Sign In
Upload
Manuals
Brands
Watchguard Manuals
Network Router
Firebox X Edge e-Series
Watchguard Firebox X Edge e-Series Manuals
Manuals and User Guides for Watchguard Firebox X Edge e-Series. We have
2
Watchguard Firebox X Edge e-Series manuals available for free PDF download: User Manual
Watchguard Firebox X Edge e-Series User Manual (310 pages)
Firebox X Edge e-Series version 10 All Firebox X Edge e-Series Standard and Wireless Models
Brand:
Watchguard
| Category:
Gateway
| Size: 10.29 MB
Table of Contents
User Guide
1
Table of Contents
3
Chapter 1 Introduction to Network Security
13
About Networks and Network Security
13
About Internet Connections
13
About Protocols
14
How Information Travels on the Internet
14
About IP Addresses
15
Private Addresses and Gateways
15
About Subnet Masks
16
About Slash Notation
16
About Entering IP Addresses
16
About DHCP
17
About Pppoe
17
About Domain Name Service (DNS)
17
About Services and Policies
17
About Ports
18
About Firewalls
19
The Firebox X Edge and Your Network
20
Chapter 2 Installation
21
Before You Begin
21
Verify Basic Requirements
21
Network Addressing Requirements
23
Find Your TCP/IP Properties
23
Finding Your TCP/IP Properties on Microsoft Windows Vista
23
Finding Your TCP/IP Properties on Microsoft Windows NT
24
Finding Your TCP/IP Properties on Macintosh os 9
24
Finding Your TCP/IP Properties on Macintosh os X 10.5
24
Finding Your TCP/IP Properties on Other Operating Systems (Unix, Linux)
24
Find Pppoe Settings
24
Disable the HTTP Proxy
25
Disable the HTTP Proxy in Internet Explorer 6.X or 7.X
25
Disable the HTTP Proxy in Firefox 2.X
26
Disable the HTTP Proxy in Safari 2.0
26
Disable Pop-Up Blocking
26
Disable the Pop-Up Blocker in Internet Explorer 6.X or 7.X
26
Disable the Pop-Up Blocker in Firefox 2.X
26
Disable the Pop-Up Blocker in Safari 2.0
26
Connect the Firebox X Edge
27
Connect the Edge to more than Four Devices
28
About User Licenses
29
Use DHCP
30
Chapter 3 Configuration Pages Overview
33
About Edge Configuration Pages
33
Connect to the Firebox X Edge
33
Navigating the Firebox X Edge User Interface
35
System Status Page
35
Firebox Users Page
37
Administration Page
38
Firewall Page
39
Logging Page
40
Webblocker Page
41
Spamblocker Page
42
Gateway AV/IPS Page
43
VPN Page
44
Wizards Page
44
Monitoring the Firebox X Edge
45
ARP Table
45
Authentications
45
Connections
46
Proxy Filter Connections
46
Packet Filter Connections
46
DHCP Leases
47
Disk Usage
47
Dynamic DNS
48
Hostile Sites
48
Interfaces
48
License
49
Livesecurity
49
Memory
49
Processes
49
Protocols
50
Routes
50
Security Services
50
Syslog
50
VPN Statistics
51
Wireless Statistics
51
Chapter 4 Configuration and Management Basics
53
About Basic Configuration and Management Tasks
53
About the Edge Backup Configuration File
53
Before You Begin
54
See the Configuration File
54
Create a Backup Configuration File
55
Restore Your Edge Configuration
55
Restore Your Configuration from a Backup File
55
About Feature Keys
57
Restart the Firebox Locally
59
Using the Web Browser
59
Disconnecting the Power Supply
59
To Set the System Time
62
SNMP Polls
64
Enable SNMP Polling
64
Use HTTP Instead of HTTPS
66
Change the HTTP Server Port
67
About Watchguard System Manager Access
67
Rename the Firebox X Edge E-Series in WSM
67
Enable Centralized Management with WSM
68
Enable Remote Management with WFS V7.3 or Earlier
70
Allow Traffic from a Management Server
71
About Updating the Firebox X Edge Software
71
Method 1: Install Software Automatically
71
