12.07.2015 Views

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

selecting for tunnel 247Gateways dialog box 244Generic Routing Encapsulation Protocol (GRE)policy 383global settingsfor authentication 77for ICMP error handing 76for TCP SYN checking 76for VPNs 75TCP segment size 77using for Firebox 75Global Settings dialog box 75gopher policy 383groups (authentication)assigning users to 126components of 123described 123, 282HHELO/EHLO responses, examining 168High Availability (HA)and Intrusion Prevention Service 348and proxy sessions 348backing up configuration 348configuring (Firebox X e-Series) 344–346configuring (non e-Series) 346–347configuring secondary Firebox (Firebox X e-Series) 345described 3, 343enabling (Firebox X e-Series) 345forcing a failover 347Gateway AntiVirus and 348requirements for 343restarting the peer 347selecting primary Firebox for 344synchronizing the configuration 347upgrading software in HA configuration 348viewing status of 36High Availability dialog box 344, 346Historical Reportsand SMTP traffic 168applying a filter 193automating reports with Log Server 88creating report filter 192creating/editing 185–190deleting a filter 193deleting reports 187described 19, 185editing a filter 192editing existing reports 187running a report 193starting 185starting new reports 186time spans for 187time zone for 62Home Banking Computer Interface (HBCI) policy 384host routes, configuring 110Host Unreachable setting (ICMP) 76hostsrelated, configuring 111–112viewing in HostWatch 54HostWatchadding blocked sites from 55changing view properties 55choosing colors for display 55described 18, 53display 53pausing 56setting display properties 54starting 53viewing authenticated users 54viewing hosts 54viewing ports 54HTTP caching proxy 399HTTP policy 384, 399HTTP proxyand antivirus responses 178and Gateway AntiVirus 308, 310and Intrusion Prevention Service 314, 315, 317and range requests 175and WebBlocker 292changing deny message 178configuring settings for requests 174described 174, 399sending log messages per transaction 175setting body content types 178setting content types for responses 177setting cookies for responses 177setting header fields for responses 177setting HTTP request URL paths 176setting idle timeout for 175, 177setting length of response headers 177setting maximum line length of responseheaders 177setting maximum URL length 175setting request authorization 176setting request header fields 176setting request methods 175, 177HTTPS policy 384hub-and-spoke configuration 230IICMP error handling settingsfor Firebox 76in policies 157Identification Protocol (IDENT) policy 384idle time-out for policies, setting 157IGMP policy 385Ignore DF for IPSec setting 75IKEand Diffie-Hellman group 245and Phase 1 settings 245described 228phase 1,2 228IKE policy 385IMAP policy 385installation procedures 9–22Instant Messaging (IM) use, preventing 317Intel Video Phone policy 386Interface Settings dialog box 98, 106interfaceschanging IP address of 98configuring 98–110graphing events on 41setting speed and duplex 111viewing configuration of 49Internetaccessing through PPTP tunnel 286security concerns on 225threats from hackers on 171, 307, 314virus traffic on 24Internet Group Management Protocol (IGMP) policy 385406 <strong>WatchGuard</strong> System Manager

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!