12.07.2015 Views

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

about SYN flood setting 137address space 137DDoS 137Denial of Service (DoS) 137flood 137IPsource route 136Ping of death 136port space 137stopping 135–138auth (ident) policy 380authenticationActive Directory 131and ssh 393defining groups for 123described 74, 121, 227for VPNs, viewing 6from external interface 122from outside Firebox 122MD5-HMAC 227of remote users 124selecting method for 227setting idle time-out for 77SHA-HMAC 227through Firebox to other Firebox 122using external server 227Authentication Header 226authentication idle time-out, setting 77Authentication List tab (Firebox System Manager) 49authentication serversand policies 132configuring Fireboxes as 125described 227LDAP 129RADIUS 127SecurID on RADIUS server 128types of 123types supported 281using backup 123using Fireboxes as 123Authentication Servers dialog box 125, 282Auto Adjustment setting, TCP segment size 77BBackup dialog box 73backup imagescreating 72described 72restoring 73backup of configuration file 14Bandwidth Meter tabadding/removing lines in 46changing colors in 46changing interface names in 46changing scale of 45described 45bandwidth usage, viewing 45base encryption 14block (proxy action) 162blocked portsavoiding problems with legitimate users 143blocking sites that use 143default 142logging and notification for 143permanent 143reasons for 142Blocked Ports dialog box 143Blocked Ports list 143blocked sitesadding from HostWatch 55auto-blocked 138blocking with policy settings 141described 138dynamic 141exceptions to 140logging and notification for 140permanent 138spyware sites 139storing in external file 140temporary 141viewing current 49Blocked Sites Configuration dialog box 138Blocked Sites listadding/removing sites from 50and Gateway AntiVirus 311described 138exceptions to 140using proxy definitions for 162viewing 50Border Gateway Protocol (BGP)allowing traffic through Firebox 341configuring Fireware to use 340daemon configuration 338–339described 337, 380BOVPNand certificate-based authentication 233described 233multi-WAN not supported in 102BOVPN with Manual IPSecadding gateways 243and strong encryption 14configuring a gateway 243configuring a tunnel with manual security 246creating tunnel policies 250described 233, 243encryption levels for 233, 243listed on Device Status tab 220outgoing dynamic NAT and 250Phase 1 settings 245specifying authentication method 245specifying encryption type 245BOVPN with <strong>WatchGuard</strong> System Manageradding security templates 239creating tunnels 240defining Fireboxes as managed clients 237described 233editing tunnels 241listed on Device Management tab 220removing devices/tunnels 241scenario 234Branch Office IPSec Tunnels dialog box 246branch office VPN. See BOVPNCCA. See Certificate Authoritycables, installing 22Certificate Authorityconfiguring certificate for 201described 201, 221, 228managing 222recording diagnostic log messages for 204Certificate Revocation List (CRL)configuring properties for 203, 204402 <strong>WatchGuard</strong> System Manager

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!