Method 2: Install Software Manually
72
Available Upgrade Options
73
Upgrade Your Firebox X Edge Model
75
Chapter 5 Network Settings
77
About Network Interface Setup
77
Setup Wizard
78
If Your ISP Uses DHCP
79
If Your Isp Uses Static Ip Addresses
80
If Your Isp Uses Pppoe
81
Advanced Pppoe Settings
82
Configure Your External Interface as a Wireless Interface
83
Using an Edge with a Wireless External Interface to Extend Network Connectivity
83
About Advanced External Network Settings
84
About Changing the IP Address of the Trusted Network
86
Change the IP Address of the Trusted Network
87
Make the Firebox a DHCP Relay Agent
90
About Restricting Access to an Interface by MAC Address
91
Restrict Access to the Trusted Interface by MAC Address
92
Allow Wireless Connections to the Trusted Interface
91
Use Static IP Addresses for Trusted Computers
91
About Configuring the Optional Network
94
Enable the Optional Network
95
Set Optional Network DHCP Address Reservations
97
Make the Firebox a DHCP Relay Agent
98
Use Static IP Addresses for Optional Computers
98
Add Computers to the Optional Network
98
Allow Wireless Connections to the Optional Interface
99
About Restricting Access to an Interface by MAC Address
99
Restrict Access to the Optional Interface by MAC Address
99
Add a Static Route
100
Create a Dyndns Account
102
Set up the Firebox X Edge for Dynamic DNS
102
Multiple WAN Configuration Options
105
WAN Failover
105
Multi-WAN
105
About Multi-WAN and DNS
106
Configure a Second External Interface for a Broadband Connection
106
Configure Advanced WAN2 Settings
107
Configure WAN Failover
109
Enable WAN Failover with the Setup Wizard
109
Configure the Edge for Serial Modem Failover
110
Configure Your Modem for WAN Failover
111
Dial-Up Account Settings
111
DNS Settings
112
Dial-Up Settings
112
About Virtual Local Area Networks (Vlans)
113
Add a VLAN Tag to the External Interface
113
Add a VLAN Tag to the Trusted or Optional Interface
114
Before You Begin
115
Chapter 6 Wireless Setup
116
About Wireless Configuration Settings
116
Change the SSID
116
Enable/Disable SSID Broadcasts
116
Log Authentication Events
117
Change the Fragmentation Threshold
117
Change the RTS Threshold
117
About Wireless Security Settings
117
Set the Encryption Level
118
Open System and Shared Key Authentication
118
WPA and WPA2 PSK Authentication
118
About Wireless Connections to the Trusted Interface
119
Allow Wireless Connections to the Trusted Interface
119
Allow Wireless Connections to the Optional Interface
121
Enable a Wireless Guest Network Manually
123
Set the Operating Region and Channel
125
Set the Wireless Mode of Operation
125
Configure the Wireless Card on Your Computer
126
About Using Policies in Your Network
127
Chapter 7 Firewall Policies
128
Policy Rules
128
Incoming and Outgoing Traffic
128
Editing Common Packet Filter Policies
131
Set Access Control Options (Incoming)
131
Set Access Control Options (Outgoing)
132
About Custom Policies
133
Add a Custom Policy Using a Wizard
133
Filter Incoming Traffic for a Custom Policy
134
Filter Outgoing Traffic for a Custom Policy
135
Control Traffic from the Trusted to Optional Network
136
Disable Traffic Filters between Trusted and Optional Networks
137
Chapter 8 Proxy Settings
139
About Proxy Policies
139
Enable a Common Proxy Policy
140
Add or Edit a Proxy Policy
140
Set Access Control Options
141
Use a Policy to Manage Manual VPN Network Traffic
141
About the HTTP Proxy
142
HTTP Proxy: Proxy Limits
142
HTTP Requests: General Settings
142
