
  • Page 474 474
  • Page 475 475
  • Page 476 476
  • Page 477 477
  • Page 478 478
  • Page 479 479
  • Page 480 480
  • Page 481 481
  • Page 482 482
  • Page 483 483
  • Page 484 484
  • Page 485 485
  • Page 486 486
  • Page 487 487
  • Page 488 488
  • Page 489 489
  • Page 490 490
  • Page 491 491
  • Page 492 492
  • Page 493 493
  • Page 494 494
  • Page 495 495
  • Page 496 496
  • Page 497 497
  • Page 498 498
  • Page 499 499
  • Page 500 500
  • Page 501 501
  • Page 502 502
  • Page 503 503
  • Page 504 504
  • Page 505 505
  • Page 506 506
  • Page 507 507
  • Page 508 508
  • Page 509 509
  • Page 510 510
  • Page 511 511
  • Page 512 512
  • Page 513 513
  • Page 514 514
  • Page 515 515
  • Page 516 516
  • Page 517 517
  • Page 518 518
  • Page 519 519
  • Page 520 520
  • Page 521 521
  • Page 522 522
  • Page 523 523
  • Page 524 524
  • Page 525 525
  • Page 526 526
  • Page 527 527
  • Page 528 528
  • Page 529 529
  • Page 530 530
  • Page 531 531
  • Page 532 532
  • Page 533 533
  • Page 534 534
  • Page 535 535
  • Page 536 536
  • Page 537 537
  • Page 538 538
  • Page 539 539
  • Page 540 540
  • Page 541 541
  • Page 542 542
  • Page 543 543
  • Page 544 544
  • Page 545 545
  • Page 546 546

Watchguard WSM User guide

Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI