EasyManua.ls Logo

Watchguard Firebox X15 User Manual

Watchguard Firebox X15
310 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
WatchGuard
Firebox X Edge e-Series
User Guide
Firebox X Edge e-Series version 10
All Firebox X Edge e-Series Standard and Wireless Models

Table of Contents

Other manuals for Watchguard Firebox X15

Question and Answer IconNeed help?

Do you have a question about the Watchguard Firebox X15 and is the answer not in the manual?

Watchguard Firebox X15 Specifications

General IconGeneral
Form FactorDesktop
Product SeriesFirebox X
Power SupplyExternal AC adapter
Weight2.5 lbs
Operating Temperature32° to 104°F (0° to 40°C)
Humidity10 - 90% (non-condensing)

Summary

Introduction to Network Security

About networks and network security

Defines networks and discusses the importance of network security against cyber threats.

About Internet Connections

Explains ISPs, bandwidth, and the differences between broadband and dial-up connections.

About protocols

Details network protocols like IP, TCP, and UDP, essential for network communication.

How Information Travels on the Internet

Illustrates how data is transmitted across the internet in packets, including addressing.

About IP addresses

Explains IP addresses, formats, private vs. public addresses, and the role of gateways.

About subnet masks

Explains subnet masks and their role in dividing networks into smaller portions.

About ports

Details network ports, their function as connection points for programs, and assigned numbers.

About Firewalls

Explains how firewalls protect networks by separating trusted and external networks.

Installation

Installation Prerequisites and Contents

Lists necessary components and initial steps before proceeding with the Firebox X Edge installation.

Identify your network settings

Guidance on finding essential TCP/IP properties and network addressing requirements.

Find PPPoE settings

Instructions for locating PPPoE connection details required for ISP setup.

Register and Activate LiveSecurity Service

Essential steps to register the Firebox and activate the LiveSecurity Service subscription.

Disable the HTTP proxy

Temporary disabling of browser HTTP proxy settings to ensure direct connection to the Firebox.

Disable pop-up blocking

Disabling browser pop-up blockers to allow necessary wizard windows during setup.

Connect the Firebox X Edge

Physical connection steps for setting up the Firebox X Edge on the network.

Set your computer to connect to the Edge

Configures your computer's network settings (DHCP or static IP) to connect to the Firebox.

Run the Quick Setup Wizard

The primary tool for initial Firebox X Edge configuration and setup.

Configuration Pages Overview

Connect to the Firebox X Edge

Instructions on how to access the Firebox X Edge's web management interface via its IP address.

Navigating the Firebox X Edge User Interface

Explains the navigation bar and how to access different configuration sections.

System Status page

Describes the System Status page, showing current settings and providing access to device configuration.

Network page

Displays the current configuration of trusted, optional, and external networks.

Firewall page

Details firewall settings, including policies, blocked sites, and proxy configurations.

Logging page

Provides access to event logs, log server status, and syslog logging configuration.

WebBlocker page

Manages WebBlocker settings, profiles, and lists of allowed or denied websites.

spamBlocker page

Configures spamBlocker settings, including actions for suspected spam.

Gateway AV/IPS page

Shows Gateway AntiVirus and Intrusion Prevention Service status and settings.

VPN page

Manages VPN gateways, tunnels, and related settings for secure remote connections.

Monitoring the Firebox X Edge

Explains how to monitor various components like ARP table and authentications.

Configuration and Management Basics

About basic configuration and management tasks

Introduces basic management tasks and custom configuration settings.

About the Edge backup configuration file

Explains how to back up and restore the Firebox X Edge configuration file.

Create a backup configuration file

Step-by-step instructions to save the current Firebox X Edge configuration to a local file.

Restore your configuration from a backup file

Procedure to restore the Firebox X Edge configuration from a previously saved backup file.

About factory default settings

Details the default network and configuration properties of the Firebox X Edge.

Restore the Firebox to the factory default settings

Instructions for resetting the Firebox X Edge to its original factory default configuration.

About feature keys

Explains feature keys and their role in enabling specific functionalities and upgrades.

Network Settings

About network interface setup

Explains the process of configuring network interface IP addresses for the Firebox.

Change the Firebox IP addresses with the Network Setup Wizard

Using the Network Setup Wizard to change IP addresses for external and trusted interfaces.

Configure external interfaces

Manually configuring external network interfaces, including DHCP, static IP, and PPPoE methods.

Change the MAC address of the external interface

Procedure to change the external interface MAC address to match ISP requirements.

About configuring the trusted network

Details on configuring the trusted network, including DHCP server and static IP options.

Enable DHCP server on the trusted network

Configuring the Firebox X Edge as a DHCP server for computers on the trusted network.

Set trusted network DHCP address reservations

Assigning static IP addresses to specific computers on the trusted network via MAC address.

Use static IP addresses for trusted computers

Using static IP addresses for trusted computers when the DHCP server is disabled.

Allow wireless connections to the trusted interface

Configuring the Edge as a wireless access point for the trusted network.

About restricting access to an interface by MAC address

Controlling access to network interfaces based on the hardware (MAC) address of devices.

Restrict access to the trusted interface by MAC address

Steps to restrict access to the trusted interface by allowing only specific MAC addresses.

About configuring the optional network

Configuring an isolated optional network for public servers or wireless access points.

Enable the optional network

Enabling and configuring the optional network interface on the Firebox X Edge.

Enable DHCP server on the optional network

Configuring the Firebox X Edge as a DHCP server for devices on the optional network.

Set optional network DHCP address reservations

Assigning static IP addresses to specific computers on the optional network via MAC address.

About static routes

Explains static routes and their use in directing network traffic to specific destinations.

About the Dynamic DNS service

Explains Dynamic DNS service for maintaining domain name resolution with changing IP addresses.

About using multiple external interfaces

Configuring multiple external interfaces for WAN failover or load balancing.

Configure a second external interface for a broadband connection

Steps to configure a second external interface for broadband connections, supporting multi-WAN.

Configure advanced WAN2 settings

Adjusting advanced settings for the second WAN interface (WAN2), including link speed and MAC address.

Configure WAN failover

Configuring WAN failover to automatically switch to a secondary external interface if the primary fails.

About virtual local area networks (VLANs)

Explains VLANs and their use for segmenting networks and controlling traffic patterns.

Add a VLAN tag to the External Interface

Tagging traffic sent to the external interface to identify it as part of a VLAN.

Wireless Setup

About wireless setup

Introduces wireless setup, adhering to 802.11b/g standards and security recommendations.

About wireless configuration settings

Configuring wireless settings like SSID, fragmentation threshold, and authentication.

Change the SSID

Setting a unique name (SSID) for the wireless network to identify the Firebox X Edge.

Enable/disable SSID broadcasts

Controlling whether the wireless network's SSID is broadcast for client discovery.

Log authentication events

Enabling the logging of wireless authentication events for security monitoring.

Change the fragmentation threshold

Adjusting the maximum frame size for wireless transmissions to optimize performance.

About wireless security settings

Details security standards like WEP, WPA, and WPA2 for protecting wireless networks.

Set the wireless authentication method

Choosing authentication methods (Open System, Shared Key, WPA, WPA2) for wireless security.

Set the encryption level

Selecting encryption levels and managing keys for secure wireless connections.

Allow wireless connections to the trusted interface

Enabling wireless clients to connect to the Edge as an access point for the trusted network.

Allow wireless connections to the optional interface

Enabling wireless clients to connect to the Edge as an access point for the optional network.

Enable a wireless guest network manually

Manually setting up a wireless guest network for limited access to the Internet.

Configure the wireless card on your computer

Instructions for configuring a wireless network card on a Windows XP computer for connection.

Firewall Policies

About policies

Explains the two categories of policies: packet filters and proxies, used for traffic filtering.

Policy rules

Details the actions (Allow, Deny, No Rule) that set firewall rules within a policy.

Editing common packet filter policies

Steps to edit default packet filter policies for incoming and outgoing traffic.

Set access control options (incoming)

Configuring rules to control incoming traffic, including IP addresses, host, and port redirection.

Set access control options (outgoing)

Configuring rules to control outgoing traffic, specifying source and destination IP addresses.

About custom policies

Creating custom policies for protocols not included by default or for specific filtering needs.

Filter incoming traffic for a custom policy

Restricting incoming traffic for a custom policy to specific computers behind the firewall.

Filter outgoing traffic for a custom policy

Restricting outgoing traffic for a custom policy to specific destinations and sources.

About policies for the optional network

Explains policies for the optional network, securing public servers and wireless access points.

Disable traffic filters between trusted and optional networks

Disabling traffic filters to allow all traffic flow between trusted and optional networks.

Proxy Settings

About proxy policies

Explains how proxies monitor and scan connections for secure communication and content.

About adding and configuring proxy policies

Steps for adding and configuring proxy policies to filter specific types of content.

About the HTTP proxy

Details the HTTP proxy's function in filtering web traffic and protecting against attacks.

HTTP proxy: Proxy Limits

Adjusting timeout and length limits for HTTP requests and responses to manage resources.

HTTP requests: General settings

Configuring general settings for HTTP requests, including idle connection timeout and URL length.

HTTP proxy: Deny message

Customizing the deny message displayed to users when HTTP proxy blocks content.

HTTP proxy exceptions

Defining exceptions to HTTP proxy rules to allow access to specific websites.

HTTP responses: Content types

Managing content types (MIME types) allowed or denied through the HTTP proxy.

About the FTP proxy

Explains the FTP proxy's function in monitoring and scanning FTP connections.

FTP proxy: Proxy limits

Setting limits for FTP proxy settings like username length, password length, and file name length.

About the POP3 proxy

Explains the POP3 proxy's function in moving and scanning email messages.

POP3 proxy: Proxy limits

Adjusting POP3 proxy settings like timeout and line length to prevent resource overuse.

POP3 proxy: Content types

Limiting content types and blocking patterns/URLs for email messages processed by POP3 proxy.

About the SMTP proxy

Explains the SMTP proxy's function in sending and scanning email messages.

SMTP proxy: Proxy limits

Setting SMTP proxy limits for timeout, email size, and line length to prevent attacks.

SMTP proxy: Deny message

Customizing the deny message for email messages blocked by the SMTP proxy.

Default Threat Protection

About intrusion prevention

Introduces threat protection features designed to block network traffic from risky systems.

About Blocked Sites

Explains features for blocking IP addresses that pose a security risk to the network.

Block a site permanently

Procedure to add IP addresses to the Blocked Sites list to prevent connections.

Block sites temporarily

Automatically blocking sites that send unhandled network traffic for a specified duration.

About blocked ports

Details ports that can be blocked to stop specified external network services and enhance security.

Block a port

Steps to block specific ports to prevent access to potentially vulnerable network services.

About denial-of-service attacks

Explains Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks and protection features.

Drop DoS flood attacks

Configuring limits on connection packets per second to mitigate DoS flood attacks.

Configure firewall options

Configuring global firewall rules to enhance network security, including logging options.

Traffic Management

About Traffic Management

Managing network traffic using QoS, Traffic Control, and NAT for data transmission control.

Causes for slow network traffic

Identifies common causes of slow network traffic, such as P2P services and bandwidth usage.

Traffic Categories

Defines traffic categories (interactive, high, medium, low) for prioritizing network traffic.

Traffic Marking

Applying marking to network traffic categories using IP Precedence or DSCP for QoS.

Enable Traffic Control

Steps to enable Traffic Control and create filters for prioritizing network traffic.

About Network Address Translation (NAT)

Explains Network Address Translation (NAT) and its purposes: IP address conservation and privacy.

Types of NAT

Describes the three types of NAT supported: Dynamic NAT, Static NAT, and 1-to-1 NAT.

1-to-1 NAT

Details 1-to-1 NAT for mapping public IP addresses to internal servers, often for public access.

