Do you have a question about the Watchguard Firebox X15 and is the answer not in the manual?
Form Factor | Desktop |
---|---|
Product Series | Firebox X |
Power Supply | External AC adapter |
Weight | 2.5 lbs |
Operating Temperature | 32° to 104°F (0° to 40°C) |
Humidity | 10 - 90% (non-condensing) |
Defines networks and discusses the importance of network security against cyber threats.
Explains ISPs, bandwidth, and the differences between broadband and dial-up connections.
Details network protocols like IP, TCP, and UDP, essential for network communication.
Illustrates how data is transmitted across the internet in packets, including addressing.
Explains IP addresses, formats, private vs. public addresses, and the role of gateways.
Explains subnet masks and their role in dividing networks into smaller portions.
Details network ports, their function as connection points for programs, and assigned numbers.
Explains how firewalls protect networks by separating trusted and external networks.
Lists necessary components and initial steps before proceeding with the Firebox X Edge installation.
Guidance on finding essential TCP/IP properties and network addressing requirements.
Instructions for locating PPPoE connection details required for ISP setup.
Essential steps to register the Firebox and activate the LiveSecurity Service subscription.
Temporary disabling of browser HTTP proxy settings to ensure direct connection to the Firebox.
Disabling browser pop-up blockers to allow necessary wizard windows during setup.
Physical connection steps for setting up the Firebox X Edge on the network.
Configures your computer's network settings (DHCP or static IP) to connect to the Firebox.
The primary tool for initial Firebox X Edge configuration and setup.
Instructions on how to access the Firebox X Edge's web management interface via its IP address.
Explains the navigation bar and how to access different configuration sections.
Describes the System Status page, showing current settings and providing access to device configuration.
Displays the current configuration of trusted, optional, and external networks.
Details firewall settings, including policies, blocked sites, and proxy configurations.
Provides access to event logs, log server status, and syslog logging configuration.
Manages WebBlocker settings, profiles, and lists of allowed or denied websites.
Configures spamBlocker settings, including actions for suspected spam.
Shows Gateway AntiVirus and Intrusion Prevention Service status and settings.
Manages VPN gateways, tunnels, and related settings for secure remote connections.
Explains how to monitor various components like ARP table and authentications.
Introduces basic management tasks and custom configuration settings.
Explains how to back up and restore the Firebox X Edge configuration file.
Step-by-step instructions to save the current Firebox X Edge configuration to a local file.
Procedure to restore the Firebox X Edge configuration from a previously saved backup file.
Details the default network and configuration properties of the Firebox X Edge.
Instructions for resetting the Firebox X Edge to its original factory default configuration.
Explains feature keys and their role in enabling specific functionalities and upgrades.
Explains the process of configuring network interface IP addresses for the Firebox.
Using the Network Setup Wizard to change IP addresses for external and trusted interfaces.
Manually configuring external network interfaces, including DHCP, static IP, and PPPoE methods.
Procedure to change the external interface MAC address to match ISP requirements.
Details on configuring the trusted network, including DHCP server and static IP options.
Configuring the Firebox X Edge as a DHCP server for computers on the trusted network.
Assigning static IP addresses to specific computers on the trusted network via MAC address.
Using static IP addresses for trusted computers when the DHCP server is disabled.
Configuring the Edge as a wireless access point for the trusted network.
Controlling access to network interfaces based on the hardware (MAC) address of devices.
Steps to restrict access to the trusted interface by allowing only specific MAC addresses.
Configuring an isolated optional network for public servers or wireless access points.
Enabling and configuring the optional network interface on the Firebox X Edge.
Configuring the Firebox X Edge as a DHCP server for devices on the optional network.
Assigning static IP addresses to specific computers on the optional network via MAC address.
Explains static routes and their use in directing network traffic to specific destinations.
Explains Dynamic DNS service for maintaining domain name resolution with changing IP addresses.
Configuring multiple external interfaces for WAN failover or load balancing.
Steps to configure a second external interface for broadband connections, supporting multi-WAN.
Adjusting advanced settings for the second WAN interface (WAN2), including link speed and MAC address.
