w9id83999a22-Network Security Local Study Guide en-US
w9id83999a22-Network Security Local Study Guide en-US
Use this guide in conjunction with instructor-led training, online video training and demos, and the WatchGuard Help
Center documentation to prepare to take the exam.
For a list of recommended resources to help you prepare for the exam, see Additional Resources.
For an introduction to important networking and security concepts, we recommend that you watch the Network and
Security Basics videos available in the Network Security Essentials for Locally-Managed Fireboxes course in the
WatchGuard Learning Center.
For information about the exam content and format, see About the Network Security Essentials for Locally-Managed
Fireboxes Exam.
WatchGuard provides training and online courseware to help you prepare for the Network
Security Essentials exam. In addition to this study guide, the training, and courseware, we
strongly recommend that you install, deploy, and manage one or more Firebox devices that run
Fireware v12.11.2 or higher before you begin the exam.
Document Conventions
This document uses these formatting conventions to highlight specific types of information:
This is a best practice. It describes the recommended configuration for a Firebox feature.
USE CASE:
This is a use case. It describes how you could configure the Firebox in a real-world scenario.
This is a caution. Read carefully. There is a risk that you could lose data, compromise system
integrity, or impact device performance if you do not follow instructions or recommendations.
Introduction
The content in this Study Guide supports the Network Security Essentials for Locally-Managed Fireboxes technical
certification exam.
You can also configure Fireboxes for cloud management with WatchGuard Cloud. You can prepare for and earn your
Network Security Essentials technical certification by choosing one of two exams:
n Network Security Essentials for Locally-Managed Fireboxes
n Network Security Essentials for Cloud-Managed Fireboxes
You must only pass one exam to earn your Network Security Essentials technical certification. Technical training self-
study content and virtual instructor-led trainings are available for each exam. Make sure you select the correct study
content for the exam you want to take.
WatchGuard provides training and online courseware to help you prepare for the Network
Security Essentials for Locally-Managed Fireboxes exam. In addition to this study guide, the
training, and courseware, we strongly recommend that you install, deploy, and manage one or
more Firebox devices that run Fireware v12.10.1 or higher before you begin the exam.
This guide describes how to use the setup wizards to configure a Firebox as a locally-managed device with basic
network settings and recommended policies.
You can also add your Firebox to WatchGuard Cloud as a cloud-managed device to manage
and monitor the device from WatchGuard Cloud. If you configure your Firebox as a cloud-
managed device, you cannot use the local device management tools. Configuration of cloud-
managed devices is outside the scope of this guide.
You can also use WSM to connect to a WatchGuard Management Server for centralized
management of Fireboxes. WatchGuard Management Server is outside the scope of this guide.
You install WatchGuard System Manager on a Windows management computer. To download the latest version of
WatchGuard System Manager, go to software.watchguard.com.
Fireware Web UI
Fireware Web UI is a browser-based management tool on the Firebox. You can connect to Fireware Web UI from the
web browser on any device on your local network.
Configuration changes you make in Fireware Web UI take effect immediately. Unlike WSM, you do not save changes
in a locally-stored configuration file and save them to the Firebox all at once. In Fireware Web UI you save each
change to the Firebox as you work.
When you save a configuration change to the Firebox from Fireware Web UI, the updated configuration file is not
saved automatically to a local file.
If you use Fireware Web UI to modify the configuration, we recommend that you manually
save a copy of the configuration to a file before and after you make significant changes.
Fireware Web UI can import existing XML configuration files that were saved from Web UI or
saved from Policy Manager with the Save As Version option.
WatchGuard Cloud
In WatchGuard Cloud, you can add a Firebox as a locally-managed device. You manage the device configuration in
WSM, Fireware Web UI, or the Command Line Interface. You can monitor live status, and view log messages and
reports for locally-managed devices you add to WatchGuard Cloud.
WatchGuard Cloud supports this functionality for locally-managed devices:
n Initiate system actions (RapidDeploy, upgrade firmware, backup images, and reboot)
n Monitor live status (network status, routes, VPNs, users)
n View log messages and reports
ThreatSync is a WatchGuard Cloud service that provides eXtended Detection and Response
(XDR) technology for WatchGuard products. ThreatSync uses data from multiple security
products to detect and score malicious scenarios and present them as incidents in WatchGuard
Cloud. The ThreatSync user interface is designed primarily for Incident Responders, and
enables them to respond to incidents on-demand and configure automated responses to
malicious detections and abnormal behaviors.
Key Concepts
To best use this study guide, you should understand these basic concepts of network security.
IPv4
An IPv4 address consists of four octets (8-bit binary number sequences) expressed in decimal format and
separated by periods. Each number between the periods must be within the range of 0 and 255. Some
examples of IPv4 addresses are:
n 203.0.113.99
n 4.2.2.2
n 10.0.4.1
IPv6
An IPv6 address contains eight hextets (16-bit hexadecimal values, separated by colons). The hexadecimal
digits are not case-sensitive. Some examples of IPv6 addresses are:
n FE80:0000:0000:0000:0200:F8FF:FE21:67CF
n 2001:0DB8:0000:0000:5D11:D837:FC76:12FC
n fe80:0000:0000:0000:2045:FaeB:33AF:8374
The first four groups of 16-bit hexadecimal values represent the network. The last four groups of 16-bit
hexadecimal values are the interface ID that uniquely identifies each networked device. This value is usually
derived from the MAC address of the device.
Subnetting
For better security and performance, networks are often divided into smaller portions called subnets. All devices in a
subnet have similar IP addresses. For example, all devices that have IP addresses whose first three octets are 10.0.1
belong to the same /24 subnet.
The subnet mask for a network IP address, or netmask, is a series of bits that mask sections of the IP address that
identify which parts of the IP address are for the network and which parts are for the host. A subnet mask can be
written in the same way as an IP address, for example, 255.255.255.0.
When you configure an interface IP address for a Firebox or other network device, the device listens for connections
to that specific IP address. The subnet mask defines the local network connected to that interface, but the Firebox
listens for connections only to the configured interface IP address.
Routing
A route is the sequence of devices through which network traffic is sent. Each device in this sequence, usually called
a router, stores information about the networks it is connected to inside a route table. This information is used to
forward the network traffic to the next router in the route.
Routing processes direct traffic based on routing tables, which are typically seen in routers, firewalls, or intelligent
switches.
The Firebox automatically creates entries in the routing table for each subnet/network
configured on the interfaces. Traffic that the Firebox does not have a route for is dropped as IP
spoofing.
The primary purposes of NAT are to increase the number of computers that can operate off a single publicly routable
IP address, and to hide the private IP addresses of hosts on your LAN. When you use NAT, the source IP address is
changed on all the packets you send.
1-to-1 NAT
1-to-1 NAT creates a mapping between IP addresses on one network and IP addresses on a different network.
1:1 NAT is recommended only when you have many public IP addresses available, or your servers need to
initialize connections with the same public IP address on which they receive traffic.
VLANs
A virtual local area network (VLAN) is a collection of computers on a LAN or LANs that are grouped together in a
single broadcast domain independent of their physical location.
n Improved manageability and simplified network tuning — When you consolidate common resources into a
VLAN, you reduce the number of routing hops necessary for those devices to communicate. You can also
manage traffic from each functional group more easily when each group uses a different VLAN.
n Increased security options — By default, members of one VLAN cannot see the traffic from another VLAN.
You can apply separate security policies to VLANs. By contrast, a secondary network on a Firebox interface
gives no additional security because there is no separation of traffic. The Firebox does not filter traffic between
the primary network of an interface and a secondary network on that interface. It automatically routes traffic
between primary and secondary networks on the same physical interface with no access restrictions.
TCP vs UDP
The two primary protocols at the transport layer are Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP).
TCP
TCP is a connection-oriented protocol and is the most widely chosen option for transmitting data because it
can reliably send and receive data and provides extensive error checking mechanisms. Because of this, TCP
is slower than UDP. TCP is useful for web, mail, and FTP server activities.
UDP
UDP is a datagram-oriented protocol, which does not open, maintain and terminate connections. This type of
protocol is useful for voice/video calls, gaming, and streaming.
Important Protocols
Different applications and services require ports to communicate. Available ports range from 0 to 65535 and are
divided into three types.
Well-known
Well-known port numbers (0–1023), also known as standard or default ports, are permanently assigned to a
service or an application for consistency and easier troubleshooting.
Registered
Registered port numbers (1024–49151) can be registered by companies for their applications but can be used
more than once.
Dynamically Assigned
Dynamically assigned port numbers (49152-65535), also called ephemeral ports, are freely or dynamically
assigned, and are typically used as source ports for client connections.
n DNS (Domain Name System) — TCP/UDP (53), translates human-readable domain names into routable IP
addresses for locating services and devices
n HTTP (Hyper Text Transport Protol) — TCP (80), used to load data from websites on the World Wide Web
into a browser with commands like “GET” or “POST”
n HTTPS (Hyper Text Transport Protol Secure) — TCP (443), used to load data from websites on the World
Wide Web into a browser with commands like “GET” or “POST”, but is encrypted through SSL/TLS (Secure
Socket Layer/Transport Layer Security)
n FTP (File Transfer Protol) — TCP (20/21), used to transfer data between clients and servers
n SSH (Secure Shell) — TCP (22), command line access to server and network equipment; provides secure
channel for communication
n Telnet — TCP (23), command line access to server and network equipment, unencrypted
n POP3 (Post Office Protocol) — TCP (110), email clients connect to a server to receive and store emails
locally on the device
n IMAP (Internet Message Access Protocol) — TCP (143), email clients connect to a server to retrieve emails,
but emails remain on the server so that multiple clients can access them simultaneously
n SMTP (Simple Mail Transfer Protocol) — TCP (25), used by email clients and email servers to send emails
n NTP (Network Time Protocol) — TCP/UDP (123), used to synchronize clocks on computers
n SNMP (Simple Network Management Protocol) — UDP (161), sed to share information between devices,
often through a central system that identifies and monitors devices to keep track of status changes
Encryption
Encryption protects sensitive data; it takes plain text data (such as an email or document) and uses a secret key to
encrypt it into an unreadable format, called cipher text. To decrypt the data, a key is required. Encryption keys are
created by algorithms that use a series of numbers. There are two types of cryptographic systems: symmetric and
asymmetric. Encryption methods are typically combined to provide optimal security and performance.
Symmetric
Symmetric uses the same key for encryption and decryption. Symmetric is more efficient but less secure than
asymmetric.
Asymmetric
Asymmetric uses two different keys for encryption and decryption. A private key is used to decrypt the data,
and a public key is used to encrypt the data. Both keys are mathematical in nature. Processing asymmetric is
more demanding, and is primarily used to exchange a symmetric key.
