12.07.2015 Views

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Configuring GAV engine settings ...................................................................................................311Configuring the GAV signature server ..........................................................................................312Using Gateway AntiVirus with more than one proxy ................................................................312Unlocking an attachment locked by Gateway AntiVirus ..........................................................312Getting Gateway AntiVirus Status and Updates .......................................................................313Seeing service status ........................................................................................................................313Updating GAV signatures or the GAV engine manually ............................................................314Updating the antivirus software ....................................................................................................314Activating Intrusion Prevention (IPS) ...........................................................................................314Configuring Intrusion Prevention ..................................................................................................316Configuring intrusion prevention for HTTP or TCP ....................................................................317Configuring Intrusion Prevention for FTP, SMTP, or DNS ...........................................................319Configuring the signature server ...................................................................................................320Configuring signature exceptions .................................................................................................320Copying IPS settings to other policies ...........................................................................................320Getting Intrusion Prevention Service Status and Updates ...................................................321Seeing service status ........................................................................................................................321Updating signatures manually ......................................................................................................322CHAPTER 26 Advanced Networking .................................................................................................323Creating QoS Actions .........................................................................................................................323Applying QoS actions to policies ...................................................................................................325Using QoS in a multiple WAN environment ................................................................................325Dynamic Routing .................................................................................................................................326Using RIP .................................................................................................................................................326RIP Version 1 .......................................................................................................................................326RIP Version 2 .......................................................................................................................................330Using OSPF .............................................................................................................................................332OSPF daemon configuration ..........................................................................................................332Configuring Fireware Pro to use OSPF ..........................................................................................335Using BGP ...............................................................................................................................................337CHAPTER 27 High Availability ..............................................................................................................343High Availability Requirements ......................................................................................................343Selecting a Primary High Availability Firebox ...........................................................................344Configuring HA for Firebox X e-Series Devices .........................................................................344Configuring the secondary High Availability Firebox ................................................................345Enabling High Availability ..............................................................................................................345Configuring HA for Firebox X (non e-Series) Devices .............................................................346Manually Controlling High Availability ........................................................................................347Backing up an HA configuration ...................................................................................................348Upgrading Software in an HA Configuration ............................................................................348Using HA with Signature-based Security Services ..................................................................348Using HA with Proxy Sessions .........................................................................................................348xiv<strong>WatchGuard</strong> System Manager

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!