WatchGuard Firebox System 7.0 User Guide
WatchGuard Firebox System 7.0 User Guide WatchGuard Firebox System 7.0 User Guide
Chapter 9: Configuring Proxied Services4 By default, all rules are enabled. You can enable ordisable the rules as you choose to determine whichpacket originators are automatically added to the autoblockedsites list.To be able to select or clear several consecutive rules as a group,select the first rule, press Shift and select the last rule, and thenselect one of the rules between the two selections.To be able to select or clear several non-consecutive rules as agroup, press Ctrl and select each rule you want.DNS file descriptor limitThe DNS proxy has only 256 file descriptors available forits use, which limits the number of DNS connections in aNAT environment. Every UDP request that uses dynamicNAT uses a file descriptor for the duration of the UDPtimeout. Every TCP session that uses dynamic, static, or 1-to-1 NAT uses a file descriptor for the duration of the session.The file descriptor limit is rarely a problem, but an occasionalsite may experience slow name resolution and manyinstances of the following log message:dns-proxy[xx] dns_setup_connect_udp: Unable to createUDP socket for port: Invalid argument158 WatchGuard Firebox System
Configuring the DNS Proxy ServiceYou can work around this problem in two ways (the firstmethod is the most secure):• Avoid using dynamic NAT between your clients andyour DNS server.• Disable the outgoing portion of the DNS proxiedservice and replace it with a filtered DNS service.User Guide 159
- Page 129 and 130: Using Service-Based Dynamic NATEnab
- Page 131 and 132: Configuring a Service for Incoming
- Page 133 and 134: Using 1-to-1 NATA one-to-one mappin
- Page 135 and 136: CHAPTER 8Configuring FilteredServic
- Page 137 and 138: Selecting Services for your Securit
- Page 139 and 140: Adding and Configuring Servicesrigh
- Page 141 and 142: Adding and Configuring Services5 (O
- Page 143 and 144: Adding and Configuring Services3 In
- Page 145 and 146: Adding and Configuring Services11 C
- Page 147 and 148: Defining Service PropertiesEnabled
- Page 149 and 150: Defining Service Properties6 Click
- Page 151 and 152: Defining Service Propertiesthe serv
- Page 153 and 154: Service Precedencegroup always have
- Page 155 and 156: Service Precedencether down the pre
- Page 157 and 158: CHAPTER 9Configuring ProxiedService
- Page 159 and 160: Customizing Logging and Notificatio
- Page 161 and 162: Configuring an SMTP Proxy Service3
- Page 163 and 164: Configuring an SMTP Proxy Service2
- Page 165 and 166: Configuring an SMTP Proxy ServiceAd
- Page 167 and 168: Configuring an SMTP Proxy ServiceEn
- Page 169 and 170: Configuring an SMTP Proxy ServiceCo
- Page 171 and 172: Configuring an FTP Proxy Service6 S
- Page 173 and 174: Selecting an HTTP Service4 Select t
- Page 175 and 176: Selecting an HTTP Servicefrom Any t
- Page 177 and 178: Configuring the DNS Proxy ServiceGE
- Page 179: Configuring the DNS Proxy Service3
- Page 183 and 184: CHAPTER 10Creating Aliases andImple
- Page 185 and 186: Using AliasesGroupfireboxtrustedopt
- Page 187 and 188: How User Authentication WorksHow Us
- Page 189 and 190: Defining Firebox Users and Groups f
- Page 191 and 192: Defining Firebox Users and Groups f
- Page 193 and 194: Configuring RADIUS Server Authentic
- Page 195 and 196: Configuring CRYPTOCard Server Authe
- Page 197 and 198: Configuring SecurID AuthenticationC
- Page 199 and 200: CHAPTER 11Intrusion Detectionand Pr
- Page 201 and 202: Default Packet Handlingtion. In con
- Page 203 and 204: Default Packet Handlingnetwork. Alt
- Page 205 and 206: Detecting Man-in-the-Middle Attacks
- Page 207 and 208: Blocking Sites• Permanently block
- Page 209 and 210: Blocking SitesUsing an external lis
- Page 211 and 212: Blocking PortsBy default, the Fireb
- Page 213 and 214: Blocking PortsAvoiding problems wit
- Page 215 and 216: Integrating Intrusion Detectionand
- Page 217 and 218: Integrating Intrusion DetectionUsin
- Page 219 and 220: Integrating Intrusion Detectionposs
- Page 221 and 222: CHAPTER 12Setting Up Loggingand Not
- Page 223 and 224: Developing Logging and Notification
- Page 225 and 226: WatchGuard Logging Architecturehost
- Page 227 and 228: Designating Log Hosts for a Firebox
- Page 229 and 230: Setting up the WatchGuard Security
Configuring the DNS Proxy ServiceYou can work around this problem in two ways (the firstmethod is the most secure):• Avoid using dynamic NAT between your clients andyour DNS server.• Disable the outgoing portion of the DNS proxiedservice and replace it with a filtered DNS service.<strong>User</strong> <strong>Guide</strong> 159