Certificates
Certificates match the identity of a person or organization with a method for others to verify that identity and secure
communications. They use an encryption method called a key pair, or two mathematically related numbers called the
private key and the public key. A certificate includes both a statement of identity and a public key, and is signed by a
private key.
The private key used to sign a certificate can be from the same key pair used to generate the certificate, or from a
different key pair. If the private key is from the same key pair used to create the certificate, the result is called a self-
signed certificate. If the private key is from a different key pair, the result is a regular certificate. Certificates with
private keys that can be used to sign other certificates are called CA (Certificate Authority) Certificates. A certificate
authority is an organization or application that signs and revokes certificates.
If your organization has a PKI (public key infrastructure) set up, you can sign certificates as a CA yourself. Most
applications and devices automatically accept certificates from prominent, trusted CAs. Certificates that are not
signed by prominent CAs, such as self-signed certificates, are not automatically accepted by many servers or
programs, and do not operate correctly with some Firebox features.
Several certificates can be used together to create a chain of trust, which allows clients to trust anything signed by a
trusted CA.
n Mobile VPN with SSL — Mobile VPN with SSL provides good security and performance, and uses a
default port (TCP 443) that is usually open on most networks. Mobile VPN with SSL uses Transport Layer
Security (TLS) to secure the connection. Windows and macOS users can download a client from
software.watchguard.com. Android and iOS users can download an OpenVPN client from an app store.
To authenticate users, you can configure local authentication on the Firebox (Firebox-DB), Active
Directory, RADIUS, AuthPoint, and SAML. Your Firebox can support Mobile VPN with IKEv2 and Mobile
VPN with SSL simultaneously.
We recommend Mobile VPN with SSL when remote networks do not allow IKEv2 IPSec traffic.
n Mobile VPN with L2TP — Mobile Virtual Private Networking (Mobile VPN) with L2TP (Layer 2 Tunneling
Protocol) creates a secure connection between a remote computer and the network resources behind the
Firebox. By default, Mobile VPN with L2TP uses IPSec to provide strong encryption and authentication.
Mobile VPN with L2TP supports connections from most L2TPv2 VPN clients that comply with the L2TP
RFC 2661 standard. Mobile VPN with L2TP supports local authentication on the Firebox (Firebox-DB)
and RADIUS authentication servers.
n Mobile VPN with IPSec — Mobile VPN with IPSec accepts connections from IPSec VPN client software
installed on a remote computer or device. The VPN client makes a secure connection from the remote
computer to your protected network through an unsecured network, such as the Internet. The Mobile VPN
client uses Internet Protocol Security (IPSec) to secure the connection. You can enable Mobile VPN with
IPSec for a group of users you have already created, or you can create a new user group. The users in
the group can authenticate either to the Firebox or to a third-party authentication server included in your
Firebox configuration.
For a list of additional resources on these topics, go to Firebox Setup and Management Additional Resources.
WatchGuard provides training and online courseware to help you prepare for the Network
Security Essentials exam. In addition to this study guide, the training, and courseware, we
strongly recommend that you install, deploy, and manage one or more Firebox devices that run
Fireware v12.11.2 or higher before you begin the exam.
The Firebox must have a feature key for the setup wizards to configure all features and licensed
services. The Firebox can automatically download the feature key, or you can manually add it
when you run the setup wizards.
Firebox Activation
Before you set up a new Firebox, you must activate it on the WatchGuard website. To activate your Firebox, go to
watchguard.com/activate.
After you activate your Firebox, copy and paste the feature key to a local file.
Factory-Default Settings
A new Firebox ships with factory-default settings. You can also reset a Firebox to factory-default settings if
necessary.
Wireless — Firebox n In Fireware v12.5.3 and higher, wireless is enabled with these default Wi-Fi
wireless models only settings:
n SSID: Firebox model plus last part of the wireless MAC address.
n Password: Firebox serial number with the dash included.
n Wireless interface (Ath1) and Trusted interface (Eth1) are members of a
bridge that uses these default settings:
n Trusted interface
n IP address: 10.0.1.1/24
n Enabled as a DHCP server
n The Firebox assigns IP addresses on the 10.0.1.0/24 subnet to
connected computers (if the connected computer is configured as a
DHCP client)
With factory-default settings, the Firebox allows management connections on any trusted or optional interface.
Because Interface 1 (Eth1) is enabled as a DHCP server by default, we recommend you connect your management
computer to interface 1 to run the setup wizards. The Firebox also allows one outbound connection from the trusted
network to any external network.
For a wireless Firebox that runs Fireware v12.5.3 or higher, you can also connect through Wi-Fi to run the setup
wizard. See the sticker attached to the Firebox for the default Wi-Fi network SSID and password.
Setup Wizards
There are two setup wizards you can use to set up your Firebox.
To start the Web Setup Wizard, in a web browser, type https://10.0.1.1:8080. If the external interface is
connected to a network with Internet access, the Web Setup Wizard can activate the Firebox and download
the required feature key.
The Quick Setup Wizard does not help you with device activation, but does provide some additional network
configuration options that are not available in the Web Setup Wizard, such as optional interface configuration.
With the Quick Setup Wizard, if you configure the external interface with a static IP address, you
can select the option to use the same IP address for the trusted interface. This configures the
Firebox in Drop-In mode.
Before you run either setup wizard, connect your management computer to Eth1. Connect Eth0 to a network with
Internet access. By default, the external interface uses DHCP to request an IP address so the Firebox can connect to
the Internet.
To create a new configuration for a locally-managed Firebox, connect to the Firebox with one of the setup wizards,
and select the configuration method Locally-Managed. This is also called "Create New Configuration" in previous
versions of Fireware.
In both setup wizards, you configure basic network settings for Eth0 and Eth1, and set passphrases for the
administrative user accounts. The wizards configure policies and services with recommended settings to allow only
outgoing connections.
In Fireware v12.5.3 and higher, the setup wizards include options to configure wireless settings. The setup wizard
configure the wireless interface as a member of a trusted network bridge, which also contains interface 1. The bridge
uses the trusted network settings you configure in the setup wizard.
Default Policies
n FTP-proxy
n HTTP-proxy
n HTTPS-proxy
n WatchGuard Certificate Portal
n WatchGuard Web UI
n Ping
n DNS
n WatchGuard
n Outgoing
The terms incoming and outgoing refer to whether a network connection is leaving or entering
the network protected by your firewall. Outgoing connections come from a protected network
and send traffic to an external network. Incoming connections come from an external network
and connect to a location in an internal (protected) network.
The default policies allow outgoing FTP, Ping, TCP and UDP connections, and do not allow incoming connections.
The default FTP, HTTP, and HTTPS proxy actions enable services and enable logging for reports.
Configuration files and backup images have different content and uses.
n A configuration file contains device configuration settings, and can be used to restore an
Configuration Files
Firebox configuration settings are stored in a configuration file. When you edit the Firebox configuration with Policy
Manager, you also save the Firebox configuration to a local file.
A device configuration file includes all configuration data, options, IP addresses, and other
information for the Firebox. On the Firebox, the configuration file works with Fireware OS to
control the flow of traffic through the Firebox. The file extension for a device configuration file is
.xml.
In Fireware Web UI, each time you make a configuration change, the change is saved to the
Firebox immediately. From the Web UI you can also download the configuration to a
compressed configuration file (.gz). You can restore a previously downloaded configuration file.
In WatchGuard System Manager, you can create and save configuration files. You can restore
or copy a Firebox configuration file to multiple devices.
Before you make major changes to your Firebox configuration, we recommend that you save
a copy of your configuration file. If you have problems with your new configuration, you can
open the saved copy of the old configuration in Policy Manager and save it back to the
Firebox.
Configuration files do not include these elements that are unique to a specific device:
n Feature keys
n Users and passwords
n Certificates
n Firmware
You can copy or move a configuration file you create on one Firebox to another Firebox. You can even save the
configuration file to a different Firebox model. This is useful if you manage multiple devices and want to use the same
configuration.
If you migrate a configuration file from one Firebox to a different model with fewer interfaces,
make sure to review the network interface settings. If you save a configuration file to a model
with fewer interfaces than the original Firebox, the configuration settings for the additional
interfaces are removed.
In Policy Manager, you can select File > Save > As Version to save a configuration file for a specific Fireware
version. This is useful when you want to save a configuration file to a Firebox that runs a different version of Fireware
or use RapidDeploy (not covered in this guide).
To save a configuration file that you can restore through Fireware Web UI, you must use File
> Save > As Version when you save the file from Policy Manager.
Policy Manager
Policy Manager is the tool for offline configuration management. In Policy Manager:
n You can open the configuration file currently in use on the Firebox, or a configuration file saved on your
computer or network
n You can create a new configuration file
n Configuration changes you make in Policy Manager have no effect on Firebox operation until you save the
configuration to the Firebox
Each time you save configuration changes to the Firebox, Policy Manager saves a copy of the configuration to a local
file. By default, the file name is the same each time you save the configuration. You can change the file name so you
do not overwrite any previously saved configuration file. To configure Policy Manager to automatically save an
additional copy of the configuration file with a time stamp, select File > Save > Always create a backup.
Fireware Web UI
Fireware Web UI is a tool for web-based configuration of the Firebox. In Fireware Web UI:
n You connect directly to the Firebox to make configuration changes
n Configuration changes take effect on the Firebox immediately when you save each change
n A copy of the configuration file is not automatically saved to the management computer
To download the configuration file to a local file or restore a saved configuration, select System > Configuration File
> Download the Configuration File.
Backup Images
A backup image is a file that contains your Firebox configuration file, device feature key, users,
certificates, and more. You can use a backup image to restore the Firebox to a previous state.
Backup images are saved in .fxi file format and are stored on the Firebox. You can also export a
backup image to your management computer for improved disaster recovery.
We recommend that you save a backup image of your Firebox before you upgrade the
firmware. Keep a record of the Firebox management IP address and the credentials for
management user accounts in the saved backup image. If you restore the backup image, you
will need this information to connect to the Firebox.
A backup image can only be restored to the device it was created from. You cannot use a
backup image to move configuration and settings from one device to another.
Because available storage is limited, backup images stored on the Firebox do not include the Fireware OS. You can
always download different Fireware OS versions from software.watchguard.com. Backup images remain on the
Firebox until they are deleted manually or the Firebox is reset to factory-default settings.
We recommend that you export a backup image before you reset your Firebox to factory-
default settings.
When you export a backup image, you can choose to include the Fireware OS. In some cases, this can make
restoration easier.
If you reset your Firebox to factory-default settings, all backup images are deleted from the
Firebox. If you want to reset the Firebox but do not want to delete the backup images, use the
CLI command restore factory-default without the all parameter.
Do not try to restore a backup image created from a different Firebox. Each backup image is
unique to the device that created it. The backup image includes the certificates and private
keys for that device.
