12.07.2015 Views

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Packet Filter PoliciesCharacteristics• Internet Protocol(s): TCP• Port Number(s): 709, 710fingerfinger is an application protocol used to get information about users on a given host. It is easy for ahacker to use this information against you. We do not recommend that you put finger servers on thetrusted interface.Characteristics• Internet Protocol(s): TCP• Port Number(s): 79FTPFile Transfer Protocol (FTP) is used to move files across the Internet. An FTP packet filter will not applythe FTP proxy rule set to any traffic. To proxy FTP traffic, use the FTP proxy policy. We recommend thatincoming FTP be allowed only to public FTP servers located behind the Firebox.External hosts can be spoofed. <strong>WatchGuard</strong> cannot verify that these packets were actually sent from thecorrect location. You can configure the Firebox to add the source IP address to the Blocked Sites listwhenever an incoming FTP connection is denied. The packet filter and proxy policy included in Watch-Guard Policy Manager handles the data channel for active and passive FTP sessions. All of the usual logoptions can be used with FTP.Characteristics• Internet Protocol(s): TCP• Port Number(s): FTP uses two ports: TCP 20 for control connections and TCP 21 for data transfer.TCP 21 can be an incoming or outgoing connection depending on how the client is configured. Ifit is incoming, 21 is the source port, and the destination port is random.GopherGopher is a data-retrieval protocol developed at the University of Minnesota. Gopher is not frequentlyused, as most users use HTML.Characteristics• Internet Protocol(s): TCP• Port Number(s): 70, but servers can be configured to use other portsGREGeneric Routing Encapsulation Protocol (GRE) is used together with Point-to-Point Tunneling Protocol(PPTP) to create virtual private networks (VPNs) between clients or between clients and servers.<strong>User</strong> <strong>Guide</strong> 383

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!