Watchguard WSM User guide

  • Hello! I am an AI chatbot trained to assist you with the Watchguard WSM User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
WatchGuard
®
System Manager
User Guide
WatchGuard System Manager v9.1
Fireware® v9.1
Fireware® Pro v9.1
Revised: 09/24/2007
ii WatchGuard System Manager
ADDRESS:
505 Fifth Avenue South
Suite 500
Seattle, WA 98104
SUPPORT:
www.watchguard.com/support
U.S. and Canada +877.232.3531
All Other Countries +1.206.521.3575
SALES:
U.S. and Canada +1.800.734.9905
All Other Countries +1.206.613.0895
ABOUT WATCHGUARD
WatchGuard is a leading provider of network security solutions for small- to mid-
sized enterprises worldwide, delivering integrated products and services that are
robust as well as easy to buy, deploy and manage. The company’s Firebox X family of
expandable integrated security appliances is designed to be fully upgradeable as an
organization grows and to deliver the industry’s best combination of security,
performance, intuitive interface and value. WatchGuard Intelligent Layered Security
architecture protects against emerging threats effectively and efficiently and provides
the flexibility to integrate additional security functionality and services offered
through WatchGuard. Every WatchGuard product comes with an initial LiveSecurity
Service subscription to help customers stay on top of the security landscape with
vulnerability alerts, software updates, expert security instruction and superior
customer care. For more information, please call (206) 613 6600 or visit
www.watchguard.com
.
Notice to Users
Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are
fictitious unless otherwise noted. No part of this guide may be reproduced or transmitted in any form or by any means,
electronic or mechanical, for any purpose, without the express written permission of WatchGuard Technologies, Inc.
Copyright, Trademark, and Patent Information
Copyright© 1998 - 2007 WatchGuard Technologies, Inc. All rights reserved.
All trademarks or trade names mentioned herein, if any, are the property of their respective owners.
Management Software: 9.1
Appliance Software: Fireware® 9.1 and Fireware Pro 9.1
Document Version: 9.1-352-2832-001-2
Complete copyright, trademark, patent, and licensing
information can be found in the appendix of this User
Guide.
User Guide iii
Contents
CHAPTER 1
Introduction
....................................................................................................................... 1
WatchGuard System Manager Tools ........................................................................... 2
About the WatchGuard System Manager Window .................................................... 2
Device Status ................................................................................................................ 2
Device Management ..................................................................................................... 4
About WatchGuard Servers ........................................................................................... 4
About Fireware and Fireware Pro ................................................................................ 5
CHAPTER 2
Getting Started
................................................................................................................ 7
Installing WatchGuard System Manager ..................................................................... 7
Installation requirements ............................................................................................... 8
Collecting network information ...................................................................................... 8
Selecting a firewall configuration mode ........................................................................ 9
Selecting where to install server software ................................................................... 11
Setting up the management station ............................................................................ 11
Backing up your previous configuration ...................................................................... 12
Quick Setup Wizard ...................................................................................................... 12
Quick Setup Wizard .................................................................................................... 13
Web Quick Setup Wizard ........................................................................................... 13
Putting the Firebox into Operation .............................................................................. 14
Starting WatchGuard System Manager ..................................................................... 15
Connecting to a Firebox .............................................................................................. 16
Disconnecting from a Firebox ..................................................................................... 16
Starting security applications ...................................................................................... 16
After Your Installation .................................................................................................... 17
Customizing your security policy ................................................................................. 17
Features of the LiveSecurity Service .......................................................................... 18
Upgrading to a New Version of Fireware ................................................................... 18
Downgrading to WSM 9.0 or Earlier .......................................................................... 19
iv
WatchGuard System Manager
Installation Topics .......................................................................................................... 19
Installing WSM and keeping an older version ............................................................. 19
Installing WatchGuard Servers on computers with desktop firewalls ......................... 19
Adding secondary networks to your configuration ...................................................... 20
Dynamic IP support on the external interface ............................................................. 20
Entering IP addresses ................................................................................................. 21
Installing the Firebox cables ....................................................................................... 22
CHAPTER 3
Service and Support
................................................................................................. 23
LiveSecurity Service Solutions .................................................................................... 23
LiveSecurity Service Broadcasts ................................................................................ 24
Activating LiveSecurity Service ................................................................................... 24
LiveSecurity Service Self Help Tools ......................................................................... 25
WatchGuard Users Forum ........................................................................................... 26
Product Documentation ................................................................................................ 26
Technical Support .......................................................................................................... 26
LiveSecurity Service technical support ....................................................................... 26
LiveSecurity Gold ........................................................................................................ 27
Firebox Installation Service ......................................................................................... 27
VPN Installation Service .............................................................................................. 27
Training and Certification ............................................................................................. 28
CHAPTER 4
Firebox Status Monitoring
.................................................................................... 29
Starting Firebox System Manager .............................................................................. 29
Connecting to a Firebox .............................................................................................. 29
Opening Firebox System Manager ............................................................................. 30
Firebox System Manager Menus and Toolbar .......................................................... 31
Setting refresh interval and pausing the display ......................................................... 32
Basic Firebox and Network Status ............................................................................. 33
Using the Security Traffic display ................................................................................ 33
Monitoring status information ...................................................................................... 34
Setting the center interface ......................................................................................... 34
Monitoring traffic, load, and status .............................................................................. 34
Firebox and VPN tunnel status ................................................................................... 35
Firebox Traffic ................................................................................................................ 37
Setting the maximum number of log messages .......................................................... 37
Using color for log messages ...................................................................................... 38
Copying log messages ................................................................................................ 39
Learning more about a traffic log message ................................................................ 39
Bandwidth Usage .......................................................................................................... 39
Policies ............................................................................................................................ 41
Traffic and Performance Statistics .............................................................................. 43
Authenticated Users ..................................................................................................... 44
Blocked Sites ................................................................................................................. 45
Security Services .......................................................................................................... 46
HostWatch ...................................................................................................................... 48
User Guide v
The HostWatch window .............................................................................................. 48
Controlling the HostWatch window ............................................................................. 50
Changing HostWatch view properties ......................................................................... 50
Blocking a site from HostWatch .................................................................................. 51