Because configuration settings vary by Fireware version, each backup image is compatible only with the version of
Fireware OS it was saved from. You can restore any backup image that was saved with the same version of Fireware
OS as the current OS version installed on the Firebox.
n To restore a backup image saved from a higher Fireware OS version, you must upgrade the OS on the
Firebox before you restore the backup image.
n To restore a backup image that was saved from a lower Fireware OS version, you must downgrade the
Firebox and select the backup image as part of the Fireware OS downgrade process.
n If your Firebox has been reset to factory-default settings, you can use the Web Setup Wizard or connect
directly to the Firebox with WatchGuard System Manager to restore an exported backup image.
n In WatchGuard Cloud (locally-managed Firebox), restore is only available for backup image files created with
Fireware v12.5.2 or higher. Backup images created with Fireware v12.5.1 or lower might be visible in
WatchGuard Cloud, but you cannot restore them.
n In WatchGuard Cloud (locally-managed Firebox), if the Fireware OS version of the backup file is different from
the version installed on the Firebox, WatchGuard Cloud automatically upgrades or downgrades the OS on the
Firebox to the same version in the backup image.
Role-based Administration
You can use role-based administration to share configuration and monitoring responsibilities for
your Firebox between several people in your organization. Create separate user accounts for
each administrative user so that you can run audit reports to monitor who makes changes to
your device configuration.
The user role of an administrative user account determines whether the user can save changes to the device
configuration. By default, your Firebox includes these default user accounts and roles:
In Fireware v12.10 or higher, the wg-support user account is no longer a default account. You
can add and edit an account named wg-support.
We recommend you add separate accounts for each user who can log into the Firebox.
Assign each user a role that determines their level of access.
Administrative Roles
Log in as a Device Administrator to manage users and roles in Firebox System Manager or Fireware Web UI.
n In Firebox System Manager — Tools > Manage Users and Roles
n In Fireware Web UI — System > Users and Roles
Role Permissions
Device Administrator (read-write permissions) Can see the configuration and save changes
Device Monitor (read-only permissions) Can see the configuration but not save changes
More than one Device Monitor can connect to the Firebox at the same time. But, if you want to
allow more than one Device Administrator to log in to the Firebox at the same time, you must
enable an option in the Global Settings. For more information about Global Settings, see Global
Settings and NTP.
Authentication Servers
By default, administrative users are stored in the Firebox-DB authentication server. You can also specify users on an
external third-party authentication server, such as Active Directory.
For external authentication servers (not Firebox-DB), make sure to add the user account to the authentication server
before you add the user account to your Firebox.
Feature Keys
A new Firebox ships in a factory-default state with no feature key installed. You must activate the Firebox to get the
feature key that enables licensed features and services.
A feature key enables a set of licensed features on your Firebox. When you get a new device, you activate the device
on the WatchGuard website to create a feature key and then install the feature key on your device to enable all the
device functions. You can add the feature key to your Firebox from the Quick Setup Wizard, Web Setup Wizard,
Policy Manager, or the Fireware Web UI. The setup wizards download the feature key for an activated Firebox
automatically.
When you activate a new service, upgrade, or renewal for your Firebox on the WatchGuard website, an updated
feature key is created. You must update your Firebox with the new feature key before you can configure the licensed
features.
The feature key includes a line item for each licensed feature or service. Some features, such as service
subscriptions, have expiration dates. Those features expire and stop working on the specified expiration date. If a
feature line has an expiration date of never, it will never expire and will always work.
To install Fireware updates, the Firebox must have a feature key with an active support
subscription. This is called LiveSecurity Service in the feature key.
Make sure the Automatic Feature Key Synchronization setting is enabled to automatically add
new services launched as part of Total Security.
Automatic Feature Key Synchronization enables the Firebox to automatically check for a feature key update when
services in the current feature key will expire within 7 days. Automatic Feature Key Synchronization is enabled by
default to ensure your services are not interrupted when you renew your subscriptions. Synchronization also
automatically adds any new services launched as part of the Total Security Suite.
Every 12 hours, the Firebox checks to see if any feature in the feature key will expire within 7 days. If so, the Firebox
automatically downloads the latest feature key from WatchGuard every 12 hours, until it successfully downloads a
feature key with no expired features.
When you manage the Firebox, you see warnings in these locations if a feature key will expire soon:
n Fireware Web UI Front Panel — Shows a feature key expiration warning message in the upper-right corner
n Policy Manager — Shows a warning when you save a configuration file if a feature expires within 90 days
Warnings also appear in the feature key when you manage the feature key in Policy Manager.
From here, you can click Details to see the actual text in the feature key file.
If you need to restore the feature key, you can copy and paste the feature key details from a saved configuration file
or the WatchGuard Portal into the Firebox configuration.
For example, if you save a device configuration with the file name Example, Policy Manager saves two files:
n Example.xml — the device configuration file
n Example_lic.tgz — the device feature key
Upgrade a Firebox
To keep your Firebox up to date with the latest security features, you must periodically upgrade Fireware OS.
n Fireware Web UI — Easier to use if you only have a few devices to upgrade
n WatchGuard Cloud — Upgrade a locally-managed Firebox from WatchGuard Cloud
Before you upgrade Fireware OS, make sure you understand what is in the update, and that you
have the necessary files to downgrade to the previous version if something goes wrong.
n Read the Release Notes — these include any special upgrade considerations
n Save a copy of the configuration file
n Save a backup image
n Schedule the upgrade for a planned maintenance window — the Firebox reboots after the upgrade
Before you use Policy Manager to upgrade a Firebox, download and install these upgrade files to your management
computer:
n WatchGuard System Manager — Installs WSM management software, including Policy Manager
n Fireware OS — Installs the OS upgrade image that Policy Manager uses to upgrade the Firebox
The Fireware OS upgrade file is different for each Firebox model. If you manage multiple
Firebox models, you must download and install a separate Fireware OS upgrade file for each
model.
To upgrade the Firebox from Policy Manager, select File > Upgrade. Policy Manager asks you to save a copy of your
configuration. It also saves a backup image automatically before the upgrade starts.
To download and install an OS upgrade, select an available version. If needed, you can also select an OS upgrade
file you have downloaded to your management computer. The upgrade process automatically saves a backup image
to the Firebox before the upgrade starts.
After you upgrade a Firebox from Fireware Web UI, you must still upgrade WatchGuard System Manager before you
can open the Firebox configuration with Policy Manager.
An individual Firebox must run Fireware v12.5.2 or higher to be able to update the firmware
from WatchGuard Cloud.
From WatchGuard Cloud, select Configure > Devices > Firmware Upgrades. In the Firmware Upgrades window,
click Upgrade Firmware.
For locally-managed Fireboxes, the Firebox automatically creates a backup when you upgrade the firmware from
WatchGuard Cloud.
Default Threat Protection is the first line of defense, and takes precedence over configured policy rules and other
services.
Blocked Ports
By default, the Blocked Ports list includes several ports related to known threats. You can also manually block the
ports that you know can be used to attack your network. This stops specified external network services from
connecting to your network. Blocking ports can protect your most sensitive services.
When you block a port, you override all the rules in your policy definitions.
The Firebox blocks inbound traffic from external sources that use the blocked ports, but these ports are not blocked
for outbound traffic.
WatchGuard recommends you review the default Blocked Ports list to make sure it does not
block ports required for services you want to allow on your network.
Blocked Sites
A blocked site is an IP address that cannot make a connection through the Firebox, regardless of the configured
policies. Sites can be permanently blocked or temporarily blocked. You can configure exceptions for sites you never
want the Firebox to block.
The Firebox sends a log message each time a blocked site tries to connect to your network. In the log file, you can
see the services that the sources use to launch attacks.
The Firebox denies connections to or from sites that are permanently blocked.
You can configure the Firebox to block the IP addresses of specific sites that are sources of suspicious traffic.
Permanently blocked sites are the sites you add to the Blocked Sites list in the Firebox configuration.
n No sites are blocked by default, so you must add them manually.
n The Firebox blocks connections to and from sites on the Blocked Sites list.
n You can block by IP address, network address, host name, or FQDN.
Adding the FQDN of a site that has a large number of domain names and changing IP
addresses (such as Facebook) to the Blocked Sites list, is generally not an effective way to
block traffic for those sites. WebBlocker is a more effective method to block applications such
as Facebook.
The Firebox denies connections from sites that are temporarily blocked, but does not deny
connections to these sites.
In addition to the permanently blocked sites you configure on the Blocked Sites list, the Firebox can also auto-block a
site, which adds the site to the Blocked Sites list with an expiration time. Auto-blocked sites are temporarily blocked
until the expiration time elapses. The Firebox denies connections from auto-blocked sites, but does not block
connections to auto-blocked sites.
The Duration for Auto-Blocked Sites setting specifies how long auto-blocked sites remain on the Blocked Sites list.
The default duration is 20 minutes. Each time the Firebox blocks traffic from a blocked site, the expiration time for the
block resets. You can think of the auto-block duration as a rolling duration, used to reset the expiration time of the
auto-blocked site.
The Firebox can auto-block sites based on triggers in the configuration. For example:
n Proxy actions and services configured with the Block action
n Default Packet Handling thresholds and settings with the Block action
You can also manually add temporarily blocked sites to the Blocked Sites list, and specify the expiration time. In
Fireware Web UI or Firebox System Manager, you can edit the expiration time for an auto-blocked site:
When you reboot the Firebox, any temporarily blocked sites are removed from the Blocked Sites list.
This feature is typically used for internal hosts and servers that you never want on the Blocked
Sites list. For sites on the Blocked Sites Exception list, the Firebox bypasses Default Packet
Handling checks except IP Spoofing and IP Source Route attacks.
If the Firebox blocks connections to a site you believe to be safe, you can manually add the site to the Blocked Site
Exceptions list. Use this option carefully, because the Firebox bypasses Default Packet Handling checks for sites on
the Blocked Site Exceptions list (except for IP Spoofing and IP Source Route attacks).
By default, the Blocked Sites Exceptions list includes default exceptions for servers that WatchGuard products and
subscription services must connect to.
Default packet handling automatically drops or blocks traffic that matches the pattern of well-
known network attacks, such as Denial-of-Service attacks, SYN flood attacks, and port scans.
When your Firebox receives a packet, it examines the IP address and port number of the packet source and
destination. The device monitors the packets to identify patterns that can show your network is at risk. This process is
called default packet handling.
To make sure that default packet handling does not affect traffic from your email server or any
other server that has a high volume of traffic, add the server to the Blocked Sites Exceptions list.
o Block — Drops the connection and adds the site to the auto-blocked sites list
o For most attack types, the Firebox drops the traffic but does not auto-block the site.
o For Port Scans and IP Scans, the Firebox auto-blocks the source IP address.
o You can configure the thresholds for flood attacks and quotas.
Unhandled Packets
An unhandled packet is a packet that does not match any configured firewall policy. By default, the Firebox denies all
unhandled packets and generates a log message. The source of unhandled packets is not auto-blocked by default.