HTTP Proxy: Deny Message
143
Define Exceptions
145
HTTP Responses: Content Types
145
HTTP Requests: URL Paths
146
HTTP Responses: Cookies
146
Block Cookies from a Site
146
About the FTP Proxy
147
Edit the FTP Proxy
147
Set Access Control Options
147
FTP Proxy: Proxy Limits
148
Edit the POP3 Proxy
150
Set Access Control Options
150
POP3 Proxy: Proxy Limits
151
POP3 Proxy: Content Types
153
POP 3 Proxy: Deny Unsafe File Name Patterns
154
Edit the SMTP Proxy
155
SMTP Proxy: Deny Message
158
SMTP Proxy: Filter Email by Address Pattern
158
SMTP Proxy: Email Content
159
Allow Only Safe Content Types
159
Add or Remove File Name Patterns
160
Deny Unsafe File Name Patterns
160
About the HTTPS Proxy
160
About the Outgoing Proxy
163
Settings Tab
163
Content Tab
163
About Additional Security Subscriptions for Proxies
163
Chapter 9 Default Threat Protection
166
About Blocked Sites
166
Permanently Blocked Sites
166
Auto-Blocked Sites/Temporary Blocked Sites List
166
Block a Site Permanently
167
Block Sites Temporarily
168
About Blocked Ports
169
Default Blocked Ports
169
Block a Port
170
Drop Dos Flood Attacks
171
Distributed Denial-Of-Service Prevention
173
Configure Firewall Options
174
Chapter 10 Traffic Management
177
About Traffic Management
177
About Network Traffic
177
Causes for Slow Network Traffic
177
Traffic Categories
178
Interactive Traffic
178
High Priority
178
Medium Priority
178
Low Priority
178
Traffic Marking
179
Types of NAT
184
NAT Behavior
184
About Dynamic NAT
185
About Static NAT
185
Add a Secondary External IP Address
187
Remove a Secondary External IP Address Pair
187
Enable Secondary Addresses
187
Add or Edit a Policy for 1-To-1 NAT
188
Chapter 11 Logging
189
About Logging and Log Files
189
Log Servers
189
Event Log and System Status Syslog
189
Logging and Notification in Applications and Servers
190
About Log Messages
190
See the Event Log File
190
To See the Event Log File
190
About Logging to a Watchguard Log Server
191
Send Your Event Logs to the Log Server
191
Send Logs to a Syslog Host
193
Chapter 12 Certificates
195
About Certificates
195
Certificate Authorities and Signing Requests
195
About Certificates and the Firebox X Edge
195
Use Openssl to Generate a CSR
196
Use Microsoft CA to Create a Certificate
196
Send the Certificate Request
196
Issue the Certificate
197
Download the Certificate
197
About Using Certificates on the Firebox X Edge
197
Import a Certificate
197
Use a Local Certificate
197
Remove a Certificate
198
Examine a Certificate
198
Chapter 13 User and Group Management
199
About User Licenses
199
User Licensing When Authentication Is Required
199
User Licensing When Authentication Is Not Required
200
About User Authentication
200
Set Authentication Options for All Users
201
Configure an Individual User Account
202
Require Users to Authenticate to the Edge
203
Authenticate a Session Without Administrative Access
204
Create a Read-Only Administrative Account
204
Use the Built-In Administrator Account
205
Set a Webblocker Profile for a User
205
Change a User Account Name or Password
206
About Ldap/Active Directory Authentication
207
About Using Third-Party Authentication Servers
207
Configure the Ldap/Active Directory Authentication Service
208
Use the LDAP Authentication Test Feature
209
Configure Groups for LDAP Authentication
209
Add a Group for LDAP Authentication
210
Set a Webblocker Profile for an LDAP Group
211
LDAP Authentication and Mobile VPN with Ipsec
211
Before You Begin
212
Enable Single Sign-On
213
