12.07.2015 Views

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Managing a Firebox from a Remote Location2 Click Add.The New Schedule dialog box appears.3 Type a schedule name and description. The schedule name appears in the Schedule dialog box.Make sure that the name is easy to remember.4 From the Mode drop-down list, select the time increment for the schedule: one hour, 30 minutes, or15 minutes.The chart on the left of the New Schedule dialog box shows your entry in the drop-down list.5 The chart in the dialog box shows days of the week along the x-axis (horizontal) and increments ofthe day on the y-axis (vertical). Click boxes in the chart to change them between operational hours(when the policy is active) and non-operational hours (when the policy is not in effect).6 Click OK to close the New Schedule dialog box. Click Close to close the Schedules dialog box.To edit a schedule, select the schedule name in the Schedule dialog box and click Edit.To create a new schedule from an existing one, select the schedule name and click Clone.Managing a Firebox from a Remote LocationWhen you configure a Firebox® with the Quick Setup Wizard, a policy is created automatically thatallows you to connect to and administer the Firebox from any computer on the trusted or optional networks.If you want to manage the Firebox from a remote location (any location external to the Firebox),then you must change your configuration to allow administrative connections from your remote location.The policy that controls administrative connections to the Firebox itself is called the <strong>WatchGuard</strong>® policyin Policy Manager. This policy controls access to the Firebox on these four TCP ports: 4103, 4105, 4117,4118. When you allow connections in the <strong>WatchGuard</strong> policy, you allow connections to each of thesefour ports.Before you change a policy to allow connections to the Firebox from a computer external to your network,it is a good idea to consider:• The use of user authentication to restrict connections to the Firebox.78 <strong>WatchGuard</strong> System Manager

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!