To automatically block all incoming connections from sites that send unhandled packets, in the Default Packet
Handling settings, select Auto-block source IP of unhandled external packets.
Use this option with caution. This causes the Firebox to block all traffic from a remote host if a
packet, such as a ping request, does not match a firewall policy.
Global Settings
In Global Settings, you can configure general settings, global networking settings, and the logon disclaimer.
General Settings
Web UI Port
Specifies the port you use to connect to Fireware Web UI. By default, Fireware Web UI uses port 8080.
Automatic Reboot
Schedule a daily or weekly reboot of the Firebox. A reboot can free up RAM or CPU and can help maintain
healthy operation.
Device Feedback
This setting enables the Firebox to send feedback to WatchGuard. WatchGuard uses device feedback to
improve products and features and to populate our Internet Security Report. Device feedback includes
subscription service statistics, but does not include any information about your company or any company data
that is sent through the Firebox. All device feedback sent to WatchGuard is encrypted.
Fault Report
Enable this setting to automatically send fault reports to WatchGuard once each day. All fault reports sent to
WatchGuard are encrypted. Your Firebox collects and stores information about the faults that occur on your
Firebox and generates diagnostic reports of the fault. Faults are collected for these categories:
n Failed assertions
n Program crashes
n Kernel exceptions
n Hardware problems
This setting has a high impact on the operation of the Firebox. Before you enable this setting,
read the documentation to make sure you understand the changes that occur when you
enable it. If you enable this setting, incorrect policy configuration can cause serious problems
with the operation of the Firebox. For example, you could lose the ability to connect to your
Firebox for management, or you could cause subscription services to fail.
Networking Settings
Many global networking settings have defaults set to recommended values. We recommend that you keep the default
settings unless you have a specific reason to adjust them. There is one setting you must change if you want to
configure Traffic Management and QoS (quality of service) networking features.
There is one other setting you might want to change, to improve the reliability of Path MTU (PMTU) discovery.
Logon Disclaimer
Enable the logon disclaimer to specify a message with terms and conditions that users must agree to before they can
log in to manage the Firebox. In Policy Manager, you configure this in the Global Settings. In Fireware Web UI, this is
a separate system setting.
It is important for the Firebox to have accurate time so that log messages correctly show when events occurred.
Accurate time is also critical for:
n Certificates
n VPNs
n Subscription services
n Feature key updates
When NTP is enabled, you can optionally enable your Firebox as an NTP server so that clients on your private
networks can contact your Firebox to synchronize the time.
Policies Introduction
A firewall policy allows or denies connections that match these policy configuration settings:
n From and To — the traffic source and destination
n Port and Protocol — the traffic type
The default firewall policies allow outbound connections to the Internet from the protected
network, and deny connections from the Internet to the protected network.
When you add a policy to your Firebox configuration, you control what types of traffic the Firebox allows or denies.
You can set a policy to allow or deny traffic based on criteria such as the source and destination of the packet, the
TCP/IP port or protocol used to transmit the packet, or the time of day. In the policy settings you can give the Firebox
more instructions on how to handle the packet. For example, you can define logging and notification parameters for
the policy, or use network address translation (NAT).
Firewall policies can help you meet several objectives. Here are some common ones:
Enable different levels of access or set bandwidth limits for different users
n Set different policies by department or user role
n Allow guests to safely connect to the Internet
To meet some of these objectives, you must enable and configure security services in your policies. For example, you
use Application Control to control applications used on your network. If your Firebox has licensed services, many
services are enabled by default. You can update the default policies and services to control the types of traffic you
want to allow on your network.
The source and destination for the policy can be a host IP address, host IP range, host name, network address, user
name, group, alias, VPN tunnel, FQDN, or any combination of these objects. A destination can also be a static
NAT action.
A policy that allows connections initiated from a source to a destination also allows response
traffic from the destination back to the source. You do not need to add a separate policy to allow
response traffic from a destination back to the source that initiated the connection.
The terms incoming and outgoing refer to whether a network connection is leaving or entering the network protected
by your firewall. Outgoing connections come from a protected network and send traffic to an external network.
Incoming connections come from an external network and connect to a location in an internal (protected) network.
Disposition
The disposition specifies whether connections that match the policy settings are allowed or denied. To configure the
disposition, select one of these settings:
n Allowed — The Firebox allows traffic that matches the rules in the policy.
n Denied — The Firebox drops all traffic that matches the rules in the policy and does not send a notification to
the device that sent the traffic.
n Denied (send reset) — The Firebox denies all traffic that matches the rules in the policy and sends a
notification, such as TCP RST or ICMP error, to the device that sent the traffic.
Policy Templates
You use policy templates to add a new policy. Policy templates define the port and protocol a
policy applies to. You cannot edit the port and protocol within a policy. To add a policy for a
custom protocol or port you must create a custom policy template.
You can edit custom policy templates, even after policies have been created based on them.
Changes you make to the ports or protocols in a custom policy template automatically
propagate to any policies that were created from that template.
Policy templates make it easy to add policies for many traffic types that use standard ports and protocols. When you
add a firewall policy, you select a policy template that defines what type of traffic the policy applies to. Fireware
includes many predefined templates. When you select a template, you can see the ports and protocol the policy
applies to.
After you select a template and add a policy, you edit the policy settings to meet your needs. When you edit the policy,
you cannot change the port and protocol defined in the policy template.
If you want to create a policy that applies to a protocol that is not included in the list of predefined policy templates,
you must create a custom policy template. A custom policy can match traffic from one or more TCP or UDP port.
For a list of additional resources on these topics, go to Logging, Monitoring, and Reporting Additional Resources.
When the Firebox detects a threat that you have configured for notification, such as a port space probe, it generates
an alarm log message. You can configure Dimension or WatchGuard Cloud to send an email notification to the
network administrator for alarm log messages. When the administrator receives the notification message for a threat,
they can examine the log files and decide how to make the network more secure. For example, the administrator
could decide to block the ports that the probe targeted, block the IP address that sent the packets, or contact the
Internet Service Provider through which the packets were sent.
WatchGuard Servers, such as the Management Server, also generate log messages. WatchGuard Servers
can send log messages to Dimension or a local file.
WatchGuard Cloud
WatchGuard Cloud is a cloud-based visibility platform that collects log messages and automatically generates
dashboards and reports based on the log data. WatchGuard Cloud includes some reports that are not
available in the other monitoring and reporting tools. When you add a Firebox to WatchGuard Cloud, the
Firebox sends log messages to WatchGuard Cloud in addition to any other log servers you configure.
WatchGuard Cloud can also send an email notification message when it receives an alarm from the Firebox.
Dimension
WatchGuard Dimension integrates with your Fireboxes to provide a flexible, cloud-ready logging, reporting,
and management solution. You deploy Dimension as a Hyper-V or VMware virtual machine (VM).
Dimension can collect log messages from your Fireboxes and WatchGuard Servers. Your Firebox can send
log messages to one or more Dimension servers at the same time. Dimension can also send an email
notification message when it receives an alarm from the Firebox.
Syslog Server
In addition to any other configured log servers, Fireboxes can send log messages to a third-party syslog server
or keep a limited number of log messages locally.
WatchGuard Log Server and Report Server are not covered in this training.
WatchGuard Log Server and Report Server do not generate reports or notifications for security
services and features added in Fireware version 11.8 or higher, such as APT Blocker. Because
security services require alerts and reports to be fully effective, we recommend you use
Dimension or WatchGuard Cloud to monitor your Fireboxes.
You can configure a Firebox to send log messages to multiple locations at the same time. For example, a Firebox can
send log messages to WatchGuard Cloud, Dimension, and a syslog server.
A Firebox sends five types of log messages: Traffic, Alarm, Event, Debug, and Statistic. Each log message includes
the name of the log type as part of the log message.
For the Firebox to generate log messages for allowed traffic, you must enable logging of
allowed traffic in packet filter policies or logging for reports in proxy policies. Logging of allowed
traffic is enabled by default in the policies created by the Firebox setup wizards.
For packet filter policies that allow traffic, you can separately select to send log messages for logging purposes
(which you can see in Traffic Monitor or Log Manager) or only for reporting purposes (these log messages are
only used in reports and do not appear in Traffic Monitor).
For proxy policies, when logging for reports is enabled, log messages for allowed traffic appear in Traffic
Monitor.
For more information about log messages, see the WatchGuard Log Catalog, available on the WatchGuard Firebox
Documentation page.
Log Files
The Firebox can send log messages to WatchGuard Cloud or Dimension. For Dimension, log messages are stored in
a local PostgreSQL database. You can also select to use an external PostgreSQL database.
By default, the diagnostic log level for all log message types is set to Error.
To see more information about traffic and events on the Firebox, you can increase the diagnostic log level. This can
be helpful for troubleshooting.
Use the Debug log level for troubleshooting only. The Debug log level generates a large
number of log messages which can fill the log database more quickly in Dimension. Debug
logging can also impact the performance of the Firebox. After you finish troubleshooting,
reset the diagnostic log level back to the default Error level.
The Diagnostic Log Level settings include two options that enable logging for traffic that originates from the Firebox
itself. These options enable logging in the hidden Any From Firebox policy.
n Enable logging for traffic sent from this device — Enables the Firebox to send log messages for traffic the
Firebox sends.
n Enable logging for reports for traffic sent from this device — Enables the Firebox to send log messages
about traffic the Firebox sends that can be used to generate reports.
When these settings are enabled, the additional log messages can make reports confusing
or misleading. We recommend you only enable these settings temporarily for
troubleshooting.
Firebox logging to WatchGuard Cloud is controlled separately from the other logging settings. You can also configure
the Firebox to send log messages to Dimension Servers in addition to WatchGuard Cloud.
You can use these features in WatchGuard Cloud to monitor a Firebox. Most of these features are also available in
Dimension.
Logs
See and search Firebox log messages.
Dashboards
See summary information about traffic, threats, and activity for a Firebox.
n Executive Summary — A concise report of the attacks and traffic blocked by the Firebox. Available as a
PDF only from the Device Summary page.
n Executive Dashboard — A summary of traffic through the selected Firebox, cluster, or group.
n Security Dashboard — A summary of the top threats in each security area protected by your configured
subscription services.
n Subscription Dashboard — A high-level view of subscription services activity on your Firebox.
n Threat Map — A visual representation of source and destination locations for traffic through your Firebox.
n FireWatch — Real-time, aggregate information about the traffic through your Firebox. This is the same
tool that is available in Fireware Web UI and Dimension.
n Policy Map — An interactive report tool that aggregates the traffic through your Fireboxes and shows a
visualization of the traffic flows through interfaces and policies. This can help you identify which policies
are more heavily used.
