WSM Reference Guide - WatchGuard Technologies
WSM Reference Guide - WatchGuard Technologies WSM Reference Guide - WatchGuard Technologies
WebBlocker Categories .......................................................................................................................69CHAPTER 6 Resources .................................................................................................................................75Publishers .................................................................................................................................................75Books ..........................................................................................................................................................76Non-Fiction ..........................................................................................................................................76Fiction ...................................................................................................................................................76White Papers & Requests for Comments ......................................................................................76Mailing Lists .............................................................................................................................................77General IT and Security Web Sites ...................................................................................................77White Hat Web Sites .............................................................................................................................79Grey Hat Sites ..........................................................................................................................................80Other Web Sites .....................................................................................................................................81Dictionaries of Computer Terminology .........................................................................................82RSS Feeds ..................................................................................................................................................82Security Feeds ......................................................................................................................................82IT Related Feeds ...................................................................................................................................83Fun Feeds ..............................................................................................................................................83ivWatchGuard System Manager
CHAPTER 1Internet Protocol ReferenceInternet Protocol (IP) sets the format of packets and the address pattern for sending data through theInternet. It operates as a postal system, and allows you to address a package and drop it into the system.But, there is no direct link between you and the recipient. In other words, there is no package.Most networks mix IP with higher level protocols such as Transmission Control Protocol (TCP). TCP/IPmakes a connection between two host servers. Then, they can send messages to each other. TCP/IP suppliesthe “packaging.”Internet Protocol HeaderInternet Protocol (IP) is an Internet standard that enables the sending of datagrams — packets of informationthat include an address and instructions on how to send the datagram to its destination. IPprepends a header to each datagram. The IP header contains a minimum of 12 properties, and otheroptional properties.Property Size DescriptionVersion 4 bits IP format number (Current version = 4)IHL 4 bits Header length in 32-bit words (Minimum = 5)TOS 8 bits Type of service sets routing priorities. It is usually not usedbecause not many application layers can set it.Tot_Len 16 bits Total length of packet measured in octets. It is used to assemblefragments.ID 16 bits Packet ID, used to assemble fragments.Flags 3 bits Miscellaneous flagsFrag_Off 13 bits Identifies fragment part for this packet.TTL 8 bits Time to live. It sets the maximum time the datagram remainsalive in the system.Protocol 8 bits IP protocol number. Indicates which of TCP, UDP, ICMP, IGMP, orother Transport protocol is inside.Reference Guide 1
- Page 1 and 2: WatchGuard ® System ManagerReferen
- Page 3: ContentsCHAPTER 1 Internet Protocol
- Page 7 and 8: Internet Protocol HeaderKeyword Num
- Page 9 and 10: Transfer ProtocolsSource RoutingThe
- Page 11 and 12: CHAPTER 2MIME Content TypesSoftware
- Page 13 and 14: Type Subtype Reference (where avail
- Page 15 and 16: Type Subtype Reference (where avail
- Page 17 and 18: Type Subtype Reference (where avail
- Page 19 and 20: Type Subtype Reference (where avail
- Page 21 and 22: Type Subtype Reference (where avail
- Page 23 and 24: CHAPTER 3Services and PortsWell-kno
- Page 25 and 26: Well-Known Services ListPort(s) Pro
- Page 27 and 28: Well-Known Services ListService Nam
- Page 29 and 30: Well-Known Services ListService Nam
- Page 31 and 32: CHAPTER 4Log MessagesUnderstanding
- Page 33 and 34: Traffic LogsFWAllowEach packet filt
- Page 35 and 36: Traffic Logsdst_ip="66.35.250.151"
- Page 37 and 38: Traffic LogsDNS Proxy Traffic Log M
- Page 39 and 40: Traffic LogsHTTP Proxy Traffic Log
- Page 41 and 42: Alarm LogsPolicy AlarmsDefaultNameP
- Page 43 and 44: Alarm LogsDenial of Servce (DoS) Al
- Page 45 and 46: Event LogsGateway AntiVirus Service
- Page 47 and 48: Event LogsDescription of Log Module
- Page 49 and 50: Event LogsEvent Log Message Catalog
- Page 51 and 52: Event LogsEvent Log Message Catalog
- Page 53 and 54: Event LogsEvent Log Message Catalog
WebBlocker Categories .......................................................................................................................69CHAPTER 6 Resources .................................................................................................................................75Publishers .................................................................................................................................................75Books ..........................................................................................................................................................76Non-Fiction ..........................................................................................................................................76Fiction ...................................................................................................................................................76White Papers & Requests for Comments ......................................................................................76Mailing Lists .............................................................................................................................................77General IT and Security Web Sites ...................................................................................................77White Hat Web Sites .............................................................................................................................79Grey Hat Sites ..........................................................................................................................................80Other Web Sites .....................................................................................................................................81Dictionaries of Computer Terminology .........................................................................................82RSS Feeds ..................................................................................................................................................82Security Feeds ......................................................................................................................................82IT Related Feeds ...................................................................................................................................83Fun Feeds ..............................................................................................................................................83iv<strong>WatchGuard</strong> System Manager