Configuring WAN failover to automatically switch to a secondary external interface if the primary fails.
Explains VLANs and their use for segmenting networks and controlling traffic patterns.
Tagging traffic sent to the external interface to identify it as part of a VLAN.
Introduces wireless setup, adhering to 802.11b/g standards and security recommendations.
Configuring wireless settings like SSID, fragmentation threshold, and authentication.
Setting a unique name (SSID) for the wireless network to identify the Firebox X Edge.
Controlling whether the wireless network's SSID is broadcast for client discovery.
Enabling the logging of wireless authentication events for security monitoring.
Adjusting the maximum frame size for wireless transmissions to optimize performance.
Details security standards like WEP, WPA, and WPA2 for protecting wireless networks.
Choosing authentication methods (Open System, Shared Key, WPA, WPA2) for wireless security.
Selecting encryption levels and managing keys for secure wireless connections.
Enabling wireless clients to connect to the Edge as an access point for the trusted network.
Enabling wireless clients to connect to the Edge as an access point for the optional network.
Manually setting up a wireless guest network for limited access to the Internet.
Instructions for configuring a wireless network card on a Windows XP computer for connection.
Explains the two categories of policies: packet filters and proxies, used for traffic filtering.
Details the actions (Allow, Deny, No Rule) that set firewall rules within a policy.
Steps to edit default packet filter policies for incoming and outgoing traffic.
Configuring rules to control incoming traffic, including IP addresses, host, and port redirection.
Configuring rules to control outgoing traffic, specifying source and destination IP addresses.
Creating custom policies for protocols not included by default or for specific filtering needs.
Restricting incoming traffic for a custom policy to specific computers behind the firewall.
Restricting outgoing traffic for a custom policy to specific destinations and sources.
Explains policies for the optional network, securing public servers and wireless access points.
Disabling traffic filters to allow all traffic flow between trusted and optional networks.
Explains how proxies monitor and scan connections for secure communication and content.
Steps for adding and configuring proxy policies to filter specific types of content.
Details the HTTP proxy's function in filtering web traffic and protecting against attacks.
Adjusting timeout and length limits for HTTP requests and responses to manage resources.
Configuring general settings for HTTP requests, including idle connection timeout and URL length.
Customizing the deny message displayed to users when HTTP proxy blocks content.
Defining exceptions to HTTP proxy rules to allow access to specific websites.
Managing content types (MIME types) allowed or denied through the HTTP proxy.
Explains the FTP proxy's function in monitoring and scanning FTP connections.
Setting limits for FTP proxy settings like username length, password length, and file name length.
Explains the POP3 proxy's function in moving and scanning email messages.
Adjusting POP3 proxy settings like timeout and line length to prevent resource overuse.
Limiting content types and blocking patterns/URLs for email messages processed by POP3 proxy.
Explains the SMTP proxy's function in sending and scanning email messages.
Setting SMTP proxy limits for timeout, email size, and line length to prevent attacks.
Customizing the deny message for email messages blocked by the SMTP proxy.
Introduces threat protection features designed to block network traffic from risky systems.
Explains features for blocking IP addresses that pose a security risk to the network.
Procedure to add IP addresses to the Blocked Sites list to prevent connections.
Automatically blocking sites that send unhandled network traffic for a specified duration.
Details ports that can be blocked to stop specified external network services and enhance security.
Steps to block specific ports to prevent access to potentially vulnerable network services.
Explains Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks and protection features.
Configuring limits on connection packets per second to mitigate DoS flood attacks.
Configuring global firewall rules to enhance network security, including logging options.
Managing network traffic using QoS, Traffic Control, and NAT for data transmission control.
Identifies common causes of slow network traffic, such as P2P services and bandwidth usage.
Defines traffic categories (interactive, high, medium, low) for prioritizing network traffic.
Applying marking to network traffic categories using IP Precedence or DSCP for QoS.
Steps to enable Traffic Control and create filters for prioritizing network traffic.
Explains Network Address Translation (NAT) and its purposes: IP address conservation and privacy.
Describes the three types of NAT supported: Dynamic NAT, Static NAT, and 1-to-1 NAT.