Enable 1-to-1-NAT

Steps to enable 1-to-1 NAT by adding IP address pairs and configuring policies.

Logging

About logging and log files

Explains the importance of logs for monitoring network security and activity.

Log Servers

Configuring the Firebox to send log data to a syslog server or WatchGuard Log Server.

See the event log file

Instructions on how to view the event log file, which contains records of recent Firebox activity.

About logging to a WatchGuard Log Server

Configuring the Firebox to send event logs to a WatchGuard Log Server for centralized logging.

Send your event logs to the Log Server

Steps to configure the Edge to send log messages to a specified WatchGuard Log Server.

Send logs to a Syslog host

Configuring the Firebox to send log messages to a syslog host for real-time log analysis.

Certificates

About certificates

Explains certificates and their use in securing sessions and VPN authentication.

About certificates and the Firebox X Edge

Details the types and limits of certificates that can be imported and used with the Firebox X Edge.

Use OpenSSL to generate a CSR

Instructions for generating a Certificate Signing Request (CSR) using OpenSSL on Linux/Windows.

Import a certificate

Steps to import certificates into the Firebox X Edge for authentication and security.

Use a local certificate

Applying an imported local certificate for system security and authentication purposes.

User and Group Management

About user licenses

Explains user licenses, session limits, and how to manage available user licenses.

About user authentication

Explains user authentication, associating usernames with IP addresses for monitoring and control.

Set authentication options for all users

Configuring global settings for user authentication, including required authentication and session termination.

Configure an individual user account

Steps to create and configure individual user accounts with specific access levels and permissions.

About LDAP/Active Directory authentication

Configuring the Firebox to use LDAP or Active Directory for centralized user authentication.

Configure the LDAP/Active Directory authentication service

Steps to configure LDAP or Active Directory authentication for user access.

Use the LDAP authentication test feature

Testing the LDAP connection and authentication requests to ensure proper integration.

Configure groups for LDAP authentication

Setting account privileges for users based on their group membership in LDAP.

About Single Sign-On (SSO)

Enabling Single Sign-On (SSO) for automatic user authentication via Active Directory.

Enable Single Sign-On

Steps to enable Single Sign-On (SSO) and configure the SSO agent IP address.

Install the WatchGuard Single Sign-On (SSO) agent

Instructions for downloading and installing the WatchGuard SSO agent software.

See active sessions and users

Viewing information about users who are currently online and their session status.

Stop a session

Procedures to manually stop active user sessions on the Firebox.

Local User account

Information on configured local user accounts, including name, admin level, and options.

Edit a user account

Steps to edit existing user accounts, changing details like name, password, and access levels.

Allow internal devices to bypass user authentication

Creating a list of internal hosts that bypass user authentication and WebBlocker rules.

WebBlocker

About WebBlocker

Explains WebBlocker's function in controlling web site access and improving productivity/security.

Configure global WebBlocker settings

Setting global WebBlocker options like activation, passwords, and inactivity timeouts.

Install the Quarantine Server and WebBlocker Server

Instructions for downloading and installing the WatchGuard Quarantine Server and WebBlocker Server.

About WebBlocker profiles

Creating and applying WebBlocker profiles to users or groups for customized content restrictions.

Create a WebBlocker profile

Steps to create a new WebBlocker profile by selecting categories of websites to block.

See whether a site is categorized

Using SurfControl's Test-a-Site tool to check how a website is categorized by WebBlocker.

Add, remove, or change a category

Submitting URLs to SurfControl to add, delete, or change their website category assignments.

About allowing sites to bypass WebBlocker

Overriding WebBlocker rules to allow access to specific necessary websites.

Add an allowed site

Steps to add IP addresses or domain names to the Allowed Sites list.

Add a denied site

Steps to add IP addresses or domain names to the Denied Sites list.

Allow internal hosts to bypass WebBlocker

Creating a list of internal hosts that bypass WebBlocker and user authentication settings.

spamBlocker

About spamBlocker

Explains spamBlocker's use of pattern detection to block spam at the gateway.

spamBlocker requirements

Lists the necessary components and conditions required before installing spamBlocker.