Reports
Reports provide insight into the network activity on your devices. Reports display details of the traffic allowed
and denied by the device, the services that are enabled, and other device information. WatchGuard Cloud
automatically generates reports based on the log messages it receives from the Firebox.
To see reports in WatchGuard Cloud, you must enable logging for reports in your policies and
services.
You can also schedule reports to run for one or more Fireboxes. Each scheduled report can contain multiple
reports. WatchGuard Cloud sends scheduled reports as a zipped PDF email attachment to the recipients you
specify. Recently generated reports are also available for download in WatchGuard Cloud.
Live Status
With WatchGuard Cloud you can monitor the live status and usage of your locally-managed Fireboxes with
cloud reporting. When the Firebox is connected to cloud, you can use these pages to see live information on
the traffic that passes through your Firebox:
n Traffic Monitor — View real-time data on currently active connections and live logs.
n FireCluster — View a graph that shows cluster member availability for a period of time. View a list of
recent FireCluster events. Click an event to see detailed information and to download a .JSON file.
n Authentication — View information about the users that are authenticated to the Firebox and enable
diagnostics.
n Networks — View information on ARP, DHCP, and the routes that are configured on your Firebox.
n Geolocation — View connections allowed by Geolocation for each country.
n VPNs — View information about the Branch Office Virtual Private Networks (BOVPNs) and mobile VPNs
configured for your Firebox.
n Diagnostic Tools — Run network diagnostic tasks (Ping, TCP Dump, and DNS Lookup) and download a
diagnostic snapshot file.
Before you can enable your Firebox to send log messages to WatchGuard Cloud, you must add
the device to your WatchGuard Cloud account.
To log in to WatchGuard Cloud, go to cloud.watchguard.com and use your WatchGuard portal user credentials to log
in. In your WatchGuard Cloud account, you can add any activated Firebox that has Standard Support, or a Total
Security or Basic Security Suite subscription. When you add a Firebox to WatchGuard Cloud, you might be required
to copy a Verification Code into the Firebox configuration to enable the Firebox to register with WatchGuard Cloud.
Fireboxes that have a TPM chip and run Fireware v12.5.3 or higher do not require the Verification Code.
Install Dimension
Dimension must be installed as a virtual machine (VM) with a 64-bit OS. You can install Dimension on VMware or on
Hyper-V. After you install and start the virtual machine, you run the web-based WatchGuard Dimension Setup Wizard
to configure the basic settings for your new instance of Dimension.
To connect to Dimension, use the IP address assigned to your Dimension VM. For example, if the IP address
assigned to your instance of Dimension is 203.0.113.201, you connect to Dimension at https://203.0.113.201.
After you configure your Dimension server, configure your Fireboxes to send log messages to
Dimension, and enable logging in your policies to generate log messages for reports. For more
information on how to send log messages to Dimension, see Configure Firebox Logging to
Dimension.
In the Dimension system settings, enable outgoing email and configure the address for the email server that
Dimension can use to send notifications and reports.
You can also configure Dimension to send notification alerts by email to specific email addresses. Email notification
of Firebox alerts is not enabled by default, and is configured separately from the email server settings.
n You can send log messages to multiple servers at the same time, such as both a local
Dimension server and a Dimension server at a remote site.
n Make sure the authentication key you configure in the Firebox logging configuration is
the same as on your Dimension server.
To configure the Firebox to send log messages to a Dimension server, you need this server information:
n Server IP address
n Server authentication key
Your Firebox can send log messages to two Dimension servers at the same time. In the log server configuration, you
specify each server on a different tab.
If you want the Firebox to simultaneously send log messages to two Dimension servers, add the first server to the
Log Servers 1 tab, and the second server to the Log Servers 2 tab. You can also optionally add backup servers on
each tab. The Firebox sends log messages to a backup server only if it cannot connect to the primary server.
Firebox System Manager shows Firebox status and activity such as interface statistics, network connections, log
messages, and security service statistics.
n Traffic Monitor displays a continuous list of log messages. The messages refresh every
five seconds by default, which makes Traffic Monitor a good place to start
troubleshooting problems with your Firebox.
n From Firebox System Manager, you can use traceroute, ping, DNS lookup, and TCP
dump diagnostic tasks to help diagnose problems with the traffic on your network.
Tab Description
Front Panel Shows the status of Firebox interfaces, information about certificates, active VPN tunnels,
and subscription services, traffic for active connections, CPU load, and system details.
Traffic Monitor Shows a color-coded list of log messages sent from the Firebox. From this page, you can
also ping the source of a denied packet.
Bandwidth Meter Provides a real-time graphical display of bandwidth utilization for each interface.
Service Watch Shows a graph of the policies configured on a Firebox. The Y-axis (vertical) shows the
number of connections or bandwidth used for each policy. The X-axis (horizontal) shows
the time.
Status Report Shows statistics about Firebox status, traffic, and performance. You can use the report to
troubleshoot problems with your configuration. You can also download a support file that
contains log data, connection information, and other system information.
Before you contact WatchGuard technical support to troubleshoot a Firebox issue, save
the support log file for your Firebox.
Authentication List Identifies the IP addresses and user names of all users that are authenticated to the
Firebox. Includes a Summary section with the number of users authenticated for each
authentication type, and the total number of authenticated users.
Tab Description
Blocked Sites Shows all sites currently blocked by the Firebox. From this page, you can also add or
remove sites from the temporary blocked sites list.
Subscription Shows the status of Gateway AntiVirus, IntelligentAV, Intrusion Prevention Service,
Services Application Control, spamBlocker, WebBlocker, Botnet Detection, Tor Exit Node Blocking,
APT Blocker, Geolocation, Data Loss Prevention, and File Exceptions. From here, you
can also review the status and perform a manual update of the signature databases.
Gateway Wireless Shows the connection status and activity of WatchGuard APs managed by the Gateway
Controller Wireless Controller. You can also monitor and manage the client connections to your
WatchGuard APs.
SD-WAN Shows loss, latency, or jitter for selected external interfaces. Shows a list of all SD-WAN
actions and the multi-WAN mode, associated interfaces, and failback option for each SD-
WAN action.
Traffic Management Shows bandwidth statistics for the traffic managed by traffic management actions
configured on your Firebox. The statistics include details about which policies and
applications use each traffic management action.
User Quotas Shows which users with applied bandwidth and time quotas are connected to your
Firebox, and shows the quota information for each user.
Performance Console
Select performance counters to generate graphs about Firebox performance.
WatchGuard Cloud and Dimension provide better tools to monitor Firebox performance.
HostWatch
Shows the network connections between the selected networks.
FireWatch, available in Fireware Web UI, Dimension, and WatchGuard Cloud, is a better tool to
monitor network connections through the Firebox.
Diagnostic Tasks
In Firebox System Manager, click Tools > Diagnostic Tasks to get access to several network diagnostic tools to
troubleshoot issues on your network:
n Ping — Ping the source or destination IP address.
n Traceroute — Trace the route to the source or destination IP address.
n DNS Lookup — Look up DNS information for an IP address.
n TCP Dump — See information about the packets transmitted across your network. You can use this tool to
perform packet captures and stream the packet capture to a local .pcap file. You can then use a third-party
tool to review the .pcap file, or send the file to WatchGuard Support for review.
To specify command arguments and see other options, select the Advanced Options check box.
The VPN tab includes diagnostic tasks that are useful for VPN troubleshooting. For more information, go to
Troubleshoot BOVPN Tunnels
Dashboard
From the Dashboard, you can see real-time information about your Firebox.
This table describes the monitoring tools available from the Dashboard:
Monitoring
Tool Description
Front Panel Shows basic information about your device, connected servers, your network, and network
traffic.
Subscription Shows the status of Gateway AntiVirus, IntelligentAV, Intrusion Prevention Service,
Services Application Control, spamBlocker, WebBlocker, Botnet Detection, Tor Exit Node Blocking,
APT Blocker, Geolocation, Data Loss Prevention, and File Exceptions.
FireWatch Shows real-time, aggregate information about the traffic through your Firebox.
Interfaces Shows the current bandwidth and detail information for the active interfaces on your device.
This includes wireless interfaces configured for your AP devices. You can also release or
renew the DHCP lease on an IP address for any external interface with DHCP enabled.
Traffic Monitor Shows log messages from your Firebox as they occur. This can be a useful tool for
troubleshooting network security problems and traffic flow issues.
Gateway Shows the connection status and activity of your WatchGuard APs managed by the Gateway
Wireless Wireless Controller. You can also monitor and manage the client connections to your
Controller WatchGuard APs.
Geolocation Shows the activity of network traffic by geographic location, as identified by the Geolocation
service.
Mobile Security Shows mobile devices that are connected to your network. You can see a list of connected
mobile devices, see detailed information for each device, and see group information for each
device.
Network Shows a tree map of all the devices on your network that are connected to the interfaces on
Discovery your Firebox. You can see detailed information for each connected device.
System Status
The System Status section of Fireware Web UI provides information similar to what is available in Firebox System
Manager. Many items from the Status Report in Firebox System Manager are available here and are easier to
examine.
Before you contact WatchGuard technical support to troubleshoot a Firebox issue, go to the
Diagnostics system status page and save the support log file for your Firebox.
For more information on policy logging options, see Policy Logging and Notification in the Firewall Policies section of
this guide.
Each log message generated by your Firebox includes a string of data about the traffic on your Firebox. When you
review the log messages in Traffic Monitor, the different details in the data have different colors applied to them to
help visually distinguish each detail.
To show only log messages for Firebox traffic, select the Traffic Logs filter.
To customize the colors, right click in the Traffic Monitor tab and select Settings.
You can use the search box to find messages that contain specific text, such as a policy name or IP address. You can
also filter the search results and highlight items in the search results.
When you read log messages, you can see details about when the connection for the traffic occurred, the source and
destination of the traffic, as well as the disposition of the connection, and other details.
Time Stamp
The log message line begins with a time stamp that includes the time and date that the log message was
created. The time stamp uses the time zone and current time from the Firebox.
This is the time stamp from the example log message above:
2022-07-02 17:38:43
This is the FireCluster member information from the example log message above:
Member2
Disposition
Each log message indicates the disposition of the traffic: Allow or Deny. If the log message is for traffic that
was managed by a proxy policy instead of a packet filter policy, the traffic might be marked Allow even though
the proxy action stripped or altered the packet body.
These are the source and destination addresses from the example log message above:
These are the service and protocol from the example log message above:
webcache/tcp
These are the source and destination ports from the example log message above:
These are the source and destination interfaces from the example log message above:
Connection Action
This is the action applied to the traffic connection. For proxy actions, this indicates whether the contents of the
packet are allowed, dropped, or stripped.
This is the connection action from the example log message above:
Allowed
Packet Length
The two packet length numbers indicate the packet length (in bytes) and the TTL (Time To Live) value. TTL is
a metric used to prevent network congestion by only allowing the packet to pass through a specific number of
routing devices before it is discarded.