Details 1-to-1 NAT for mapping public IP addresses to internal servers, often for public access.
Steps to enable 1-to-1 NAT by adding IP address pairs and configuring policies.
Explains the importance of logs for monitoring network security and activity.
Configuring the Firebox to send log data to a syslog server or WatchGuard Log Server.
Instructions on how to view the event log file, which contains records of recent Firebox activity.
Configuring the Firebox to send event logs to a WatchGuard Log Server for centralized logging.
Steps to configure the Edge to send log messages to a specified WatchGuard Log Server.
Configuring the Firebox to send log messages to a syslog host for real-time log analysis.
Explains certificates and their use in securing sessions and VPN authentication.
Details the types and limits of certificates that can be imported and used with the Firebox X Edge.
Instructions for generating a Certificate Signing Request (CSR) using OpenSSL on Linux/Windows.
Steps to import certificates into the Firebox X Edge for authentication and security.
Applying an imported local certificate for system security and authentication purposes.
Explains user licenses, session limits, and how to manage available user licenses.
Explains user authentication, associating usernames with IP addresses for monitoring and control.
Configuring global settings for user authentication, including required authentication and session termination.
Steps to create and configure individual user accounts with specific access levels and permissions.
Configuring the Firebox to use LDAP or Active Directory for centralized user authentication.
Steps to configure LDAP or Active Directory authentication for user access.
Testing the LDAP connection and authentication requests to ensure proper integration.
Setting account privileges for users based on their group membership in LDAP.
Enabling Single Sign-On (SSO) for automatic user authentication via Active Directory.
Steps to enable Single Sign-On (SSO) and configure the SSO agent IP address.
Instructions for downloading and installing the WatchGuard SSO agent software.
Viewing information about users who are currently online and their session status.
Procedures to manually stop active user sessions on the Firebox.
Information on configured local user accounts, including name, admin level, and options.
Steps to edit existing user accounts, changing details like name, password, and access levels.
Creating a list of internal hosts that bypass user authentication and WebBlocker rules.
Explains WebBlocker's function in controlling web site access and improving productivity/security.
Setting global WebBlocker options like activation, passwords, and inactivity timeouts.
Instructions for downloading and installing the WatchGuard Quarantine Server and WebBlocker Server.
Creating and applying WebBlocker profiles to users or groups for customized content restrictions.
Steps to create a new WebBlocker profile by selecting categories of websites to block.
Using SurfControl's Test-a-Site tool to check how a website is categorized by WebBlocker.
Submitting URLs to SurfControl to add, delete, or change their website category assignments.
Overriding WebBlocker rules to allow access to specific necessary websites.
Steps to add IP addresses or domain names to the Allowed Sites list.
Steps to add IP addresses or domain names to the Denied Sites list.
Creating a list of internal hosts that bypass WebBlocker and user authentication settings.
Explains spamBlocker's use of pattern detection to block spam at the gateway.
Lists the necessary components and conditions required before installing spamBlocker.
Details Virus Outbreak Detection technology for identifying and preventing email virus outbreaks.
Configuring spamBlocker actions (Allow, Tag, Quarantine, Deny) based on message categories.
Setting up spamBlocker actions for POP3 and SMTP email, including Virus Outbreak Detection.
Configuring actions for POP3 email based on confirmed, bulk, or suspect categories.
Configuring actions for SMTP email based on confirmed, bulk, or suspect categories.
Creating exception lists based on sender addresses to customize spam filtering actions.
Steps to add sender or recipient exceptions to spamBlocker actions.
Reporting misclassified emails to Commtouch to improve spam detection accuracy.
Entering trusted email forwarder information to improve the accuracy of spam scoring.
Provides a quarantine mechanism for suspected spam or virus-infected email messages.
Instructions for downloading and installing the WatchGuard Quarantine Server and WebBlocker Server.
Steps to start the Quarantine Server, including installing components and running the setup wizard.
Options for configuring the Quarantine Server, including general parameters and notification settings.
Configuring general server parameters like database size, warning thresholds, and email server settings.