About Virus Outbreak Detection (VOD)

Details Virus Outbreak Detection technology for identifying and preventing email virus outbreaks.

spamBlocker actions, tags, and categories

Configuring spamBlocker actions (Allow, Tag, Quarantine, Deny) based on message categories.

Configure spamBlocker

Setting up spamBlocker actions for POP3 and SMTP email, including Virus Outbreak Detection.

Set POP3 email actions

Configuring actions for POP3 email based on confirmed, bulk, or suspect categories.

Set SMTP email actions

Configuring actions for SMTP email based on confirmed, bulk, or suspect categories.

About spamBlocker exceptions

Creating exception lists based on sender addresses to customize spam filtering actions.

Create exceptions

Steps to add sender or recipient exceptions to spamBlocker actions.

Report false positives and false negatives

Reporting misclassified emails to Commtouch to improve spam detection accuracy.

Add trusted email forwarders to improve spam score accuracy

Entering trusted email forwarder information to improve the accuracy of spam scoring.

Quarantine Server

About the Quarantine Server

Provides a quarantine mechanism for suspected spam or virus-infected email messages.

Install the Quarantine Server and WebBlocker Server

Instructions for downloading and installing the WatchGuard Quarantine Server and WebBlocker Server.

Start the Quarantine Server

Steps to start the Quarantine Server, including installing components and running the setup wizard.

Configure the Quarantine Server

Options for configuring the Quarantine Server, including general parameters and notification settings.

Set general server parameters

Configuring general server parameters like database size, warning thresholds, and email server settings.

Change expiration settings and user domains

Setting message retention periods and managing user domains for email quarantine.

Add or remove user domains

Adding or removing domain names that the Quarantine Server will accept email messages from.

Change notification settings

Configuring email notifications to users about messages stored on the Quarantine Server.

Change Quarantine Server rules

Setting rules to automatically remove messages based on domain, sender, or subject line text.

Get statistics on Quarantine Server activity

Viewing statistics on Quarantine Server activity, such as message counts and types.

Gateway AntiVirus and Intrusion Prevention Service

About Gateway AntiVirus and Intrusion Prevention

Explains how Gateway AV/IPS protects the network from viruses and intrusions using signatures.

About Gateway AntiVirus settings

Configuring Gateway AntiVirus settings for SMTP, POP3, HTTP, and FTP proxies.

Configure Gateway AV

Steps to enable and configure Gateway AntiVirus for SMTP, POP3, FTP, and HTTP traffic.

About the Intrusion Prevention Service settings

Details Intrusion Prevention Service settings and how it works with proxies to block attacks.

Configure the Intrusion Prevention Service

Enabling Intrusion Prevention Service for SMTP, POP3, FTP, HTTP, and Outgoing traffic.

Branch Office Virtual Private Networks

About Branch Office Virtual Private Networks (BOVPNs)

Explains how VPNs create secure, encrypted connections between geographically separated offices.

Process required to create a tunnel

Steps involved in creating a BOVPN tunnel, including understanding requirements and configuration.

What you need to create a VPN

Lists requirements for creating VPN tunnels, including device compatibility and ISP support.

About VPN Failover

Explains VPN failover functionality for maintaining VPN connections with multiple gateways.

About managed VPNs

Configuring VPN tunnels using WatchGuard Management Server for easier setup.

Set up manual VPN tunnels

Creating VPN tunnels manually when not using the Managed VPN option.

Configure VPN Keep Alive

Setting up VPN Keep Alive to maintain tunnel open status by sending periodic ping messages.

See VPN statistics

Monitoring VPN traffic and troubleshooting configuration using the VPN Statistics page.

Mobile VPN with PPTP

Enable PPTP access for firewall users

Enabling PPTP access for individual firewall users to connect to the Edge.

Enable PPTP on the Edge

Activating the PPTP server functionality on the Firebox X Edge.