Install the Watchguard Single Sign-On (SSO) Agent
213
See Active Sessions and Users
216
Firebox User Settings
216
Active Sessions
216
Local User Account
217
Editing a User Account
218
Deleting a User Account
218
Allow Internal Devices to Bypass User Authentication
218
Chapter 14 Webblocker
219
About Webblocker
219
Configure Global Webblocker Settings
219
Install the Quarantine Server and Webblocker Server
221
Download the Server Software
221
About Webblocker Profiles
222
Create a Webblocker Profile
222
About Webblocker Categories
224
See Whether a Site Is Categorized
225
Add, Remove, or Change a Category
226
About Allowing Sites to Bypass Webblocker
227
Add an Allowed Site
227
Add a Denied Site
228
Allow Internal Hosts to Bypass Webblocker
229
Chapter 15 Spamblocker
231
About Spamblocker
231
Spamblocker Requirements
231
About Virus Outbreak Detection (VOD)
232
Spamblocker Actions, Tags, and Categories
232
Spamblocker Tags
232
Spamblocker Categories
233
Configure Spamblocker
234
Set POP3 Email Actions
236
Set SMTP Email Actions
236
About Spamblocker Exceptions
237
Create Exceptions
237
Change the Order of Exceptions
237
About Using Spamblocker with Multiple Proxies
238
Send Spam or Bulk Email to Special Folders in Outlook
239
Report False Positives and False Negatives
240
Add Trusted Email Forwarders to Improve Spam Score Accuracy
240
Chapter 16 Quarantine Server
241
About the Quarantine Server
241
Download the Server Software
242
Install the Quarantine Server and Webblocker Server
242
Install Quarantine Server and Webblocker Server
242
Install Server Components
243
Run the Setup Wizard
243
Define the Server Location
243
Set General Server Parameters
244
Change Expiration Settings and User Domains
246
Change Notification Settings
247
Enable or Disable Logging
249
Add or Prioritize Log Servers
249
Send Messages to the Windows Event Viewer
249
Send Messages to a File
249
Open the Messages Dialog Box
252
Save Messages or Send to a User's Inbox
253
Delete Messages Manually
253
Delete Messages Automatically
253
Open the Messages Dialog Box
254
About Managing Users
255
Add Users
256
Remove Users
256
Change the Notification Option for a User
256
Get Statistics on Quarantine Server Activity
257
See Statistics from Specific Dates
257
See Specific Types of Messages
257
Group Statistics by Month, Week, or Day
257
Export and Print Statistics
257
Chapter 17 Gateway Antivirus and Intrusion Prevention Service
259
About Gateway Antivirus and Intrusion Prevention
259
About Gateway Antivirus Settings
260
POP3 Proxy Deny Messages and Gateway AV/IPS
260
Configure Gateway AV
261
About Intrusion Prevention Service Settings
262
Configure the Intrusion Prevention Service
262
Chapter 18 Branch Office Virtual Private Networks
265
About Branch Office Virtual Private Networks (Bovpns)
265
Process Required to Create a Tunnel
265
About VPN Failover
266
About Managed Vpns
267
Set up Manual VPN Tunnels
267
What You Need for Manual VPN
267
Sample VPN Address Information Table
268
Phase 1 Settings
270
Phase 2 Settings
273
See VPN Statistics
275
Why Do I Need a Static External Address
276
How Do I Get a Static External IP Address
276
How Do I Troubleshoot the Connection
276
Why Is Ping Not Working
276
How Do I Set up more than the Number of Allowed VPN Tunnels on My Edge
276
Chapter 19 About Mobile VPN with PPTP
279
Enable PPTP on the Edge
279
Configure DNS and WINS Settings
280
Prepare the Client Computers
280
Create and Connect a PPTP VPN from a Windows Vista Client
280
Create and Connect a PPTP VPN from a Windows XP Client