Pausing the HostWatch display .................................................................................. 51
Performance Console ................................................................................................... 51
Types of counters ........................................................................................................ 51
Defining counters ........................................................................................................ 52
Viewing the performance graph .................................................................................. 54
Working with more than one Performance Console graph ......................................... 55
Certificates on the Firebox ........................................................................................... 55
Feature Keys on the Firebox ....................................................................................... 56
Communication Log ...................................................................................................... 57
Performing Operations in Firebox System Manager ............................................... 57
Synchronizing time ...................................................................................................... 57
Clearing the ARP cache .............................................................................................. 57
Clearing alarms ........................................................................................................... 58
Rekeying BOVPN tunnels ........................................................................................... 58
High Availability ........................................................................................................... 58
Changing passphrases ............................................................................................... 58
CHAPTER 5
Basic Firebox Administration
............................................................................ 61
Working with Feature Keys .......................................................................................... 61
Getting feature keys .................................................................................................... 61
Adding feature keys to the Firebox ............................................................................. 62
Deleting a feature key ................................................................................................. 63
Seeing the active features .......................................................................................... 63
Seeing the properties of a feature key ........................................................................ 64
Downloading a feature key ......................................................................................... 64
Setting NTP Servers ..................................................................................................... 64
Setting a Friendly Name and Time Zone ................................................................... 65
Working with SNMP ...................................................................................................... 65
Enabling SNMP polling ............................................................................................... 66
Enabling SNMP traps .................................................................................................. 66
Using MIBs .................................................................................................................. 67
Changing the Firebox Passphrases ........................................................................... 67
Recovering a Firebox ................................................................................................... 68
Resetting a Firebox X e-Series device ....................................................................... 68
Resetting a Firebox X Core or Peak (non e-Series) ................................................... 68
CHAPTER 6
Basic Configuration Setup
................................................................................... 71
Opening a Configuration File ...................................................................................... 71
Opening a working configuration file ........................................................................... 72
Opening a local configuration file ................................................................................ 73
Making a new configuration file ................................................................................... 74
Saving a Configuration File ......................................................................................... 74
Saving a configuration to the Firebox ......................................................................... 74
Saving a configuration to a local hard drive ................................................................ 75
vi
WatchGuard System Manager
About Firebox Backup Images .................................................................................... 75
Creating a Firebox backup image ............................................................................... 75
Restoring a Firebox backup image ............................................................................. 76
Working with Aliases ..................................................................................................... 76
Alias members ............................................................................................................ 77
Creating an alias ......................................................................................................... 77
Using Global Settings ................................................................................................... 79
Defining ICMP error handling global settings ............................................................. 79
Enabling TCP SYN checking ...................................................................................... 80
Defining TCP maximum segment size adjustment global settings ............................. 80
Disabling Traffic Management and QoS ..................................................................... 80
Using Global VPN Settings .......................................................................................... 81
Creating Schedules ...................................................................................................... 82
Managing a Firebox from a Remote Location .......................................................... 83
CHAPTER 7
Logging and Notification
....................................................................................... 87
Setting Up the Log Server ........................................................................................... 87
Changing the Log Server encryption key .................................................................... 88
Setting up the Firebox for a Designated Log Server ............................................... 89
Adding a Log Server for a Firebox .............................................................................. 89
Setting Log Server priority .......................................................................................... 90
Activating syslog logging ............................................................................................. 90
Enabling advanced diagnostics .................................................................................. 91
Disabling performance statistic logging ...................................................................... 92
Starting and stopping the Log Server ......................................................................... 93
Setting Global Logging and Notification Preferences .............................................. 93
Log file size and rollover frequency ............................................................................ 93
Setting when log files rollover ..................................................................................... 94
Scheduling automated reports .................................................................................... 95
Controlling notification ................................................................................................. 95
Setting Logging and Notification Preferences in Policy Manager ......................... 96
Logging and Notification in Proxy Definitions ........................................................... 97
Configuring log messages and notification for a proxy policy ..................................... 98
Configuring log messages and alarms for a proxy rule .............................................. 98
About Log Messages ................................................................................................... 98
Types of log messages ............................................................................................... 98
Log file names and locations ...................................................................................... 99
Consolidating log files ................................................................................................. 99
Updating .wgl log files to .xml format ........................................................................ 100
Using LogViewer ......................................................................................................... 101
LogViewer settings .................................................................................................... 102
Creating a search rule ............................................................................................... 103
Searching in LogViewer ............................................................................................ 104
Viewing the current log file in LogViewer .................................................................. 105
Copying LogViewer data ........................................................................................... 105
CHAPTER 8
Network Setup and Configuration
................................................................ 107
Configuring Firebox Interfaces .................................................................................. 108
User Guide vii
Configuring the external interface ............................................................................. 110
Adding Secondary Networks ..................................................................................... 113
Adding WINS and DNS Server Addresses ............................................................. 114
Configuring Dynamic DNS ......................................................................................... 115
Creating a DynDNS account ..................................................................................... 115
Setting up the Firebox for dynamic DNS .................................................................. 115
Configuring Routes ..................................................................................................... 116
Adding a network route ............................................................................................. 117
Adding a host route ................................................................................................... 117
Configuring Advanced Settings for an Interface ..................................................... 118