These are the packet length numbers from the example log message above:
Policy Name
This is the name of the policy on your Firebox that handles the traffic. The number (-00) is automatically
appended to policy names, and is part of the internal reference system on the Firebox.
This is the policy name from the example log message above:
(Outgoing-proxy-00)
Process
This section of the log message shows the process that handles the traffic.
Return Code
This is the return code for the packet, which is used in reports.
This is the return code from the example log message above:
rc="100"
NAT Address
This is the IP address that appears in place of the actual source IP address of the traffic after it leaves the
Firebox interface and the NAT rules have been applied. A destination NAT IP address can also be included.
This is the NAT address from the example log message above:
src_ip_nat="203.0.113.99"
Packet Size
The tcp_info detail includes values for the offset, sequence, and window size for the packet that initiates the
connection. The packet size details that are included depend on the protocol type.
This is the packet size from the example log message above:
tcp_info="offset 10 S 2982213793 win 2105"
Log messages show which policies allow or deny traffic through the firewall. This traffic log message shows
information for an allowed packet:
The Firebox uses the source port to map response packets received from the destination IP address and port back to
the source IP address that originally initiated the connection.
For proxy policies, log messages show a lot of detail about why a policy allowed or denied a packet. This log message
shows that the HTTP-proxy policy denied an HTTP request because it matched a denied WebBlocker category.
The Firebox uses two hidden low precedence policies to deny packets that do not match any configured policy:
n Unhandled Internal Packet — Denies packets received on an internal interface
n Unhandled External Packet — Denies packets received on an external interface
Network Settings
In this section, you learn about the basic information you need to configure network settings on your Firebox. This
includes:
n Network routing modes
n DNS
n Interface types and aliases
n Network bridges
n Secondary networks
n VLANs
n Multi-WAN
n Static routing
n Dynamic NAT
n Static NAT
n 1-to-1 NAT
For a list of additional resources on these topics, go to Network Settings Additional Resources.
The most common configuration method is Mixed Routing Mode. We use Mixed Routing to explain most of the
features and examples in this guide.
When you use the Web Setup Wizard to create your initial network configuration, the Firebox is automatically
configured in Mixed Routing Mode. When you use the Quick Setup Wizard in WatchGuard System Manager to create
your initial network configuration, you can choose to configure the Firebox in a Mixed Routing Mode or Drop-in Mode.
Mixed Routing Mode is the only mode that allows you to use all Firebox features. Other modes disable some features.
For example, you cannot configure a VPN in Bridge Mode. Before you select a mode other than Mixed Routing Mode,
make sure you understand the limitations of that mode.
Drop-In Mode and Bridge Mode are rarely used and have these characteristics:
All the Firebox interfaces are on the same All the Firebox interfaces are on the same network.
network and have the same IP address. You specify an IP address to use to manage the
Firebox.
The computers on the trusted or optional Traffic from all trusted or optional interfaces is
interfaces can have a public IP address. NAT is examined and sent to the external interface. You can
not necessary. specify a static IP address or use DHCP for the
Interface IP address. Traffic sent or received through
the Firebox appears to come from its original source.
Interfaces
A firewall physically separates the networks on your local area network (LAN) from those on a wide area network
(WAN) like the Internet. One of the basic functions of a firewall is to move packets from one side of the firewall to the
other. This is known as routing. To route packets correctly, the firewall must know what networks are accessible
through each of its interfaces.
The Firebox provides additional functionality for some interfaces. You can configure external interfaces to work with
Dynamic DNS. You can configure trusted, optional, and custom interfaces to enable a DHCP (Dynamic Host
Configuration Protocol) server.
The Firebox has four types of network interfaces, which are also known as zones:
External Interfaces
An external interface connects your Firebox to a wide area network (WAN), such as the Internet, and can have
either a static or dynamic IP address. The Firebox gets a dynamic IP address for the external interface from
either a DHCP server or PPPoE (Point-to-Point Protocol over Ethernet) server.
With DHCP, the Firebox uses a DHCP server controlled by your Internet Service Provider (ISP) to get an IP
address for the external interface, a gateway IP address, and a subnet mask. With PPPoE, the Firebox
connects to your ISP’s PPPoE server to get the same information.
External interfaces are members of the Any-External alias. External interfaces always have a default route,
which is also known as a zero route (0.0.0.0/0).
Trusted Interfaces
A trusted interface connects your Firebox to the private local area network (LAN) or internal network that you
want to secure. User workstations and private servers which cannot be accessed from outside the network are
usually found in trusted networks. Trusted interfaces are members of the Any-Trusted alias.
Optional Interfaces
Optional interfaces connect your Firebox to your optional networks, which are mixed trust or DMZ
environments separated from your trusted networks. Public web, FTP, and mail servers are usually found in
optional networks. The settings for an optional interface are the same as for a trusted interface. The only
difference is that optional interfaces are members of the Any-Optional alias.
Custom Interfaces
A custom interface connects your Firebox to an internal network with a custom level of trust that is different
from trusted or optional. A custom interface is not a member of the built-in aliases (Any-Trusted, Any-Optional,
or Any-External), so traffic for a custom interface is not allowed through the Firebox unless you specifically
configure policies to allow it. A custom interface is included in the Any alias.
The only difference between trusted, optional, and custom interfaces is which aliases the interface is a member of. All
interfaces are part of the Any alias regardless of the interface type.
Most users configure at least one external and one trusted interface on their Firebox. You can
configure any interface as trusted, optional, external, or custom.
Trusted, optional, and custom interfaces are all internal interfaces, and all have the same configurable settings. The
IP address for an internal interface must be static. Usually, internal interfaces use private or reserved IP addresses
that conform to RFC 1918 and RFC 8190.
We recommend that you do not use public IP addresses that you do not own on your internal
network.
When you configure the IPv4 addresses for interfaces on a Firebox, you must use slash notation to denote the subnet
mask. For example, you specify the network range 192.168.0.0 with subnet mask 255.255.255.0 as 192.168.0.0/24.
A trusted interface with the IP address of 10.0.1.1/16 has a subnet mask of 255.255.0.0.
Interface Aliases
For each interface, the interface name is an alias used in policies to refer to traffic sent or received through that
interface. Each interface is also a member of one or more built-in aliases, which refer to network security zones.
When you select an interface type, the interface becomes a member of one or more of the built-in aliases that define
the different security zones.
In Mixed Routing Mode, all devices behind the trusted and optional interfaces must have an IP address from the
network assigned to that interface. To make this easy to remember, many administrators set the interface address to
the first or last IP address in the range used for that network. In the image below, for example, the IPv4 address of the
trusted interface could be 10.0.1.1/24 and the IPv4 address of optional interface could be 10.0.2.1/24.
Make sure to add enough IP addresses to the address pool to support the number of clients on your network. For
example, in the configuration shown here, the DHCP server can assign IP addresses to a maximum of 99
DHCP clients. When the 100th client requests an IP address, that request fails, and that client cannot connect.
You can also configure the Firebox for DHCP relay. When you use DHCP relay, computers behind the Firebox can
use a DHCP server on a different network to get IP addresses. The Firebox sends the DHCP request to a DHCP
server at a different location than the DHCP client. The Firebox sends the DHCP server reply to the computers on the
trusted, optional, or custom network.
To make sure that a DNS server is always available on your network, we recommend that you
configure at least two DNS servers on the Firebox: one for an internal DNS server, and another
for an external DNS server. We recommend that you list the internal DNS server first so it has
higher precedence. If you do not have an internal DNS server, we recommend that you specify
two external DNS servers from different providers for redundancy.
You can configure different kinds of DNS servers and services on your Firebox. Each DNS server and service has a
different purpose and is configured in a different location in the Firebox settings. Some DNS servers take precedence
over others.
Network Bridges
A local area network bridge logically combines multiple physical interfaces to work as a single network, with a single
interface name and IP address. You configure the interface IP address and other interface settings in the bridge
configuration, and then configure interfaces as members of the bridge. A bridge must include at least one interface,
and can include any combination of physical, wireless, and link aggregation interfaces.
A bridge operates in the same way as any other network interface. It is technically an untagged VLAN network that
you assign to multiple interfaces.
You can configure a bridge in the trusted, optional, or custom security zone. The configuration settings for a bridge
are similar to the settings for any other trusted, optional, or custom network interface. For example, you can configure
DHCP to give IP addresses to clients on a bridge, or use the bridge name as an alias in firewall policies.
You can use a network bridge configuration if you want the Firebox to also function as a switch. You might do this on a
small network if you do not want to implement a network switch device.
For example, you can create a network bridge on the trusted network to combine two internal interfaces. In our
example, a network bridge named Trusted-Bridge has the IP address 10.0.100.1/24.
The interfaces Trusted-1 and Trusted-2 are part of the bridge configuration.
Do not change the interface that you currently use to connect to Fireware Web UI to a bridge
interface. This causes you to immediately lose the management connection to the Firebox.
Secondary Networks
A secondary network is a network that shares one of the same physical networks as one of the
Firebox interfaces.
When you add a secondary network, you add a second IP alias to the interface. This IP alias is the default gateway for
all the computers on the secondary network. Secondary networks can be used only in Mixed Routing or Drop-In
Mode.
Here are some examples of situations when secondary networks can be useful:
Network Consolidation
If you want to remove a router from your network, you can add the router IP address as a secondary IP
address on the firewall when the router is shut down. Any hosts or routers that are still sending traffic to the old
router IP address would then send traffic to the firewall.
Network Migration
Secondary addresses can help you avoid a network outage if you want to migrate your trusted network from
one subnet to another. For example, if you currently use 192.168.1.1/24 as the primary interface IP address,
and you change the interface IP address to 10.0.10.1/24, this could cause a network outage while the devices
that use DHCP get an IP address on the new subnet. Also, any devices that use a static IP address cannot
connect until you reconfigure them with an IP address on the new subnet. To avoid the outage, add the old IP
address as a secondary network, so that devices can still use IP addresses on the old subnet during the
migration.
When you configure a secondary network, the devices that use DHCP get an IP address on the new subnet
when they renew their DHCP lease, without an outage. Devices that use a static IP address can continue to
use the old subnet until you have time to update their IP addresses. After all devices have been migrated to the
new subnet, you can remove the secondary IP address from the interface.
You might want to migrate to a different local network range in these cases:
n You inherit a network that uses the 192.168.0.0/24 or 192.168.1.0/24 networks. Because these network
ranges conflict with many home network ranges, your mobile VPN users cannot access local resources
on your network.
n You have two sites with the same local network range, and you want to connect the sites with a BOVPN.
For example, configure an external secondary network with a second public IP address if you have two public
web servers and you want to configure a static NAT rule for each server.
You can also add secondary networks to the external interface of a Firebox if the external interface is configured to
get its IP address through PPPoE or DHCP. You can add up to 2048 secondary networks for each interface.