281
Create and Connect a PPTP VPN from a Windows 2000 Client
281
Use PPTP and Access the Internet
282
Chapter 20 About Mobile VPN with Ipsec
283
Client Requirements
283
Enable Mobile VPN for a Group
285
About Mobile VPN Client Configuration Files
286
Configure Global Mobile VPN with Ipsec Client Settings
286
Get the User's .Wgx File
287
Client Requirements
289
Import the End-User Profile
289
Select a Certificate and Enter the PIN
290
Connect and Disconnect the Mobile VPN Client
291
Disconnect the Mobile VPN Client
292
Control Connection Behavior
292
Mobile User VPN Client Icon
293
See Mobile VPN Log Messages
293
Enable the Link Firewall
294
About the Desktop Firewall
295
Enable the Desktop Firewall
295
Define Friendly Networks
296
Create Firewall Rules
296
Chapter 21 About Mobile VPN with SSL
301
Steps Required to Set up Your Tunnels
301
Before You Begin
301
Options for Mobile VPN with SSL Tunnels
301
Enable Mobile VPN with SSL for a Firebox User
302
Client Requirements
302
Enable Mobile VPN with SSL for a Group
303
Enable the Edge to Use Mobile VPN with SSL
304
SSL VPN Advanced Tab
306
Download the Client Software
307
Install the Mobile VPN with SSL Client Software (Mac os X)
308
Connect to the Firebox with the Mobile VPN with SSL Client (Mac os X)
309
Uninstall the Mobile VPN with SSL Client
310
Mobile VPN with SSL Client for Windows Vista and Windows XP
310
Mobile VPN with SSL Client for Mac os X
310
Advertisement
Watchguard Firebox X Edge e-Series User Manual (310 pages)
Firmware Version 8.6 All Firebox X Edge e-Series Standard and Wireless Models
Brand:
Watchguard
| Category:
Gateway
| Size: 3.57 MB
Table of Contents
User Guide
1
Table of Contents
5
1 Introduction to Network Security
13
Network Security
13
About Networks
13
Clients and Servers
14
Connecting to the Internet
14
Protocols
14
How Information Travels on the Internet
14
IP Addresses
15
Network Addressing
16
About DHCP
16
About Pppoe
16
Default Gateway
16
Domain Name Service (DNS)
16
Services and Policies
16
Ports
17
Firewalls
18
The Firebox X Edge and Your Network
19
2 Installation
21
Installation Requirements
21
Package Contents
21
Registering Your Firebox & Activating Livesecurity Service
22
Identifying Your Network Settings
23
About Network Addressing
23
Static Addresses, DHCP, and Pppoe
23
TCP/IP Properties
24
Pppoe Settings
25
Web Browser HTTP Proxy Settings
25
Web Browser Pop-Up Blocking Settings
26
Connecting the Firebox X Edge
27
Connecting the Edge to more than Four Devices
28
About User Licenses
29
Setting Your Computer to Connect to the Edge
29
Using DHCP
29
Using a Static IP Address
30
Using the Quick Setup Wizard
31
3 Navigation
33
Connecting to the Firebox X Edge
33
Navigating the Firebox X Edge User Interface
34
System Status Page
35
Network Page
35
Firebox Users Page
36
Administration Page
37
Firewall Page
38
Logging Page
39
Webblocker Page
39
Spamblocker Page
40
GAV/IPS Page
40
VPN Page
41
Wizards Page
41
Monitoring the Firebox X Edge
42
ARP Table
42
Authentications
43
Connections
43
Components List
44
DHCP Leases
44
Disk Usage
44
Dynamic DNS
45
Hostile Sites
45
Interfaces
45
License
45
Memory
46
Processes
46
Protocols
46
Routes
46
Security Services
47
Syslog
47
Traffic Control
47
VPN Statistics
48
Wireless Statistics
48
4 Configuration and Management Basics
49
Factory Default Settings
49
Restoring the Firebox to the Factory Default Settings
50
Restarting the Firebox
50
Local Restart
51
Remote Restart
51
Setting the System Time
51
Enabling the Edge for SNMP Polling