Setting Firebox Interface Speed and Duplex ............................................................ 118
Setting maximum bandwidth and marking type ........................................................ 119
Setting DF bit for IPSec (external interfaces only) .................................................... 119
Using a Firebox with a Drop-in Configuration ......................................................... 119
Configuring related hosts .......................................................................................... 120
Virtual Local Area Networks (VLANs) ...................................................................... 121
Tagging ...................................................................................................................... 122
Defining a New VLAN ................................................................................................ 122
Using DHCP .............................................................................................................. 125
Using DHCP relay ..................................................................................................... 125
Specifying VLANs for an Interface ............................................................................ 125
CHAPTER 9
Network Setup with Multiple External Interfaces
.............................. 127
Multi-WAN Requirements and Conditions ............................................................... 127
Multi-WAN Options ...................................................................................................... 128
About the WAN Failover method .............................................................................. 128
About multi-WAN in round-robin order ..................................................................... 128
About multi-WAN with the routing table .................................................................... 128
About the Interface Overflow method ....................................................................... 129
Configuring the Multi-WAN Routing Table Option .................................................. 130
Looking at the Firebox route table ............................................................................ 130
Configuring the Multi-WAN Round-robin Option .................................................... 131
Configuring the Multi-WAN Failover Option ............................................................ 132
Configuring the Multi-WAN Interface Overflow Option .......................................... 134
Checking WAN Interface Status ................................................................................ 135
Configuring Advanced Multi-WAN Settings ............................................................ 137
Sticky Connections .................................................................................................... 137
Failback ..................................................................................................................... 138
CHAPTER 10
Network Address Translation (NAT)
........................................................... 141
Types of NAT ............................................................................................................... 141
Using Dynamic NAT .................................................................................................... 142
Adding firewall dynamic NAT entries ........................................................................ 142
Reordering dynamic NAT entries .............................................................................. 143
Using 1-to-1 NAT ......................................................................................................... 144
Defining a 1-to-1 NAT rule ......................................................................................... 144
viii
WatchGuard System Manager
Configuring firewall 1-to-1 NAT ................................................................................. 145
Configuring Policy-Based Dynamic or 1-to-1 NAT ................................................. 146
Configuring policy-based 1-to-1 NAT ........................................................................ 146
Configuring policy-based dynamic NAT .................................................................... 146
Configuring Static NAT ............................................................................................... 148
Server Load Balancing ............................................................................................... 149
Configuring Server Load Balancing ......................................................................... 149
CHAPTER 11
Authentication
............................................................................................................. 153
How User Authentication Works ............................................................................... 153
Using authentication from the external network ........................................................ 154
Using authentication through a gateway Firebox to another Firebox ....................... 154
About Authentication Timeout Values ...................................................................... 155
Defining global authentication timeouts .................................................................... 155
Closing a session before timeout occurs .................................................................. 155
Using a Custom Default Start Page ......................................................................... 156
Allowing Multiple Concurrent Logins ........................................................................ 156
Authentication Server Types ..................................................................................... 156
Using a backup authentication server ....................................................................... 157
Configuring the Firebox as an Authentication Server ............................................ 157
Authentication types .................................................................................................. 157
Defining a new user for Firebox authentication ........................................................ 159
Defining a new group for Firebox authentication ...................................................... 160
Using a local user account for Firewall user, PPTP, and MUVPN authentication .... 161
Configuring RADIUS Server Authentication ........................................................... 161
Configuring SecurID Authentication ......................................................................... 163
Configuring LDAP Authentication ............................................................................. 164
Using LDAP optional settings ................................................................................... 166
Configuring Active Directory Authentication .......................................................... 168
Using Active Directory optional settings ................................................................... 169
Defining Users and Groups for Policy Definitions .................................................. 169
Defining users and groups for Firebox authentication .............................................. 170
Defining users and groups for third-party authentication .......................................... 170
Using users and groups in policy definitions ............................................................. 171
CHAPTER 12
Firewall Intrusion Detection and Prevention
........................................ 173
Using Default Packet Handling Options .................................................................. 173
Spoofing attacks ........................................................................................................ 174
IP source route attacks ............................................................................................. 174
Port space and address space attacks ..................................................................... 175
Flood attacks ............................................................................................................. 175
Unhandled packets ................................................................................................... 175
Distributed denial of service attacks ......................................................................... 176
Setting logging and notification for packet handling ................................................. 176
Setting Blocked Sites .................................................................................................. 176
Blocking a site permanently ...................................................................................... 177
Blocking spyware sites .............................................................................................. 178
User Guide ix
Using an external list of blocked sites ....................................................................... 178
Creating exceptions to the Blocked Sites list ............................................................ 179
Using an external list of blocked sites exceptions .................................................... 180
Setting logging and notification for blocked sites ...................................................... 180
Blocking sites temporarily with policy settings .......................................................... 180
Blocked sites and Traffic Monitor .............................................................................. 180
Blocking Ports .............................................................................................................. 181
Blocking a port permanently ..................................................................................... 182
Automatically blocking IP addresses that try to use blocked ports ........................... 182
Setting logging and notification for blocked ports ..................................................... 182
CHAPTER 13
Policies
............................................................................................................................. 183
Using Policies in your Network ................................................................................. 183
About Policy Manager ................................................................................................ 184
Opening Policy Manager ........................................................................................... 184
About the Policy Manager window ............................................................................ 184
Changing the Policy Manager View .......................................................................... 185
Selecting colors for Policy Manager text ................................................................... 187
Finding a policy ......................................................................................................... 188
Adding Policies to Policy Manager ........................................................................... 189
Seeing the list of policy templates ............................................................................. 189
Adding a policy from the list of policy templates ....................................................... 190