Prepare the client computers

Ensuring remote user computers are prepared for PPTP VPN connections.

Create and connect a PPTP VPN from a Windows Vista client

Steps to configure and connect a PPTP VPN connection on a Windows Vista client.

Create and connect a PPTP VPN from a Windows XP client

Steps to configure and connect a PPTP VPN connection on a Windows XP client.

Use PPTP and Access the Internet

Enabling PPTP users to access the Internet through the tunnel, applying firewall policies.

Mobile VPN with IPSec

Client requirements

Lists requirements and recommendations for installing and using the Mobile VPN with IPSec client.

Enable Mobile VPN for a Firebox user account

Enabling Mobile VPN with IPSec for individual Firebox user accounts.

Enable Mobile VPN for a group

Enabling Mobile VPN with IPSec for groups, linking to authentication servers.

About Mobile VPN Client configuration files

Explains the .wgx client configuration files containing shared keys, IP addresses, and settings.

Configure global Mobile VPN with IPSec client settings

Setting global Mobile VPN with IPSec client settings that apply to all connections.

Get the user’s .wgx file

Instructions for downloading the .wgx client configuration file for Firebox users.

Distribute the software and profiles

Recommendations for distributing Mobile VPN client software and profiles securely to end-users.

About the Mobile VPN with IPSec client

Description of the Mobile VPN with IPSec client software and its functionality.

Import the end-user profile

Steps to import the .wgx configuration file into the Mobile VPN client software.

Select a certificate and enter the PIN

Selecting the correct certificate and entering the PIN for certificate-based authentication.

Uninstall the Mobile VPN client

Procedure for uninstalling the Mobile VPN client software from a computer.

Connect and disconnect the Mobile VPN client

Instructions for connecting and disconnecting the Mobile VPN client and monitoring its status.

Control connection behavior

Controlling the Mobile VPN client's behavior when the VPN tunnel goes down.

About the desktop firewall

Configuring the desktop firewall, specifying network types like VPN, friendly, and unknown networks.

Define friendly networks

Defining specific known networks as 'friendly' to differentiate firewall rules.

Create firewall rules

Creating firewall rules to allow or deny traffic based on network types and applications.

Mobile VPN with SSL

Before You Begin

Lists client requirements and decisions needed before setting up Mobile VPN with SSL tunnels.

Steps required to set up your tunnels

Outlines the steps to configure the Firebox for Mobile VPN with SSL and add remote users.

Options for Mobile VPN with SSL tunnels

Modifying advanced settings for Mobile VPN with SSL tunnels to meet specific security needs.

Client requirements

Lists operating systems and requirements for installing the Mobile VPN with SSL client software.

Enable Mobile VPN with SSL for a Firebox user

Enabling Mobile VPN with SSL access for individual Firebox user accounts.

Enable Mobile VPN with SSL for a group

Enabling Mobile VPN with SSL access for groups, linking to authentication servers.

Enable the Edge to use Mobile VPN with SSL

Configuring the Firebox X Edge to enable Mobile VPN with SSL connections.

Download the client software

Instructions for downloading the Mobile VPN client software from the Firebox web browser.

Install the Mobile VPN with SSL client software (Windows Vista and Windows XP)

Steps to install the Mobile VPN with SSL client software on Windows Vista and XP.

Install the Mobile VPN with SSL client software (Mac OS X)

Steps to install the Mobile VPN with SSL client software on Mac OS X.

Connect to the Firebox with the Mobile VPN with SSL client (Windows Vista and Windows XP)

Connecting to the Firebox using the Mobile VPN with SSL client on Windows Vista/XP.

Connect to the Firebox with the Mobile VPN with SSL client (Mac OS X)

Connecting to the Firebox using the Mobile VPN with SSL client on Mac OS X.

Mobile VPN with SSL client controls

Understanding the controls and status indicators for the Mobile VPN with SSL client.

Uninstall the Mobile VPN with SSL client

Procedure for uninstalling the Mobile VPN with SSL client software.

Related product manuals