WSM Reference Guide - WatchGuard Technologies

WSM Reference Guide - WatchGuard Technologies WSM Reference Guide - WatchGuard Technologies

watchguard.com
from watchguard.com More from this publisher
20.02.2014 Views

Using the LCD Interface with Fireware Appliance Software ..................................................70 LCD Keypad Button Control ...............................................................................................................70 Firebox Boot Countdown ...................................................................................................................71 Using the LCD Interface in Firebox Default Mode .....................................................................71 Using the LCD Interface in Firebox Safe Mode ...........................................................................73 To put a Firebox into Safe mode using the LCD display ..............................................................73 Using the LCD Interface in Firebox Maintenance Mode ..........................................................73 To put a Firebox into Maintenance Mode: .....................................................................................73 Using Maintenance Mode Status Screens .....................................................................................73 Using Maintenance Mode Menu Screens .......................................................................................74 Using Maintenance Mode Dialog Screens .....................................................................................74 Changing the Firebox Mode with a Serial Connection ............................................................74 CHAPTER 6 WebBlocker Content ..........................................................................................................75 Searching for Blocked Sites ................................................................................................................75 WebBlocker Categories .......................................................................................................................75 CHAPTER 7 Resources .................................................................................................................................81 Publishers .................................................................................................................................................81 Books ..........................................................................................................................................................82 Non-Fiction ..........................................................................................................................................82 Fiction ...................................................................................................................................................82 White Papers & Requests for Comments ......................................................................................82 Mailing Lists .............................................................................................................................................83 General IT and Security Web Sites ...................................................................................................83 White Hat Web Sites .............................................................................................................................85 Grey Hat Sites ..........................................................................................................................................86 Other Web Sites .....................................................................................................................................87 Dictionaries of Computer Terminology .........................................................................................88 RSS Feeds ..................................................................................................................................................88 Security Feeds ......................................................................................................................................88 IT Related Feeds ...................................................................................................................................89 Fun Feeds ..............................................................................................................................................89 iv WatchGuard System Manager

CHAPTER 1 Internet Protocol Reference Internet Protocol (IP) sets the format of packets and the address pattern for sending data through the Internet. It operates as a postal system, and allows you to address a package and drop it into the system. But, there is no direct link between you and the recipient. In other words, there is no package. Most networks mix IP with higher level protocols such as Transmission Control Protocol (TCP). TCP/IP makes a connection between two host servers. Then, they can send messages to each other. TCP/IP supplies the “packaging.” Internet Protocol Header Internet Protocol (IP) is an Internet standard that enables the sending of datagrams — packets of information that include an address and instructions on how to send the datagram to its destination. IP prepends a header to each datagram. The IP header contains a minimum of 12 properties, and other optional properties. Property Size Description Version 4 bits IP format number (Current version = 4) IHL 4 bits Header length in 32-bit words (Minimum = 5) TOS 8 bits Type of service sets routing priorities. It is usually not used because not many application layers can set it. Tot_Len 16 bits Total length of packet measured in octets. It is used to assemble fragments. ID 16 bits Packet ID, used to assemble fragments. Flags 3 bits Miscellaneous flags Frag_Off 13 bits Identifies fragment part for this packet. TTL 8 bits Time to live. It sets the maximum time the datagram remains alive in the system. Protocol 8 bits IP protocol number. Indicates which of TCP, UDP, ICMP, IGMP, or other Transport protocol is inside. Reference Guide 1

CHAPTER 1<br />

Internet Protocol <strong>Reference</strong><br />

Internet Protocol (IP) sets the format of packets and the address pattern for sending data through the<br />

Internet. It operates as a postal system, and allows you to address a package and drop it into the system.<br />

But, there is no direct link between you and the recipient. In other words, there is no package.<br />

Most networks mix IP with higher level protocols such as Transmission Control Protocol (TCP). TCP/IP<br />

makes a connection between two host servers. Then, they can send messages to each other. TCP/IP supplies<br />

the “packaging.”<br />

Internet Protocol Header<br />

Internet Protocol (IP) is an Internet standard that enables the sending of datagrams — packets of information<br />

that include an address and instructions on how to send the datagram to its destination. IP<br />

prepends a header to each datagram. The IP header contains a minimum of 12 properties, and other<br />

optional properties.<br />

Property Size Description<br />

Version 4 bits IP format number (Current version = 4)<br />

IHL 4 bits Header length in 32-bit words (Minimum = 5)<br />

TOS 8 bits Type of service sets routing priorities. It is usually not used<br />

because not many application layers can set it.<br />

Tot_Len 16 bits Total length of packet measured in octets. It is used to assemble<br />

fragments.<br />

ID 16 bits Packet ID, used to assemble fragments.<br />

Flags 3 bits Miscellaneous flags<br />

Frag_Off 13 bits Identifies fragment part for this packet.<br />

TTL 8 bits Time to live. It sets the maximum time the datagram remains<br />

alive in the system.<br />

Protocol 8 bits IP protocol number. Indicates which of TCP, UDP, ICMP, IGMP, or<br />

other Transport protocol is inside.<br />

<strong>Reference</strong> <strong>Guide</strong> 1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!