WSM User Guide - WatchGuard Technologies
WSM User Guide - WatchGuard Technologies
WSM User Guide - WatchGuard Technologies
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Setting Blocked Sites ..........................................................................................................................138Blocking a site permanently ...........................................................................................................138Blocking spyware sites .....................................................................................................................139Using an external list of blocked sites ...........................................................................................140Creating exceptions to the Blocked Sites list ...............................................................................140Setting logging and notification parameters .............................................................................140Blocking sites temporarily with policy settings ...........................................................................141Blocking Ports .......................................................................................................................................142Blocking a port permanently ..........................................................................................................143Automatically blocking IP addresses that try to use blocked ports ........................................143Setting logging and notification for blocked ports ....................................................................143CHAPTER 12 Configuring Policies .......................................................................................................145Creating Policies for your Network ...............................................................................................145Adding Policies .....................................................................................................................................146Changing the Policy Manager View ..............................................................................................146Adding a policy .................................................................................................................................147Making a custom policy template .................................................................................................148Adding more than one policy of the same type ..........................................................................150Deleting a policy ...............................................................................................................................150Configuring Policy Properties .........................................................................................................150Setting access rules, sources, and destinations ..........................................................................151Setting a proxy action ......................................................................................................................152Setting logging properties ..............................................................................................................153Configuring static NAT .....................................................................................................................154Setting advanced properties ..........................................................................................................156Setting Policy Precedence ................................................................................................................157Using automatic order .....................................................................................................................157Setting precedence manually .........................................................................................................159CHAPTER 13 Configuring Proxied Policies .....................................................................................161Defining Rules .......................................................................................................................................161Adding rulesets ..................................................................................................................................162Using the advanced rules view .......................................................................................................163Customizing Logging and Notification for Proxy Rules .........................................................164Configuring log messages and notification for a proxy policy ................................................164Configuring log messages and alarms for a proxy rule ............................................................164Using dialog boxes for alarms, log messages, and notification ..............................................164Configuring the SMTP Proxy ...........................................................................................................166Configuring general settings ..........................................................................................................167Configuring ESMTP parameters .....................................................................................................168Configuring authentication rules ..................................................................................................169Defining content type rules ............................................................................................................170Defining file name rules ..................................................................................................................170Configuring the Mail From and Mail To rules ..............................................................................170Defining header rules .......................................................................................................................170Defining antivirus responses ..........................................................................................................170viii<strong>WatchGuard</strong> System Manager