Adding more than one policy of the same type ......................................................... 191
Seeing and modifying policy templates .................................................................... 192
Disabling a policy ...................................................................................................... 192
Deleting a policy ........................................................................................................ 192
About Custom Policies ............................................................................................... 192
Creating a custom policy template ............................................................................ 193
Adding a custom policy from the list of policy templates .......................................... 194
Importing and exporting custom policy templates .................................................... 194
Setting Policy Properties ............................................................................................ 195
Setting sources and destinations for a policy ........................................................... 196
About policy-based routing ...................................................................................... 198
Setting a proxy action ................................................................................................ 200
Setting a custom idle timeout .................................................................................... 200
Setting logging properties ......................................................................................... 201
Configuring static NAT for a policy ............................................................................ 201
Configuring server load balancing for a policy .......................................................... 203
Setting an operating schedule .................................................................................. 203
Applying Traffic Management actions ....................................................................... 203
Setting ICMP error handling ...................................................................................... 204
Applying NAT rules ................................................................................................... 205
Using QoS Marking for a policy ................................................................................ 205
Setting traffic priority for a policy ............................................................................... 206
Enabling sticky connections for a policy ................................................................... 206
Setting Policy Precedence ......................................................................................... 207
Using automatic order ............................................................................................... 207
Setting precedence manually .................................................................................... 208
x
WatchGuard System Manager
CHAPTER 14
Proxy Policies
.............................................................................................................. 209
Working with WatchGuard Proxies ........................................................................... 209
About rules and rulesets ........................................................................................... 210
About proxy actions ................................................................................................... 210
Predefined and user-defined proxy actions .............................................................. 210
Adding a Proxy to your Firebox Configuration ........................................................ 211
SMTP Proxy ................................................................................................................. 213
SMTP proxy: General settings .................................................................................. 213
SMTP proxy: Greeting rules ...................................................................................... 215
SMTP proxy: ESMTP settings .................................................................................. 216
SMTP proxy: Authentication ..................................................................................... 217
SMTP proxy: Content types ...................................................................................... 217
SMTP proxy: File names ........................................................................................... 218
SMTP proxy: Mail From/Mail To ................................................................................ 219
SMTP proxy: Headers ............................................................................................... 219
SMTP proxy: Antivirus responses ............................................................................. 220
SMTP proxy: Deny message .................................................................................... 220
SMTP proxy: Intrusion prevention ............................................................................. 221
SMTP proxy: spamBlocker ....................................................................................... 221
SMTP proxy: Proxy and AV alarms ........................................................................... 221
SMTP proxy: Finishing and saving the configuration ............................................... 221
POP3 Proxy ................................................................................................................. 222
POP3 proxy: General settings .................................................................................. 222
POP3 proxy: Authentication ...................................................................................... 223
POP3 proxy: Content types ...................................................................................... 224
POP3 proxy: File names ........................................................................................... 225
POP3 proxy: Headers ............................................................................................... 226
POP3 proxy: Antivirus responses ............................................................................. 227
POP3 proxy: Deny message ..................................................................................... 228
POP3 proxy: Intrusion prevention ............................................................................. 229
POP3 proxy: spamBlocker ........................................................................................ 230
POP3 proxy: Proxy and AV alarms ........................................................................... 231
POP3 proxy: Finishing and saving the configuration ................................................ 232
FTP Proxy ................................................................................................................... 232
FTP proxy: General settings ..................................................................................... 233
FTP proxy: Commands ............................................................................................. 234
FTP proxy: Download ................................................................................................ 234
FTP proxy: Upload .................................................................................................... 235
FTP proxy: Antivirus responses ................................................................................ 235
FTP proxy: Intrusion prevention ................................................................................ 236
FTP proxy: Proxy and AV alarms .............................................................................. 236
FTP proxy: Finishing and saving the configuration ................................................... 237
HTTP Proxy .................................................................................................................. 237
HTTP requests: General settings .............................................................................. 238
HTTP requests: Request methods ............................................................................ 239
HTTP requests: URL paths ....................................................................................... 240
HTTP requests: Header fields ................................................................................... 240
HTTP requests: Authorization ................................................................................... 241
HTTP responses: General settings ........................................................................... 241
HTTP responses: Header fields ................................................................................ 242
User Guide xi
HTTP responses: Content types ............................................................................... 242
HTTP responses: Cookies ........................................................................................ 243
HTTP responses: Body content types ...................................................................... 243
HTTP proxy: Exceptions ........................................................................................... 244
HTTP proxy: Antivirus responses ............................................................................. 244
HTTP proxy: Deny message ..................................................................................... 244
HTTP proxy: Intrusion prevention ............................................................................. 246
HTTP proxy: Proxy and AV alarms ........................................................................... 246
Finishing and saving the HTTP configuration ........................................................... 246
DNS Proxy .................................................................................................................... 246
DNS proxy: General settings .................................................................................... 247
DNS proxy: OPcodes ................................................................................................ 247
DNS proxy: Query types ........................................................................................... 248
DNS proxy: Query names ......................................................................................... 249
DNS proxy: Intrusion prevention ............................................................................... 250
DNS proxy: Alarms .................................................................................................... 250
Finishing and saving the DNS configuration ............................................................. 250
TCP Proxy .................................................................................................................... 250
TCP proxy: General settings ..................................................................................... 250
TCP proxy: Intrusion prevention ............................................................................... 251
Finishing and saving the TCP configuration ............................................................. 251
Working with Rules and Rulesets ............................................................................. 251
