WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies WSM User Guide - WatchGuard Technologies

watchguard.com
from watchguard.com More from this publisher
12.07.2015 Views

Configuring the FTP Proxy2 For information on fields in the Proxy/AV Alarm Configuration section, see “Using dialog boxes foralarms, log messages, and notification” on page 164.Configuring the FTP ProxyFile Transfer Protocol (FTP) is the protocol used to move files on the Internet. Like SMTP and HTTP, FTPuses TCP/IP protocols to enable data transfer. You usually use FTP to download a file from a server on theInternet or to upload a file to a server.1 Add the FTP proxy to Policy Manager. To learn how to add policies to Policy Manager, see “AddingPolicies” on page 146.2 Double-click the FTP icon and select the Policy tab.3 Select Allowed from the FTP proxy connections are drop-down list.4 Select the Properties tab.5 In the Proxy drop-down list, select to configure the proxy action for FTP-Client or FTP-Server.6 Click the View/Edit Proxy icon.Configuring general settingsYou use the General fields to configure basic FTP parameters including maximum user name length.1 From the Categories section, select General.2 To set limits for FTP parameters, select the applicable check boxes. These settings help to protectyour network from buffer overflow attacks. If you set a check box to 0 bytes, the Firebox® does notuse the parameter. Use the arrows to set the limits:Maximum user name lengthSets a maximum length for user names on FTP sites.Maximum password lengthSets a maximum length for passwords used to log in to FTP sites.172 WatchGuard System Manager

Configuring the FTP ProxyMaximum file name lengthSets the maximum file name length for files to upload or download.Maximum command line lengthSets the maximum length for command lines used on FTP sites.3 For each setting, you can set or clear the Auto-block check box next to it. If someone tries toconnect to an FTP site and exceeds a limit whose Auto-block check box is selected, the computerthat sent the commands is added to the temporary Blocked Sites list.4 To create a log message for each transaction, select the Send a log message with summaryinformation for each transaction check box.Defining commands rules for FTPFTP has a number of commands to manage files. You can write rules to put limits on some FTP commands.Use the FTP-Server proxy action to put limits on commands that can be used on an FTP serverprotected by the Firebox. Use the FTP-Client proxy action to put limits on commands that users protectedby the Firebox can use when they connect to external FTP servers. The default configuration ofthe FTP-Client is to allow all FTP commands.1 From the Categories section, select Commands.2 Do the steps used to create rules. For more information, see “Defining Rules” on page 161.Setting download rules for FTPDownload rules control the file names, extensions, or URL paths that users can use FTP to download.Use the FTP-Server proxy action to control download rules for an FTP server protected by the Firebox.Use the FTP-Client proxy action to set download rules for users connecting to external FTP servers. Toadd download rulesets:1 From the Categories section, select Download.2 Do the steps used to create rules. For more information, see “Defining Rules” on page 161.Setting upload rules for FTPUpload rulesets control the file names, extensions, or URL paths that users can use FTP to upload. Usethe FTP-Server proxy action to control upload rules for an FTP server protected by the Firebox. Use theFTP-Client proxy action to set upload rules for users connecting to external FTP servers. The default configurationof the FTP-Client is to allow all files to be uploaded. To create upload rulesets:1 From the Categories section, select Upload.2 Do the steps used to create rules. For more information, see “Defining Rules” on page 161.Enabling intrusion prevention for FTPAlthough you can use the proxy definition screens to activate and configure IPS, it is easier to use theTasks menu in Policy Manager to do this. For more information on how to do this, or to use the IPSscreens in the proxy definition, see the chapter “Using Signature-Based Security Services.”User Guide 173

Configuring the FTP Proxy2 For information on fields in the Proxy/AV Alarm Configuration section, see “Using dialog boxes foralarms, log messages, and notification” on page 164.Configuring the FTP ProxyFile Transfer Protocol (FTP) is the protocol used to move files on the Internet. Like SMTP and HTTP, FTPuses TCP/IP protocols to enable data transfer. You usually use FTP to download a file from a server on theInternet or to upload a file to a server.1 Add the FTP proxy to Policy Manager. To learn how to add policies to Policy Manager, see “AddingPolicies” on page 146.2 Double-click the FTP icon and select the Policy tab.3 Select Allowed from the FTP proxy connections are drop-down list.4 Select the Properties tab.5 In the Proxy drop-down list, select to configure the proxy action for FTP-Client or FTP-Server.6 Click the View/Edit Proxy icon.Configuring general settingsYou use the General fields to configure basic FTP parameters including maximum user name length.1 From the Categories section, select General.2 To set limits for FTP parameters, select the applicable check boxes. These settings help to protectyour network from buffer overflow attacks. If you set a check box to 0 bytes, the Firebox® does notuse the parameter. Use the arrows to set the limits:Maximum user name lengthSets a maximum length for user names on FTP sites.Maximum password lengthSets a maximum length for passwords used to log in to FTP sites.172 <strong>WatchGuard</strong> System Manager

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!