WSM User Guide - WatchGuard Technologies
WSM User Guide - WatchGuard Technologies WSM User Guide - WatchGuard Technologies
Configuring a Gateway ......................................................................................................................243Adding a gateway ............................................................................................................................243Editing and deleting gateways ......................................................................................................246Making a Manual Tunnel ..................................................................................................................246Editing and deleting a tunnel .........................................................................................................249Making a Tunnel Policy ......................................................................................................................250Setting up Outgoing Dynamic NAT through a BOVPN Tunnel ...........................................250CHAPTER 21 Managing the Firebox X Edge and Firebox SOHO .........................................253Working with Devices on a Management Server ....................................................................254Preparing a new or factory default Firebox X Edge for management ....................................254Preparing an installed Firebox X Edge for management ..........................................................255Preparing a Firebox SOHO 6 for management ...........................................................................256Adding Firebox X Edge and SOHO 6 devices to a Management Server .................................257Scheduling Firebox X Edge Firmware Updates ........................................................................259Viewing and deleting firmware updates ......................................................................................261Using the Firebox X Edge Management Page ...........................................................................261Viewing the Firebox X Edge management page ........................................................................261Configuring Firebox X Edge management properties ...............................................................262Updating the device .........................................................................................................................263Adding a VPN Resource ...................................................................................................................263Starting Firebox X Edge tools ..........................................................................................................264Adding a Firebox X Edge VPN Tunnel ............................................................................................264Using the Firebox X Edge Policy section .......................................................................................265Using the Firebox SOHO 6 Management Page .........................................................................265Viewing the SOHO 6 management page .....................................................................................265Configure Firebox SOHO 6 management properties .................................................................266Updating the device .........................................................................................................................266Adding a VPN Resource ...................................................................................................................267Starting Firebox SOHO 6 tools ........................................................................................................267Adding a Firebox SOHO 6 VPN Tunnel ..........................................................................................268Creating and Applying Edge Configuration Templates .........................................................268Adding a pre-defined policy with the Add Policy wizard ..........................................................269Adding a custom policy with the Add Policy wizard ..................................................................270Cloning an Edge Configuration Template ...................................................................................271Applying an Edge Configuration Template to devices ..............................................................271Managing Firebox X Edge Network Settings .............................................................................273Using Aliases .........................................................................................................................................275Naming aliases on the Management Server ...............................................................................276Defining aliases on a Firebox X Edge ............................................................................................277CHAPTER 22 Configuring RUVPN with PPTP ................................................................................279Configuration Checklist .....................................................................................................................279Encryption levels ...............................................................................................................................279Configuring WINS and DNS Servers .............................................................................................280Enabling RUVPN with PPTP ..............................................................................................................281xiiWatchGuard System Manager
Enabling extended authentication ...............................................................................................281Adding IP Addresses for RUVPN Sessions ...................................................................................281Adding New Users to the PPTP_Users Authentication Group ...........................................282Configuring Policies to Allow Incoming RUVPN Traffic .........................................................283By individual policy ..........................................................................................................................283Using the Any policies ......................................................................................................................284Preparing the Client Computers ....................................................................................................284Installing MSDUN and service packs ............................................................................................285Creating and Connecting a PPTP RUVPN on Windows XP ...................................................285Creating and Connecting a PPTP RUVPN on Windows 2000 ...............................................286Running RUVPN and accessing the Internet ...............................................................................286Making outbound PPTP connections from behind a Firebox ..................................................287CHAPTER 23 Controlling Web Site Access with WebBlocker ................................................289Installing the Software Licenses .....................................................................................................289Getting Started with WebBlocker ..................................................................................................290Automating WebBlocker database downloads .........................................................................291Activating WebBlocker ......................................................................................................................291Configuring WebBlocker ...................................................................................................................293Adding new servers ..........................................................................................................................294Selecting categories to block ..........................................................................................................294Defining WebBlocker exceptions ...................................................................................................295Defining advanced WebBlocker options ......................................................................................296Scheduling a WebBlocker Action ..................................................................................................297CHAPTER 24 Configuring spamBlocker ...........................................................................................299About spamBlocker ............................................................................................................................299spamBlocker actions ........................................................................................................................299spamBlocker tags .............................................................................................................................300spamBlocker categories ..................................................................................................................300Installing the Software License ......................................................................................................300Activating spamBlocker ....................................................................................................................301Configuring spamBlocker .................................................................................................................303Adding spamBlocker exceptions ....................................................................................................304Creating Rules for Bulk and Suspect E-mail on E-mail Clients .............................................304Sending spam or bulk e-mail to special folders in Outlook ......................................................304Reporting False Positives and False Negatives .........................................................................305Monitoring spamBlocker Activity ..................................................................................................305Customizing spamBlocker Using Multiple Proxies ..................................................................306CHAPTER 25 Using Signature-Based Security Services ...........................................................307Installing the Software Licenses .....................................................................................................308About Gateway AntiVirus .................................................................................................................308Activating Gateway AntiVirus ........................................................................................................309Configuring Gateway AntiVirus ......................................................................................................310Creating alarms or log entries for antivirus responses ..............................................................311User Guidexiii
- Page 1: WatchGuard ® System ManagerUser Gu
- Page 4 and 5: Installation Topics ...............
- Page 6 and 7: Restoring a Firebox backup image ..
- Page 8 and 9: Setting Blocked Sites .............
- Page 10 and 11: Exporting Reports .................
- Page 14 and 15: Configuring GAV engine settings ...
- Page 16 and 17: MSSQL-Monitor .....................
- Page 18 and 19: xviiiWatchGuard System Manager
- Page 20 and 21: Fireware Features and ToolsYour org
- Page 22 and 23: WatchGuard System Manager (WSM) Use
- Page 24 and 25: WatchGuard System Manager (WSM) Use
- Page 26 and 27: WatchGuard System Manager (WSM) Use
- Page 28 and 29: Installing WatchGuard System Manage
- Page 30 and 31: Installing WatchGuard System Manage
- Page 32 and 33: Quick Setup Wizardtion, you must ha
- Page 34 and 35: Putting the Firebox into Operation
- Page 36 and 37: Starting WatchGuard System ManagerT
- Page 38 and 39: Upgrading to a New Version of Firew
- Page 40 and 41: Installation Topics• High Availab
- Page 42 and 43: LiveSecurity Service Broadcastslear
- Page 44 and 45: WatchGuard Users ForumAdvanced FAQs
- Page 46 and 47: Product Documentation• Netscape N
- Page 48 and 49: Training and Certification30 WatchG
- Page 50 and 51: Firebox System Manager Menus and To
- Page 52 and 53: Seeing Basic Firebox and Network St
- Page 54 and 55: Seeing Basic Firebox and Network St
- Page 56 and 57: Monitoring Firebox TrafficMonitorin
- Page 58 and 59: Clearing the ARP CacheLearning more
- Page 60 and 61: Using the Performance Console2 From
Enabling extended authentication ...............................................................................................281Adding IP Addresses for RUVPN Sessions ...................................................................................281Adding New <strong>User</strong>s to the PPTP_<strong>User</strong>s Authentication Group ...........................................282Configuring Policies to Allow Incoming RUVPN Traffic .........................................................283By individual policy ..........................................................................................................................283Using the Any policies ......................................................................................................................284Preparing the Client Computers ....................................................................................................284Installing MSDUN and service packs ............................................................................................285Creating and Connecting a PPTP RUVPN on Windows XP ...................................................285Creating and Connecting a PPTP RUVPN on Windows 2000 ...............................................286Running RUVPN and accessing the Internet ...............................................................................286Making outbound PPTP connections from behind a Firebox ..................................................287CHAPTER 23 Controlling Web Site Access with WebBlocker ................................................289Installing the Software Licenses .....................................................................................................289Getting Started with WebBlocker ..................................................................................................290Automating WebBlocker database downloads .........................................................................291Activating WebBlocker ......................................................................................................................291Configuring WebBlocker ...................................................................................................................293Adding new servers ..........................................................................................................................294Selecting categories to block ..........................................................................................................294Defining WebBlocker exceptions ...................................................................................................295Defining advanced WebBlocker options ......................................................................................296Scheduling a WebBlocker Action ..................................................................................................297CHAPTER 24 Configuring spamBlocker ...........................................................................................299About spamBlocker ............................................................................................................................299spamBlocker actions ........................................................................................................................299spamBlocker tags .............................................................................................................................300spamBlocker categories ..................................................................................................................300Installing the Software License ......................................................................................................300Activating spamBlocker ....................................................................................................................301Configuring spamBlocker .................................................................................................................303Adding spamBlocker exceptions ....................................................................................................304Creating Rules for Bulk and Suspect E-mail on E-mail Clients .............................................304Sending spam or bulk e-mail to special folders in Outlook ......................................................304Reporting False Positives and False Negatives .........................................................................305Monitoring spamBlocker Activity ..................................................................................................305Customizing spamBlocker Using Multiple Proxies ..................................................................306CHAPTER 25 Using Signature-Based Security Services ...........................................................307Installing the Software Licenses .....................................................................................................308About Gateway AntiVirus .................................................................................................................308Activating Gateway AntiVirus ........................................................................................................309Configuring Gateway AntiVirus ......................................................................................................310Creating alarms or log entries for antivirus responses ..............................................................311<strong>User</strong> <strong>Guide</strong>xiii