12.07.2015 Views

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Setting Blocked Sites ..........................................................................................................................138Blocking a site permanently ...........................................................................................................138Blocking spyware sites .....................................................................................................................139Using an external list of blocked sites ...........................................................................................140Creating exceptions to the Blocked Sites list ...............................................................................140Setting logging and notification parameters .............................................................................140Blocking sites temporarily with policy settings ...........................................................................141Blocking Ports .......................................................................................................................................142Blocking a port permanently ..........................................................................................................143Automatically blocking IP addresses that try to use blocked ports ........................................143Setting logging and notification for blocked ports ....................................................................143CHAPTER 12 Configuring Policies .......................................................................................................145Creating Policies for your Network ...............................................................................................145Adding Policies .....................................................................................................................................146Changing the Policy Manager View ..............................................................................................146Adding a policy .................................................................................................................................147Making a custom policy template .................................................................................................148Adding more than one policy of the same type ..........................................................................150Deleting a policy ...............................................................................................................................150Configuring Policy Properties .........................................................................................................150Setting access rules, sources, and destinations ..........................................................................151Setting a proxy action ......................................................................................................................152Setting logging properties ..............................................................................................................153Configuring static NAT .....................................................................................................................154Setting advanced properties ..........................................................................................................156Setting Policy Precedence ................................................................................................................157Using automatic order .....................................................................................................................157Setting precedence manually .........................................................................................................159CHAPTER 13 Configuring Proxied Policies .....................................................................................161Defining Rules .......................................................................................................................................161Adding rulesets ..................................................................................................................................162Using the advanced rules view .......................................................................................................163Customizing Logging and Notification for Proxy Rules .........................................................164Configuring log messages and notification for a proxy policy ................................................164Configuring log messages and alarms for a proxy rule ............................................................164Using dialog boxes for alarms, log messages, and notification ..............................................164Configuring the SMTP Proxy ...........................................................................................................166Configuring general settings ..........................................................................................................167Configuring ESMTP parameters .....................................................................................................168Configuring authentication rules ..................................................................................................169Defining content type rules ............................................................................................................170Defining file name rules ..................................................................................................................170Configuring the Mail From and Mail To rules ..............................................................................170Defining header rules .......................................................................................................................170Defining antivirus responses ..........................................................................................................170viii<strong>WatchGuard</strong> System Manager

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!