Simple and advanced views ..................................................................................... 251
Adding rules (simple view) ........................................................................................ 253
Adding rules (advanced view) ................................................................................... 253
Cutting and pasting rule definitions ........................................................................... 254
Changing the order of rules ...................................................................................... 254
Modifying the default rule .......................................................................................... 255
Import and Export Functions for Proxies ................................................................. 255
Importing and exporting user-defined proxy actions ................................................. 256
Importing and exporting rulesets .............................................................................. 256
CHAPTER 15
Historical Reports
..................................................................................................... 259
Creating and Editing Reports .................................................................................... 259
Starting Historical Reports ......................................................................................... 259
Starting a new report ................................................................................................. 260
Editing an existing report .......................................................................................... 261
Deleting a report ........................................................................................................ 261
Viewing the reports list .............................................................................................. 261
Backing up report definition files ............................................................................... 262
Setting Report Properties .......................................................................................... 262
Specifying a report time span .................................................................................... 262
Specifying report sections ......................................................................................... 262
Consolidating report sections .................................................................................... 263
Setting report preferences ........................................................................................ 264
Viewing network interface relationships .................................................................... 265
Using Report Filters .................................................................................................... 265
Creating a new report filter ........................................................................................ 266
Editing a report filter .................................................................................................. 266
Deleting a report filter ................................................................................................ 267
xii
WatchGuard System Manager
Applying a report filter ............................................................................................... 267
Running Reports ......................................................................................................... 267
Exporting Reports ....................................................................................................... 267
Exporting reports to HTML format ............................................................................. 268
Exporting reports to NetIQ format ............................................................................. 268
Report Sections and Consolidated Sections .......................................................... 268
Report sections ......................................................................................................... 268
Consolidated sections ............................................................................................... 271
CHAPTER 16
Management Server Setup and Administration
................................. 273
Installing the Management Server ............................................................................ 273
WatchGuard Management Server Passphrases .................................................... 273
Setting Up the Management Server ......................................................................... 275
Changing the Management Server Configuration ................................................. 276
Adding or removing a Management Server license .................................................. 276
Recording diagnostic log messages for the Management Server ............................ 277
Configuring the Certificate Authority ........................................................................ 277
Configuring properties for the CA certificate ............................................................. 277
Configuring properties for client certificates .............................................................. 278
Configuring properties for the Certificate Revocation List (CRL) ............................. 279
Recording diagnostic log messages for the Certificate Authority service ................. 279
Backing up or Restoring the Management Server Configuration ........................ 280
Moving the WatchGuard Management Server to a New Computer .................... 280
Connecting to a Management Server ...................................................................... 280
CHAPTER 17
Device Management Setup
................................................................................ 283
Configuring Fireboxes as Managed Clients ............................................................ 283
Configuring a Firebox X Core or X Peak running Fireware as a managed client ..... 283
Configuring a Firebox III or Firebox X Core running WFS as a managed client ...... 285
Configuring Edges and SOHOs as Managed Clients ........................................... 286
Preparing a new or factory default Firebox X Edge for management ...................... 287
Importing Firebox X Edge devices into a Management Server ................................ 288
Preparing an installed Firebox X Edge for management .......................................... 288
Configuring a Firebox SOHO 6 as a managed client ............................................... 290
Adding Devices ............................................................................................................ 291
CHAPTER 18
Device Management Properties
..................................................................... 295
Viewing the Managed Devices .................................................................................. 295
Viewing the Device Management Page ................................................................... 296
Configuring Device Management Properties .......................................................... 297
Updating a Device ....................................................................................................... 302
Removing a Device ..................................................................................................... 302
Network Setup (Edge devices only) ......................................................................... 302
Adding a VPN Resource ............................................................................................ 303
User Guide xiii
Starting Firebox and Edge Tools ............................................................................... 303
VPN Tunnels ................................................................................................................ 304
Using the Firebox X Edge Policy Section ................................................................ 304
CHAPTER 19
Firebox X Edge Templates and Aliases
.................................................... 305
Scheduling Firebox X Edge Firmware Updates ..................................................... 305
Seeing and deleting firmware updates ..................................................................... 307
Creating and Applying Edge Configuration Templates ......................................... 308
Adding a pre-defined policy with the Add Policy wizard ........................................... 310
Adding a custom policy with the Add Policy wizard .................................................. 310
Cloning an Edge Configuration Template ................................................................. 312
Applying an Edge Configuration Template to devices .............................................. 312
Removing an Edge from the device list .................................................................... 314
Using Aliases ............................................................................................................... 314
Naming aliases on the Management Server ............................................................. 315
Defining aliases on a Firebox X Edge ....................................................................... 316
CHAPTER 20
Managed BOVPN Tunnels
................................................................................... 319
About Managed BOVPN Tunnels ............................................................................. 319
VPN Failover ............................................................................................................. 319
Global VPN settings .................................................................................................. 320
VPN Resources and Templates ................................................................................ 320
Configuring a Firebox as a Managed Firebox Client ............................................. 320
Adding VPN Resources ............................................................................................. 320
Getting the current resources from a device ............................................................. 321
Creating a new VPN resource .................................................................................. 321
Adding more hosts or networks ................................................................................ 322
Adding VPN Firewall Policy Templates .................................................................... 322
Adding Security Templates ........................................................................................ 323
Making Tunnels Between Devices ........................................................................... 325
Editing a Tunnel ........................................................................................................... 326
Removing Tunnels and Devices ............................................................................... 327
Removing a tunnel .................................................................................................... 327
Removing a device .................................................................................................... 327
CHAPTER 21
Manual BOVPN Tunnels
....................................................................................... 329