You can enable or disable intra-interface inspection on physical and link aggregation interfaces. If you enable this
setting, the Firebox applies firewall policies to intra-interface traffic for the specified interface. In Fireware v12.9 or
higher, you can enable or disable the setting from Fireware Web UI or Policy Manager.
VLANS
A virtual local area network (VLAN) is a collection of computers on a LAN or LANs that are grouped together in a
single broadcast domain independent of their physical location.
With a VLAN, you can group devices according to function or traffic patterns instead of location
or IP address. Members of a VLAN can share resources as if they were connected to the same
LAN.
VLAN Benefits
VLANs provide three main benefits:
n Increased performance by restricting broadcasts — Each computer you add to a LAN increases the amount
of background (broadcast) traffic, which can reduce performance. With VLANs, you can restrict this traffic and
reduce the amount of bandwidth used by your network.
n Improved manageability and simplified network tuning — When you consolidate common resources into a
VLAN, you reduce the number of routing hops required for those devices to communicate. You can also
manage traffic from each functional group more easily when each group uses a different VLAN.
n Increased security options — By default, members of one VLAN cannot see the traffic from another VLAN.
You can apply separate security policies to VLANs. By contrast, a secondary network on a Firebox interface
gives no additional security because there is no separation of traffic. The Firebox does not filter traffic between
the primary network of an interface and a secondary network on that interface. It automatically routes traffic
between primary and secondary networks on the same physical interface with no access restrictions.
VLAN ID (VID)
A number from 1 to 4094 associated with the VLAN. Every VLAN you use has a unique number.
Tag
This term has one meaning when used as a verb, and another meaning when used as a noun:
Tag [noun] — Information that is added to the header of an Ethernet frame. The format of the tag is defined by
the IEEE 802.1Q standard.
Tag [verb] — To add a VLAN tag to a data frame’s Ethernet header. The tag is added by an 802.1Q-compliant
device such as an 802.1Q switch or router, or the Firebox.
Because the physical segment between two 802.1Q devices normally carries only tagged data packets, we
call it the tagged data segment.
Untag
To remove a VLAN tag from a frame’s Ethernet header. When an 802.1Q device must send data to a network
device that cannot understand 802.1Q VLAN tags, the data frames must be configured as untagged.
Because the physical segment between a VLAN device and a device that cannot understand VLAN tags
normally carries only untagged data packets, we call it the untagged data segment.
Clients are untagged by default. As a best practice, we recommend that you have one untagged VLAN for
direct management access. For example, you might want to physically connect to the Firebox to troubleshoot
an issue. Some third-party devices leave VLAN ID 1 untagged for management and troubleshooting.
When you configure a Firebox Ethernet interface for VLAN, the interface accepts both tagged and untagged
data frames. A VLAN can have more than one physical interface member. An interface can simultaneously
belong to both an External and Internal (Trusted, Optional, or Custom) VLAN. A VLAN interface can send and
receive untagged traffic for an external VLAN.
Use these two rules to decide whether to configure a switch interface for Tag or Untag:
n If the interface connects to a device that can receive and understand 802.1Q VLAN tags, configure
the switch interface for Tag. Devices you connect to this interface are usually VLAN switches
(managed switches) or routers.
n If the interface connects to a device that cannot receive and understand 802.1Q VLAN tags,
configure the switch interface for Untag. Such devices will likely strip the VLAN tag from the
Ethernet header, or drop the frame altogether. Devices you connect to this interface are usually
computers or printers.
VLAN Type
VLANs can use different parameters to assign membership. The Firebox uses 802.1Q VLANs. The Institute of
Electrical and Electronic Engineers (IEEE) publishes the 802.1Q standard to define the format of VLAN tags.
This standard lets you use VLANs with any vendor equipment that conforms to 802.1Q standards.
o You can configure a Firebox in Bridge Mode to be managed from a VLAN that has a specified VLAN tag.
o You can enable Spanning Tree Protocol in Bridge Mode.
n Multi-WAN configuration settings are applied to VLAN traffic. However, it can be easier to manage bandwidth
when you use only physical interfaces in a multi-WAN configuration.
n Your device model and license determine the number of VLANs you can create. To see the number of VLANs
you can add to your Firebox, open Policy Manager and select Setup > Feature Keys. Find the Total Number
of VLAN Interfaces row.
n We recommend that you do not create more than 10 VLANs that operate on external interfaces. Too many
VLANs on external interfaces affect performance.
n All network segments you want to add to a VLAN must have IP addresses on the VLAN network.
USE CASE:
Use VLANs to create separate logical networks for two groups of devices that connect to a single
Firebox interface through a switch. Create a separate VLAN for the management computer.
For example, if you use VLANs to logically separate traffic for devices located in two departments, the network
diagram could look like this:
Firebox configuration:
n The VLAN interface that connects to the switch has one untagged VLAN and two tagged VLANs.
With this configuration, the switch adds and removes VLAN tags for network traffic between clients and the Firebox.
n All traffic for VLAN 10 and VLAN 20 is tagged between the Firebox and the switch.
n All traffic for VLAN 10 and VLAN 20 is not tagged between the switch and the network clients.
n The switch removes the tags for traffic sent from the Firebox to clients on those VLANs.
n The switch adds tags for traffic from clients on those VLANs to the Firebox.
USE CASE:
Use a VLAN to create a single logical network for devices that connect to two Firebox interfaces through
two different switches.
For example, if you use a VLAN to create a single logical network for devices located on two floors of a building, the
network diagram could look like this:
Firebox configuration:
n The VLAN interfaces that connect to both switches are configured as members of the same tagged VLAN.
With this configuration, the switch adds and removes VLAN tags for network traffic between clients and the Firebox.
n All traffic for VLAN 10 is tagged between the Firebox and the switches.
n All traffic for VLAN 10 is not tagged between the switches and the network clients.
n The switch removes the tags for traffic sent from the Firebox to clients on the VLAN.
n The switch adds tags for traffic from clients on that VLAN to the Firebox.
USE CASE:
Use two Firebox interfaces to handle traffic for two separate VLANs configured on the same connected
switch. This use case does not require any VLAN configuration on the Firebox. To configure different
policies for each VLAN, specify the interface that connects to each VLAN on the switch.
For example, if your switch is configured with two VLANs for computers in two departments, and you use a different
Firebox interface for traffic from each VLAN, the network diagram could look like this:
In this configuration, the Firebox is not aware of the VLANs, and sees these as two separate networks.
Firebox configuration:
n Each interface connected to the switch is a trusted, optional, or custom interface.
With this configuration, the switch routes traffic for clients on each VLAN to a different Firebox interface.
n All traffic between VLAN 10 clients and the Firebox goes through one Firebox interface.
n All traffic between VLAN 20 clients and the Firebox goes through another Firebox interface.
If I want to allow traffic that starts in a VLAN and leaves the VLAN, do I need a policy for it?
Yes. Traffic is not allowed to leave a network protected by the Firebox unless there is a policy to allow it.
However, the default configuration the Quick Setup Wizard creates for the Firebox includes the Outgoing
policy, which allows traffic from Any-Trusted or Any-Optional to Any-External.
If your VLAN uses the Trusted or Optional security zone, any device in the VLAN can use the Outgoing policy
to send traffic to Any-External. This is because a VLAN that uses the Trusted security zone is included in the
Any-Trusted alias, and a VLAN that uses the Optional security zone is included in the Any-Optional alias.
If I want to allow traffic that starts in one VLAN and goes to another VLAN, do I need a policy for it?
Yes. By default, devices in one VLAN cannot see the traffic from another VLAN. You can apply separate
security policies to VLANs.
If I want to allow traffic that starts in a VLAN and goes to a device in the same VLAN, do I need a policy
for it?
No. If a computer connected to Switch A sends traffic to a computer connected to Switch B, and both
computers are in the same VLAN, the Firebox does not filter this traffic. In this setup, the Firebox serves as a
VLAN bridge between the two computers and the two switches. The two computers communicate as if they
were in the same physical LAN, not separated by the Firebox.
But, if you want to apply firewall policies to traffic between clients on two networks that are part of the same
VLAN, you can select the Apply firewall policies to intra-VLAN traffic check box in the VLAN configuration.
If you want to apply policies to intra-VLAN traffic, make sure that no alternate path exists between the source
and destination. The VLAN traffic must go through the Firebox for firewall policies to apply.
Static Routing
A route is the sequence of devices that network traffic must go through to get from its source to its destination. The
trip from one device to the next device is known as a hop.
A router, or a network device such as a Firebox, stores information about routes in a routing table. The device looks in
the routing table to find a route to send each received packet toward its destination.
Each hop in the route is isolated, which means routing issues are caused by point-to-point
connection problems between devices in the route.
Static routes can be appropriate in certain cases. For example, static routes can make sense on small networks,
when there are very few hops, or when you know the route will likely not change. Static routing can be used as
backup for dynamic routing. However, if the network structure changes or a connection fails, network traffic cannot
get to its destination.
To add a static route, from Policy Manager, select Network > Routes.
n Gateway — The IP address to route the traffic through. This is the next hop in the route. The gateway IP
address must be part of a network included in the Firebox routing table. This is usually a subnet configured on
one of the Firebox interfaces.
n Metric or Distance — The distance sets the priority for the route. If the routing table includes more than one
route to the same destination, the Firebox uses the route that has the lower distance.
n Interface — For a route to an IPv6 destination, you can optionally select the IPv6-enabled interface to use for
the route. For a BOVPN Virtual Interface Route, you must select the BOVPN virtual interface to use for the
route.
Each route in the routing table has an associated metric. If the routing table includes more than one route to the same
destination, the Firebox uses the route that has the lower metric. For a static route, you manually set the distance
(metric) to control the priority of each route. If you use dynamic routing, the dynamic routing protocol automatically
sets the distance for each route.
A configured static route does not appear in the route table if there is no route to the gateway
specified in the static route.
Multi-WAN
Multi-WAN controls how outbound traffic through multiple external interfaces is sent to more than one Internet
Service Provider (ISP) simultaneously. This approach offers significant benefits in terms of redundancy, bandwidth
optimization, and failover capabilities.
Redundancy
If the main Internet connection goes down, you can use a backup connection for outgoing connections.
With multi-WAN, you can configure multiple external interfaces, each on a different subnet. This
enables you to connect your Firebox to more than one Internet Service Provider (ISP). When
you configure two or more external interfaces, the multi-WAN feature is automatically enabled.
If your Firebox has multiple external interfaces, multi-WAN is the global routing option.
By default, multi-WAN is not enabled for modems. Multi-WAN does not impact BOVPNs or inbound traffic.