53
Using Mibs
54
Selecting HTTP or HTTPS for Management
54
Changing the HTTP Server Port
55
Setting up Watchguard System Manager Access
55
Renaming the Firebox X Edge E-Series
56
Enabling Centralized Management with WSM V9.1
56
Enable Remote Management with WFS V7.3 or Earlier
57
Allowing Traffic from a Management Server
58
Updating the Firebox X Edge Software
59
Method 1: Installing Software Automatically
59
Method 2: Installing Software Manually
59
Activating Upgrade Options
60
Upgrade Options
60
Adding a Feature to Your Firebox X Edge
61
Enabling the Model Upgrade Option
62
Viewing the Configuration File
62
5 Network Settings
65
Using the Network Setup Wizard
65
Configuring the External Network
66
If Your ISP Uses DHCP
66
If Your ISP Uses Static IP Addresses
67
If Your ISP Uses Pppoe
68
External Network Advanced Settings
69
Changing the Mac Address of the External Interface
70
Configuring the Trusted Network
71
Changing the IP Address of the Trusted Network
71
Using DHCP on the Trusted Network
72
Setting Trusted Network DHCP Address Reservations
73
Configuring the Trusted Network for DHCP Relay
73
Using Static IP Addresses for Trusted Computers
74
Adding Computers to the Trusted Network
74
Allowing Wireless Connections to the Trusted Interface
75
Restricting Access to the Edge Trusted Interface by MAC Address
75
Configuring the Optional Network
77
Enabling the Optional Network
77
Using DHCP on the Optional Network
78
Setting Optional Network DHCP Address Reservations
79
Configuring the Optional Network for DHCP Relay
79
Using Static IP Addresses for Optional Computers
80
Adding Computers to the Optional Network
80
Allowing Wireless Connections to the Optional Interface
80
Restricting Access to the Edge Optional Interface by MAC Address
81
Making Static Routes
81
Using Slash Notation
81
Making a Static Route
82
Registering with the Dynamic DNS Service
82
Using the WAN Failover Option
84
Understanding WAN Failover
84
WAN Failover and DNS
85
Configuring WAN Failover with a Second Broadband Connection
85
Configuring the Edge for Serial Modem Failover
88
Configuring Your Modem for WAN Failover
89
Dns Settings
90
Configuring BIDS
91
6 Firebox X Edge E-Series Wireless Setup
93
Installing the Firebox X Edge E-Series Wireless
93
Understanding Wireless Configuration Settings
94
Setting the SSID
94
Controlling SSID Broadcasts
95
Logging Authentication Events
95
Setting the Fragmentation Threshold
95
Setting the RTS Threshold
95
Configuring Wireless Security Settings
95
Setting the Wireless Authentication Method
96
Configuring Encryption
96
Allowing Wireless Connections to the Trusted Interface
97
Allowing Wireless Connections to the Optional Interface
98
Enabling a Wireless Guest Network
99
Configuring Wireless Radio Settings
100
Setting the Operating Region and Channel
100
Setting the Wireless Mode of Operation
101
Configuring the Wireless Card on Your Computer
101
7 Firewall Policies
103
Understanding Policies
103
Incoming and Outgoing Traffic
104
Policy Rules
104
Precedence
104
Enabling Common Packet Filter Policies
105
Editing Common Packet Filter Policies
106
Incoming Settings
107
Outgoing Settings
108
Configuring Custom Packet Filter Policies
108
Adding a Custom Policy Using the Wizard
109
Adding a Custom Packet Filter Policy Manually
109
Filtering Incoming Traffic for a Custom Policy
110
Filtering Outgoing Traffic for a Custom Policy
111
Configuring Policies for the Optional Network
112
Controlling Traffic from the Trusted to Optional Network
112