About Manual VPN Tunnels ...................................................................................... 329
VPN and failover ....................................................................................................... 329
Global VPN settings .................................................................................................. 329
Configuring Gateways ................................................................................................ 330
Defining the credential method ................................................................................. 331
Defining gateway endpoints ...................................................................................... 332
Configuring mode and transforms (Phase 1 settings) .............................................. 334
Adding a Phase 1 transform ..................................................................................... 335
Editing and deleting gateways .................................................................................. 336
Making Tunnels between Gateway Endpoints ....................................................... 336
xiv
WatchGuard System Manager
Configuring routes for the tunnel ............................................................................... 337
Adding new routes .................................................................................................... 338
Configuring Phase 2 settings .................................................................................... 339
Adding a Phase 2 proposal ....................................................................................... 341
Editing and deleting a tunnel ..................................................................................... 342
Changing order of tunnels ......................................................................................... 342
Making a Tunnel Policy .............................................................................................. 343
Setting up Outgoing Dynamic NAT through a BOVPN Tunnel ............................ 343
About VPN Failover .................................................................................................... 344
Configuring multiple gateway pairs ........................................................................... 345
Forcing a BOVPN Tunnel Rekey .............................................................................. 346
To rekey one BOVPN tunnel ..................................................................................... 346
To rekey all BOVPN tunnels ...................................................................................... 347
CHAPTER 22
Certificates and the Certificate Authority
............................................... 349
Creating a New Certificate ......................................................................................... 349
Creating a certificate with Firebox System Manager ................................................ 349
Creating a certificate with CA Manager .................................................................... 351
Completing a Certificate Signing Request .............................................................. 352
Importing a Certificate ................................................................................................ 353
Firebox authentication ............................................................................................... 354
Mobile User VPN (MUVPN) tunnel authentication ................................................... 355
Branch Office VPN (BOVPN) authentication ............................................................ 356
Managing Certificates ................................................................................................. 356
Using the web-based CA Manager ........................................................................... 356
Using WSM to manage certificates ........................................................................... 358
Using FSM to manage certificates ............................................................................ 358
CHAPTER 23
Remote User VPN with PPTP
........................................................................... 361
Configuration Checklist .............................................................................................. 361
Encryption levels ....................................................................................................... 361
Configuring WINS and DNS Servers ....................................................................... 362
Enabling RUVPN with PPTP ..................................................................................... 363
Enabling RADIUS authentication .............................................................................. 364
Setting encryption for PPTP tunnels ......................................................................... 364
Defining timeout settings for PPTP tunnels .............................................................. 365
Adding IP Addresses for RUVPN Sessions ............................................................ 365
Adding New Users to the PPTP_Users Authentication Group ........................... 366
Configuring policies to allow RUVPN traffic .............................................................. 367
Preparing the Client Computers ............................................................................... 367
Installing MSDUN and service packs ........................................................................ 367
Creating and Connecting a PPTP RUVPN from a Windows Vista Client .......... 368
Establishing the PPTP connection ............................................................................ 369
Creating and Connecting a PPTP RUVPN on Windows XP ................................ 369
Creating and Connecting a PPTP RUVPN on Windows 2000 ............................ 369
Running RUVPN and Accessing the Internet ......................................................... 370
User Guide xv
Making outbound PPTP connections from behind a Firebox ................................... 371
CHAPTER 24
WebBlocker
................................................................................................................... 373
Installing the Feature Key .......................................................................................... 373
Getting Started with WebBlocker .............................................................................. 373
Automating WebBlocker database downloads ......................................................... 374
Activating WebBlocker ............................................................................................... 375
Configuring WebBlocker ............................................................................................ 378
Adding new servers ................................................................................................... 379
Selecting categories to block .................................................................................... 379
Defining advanced WebBlocker options ................................................................... 380
Defining WebBlocker Exceptions ............................................................................. 381
Components of exception rules ................................................................................ 382
Exceptions with part of a URL ................................................................................... 382
Adding exceptions ..................................................................................................... 382
Defining the action for sites that do not match exceptions ....................................... 384
Changing the order of exception rules ...................................................................... 384
Importing or exporting exception rules ...................................................................... 385
WebBlocker Actions .................................................................................................... 386
Adding WebBlocker actions to a policy ..................................................................... 387
Scheduling WebBlocker actions ............................................................................... 387
CHAPTER 25
spamBlocker
................................................................................................................. 389
About spamBlocker ..................................................................................................... 389
spamBlocker requirements ....................................................................................... 389
spamBlocker actions ................................................................................................. 390
spamBlocker tags ...................................................................................................... 390
spamBlocker categories ............................................................................................ 390
Installing the spamBlocker Feature Key .................................................................. 391
Activating spamBlocker .............................................................................................. 391
Configuring spamBlocker ........................................................................................... 393
Using spamBlocker Exception Rules ....................................................................... 395
Adding spamBlocker exception rules ........................................................................ 395
Changing the order of exception rules ...................................................................... 396
Importing or exporting exception rules ...................................................................... 396
Logging exceptions ................................................................................................... 397
Setting Global spamBlocker Parameters ................................................................ 398
Using an HTTP proxy server ..................................................................................... 399
Adding trusted email forwarders ............................................................................... 399
Creating Rules for Bulk and Suspect Email on Email Clients .............................. 401
Sending spam or bulk email to special folders in Outlook ........................................ 401
Reporting False Positives and False Negatives ..................................................... 402
Monitoring spamBlocker Activity ............................................................................... 402
Customizing spamBlocker Using Multiple Proxies ................................................. 402
xvi
WatchGuard System Manager
CHAPTER 26
Quarantine Server
..................................................................................................... 403
About the Quarantine Server .................................................................................... 403
Starting the Quarantine Server ................................................................................. 404
Installing server components .................................................................................... 404
