WSM User Guide - WatchGuard Technologies
WSM User Guide - WatchGuard Technologies WSM User Guide - WatchGuard Technologies
Configuring the Certificate Authority2 Click the Certificates tab.3 In the Common Name text box, type the name you want to appear in the CA certificate.4 In the Organization text box, type an organization name for the CA certificate.5 In the Certificate Lifetime text box, type the number of days after which the CA certificate willexpire.A longer certificate lifetime could give an attacker more time to attack it.6 From the Key Bits drop-down list, select the strength to apply to the certificate.The higher the number in the Key Bits setting, the stronger the cryptography that protects the key.7 Click OK when you complete the configuration.Configuring properties for client certificates1 From the computer defined as a Management Server, right-click the Management Server icon in theWatchGuard toolbar and select Configure.202 WatchGuard System Manager
Configuring the Certificate Authority2 Click the Certificates tab.3 In the Certificate Lifetime text box, type the number of days after which the client certificate willexpire.A longer certificate lifetime could give an attacker more time to attack it.4 From the Key Bits drop-down list, select the strength to apply to the certificate.The higher the number in the Key Bits setting, the stronger the cryptography that protects the key.5 Click OK when you complete the configuration.Configuring properties for the Certificate Revocation List (CRL)1 From the computer defined as a Management Server, right-click the Management Server icon in theWatchGuard toolbar and select Configure.User Guide 203
- Page 170 and 171: Configuring Policy Properties2 To a
- Page 172 and 173: Configuring Policy PropertiesRepeat
- Page 174 and 175: Configuring Policy PropertiesSettin
- Page 176 and 177: Setting Policy Precedence2 Traffic
- Page 178 and 179: Setting Policy Precedence160 WatchG
- Page 180 and 181: Defining RulesThe fields you use fo
- Page 182 and 183: Customizing Logging and Notificatio
- Page 184 and 185: Configuring the SMTP ProxyConfiguri
- Page 186 and 187: Configuring the SMTP Proxyand 8-bit
- Page 188 and 189: Configuring the SMTP ProxyDefining
- Page 190 and 191: Configuring the FTP Proxy2 For info
- Page 192 and 193: Configuring the HTTP ProxyConfiguri
- Page 194 and 195: Configuring the HTTP ProxyBrowsers
- Page 196 and 197: Configuring the HTTP ProxyThis rule
- Page 198 and 199: Configuring the DNS ProxyConfigurin
- Page 200 and 201: Configuring the DNS ProxyAdding a n
- Page 202 and 203: Configuring the TCP Proxy184 WatchG
- Page 204 and 205: Creating and Editing ReportsStartin
- Page 206 and 207: Setting Report Properties“yesterd
- Page 208 and 209: Exporting ReportsSetting report pro
- Page 210 and 211: Using Report FiltersExcludeTo make
- Page 212 and 213: Report Sections and Consolidated Se
- Page 214 and 215: Report Sections and Consolidated Se
- Page 216 and 217: WatchGuard Management Server Passph
- Page 218 and 219: Changing the Management Server Conf
- Page 222 and 223: Backing up or Restoring the Managem
- Page 224 and 225: Moving the WatchGuard Management Se
- Page 226 and 227: Managing Devices with the Managemen
- Page 228 and 229: Managing Devices with the Managemen
- Page 230 and 231: Managing Devices with the Managemen
- Page 232 and 233: Adding Devices to the Management Se
- Page 234 and 235: Using the Device Management Page17
- Page 236 and 237: Using the Device Management PageCon
- Page 238 and 239: Monitoring VPNsAdding a Firebox VPN
- Page 240 and 241: PKI in a WatchGuard VPNPKI in a Wat
- Page 242 and 243: Managing the Certificate Authority2
- Page 244 and 245: Tunneling ProtocolsVirtual private
- Page 246 and 247: IP Addressingsecurity of the networ
- Page 248 and 249: Network TopologyThis topology is th
- Page 250 and 251: WatchGuard VPN SolutionsSplit tunne
- Page 252 and 253: VPN Scenarios• You make tunnels b
- Page 254 and 255: VPN ScenariosSmall Company Using Ex
- Page 256 and 257: Adding VPN Resourcesapplies a VPN r
- Page 258 and 259: Making Tunnels Between Devices3 To
- Page 260 and 261: Removing Tunnels and Devices2 Expan
- Page 262 and 263: Configuring a GatewayTo configure t
- Page 264 and 265: Making a Manual Tunnel18 When you c
- Page 266 and 267: Making a Manual Tunnel7 From the Ty
- Page 268 and 269: Making a Tunnel Policy2 Make the ch
Configuring the Certificate Authority2 Click the Certificates tab.3 In the Certificate Lifetime text box, type the number of days after which the client certificate willexpire.A longer certificate lifetime could give an attacker more time to attack it.4 From the Key Bits drop-down list, select the strength to apply to the certificate.The higher the number in the Key Bits setting, the stronger the cryptography that protects the key.5 Click OK when you complete the configuration.Configuring properties for the Certificate Revocation List (CRL)1 From the computer defined as a Management Server, right-click the Management Server icon in the<strong>WatchGuard</strong> toolbar and select Configure.<strong>User</strong> <strong>Guide</strong> 203