WatchGuard Firebox System 4.6 User Guide
WatchGuard Firebox System 4.6 User Guide WatchGuard Firebox System 4.6 User Guide
120
CHAPTER 17Configuring BranchOffice Virtual PrivateNetworkingBranch office virtual private networking (VPN) creates a secure tunnel, over anunsecure network, between two networks protected by the WatchGuard FireboxSystem or between a WatchGuard Firebox and an IPSec-compliant device. Usingbranch office VPN, you can connect two or more locations over the Internet while stillprotecting the resources of your trusted and optional networks.WatchGuard offers three branch office VPN methods:• DVCP VPNThis method defines a Firebox as a DVCP server at the center of a distributed arrayof WatchGuard Firebox and SOHO clients.• IPSec (Internet Protocol Security)This method uses IPSec to tunnel between a WatchGuard Firebox and an IPSeccompliantdevice from another vendor or between two Fireboxes.• WatchGuard VPNThis method uses the WatchGuard proprietary secure connection, calledWatchGuard VPN, to create a tunnel between two WatchGuard Fireboxes.A given pair of Fireboxes can establish only one VPN connection betweenthem. However, a single Firebox can tunnel to multiple branch locations.Incoming connections from branch office VPN networks can access machineson the Trusted interface regardless of whether the local machines are usingNAT.Connections made through a branch office VPN are exempt from SimpleNAT.Addresses used for VPN must not be on the Blocked Sites list.Configuration checklistBefore implementing branch office VPN, gather the following information:• IP address of both ends of the tunnel.User Guide 121
- Page 79 and 80: CHAPTER 11Setting Up Logging andNot
- Page 81 and 82: Designating Event Processors for a
- Page 83 and 84: Setting up the LiveSecurity Event P
- Page 85 and 86: Setting global logging and notifica
- Page 87 and 88: Customizing logging and notificatio
- Page 89 and 90: CHAPTER 12Connect with Out-of-Band
- Page 91 and 92: Configuring the Firebox for OOB5 En
- Page 93: PART IVAdministering a SecurityPoli
- Page 96 and 97: Using host aliasesAdding a host ali
- Page 98 and 99: Configuring Firebox authenticationC
- Page 100 and 101: Configuring CRYPTOCard server authe
- Page 102 and 103: Using authentication to define remo
- Page 104 and 105: Firebox MonitorsSetting Firebox Mon
- Page 106 and 107: Firebox MonitorsLogging optionsLogg
- Page 108 and 109: HostWatchARP tableA snapshot of the
- Page 110 and 111: HostWatch6 To change playback prope
- Page 112 and 113: HostWatch102
- Page 114 and 115: Viewing files with LogViewer2 Confi
- Page 116 and 117: Working with log filesIP header len
- Page 118 and 119: Working with log files108
- Page 120 and 121: Specifying report sectionsCreating
- Page 122 and 123: Exporting reports6 Enter the number
- Page 124 and 125: Scheduling and running reportsDelet
- Page 126 and 127: Report sections and consolidated se
- Page 128 and 129: Report sections and consolidated se
- Page 132 and 133: Using DVCP to connect to devices•
- Page 134 and 135: Branch office VPN with IPSecFrom Po
- Page 136 and 137: Branch office VPN with IPSecdescrib
- Page 138 and 139: Branch office VPN with IPSecbe acce
- Page 140 and 141: Configuring WatchGuard VPNConfiguri
- Page 142 and 143: Configuring WatchGuard VPN• Watch
- Page 144 and 145: Configuring shared servers for RUVP
- Page 146 and 147: Configuring the Firebox for Remote
- Page 148 and 149: Configuring the Firebox for Mobile
- Page 150 and 151: Configuring debugging optionsA prom
- Page 152 and 153: Preparing the client computers• P
- Page 154 and 155: Preparing the client computers10 Cl
- Page 156 and 157: Using Remote User PPTPInstalling a
- Page 158 and 159: Configuring debugging options148
- Page 160 and 161: CChangingan interface IP address 39
- Page 162 and 163: monitors 2, 32, 93BandwidthMeter 94
- Page 164 and 165: for blocked sites 44global preferen
- Page 166 and 167: pull-down menus 32services arena 32
- Page 168 and 169: introduction 37Routes 97network con
- Page 170: manager 17mobile user 18multiple-bo
CHAPTER 17Configuring BranchOffice Virtual PrivateNetworkingBranch office virtual private networking (VPN) creates a secure tunnel, over anunsecure network, between two networks protected by the <strong>WatchGuard</strong> <strong>Firebox</strong><strong>System</strong> or between a <strong>WatchGuard</strong> <strong>Firebox</strong> and an IPSec-compliant device. Usingbranch office VPN, you can connect two or more locations over the Internet while stillprotecting the resources of your trusted and optional networks.<strong>WatchGuard</strong> offers three branch office VPN methods:• DVCP VPNThis method defines a <strong>Firebox</strong> as a DVCP server at the center of a distributed arrayof <strong>WatchGuard</strong> <strong>Firebox</strong> and SOHO clients.• IPSec (Internet Protocol Security)This method uses IPSec to tunnel between a <strong>WatchGuard</strong> <strong>Firebox</strong> and an IPSeccompliantdevice from another vendor or between two <strong>Firebox</strong>es.• <strong>WatchGuard</strong> VPNThis method uses the <strong>WatchGuard</strong> proprietary secure connection, called<strong>WatchGuard</strong> VPN, to create a tunnel between two <strong>WatchGuard</strong> <strong>Firebox</strong>es.A given pair of <strong>Firebox</strong>es can establish only one VPN connection betweenthem. However, a single <strong>Firebox</strong> can tunnel to multiple branch locations.Incoming connections from branch office VPN networks can access machineson the Trusted interface regardless of whether the local machines are usingNAT.Connections made through a branch office VPN are exempt from SimpleNAT.Addresses used for VPN must not be on the Blocked Sites list.Configuration checklistBefore implementing branch office VPN, gather the following information:• IP address of both ends of the tunnel.<strong>User</strong> <strong>Guide</strong> 121