Running the setup wizard ......................................................................................... 404
Entering the server location ...................................................................................... 404
Configuring the Quarantine Server .......................................................................... 405
Setting general server parameters ............................................................................ 406
Configuring the expiration settings ............................................................................ 406
Adding and removing user domains ......................................................................... 407
Configuring the notification settings .......................................................................... 408
Configuring rules ....................................................................................................... 409
Managing Messages .................................................................................................. 410
Setting viewing options ............................................................................................. 411
Saving messages ...................................................................................................... 411
Manually deleting messages ..................................................................................... 412
Automatically deleting messages .............................................................................. 412
Managing Users .......................................................................................................... 412
Adding users ............................................................................................................. 413
Removing users ........................................................................................................ 414
Changing notification option for a user ..................................................................... 414
Getting Statistics on Quarantine Server Activity ..................................................... 414
Viewing statistics from specific dates ........................................................................ 415
Viewing specific types of messages ......................................................................... 415
Grouping data ........................................................................................................... 415
Exporting and printing statistics ................................................................................ 416
CHAPTER 27
Signature-Based Security Services
............................................................ 417
Installing and Updating Security Services ............................................................... 417
About Gateway AntiVirus ........................................................................................... 417
Activating Gateway AntiVirus .................................................................................... 418
Activating Gateway AV with a wizard ........................................................................ 418
Activating Gateway AV from proxy definitions .......................................................... 420
Configuring Antivirus Actions .................................................................................... 421
Creating alarms or log entries for antivirus actions .................................................. 423
Unlocking a file locked by Gateway AntiVirus ........................................................... 423
Global Gateway AntiVirus Settings .......................................................................... 424
Configuring Gateway AV engine settings ................................................................. 424
Configuring the update server ................................................................................... 424
Connecting to the update server through an HTTP proxy server ............................. 425
Activating Intrusion Prevention Service (IPS) ......................................................... 426
Configuring Intrusion Prevention .............................................................................. 429
Configuring intrusion prevention for HTTP or TCP ................................................... 430
Configuring Intrusion Prevention for FTP, SMTP, POP3, or DNS ............................. 432
Configuring the IPS update server ............................................................................ 432
Configuring signature exceptions .............................................................................. 432
Copying IPS settings to other policies ...................................................................... 433
User Guide xvii
Getting Gateway AV/IPS Status and Updates ........................................................ 433
Seeing service status ................................................................................................ 433
Updating signatures or engines manually ................................................................. 434
Seeing the update history ......................................................................................... 435
CHAPTER 28
Dynamic Routing
....................................................................................................... 437
Routing Daemon Configuration Files ....................................................................... 437
Using RIP ..................................................................................................................... 438
RIP Version 1 ............................................................................................................ 438
RIP Version 2 ............................................................................................................ 440
Using OSPF ................................................................................................................. 442
OSPF daemon configuration ..................................................................................... 442
Configuring Fireware Pro to use OSPF .................................................................... 445
Using BGP .................................................................................................................... 446
CHAPTER 29
Traffic Management and Quality of Service
.......................................... 451
About Traffic Management and QoS ........................................................................ 451
Guaranteeing bandwidth ........................................................................................... 451
Restricting bandwidth ................................................................................................ 452
QoS Marking ............................................................................................................. 452
Traffic priority ............................................................................................................. 452
Configuring Outgoing Interface Bandwidth ............................................................. 452
Using Traffic Management Actions .......................................................................... 453
Defining a Traffic Management action ...................................................................... 453
Applying the Traffic Management action to a policy ................................................. 454
Setting traffic priority in a policy ................................................................................ 455
Using Traffic Management actions in a multi-WAN environment ............................. 455
Setting Connection and Bandwidth Limits ............................................................... 456
About QoS Marking .................................................................................................... 456
Per-interface and per-policy QoS Marking ................................................................ 457
Marking types and values ......................................................................................... 457
Enabling QoS Marking for an interface ..................................................................... 458
Enabling QoS Marking for a policy ............................................................................ 459
QoS Marking and IPSec traffic .................................................................................. 460
CHAPTER 30
High Availability
......................................................................................................... 461
About WatchGuard High Availability ........................................................................ 461
High Availability Requirements ................................................................................. 462
Selecting a Primary High Availability Firebox ......................................................... 462
Configuring High Availability ...................................................................................... 463
Manually Controlling High Availability ...................................................................... 464
Backing up an HA configuration ................................................................................ 465
Upgrading Software in an HA Configuration ........................................................... 465
Using HA with Proxy Sessions .................................................................................. 465
xviii
WatchGuard System Manager
APPENDIX A
Copyright and Licensing
..................................................................................... 467
WatchGuard Firebox Software End-User License Agreement ............................ 467
WatchGuard Technologies, Inc. Add-on Product/Service
Customer Agreement/End-User License Agreement
........................................... 469
Copyright and Trademarks ........................................................................................ 471
Patents .......................................................................................................................... 471
Licenses ........................................................................................................................ 471
SSL Licenses ............................................................................................................ 472
Apache Software License, Version 2.0, January 2004 ............................................. 473
PCRE License ........................................................................................................... 474
GNU Lesser General Public License ........................................................................ 475
GNU General Public License .................................................................................... 479
Sleepycat License ..................................................................................................... 481
Sourcefire License .................................................................................................... 482
Expat-MIT HTML Parser Toolkit License .................................................................. 485
Curl Software MIT-X License .................................................................................... 485