Disabling Traffic Filters between Trusted and Optional Networks
113
8 Proxy Settings
115
Proxy Policies
115
Understanding the HTTP Proxy
115
Understanding the FTP Proxy
116
Understanding the POP3 Proxy
116
Understanding the SMTP Proxy
116
Creating Proxy Policies
116
Using the HTTP Proxy
117
Configuring the HTTP Proxy
117
Setting Access Control Options
118
Setting Proxy Limits
118
Filtering Web Content
121
Using the FTP Proxy
123
Configuring the FTP Proxy
124
Setting Access Control Options
124
Setting Proxy Limits
124
Filtering Content
125
Using the POP3 Proxy
126
Using the POP3 Proxy
127
Configuring the POP3 Proxy
128
Setting Access Control Options
129
Setting Proxy Limits
129
Filtering Email Content
130
Using the SMTP Proxy
132
Configuring the SMTP Proxy
132
Setting Access Control Options
132
Setting Proxy Limits
132
Deny Message
132
Deny Message
133
Filtering Email by Address Pattern
134
Filtering Email Content
135
Allow Only Safe Content Types
135
Deny Unsafe File Name Patterns
135
Adding a Custom Proxy Policy
137
Adding a Custom SMTP Proxy Policy
137
Gateway Antivirus/Intrusion Prevention Service
137
Webblocker
137
Spamblocker
137
Using Additional Services for Proxies
138
9 Intrusion Prevention
139
Adding a Site to the Permanent Blocked Sites List
139
Blocking Sites Temporarily
140
Blocking Ports
141
Avoiding Problems with Blocked Ports
142
Adding a Port to the Blocked Ports List
142
Preventing Denial-Of-Service Attacks
143
Dropping Flood Attacks
143
Distributed Denial-Of-Service Prevention
144
Configuring Firewall Options
145
10 Traffic Management
147
About Network Traffic
147
Causes for Slow Network Traffic
147
Traffic Categories
148
Interactive Traffic
148
High Priority
148
Medium Priority
148
Low Priority
148
Traffic Marking
148
Configuring Traffic Control
150
Enabling Traffic Control
151
Adding a Traffic Control Filter
152
Editing a Traffic Control Filter
153
Changing the Priority of a Traffic Control Filter
154
Removing a Traffic Control Filter
154
Working with Firewall NAT
154
NAT Types
154
NAT Behavior
155
Secondary IP Addresses
155
Using 1-To-1 NAT
155
11 Logging and Certificates
159
Viewing Log Messages
159
Logging to a Watchguard Log Server
160
Logging to a Syslog Host
161
About Certificates
162
Creating a Certificate or Signing Request
162
Using Openssl to Generate a CSR
162
Using Microsoft CA to Create a Certificate
163
Sending the Certificate Request
163
Issuing the Certificate
163
Downloading the Certificate
164
Using Certificates on the Firebox X Edge
164
Importing a Certificate
164
Removing a Certificate
164
Examining a Certificate
165
12 User and Group Management
167
About User Licenses
167
When a User License Is Used
168
When a User License Is Not Used
168
About User Authentication
168
Setting Authentication Options for All Users
168
Using Local Firebox Authentication
170
Configuring an Individual User Account
170
Authenticating to the Edge
171
Setting a Webblocker Profile for a User
173
Changing a User Account Name or Password
173
Using Ldap/Active Directory Authentication
174
Configuring the Ldap/Active Directory Authentication Service
174
Using the LDAP Authentication Test Feature
176
Configuring Groups for LDAP Authentication
176
Adding a Group
176
Setting a Webblocker Profile for a Group
177
LDAP Authentication and MUVPN
178
Seeing Current Sessions and Users
178
Firebox Users Settings
178
Active Sessions
178
Stopping a Session
178
Local User Accounts
179
Allowing Internal Devices to Bypass User Authentication
180
13 Webblocker
181