Setting message retention periods and managing user domains for email quarantine.
Adding or removing domain names that the Quarantine Server will accept email messages from.
Configuring email notifications to users about messages stored on the Quarantine Server.
Setting rules to automatically remove messages based on domain, sender, or subject line text.
Viewing statistics on Quarantine Server activity, such as message counts and types.
Explains how Gateway AV/IPS protects the network from viruses and intrusions using signatures.
Configuring Gateway AntiVirus settings for SMTP, POP3, HTTP, and FTP proxies.
Steps to enable and configure Gateway AntiVirus for SMTP, POP3, FTP, and HTTP traffic.
Details Intrusion Prevention Service settings and how it works with proxies to block attacks.
Enabling Intrusion Prevention Service for SMTP, POP3, FTP, HTTP, and Outgoing traffic.
Explains how VPNs create secure, encrypted connections between geographically separated offices.
Steps involved in creating a BOVPN tunnel, including understanding requirements and configuration.
Lists requirements for creating VPN tunnels, including device compatibility and ISP support.
Explains VPN failover functionality for maintaining VPN connections with multiple gateways.
Configuring VPN tunnels using WatchGuard Management Server for easier setup.
Creating VPN tunnels manually when not using the Managed VPN option.
Setting up VPN Keep Alive to maintain tunnel open status by sending periodic ping messages.
Monitoring VPN traffic and troubleshooting configuration using the VPN Statistics page.
Enabling PPTP access for individual firewall users to connect to the Edge.
Activating the PPTP server functionality on the Firebox X Edge.
Ensuring remote user computers are prepared for PPTP VPN connections.
Steps to configure and connect a PPTP VPN connection on a Windows Vista client.
Steps to configure and connect a PPTP VPN connection on a Windows XP client.
Enabling PPTP users to access the Internet through the tunnel, applying firewall policies.
Lists requirements and recommendations for installing and using the Mobile VPN with IPSec client.
Enabling Mobile VPN with IPSec for individual Firebox user accounts.
Enabling Mobile VPN with IPSec for groups, linking to authentication servers.
Explains the .wgx client configuration files containing shared keys, IP addresses, and settings.
Setting global Mobile VPN with IPSec client settings that apply to all connections.
Instructions for downloading the .wgx client configuration file for Firebox users.
Recommendations for distributing Mobile VPN client software and profiles securely to end-users.
Description of the Mobile VPN with IPSec client software and its functionality.
Steps to import the .wgx configuration file into the Mobile VPN client software.
Selecting the correct certificate and entering the PIN for certificate-based authentication.
Procedure for uninstalling the Mobile VPN client software from a computer.
Instructions for connecting and disconnecting the Mobile VPN client and monitoring its status.
Controlling the Mobile VPN client's behavior when the VPN tunnel goes down.
Configuring the desktop firewall, specifying network types like VPN, friendly, and unknown networks.
Defining specific known networks as 'friendly' to differentiate firewall rules.
Creating firewall rules to allow or deny traffic based on network types and applications.
Lists client requirements and decisions needed before setting up Mobile VPN with SSL tunnels.
Outlines the steps to configure the Firebox for Mobile VPN with SSL and add remote users.
Modifying advanced settings for Mobile VPN with SSL tunnels to meet specific security needs.
Lists operating systems and requirements for installing the Mobile VPN with SSL client software.
Enabling Mobile VPN with SSL access for individual Firebox user accounts.
Enabling Mobile VPN with SSL access for groups, linking to authentication servers.
Configuring the Firebox X Edge to enable Mobile VPN with SSL connections.
Instructions for downloading the Mobile VPN client software from the Firebox web browser.
Steps to install the Mobile VPN with SSL client software on Windows Vista and XP.
Steps to install the Mobile VPN with SSL client software on Mac OS X.
Connecting to the Firebox using the Mobile VPN with SSL client on Windows Vista/XP.
Connecting to the Firebox using the Mobile VPN with SSL client on Mac OS X.
Understanding the controls and status indicators for the Mobile VPN with SSL client.
Procedure for uninstalling the Mobile VPN with SSL client software.