APPENDIX B
WatchGuard File Locations
............................................................................... 487
Default File Locations ................................................................................................. 488
APPENDIX C
Types of Policies
........................................................................................................ 491
Packet Filter Policies .................................................................................................. 491
Any ............................................................................................................................ 491
archie ......................................................................................................................... 491
auth ........................................................................................................................... 492
BGP ........................................................................................................................... 492
Citrix .......................................................................................................................... 492
Clarent-Command ..................................................................................................... 492
Clarent-Gateway ....................................................................................................... 493
CU-SeeMe ................................................................................................................ 493
DHCP-Server or DHCP-Client .................................................................................. 494
DNS ........................................................................................................................... 494
Entrust ....................................................................................................................... 494
finger ......................................................................................................................... 494
FTP ............................................................................................................................ 494
Gopher ...................................................................................................................... 495
GRE ........................................................................................................................... 495
HBCI .......................................................................................................................... 495
HTTP ......................................................................................................................... 495
HTTPS ....................................................................................................................... 496
IDENT ........................................................................................................................ 496
IGMP ......................................................................................................................... 496
IMAP .......................................................................................................................... 496
IPSec ......................................................................................................................... 497
IRC ............................................................................................................................ 497
Intel Video Phone ...................................................................................................... 497
Kerberos v 4 and Kerberos v 5 ................................................................................. 497
L2TP .......................................................................................................................... 497
User Guide xix
LDAP ......................................................................................................................... 498
LDAP-SSL ................................................................................................................. 498
Lotus Notes ............................................................................................................... 498
MS-SQL-Monitor ....................................................................................................... 498
MS-SQL-Server ......................................................................................................... 498
MS-Win-Media .......................................................................................................... 499
NetMeeting ................................................................................................................ 499
NFS ........................................................................................................................... 499
NNTP ......................................................................................................................... 499
NTP ........................................................................................................................... 499
OSPF ......................................................................................................................... 500
pcAnywhere .............................................................................................................. 500
Ping ........................................................................................................................... 500
POP2 and POP3 ....................................................................................................... 500
PPTP ......................................................................................................................... 501
RADIUS and RADIUS-RFC ...................................................................................... 501
RADIUS-Accounting and RADIUS-Acct-RFC ........................................................... 501
RDP ........................................................................................................................... 501
RIP ............................................................................................................................ 502
RSH ........................................................................................................................... 502
RealPlayerG2 ............................................................................................................ 502
Rlogin ........................................................................................................................ 502
SecurID ..................................................................................................................... 502
SMB (Windows Networking) ..................................................................................... 503
SMTP ........................................................................................................................ 503
SNMP ........................................................................................................................ 503
SNMP-Trap ............................................................................................................... 503
SQL*Net .................................................................................................................... 504
SQL-Server ............................................................................................................... 504
SSH ........................................................................................................................... 504
SunRPC .................................................................................................................... 504
Syslog ........................................................................................................................ 504
TACACS .................................................................................................................... 505
TACACS+ .................................................................................................................. 505
TCP ........................................................................................................................... 505
TCP-UDP .................................................................................................................. 505
Telnet ......................................................................................................................... 505
Timbuktu .................................................................................................................... 506
Time ........................................................................................................................... 506
Traceroute ................................................................................................................. 506
UDP ........................................................................................................................... 506
UUCP ........................................................................................................................ 507
WAIS ......................................................................................................................... 507
WinFrame .................................................................................................................. 507
WG-Auth ................................................................................................................... 507
WG-Firebox-Mgmt ..................................................................................................... 508
WG-Logging .............................................................................................................. 508
WG-Mgmt-Server ...................................................................................................... 508
WG-SmallOffice-Mgmt .............................................................................................. 508
WG-WebBlocker ....................................................................................................... 508
WHOIS ...................................................................................................................... 509
X11 ............................................................................................................................ 509
Proxy Policies .............................................................................................................. 509
xx
WatchGuard System Manager
DNS-proxy ................................................................................................................. 509
FTP-proxy ................................................................................................................. 509
HTTP-proxy ............................................................................................................... 510
POP3-proxy ............................................................................................................... 510
SMTP-proxy .............................................................................................................. 510
TCP-proxy ................................................................................................................. 511
/