How Webblocker Works
181
Configuring Global Webblocker Settings
181
Creating Webblocker Profiles
183
Webblocker Categories
185
Determining a Category
192
Adding, Removing, or Changing a Web Site Category
192
Allowing Certain Sites to Bypass Webblocker
193
Blocking Additional Web Sites
194
Bypassing Webblocker
195
14 Spamblocker
197
Understanding How Spamblocker Works
197
Spamblocker Categories
198
Spamblocker Actions
198
Spamblocker Exceptions
198
Configuring Spamblocker
198
Enabling Spamblocker
199
Configuring Spamblocker Settings
199
Creating Exceptions
200
Adding Trusted Email Forwarders
201
Configuring Rules for Your Email Reader
201
Sending Spam or Bulk Email to Special Folders in Outlook
201
15 Gateway Antivirus and Intrusion Prevention Service
203
Understanding Gateway Antivirus Settings
203
Understanding Intrusion Prevention Service Settings
204
Configuring Gateway AV/IPS
204
Gateway Antivirus Settings
205
Intrusion Prevention Service Settings
206
POP3 Proxy Deny Messages and Gateway AV/IPS
206
Updating Gateway AV/IPS
206
16 Branch Office Virtual Private Networks
209
About this Chapter
209
What You Need to Create a VPN
209
About VPN Failover
210
Managed Vpns
211
Manual VPN: Setting up Manual VPN Tunnels
211
What You Need for Manual VPN
211
To Create Manual VPN Tunnels on Your Edge
213
Phase 1 Settings
213
Phase 2 Settings
216
VPN Traffic Control
217
VPN Keep Alive
217
Viewing VPN Statistics
218
Frequently Asked Questions
218
How Do I Troubleshoot the Connection
219
Why Is Ping Not Working
219
17 Mobile User Virtual Private Networks
221
Configuring Ipsec Mobile User VPN
221
Using Ipsec MUVPN
222
Configuring MUVPN Client Settings
222
Enabling MUVPN Access for a Firebox User Account
224
Distributing the Software and the .Wgx File
225
Preparing Remote Computers for Ipsec MUVPN
226
Windows 2000 Setup
227
Windows XP Setup
228
Installing and Configuring the Ipsec MUVPN Client
230
Uninstalling the Muvpn Client
231
Connecting and Disconnecting the Ipsec MUVPN Client
232
Monitoring the Ipsec MUVPN Client Connection
233
The Zonealarm Personal Firewall
234
Allowing Traffic through Zonealarm
235
Shutting down Zonealarm
235
Uninstalling Zonealarm
235
Using Ipsec MUVPN on a Firebox X Edge E-Series Wireless Network
236
Troubleshooting Tips
236
Configuring PPTP Mobile User VPN
238
Enabling PPTP
238
Enabling PPTP Access for Firewall Users
240
Preparing the Client Computers
240
Using PPTP and Accessing the Internet
242
Firebox X Edge E-Series Hardware
243
Package Contents
243
Specifications
244
Hardware Description
245
Front Panel
245
Rear View
246
Side Panels
246
AC Power Adapter
247
About the Firebox X Edge E-Series Wireless
247
Antenna Directional Gain
247
Signal Attenuation
248
Channel Data Rate
248
Legal Notifications
249
Copyright, Trademark, and Patent Information
249
Gnu Lesser General Public License
259
Openssl License
283
Original Ssleay License
283
Certifications and Notices
296
Industry Canada
298
Declaration of Conformity
300
Limited Hardware Warranty
300
Advertisement
Related Products
Watchguard Firebox X Edge Series
Watchguard Firebox X Core e-Series
Watchguard Firebox X Edge e-Series v10.0
Watchguard Firebox X Series
Watchguard Firebox X Peak Series
Watchguard Firebox X Peak e-Series
Watchguard Firebox Cloud
Watchguard Firebox SSL Series
Watchguard Firebox T35 Series
Watchguard Firebox T55 Series
Watchguard Categories
Firewall
Wireless Access Point
Security System
Gateway
Network Router
More Watchguard Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL