WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies WSM User Guide - WatchGuard Technologies

watchguard.com
from watchguard.com More from this publisher
12.07.2015 Views

Configuring a Gateway ......................................................................................................................243Adding a gateway ............................................................................................................................243Editing and deleting gateways ......................................................................................................246Making a Manual Tunnel ..................................................................................................................246Editing and deleting a tunnel .........................................................................................................249Making a Tunnel Policy ......................................................................................................................250Setting up Outgoing Dynamic NAT through a BOVPN Tunnel ...........................................250CHAPTER 21 Managing the Firebox X Edge and Firebox SOHO .........................................253Working with Devices on a Management Server ....................................................................254Preparing a new or factory default Firebox X Edge for management ....................................254Preparing an installed Firebox X Edge for management ..........................................................255Preparing a Firebox SOHO 6 for management ...........................................................................256Adding Firebox X Edge and SOHO 6 devices to a Management Server .................................257Scheduling Firebox X Edge Firmware Updates ........................................................................259Viewing and deleting firmware updates ......................................................................................261Using the Firebox X Edge Management Page ...........................................................................261Viewing the Firebox X Edge management page ........................................................................261Configuring Firebox X Edge management properties ...............................................................262Updating the device .........................................................................................................................263Adding a VPN Resource ...................................................................................................................263Starting Firebox X Edge tools ..........................................................................................................264Adding a Firebox X Edge VPN Tunnel ............................................................................................264Using the Firebox X Edge Policy section .......................................................................................265Using the Firebox SOHO 6 Management Page .........................................................................265Viewing the SOHO 6 management page .....................................................................................265Configure Firebox SOHO 6 management properties .................................................................266Updating the device .........................................................................................................................266Adding a VPN Resource ...................................................................................................................267Starting Firebox SOHO 6 tools ........................................................................................................267Adding a Firebox SOHO 6 VPN Tunnel ..........................................................................................268Creating and Applying Edge Configuration Templates .........................................................268Adding a pre-defined policy with the Add Policy wizard ..........................................................269Adding a custom policy with the Add Policy wizard ..................................................................270Cloning an Edge Configuration Template ...................................................................................271Applying an Edge Configuration Template to devices ..............................................................271Managing Firebox X Edge Network Settings .............................................................................273Using Aliases .........................................................................................................................................275Naming aliases on the Management Server ...............................................................................276Defining aliases on a Firebox X Edge ............................................................................................277CHAPTER 22 Configuring RUVPN with PPTP ................................................................................279Configuration Checklist .....................................................................................................................279Encryption levels ...............................................................................................................................279Configuring WINS and DNS Servers .............................................................................................280Enabling RUVPN with PPTP ..............................................................................................................281xiiWatchGuard System Manager

Enabling extended authentication ...............................................................................................281Adding IP Addresses for RUVPN Sessions ...................................................................................281Adding New Users to the PPTP_Users Authentication Group ...........................................282Configuring Policies to Allow Incoming RUVPN Traffic .........................................................283By individual policy ..........................................................................................................................283Using the Any policies ......................................................................................................................284Preparing the Client Computers ....................................................................................................284Installing MSDUN and service packs ............................................................................................285Creating and Connecting a PPTP RUVPN on Windows XP ...................................................285Creating and Connecting a PPTP RUVPN on Windows 2000 ...............................................286Running RUVPN and accessing the Internet ...............................................................................286Making outbound PPTP connections from behind a Firebox ..................................................287CHAPTER 23 Controlling Web Site Access with WebBlocker ................................................289Installing the Software Licenses .....................................................................................................289Getting Started with WebBlocker ..................................................................................................290Automating WebBlocker database downloads .........................................................................291Activating WebBlocker ......................................................................................................................291Configuring WebBlocker ...................................................................................................................293Adding new servers ..........................................................................................................................294Selecting categories to block ..........................................................................................................294Defining WebBlocker exceptions ...................................................................................................295Defining advanced WebBlocker options ......................................................................................296Scheduling a WebBlocker Action ..................................................................................................297CHAPTER 24 Configuring spamBlocker ...........................................................................................299About spamBlocker ............................................................................................................................299spamBlocker actions ........................................................................................................................299spamBlocker tags .............................................................................................................................300spamBlocker categories ..................................................................................................................300Installing the Software License ......................................................................................................300Activating spamBlocker ....................................................................................................................301Configuring spamBlocker .................................................................................................................303Adding spamBlocker exceptions ....................................................................................................304Creating Rules for Bulk and Suspect E-mail on E-mail Clients .............................................304Sending spam or bulk e-mail to special folders in Outlook ......................................................304Reporting False Positives and False Negatives .........................................................................305Monitoring spamBlocker Activity ..................................................................................................305Customizing spamBlocker Using Multiple Proxies ..................................................................306CHAPTER 25 Using Signature-Based Security Services ...........................................................307Installing the Software Licenses .....................................................................................................308About Gateway AntiVirus .................................................................................................................308Activating Gateway AntiVirus ........................................................................................................309Configuring Gateway AntiVirus ......................................................................................................310Creating alarms or log entries for antivirus responses ..............................................................311User Guidexiii

Enabling extended authentication ...............................................................................................281Adding IP Addresses for RUVPN Sessions ...................................................................................281Adding New <strong>User</strong>s to the PPTP_<strong>User</strong>s Authentication Group ...........................................282Configuring Policies to Allow Incoming RUVPN Traffic .........................................................283By individual policy ..........................................................................................................................283Using the Any policies ......................................................................................................................284Preparing the Client Computers ....................................................................................................284Installing MSDUN and service packs ............................................................................................285Creating and Connecting a PPTP RUVPN on Windows XP ...................................................285Creating and Connecting a PPTP RUVPN on Windows 2000 ...............................................286Running RUVPN and accessing the Internet ...............................................................................286Making outbound PPTP connections from behind a Firebox ..................................................287CHAPTER 23 Controlling Web Site Access with WebBlocker ................................................289Installing the Software Licenses .....................................................................................................289Getting Started with WebBlocker ..................................................................................................290Automating WebBlocker database downloads .........................................................................291Activating WebBlocker ......................................................................................................................291Configuring WebBlocker ...................................................................................................................293Adding new servers ..........................................................................................................................294Selecting categories to block ..........................................................................................................294Defining WebBlocker exceptions ...................................................................................................295Defining advanced WebBlocker options ......................................................................................296Scheduling a WebBlocker Action ..................................................................................................297CHAPTER 24 Configuring spamBlocker ...........................................................................................299About spamBlocker ............................................................................................................................299spamBlocker actions ........................................................................................................................299spamBlocker tags .............................................................................................................................300spamBlocker categories ..................................................................................................................300Installing the Software License ......................................................................................................300Activating spamBlocker ....................................................................................................................301Configuring spamBlocker .................................................................................................................303Adding spamBlocker exceptions ....................................................................................................304Creating Rules for Bulk and Suspect E-mail on E-mail Clients .............................................304Sending spam or bulk e-mail to special folders in Outlook ......................................................304Reporting False Positives and False Negatives .........................................................................305Monitoring spamBlocker Activity ..................................................................................................305Customizing spamBlocker Using Multiple Proxies ..................................................................306CHAPTER 25 Using Signature-Based Security Services ...........................................................307Installing the Software Licenses .....................................................................................................308About Gateway AntiVirus .................................................................................................................308Activating Gateway AntiVirus ........................................................................................................309Configuring Gateway AntiVirus ......................................................................................................310Creating alarms or log entries for antivirus responses ..............................................................311<strong>User</strong> <strong>Guide</strong>xiii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!