Multi-WAN Methods
Fireware supports these multi-WAN methods:
Failover (default)
The Failover method sends all outgoing connections to the primary interface. This algorithm sends outgoing
connections through a backup interface only if the primary interface is not available. When you enable multi-
WAN on the Firebox, Failover is the default multi-WAN method. For more information about Failover, go to
Failover in About Multi-WAN Methods in Fireware Help.
Routing Table
The Routing Table uses Equal-Cost Multi-Path Routing (ECMP) to distribute outgoing connections based on
the src/dst (source and destination) IP addresses. The Routing Table method attempts to equalize the number
of connections that go out of each interface. For detailed instructions on how to configure the Routing Table,
go to Configure the Routing Table Multi-WAN Method in Fireware Help.
Round-robin
Round-robin distributes outgoing connections based on the number of connections. If you set the weight for
each external interface to 1 in Round-robin mode, the algorithm attempts to equalize the number of
connections sent through each interface.
For light traffic loads, weighted Round-robin behaves like a connection-based Round-robin because the
weights you use tend to determine the number of connections through each external interface. When the traffic
load increases, weighted Round-robin behaves more like a load-based Round-robin because the weights you
assign tend to determine the load through each external interface. For more information about Round Robin,
go to Round-Robin in About Multi-WAN Methods in Fireware Help.
Interface Overflow
The Interface Overflow method enables you to set a bandwidth limit to restrict the amount of traffic sent over
each WAN interface. The algorithm sends outgoing connections to external interfaces in the order you specify.
After all interfaces reach their bandwidth limit, the Firebox uses the routing table to find the best path. For
information about Interface Overflow, go to Interface Overflow in About Multi-WAN Methods in Fireware Help.
Failover/Failback
Failover occurs when an interface that was previously active becomes unable to send traffic to external networks.
Failback occurs when an interface that was previously not able to reach external locations becomes active again.
If an external interface goes down, the Firebox removes that external interface from all routing decisions. The action
the Firebox takes depends on the multi-WAN method currently in use. For information on how to configure failover, go
to Configure the Failover Multi-WAN Method in Fireware Help.
Failback
When you reconnect the interface or when Link Monitor probes determine that an interface is active again, the
Firebox makes the interface available again for outgoing traffic. You can set the action you want the Firebox to take
when a failover event occurs and after the primary external interface becomes active again. For information on how to
configure failback and select the action to take, go to Advanced Multi-WAN Settings in Fireware Help.
Link Monitor
Link Monitor is responsible for monitoring the status and availability of network links and connections. Its primary
purpose is to continuously check the health and availability of network links and provide information on the monitored
status. A Link Monitor operates by sending periodic network packets or messages, such as pings, to the target
devices or IP addresses associated with the links. It then waits for responses and analyzes them to determine the
link's status.
Link Monitor is vital for multi-WAN and all VPN types. You must configure Link Monitor correctly
for these features to work as expected.
The Firebox uses two methods to determine whether an interface is available to send and receive traffic:
To monitor an interface with Link Monitor, you must click Add and manually add the interface to Link Monitor. You can
add these types of interfaces to Link Monitor:
n External
n Internal (Trusted, Optional, and Custom)
n Modem
n BOVPN virtual interface
To add a BOVPN virtual interface to Link Monitor, you must first configure a virtual peer IP address in the
BOVPN virtual interface settings. You must specify a peer IP address, not a netmask.
When you add an external or modem interface to Link Monitor, the target is the default gateway, which is the next hop
after the Firebox. For meaningful operational and performance data, we recommend that you replace the default
gateway target with a Link Monitor target that is farther upstream. For information about how to select an effective
target, see the next section.
To add a custom target, in the Monitored Interfaces list, click the interface you added, and then click Add. From the
Type drop-down list, select one of these options:
n Ping — Add an IP address or domain name for the Firebox to ping to check for interface status.
n TCP — Add the IP address or domain name where the Firebox sends a TCP SYN packet. Use the Port box to
set the port the Firebox uses when it sends the SYN packet. If the target sends an ACK in reply, the Firebox
knows it can reach the external target. The Firebox closes the connection with an RST packet when it gets an
ACK.
n DNS — Query a DNS server for a specified domain name. You must specify the IP address of the DNS server
you want to use and the domain name to query.
If you add an internal interface, you must add a next hop, a custom target, or both. The next hop IP address tells the
Firebox how to route Link Monitor traffic for the interface. If you do not specify a next hop IP address, the Firebox
routing table is used to route traffic.
If you add a BOVPN virtual interface, the Firebox automatically adds a ping target to the IP address of the peer. You
cannot edit or remove this target.
Multi-WAN does not require that you configure link monitor targets. However, we recommend that you configure link
monitor targets so the Firebox can:
n Determine whether an interface can send traffic
n Fail over properly to a different external interface
If you enable Link Monitor for an interface but do not configure a custom link monitor target, the Firebox pings the
interface default gateway to find the interface status. The default gateway is usually the Internet Service Provider
(ISP) modem or router. The default gateway is not a reliable target for these reasons:
n If ISP equipment just beyond the modem cannot connect to the Internet, but the default gateway still responds
to a ping, the Firebox does not detect the interface as inactive. This occurs because the gateway is the only
test of connectivity. In some multi-WAN modes, this can cause traffic loss because the Firebox continues to
send packets through an inactive interface that appears active because the connected modem or router
responds to a ping.
n Some ISP equipment might be configured to not respond to a ping.
These settings apply to all Link Monitor targets you configure for an interface. For example, if you configure a ping
target and a TCP target and specify a probe interval of five seconds, both targets use a probe interval of five seconds.
In certain cases, the Firebox disregards the Probe Interval, Deactivate After, and Reactivate After settings:
n Physical link disconnection or reconnection — If the interface cable is unplugged, for example, the Firebox
immediately considers the interface inactive. If the cable is plugged in again, the Firebox considers the
interface active after one successful probe.
n Link Monitor configuration change — If you change the IP address of a Link Monitor target, for example, the
Firebox immediately probes the target and updates the interface status as active or inactive.
Dynamic NAT
Dynamic NAT, also known as IP masquerading, changes the source IP address of each outgoing connection to
match the IP address of the Firebox interface that the connection goes out through. For traffic that goes to an external
network, packets go out through the Firebox external interface, so dynamic NAT changes the source IP address to
the Firebox external interface IP address. The Firebox tracks the private source IP address and destination address,
as well as other IP header information such as source and destination ports, and protocol.
Dynamic NAT enables clients on a private network to connect to servers on the Internet.
Dynamic NAT is normally applied to connections that start from behind the device. When dynamic NAT is applied to a
packet, the Firebox tries to always keep the same source port that the requesting client used. The source port is
changed only if necessary.
USE CASE:
In an example use case, two internal clients use the same source port to access the same web server.
However, the source IP address is always changed when dynamic NAT is applied. When the response
returns to the same Firebox interface from which the original connection exited, the Firebox examines its
connection state table and finds the original source IP address. It reverses the NAT process to send the
packet to the correct host.
Dynamic NAT is enabled by default on the Firebox. By default, dynamic NAT is applied to any connection that starts
from one of the private address ranges specified in RFC1918 and goes to an external network.
To see the default dynamic NAT rules in Policy Manager, select Network > NAT.
Dynamic NAT is also enabled by default in each policy you create. You can override the global dynamic NAT settings
in individual policies.
Set the Dynamic NAT Source IP Address in a Network Dynamic NAT rule
If you want to set the source IP address for traffic that matches a dynamic NAT rule, regardless of any policies
that apply to the traffic, select Network > NAT, and add a network dynamic NAT rule that specifies the source
IP address. The source IP address you specify must be on the same subnet as the primary or secondary IP
address of the interface the traffic leaves. You can also specify IP addresses that are on the same subnet as
the primary or secondary IP address of the loopback interface.
Static NAT, also known as port forwarding, allows inbound connections on specific ports to one
or more public servers from a single external IP address. The Firebox changes the destination
IP address of the packets and forwards them based on the original destination port number. You
can also translate the original destination port to an alternative port on which the server is
listening.
Static NAT is typically used for public services such as websites and email. For example, you can use static NAT to
designate a specific internal server to receive all email. Then, when someone sends email to the device’s external IP
address, the device can forward the connection to the private IP address of the designated email (SMTP) server.
We recommend that you configure SNAT rather than 1-to-1 NAT, especially if you have a
small number of public IP addresses.
IP addresses used with SNAT can also be used for other Firebox features such as VPNs. SNAT is the only option if
you have only one public IP address.
Server Load Balancing requires Fireware with a Pro upgrade and is not supported on Firebox
T10, Firebox T15, XTM 2 Series, and 3 Series devices.
Static NAT
A static NAT action forwards inbound traffic addressed to one IP address to a different IP address and port
behind the firewall. You can specify an FQDN in a SNAT action in addition to an IP address.
To use static NAT, you add a static NAT action to the To section of the policy that handles each type of inbound
traffic. To implement static NAT for the diagram above, you would add a different static NAT action to the FTP, SMTP,
and HTTP policies that handle the inbound traffic to each of the three servers.
You can combine SNAT with the Set Source IP option for dynamic NAT (DNAT) to perform the
same function as 1-to-1 NAT. With this configuration, you can still use the public IP address for
other purposes.
1-to-1 NAT
When you enable 1-to-1 NAT, your Firebox maps one or more private IP addresses to one or more public IP
addresses. This allows you to make internal network resources accessible on the Internet.
On most networks, we recommend that you configure SNAT rather than 1-to-1 NAT.
Do not enable 1-to-1 NAT if you have only one public IP address or a small number of public IP addresses. If you
have only one public IP address and configure 1-to-1 NAT, this configuration prevents all use of inbound Firebox
functions and the WatchGuard Support team cannot connect. If you have only a few public IP addresses, we
recommend SNAT to better utilize your public IP addresses.
If you configure 1-to-1 NAT, be aware that IP addresses used for 1-to-1 NAT cannot be used for
other purposes. For example, you cannot also use 1-to-1 IP addresses for inbound traffic or for
Firebox features such as VPNs, Access Portal, or Support Access.
Configuration Example
Consider a situation in which you fully dedicate public IP addresses to specific internal devices, but these public IP
addresses will not be available for any other Firebox functions. You can use 1-to-1 NAT to map public IP addresses to
the internal devices. You do not need to change the IP addresses of your internal devices.
A company has a group of three privately addressed servers behind the optional interface of the Firebox. These
addresses are:
10.0.2.11
10.0.2.12
10.0.2.13
The administrator selects three public IP addresses from the same network address as the external interface of the
device and creates DNS records for the servers to resolve to. These addresses are:
203.0.113.11
203.0.113.12
203.0.113.13
Now the administrator configures a 1-to-1 NAT rule for the servers. The 1-to-1 NAT rule builds a static, bidirectional
relationship between the corresponding pairs of IP addresses. The relationship looks like this:
10.0.2.11 <--> 203.0.113.11
10.0.2.12 <--> 203.0.113.12
10.0.2.13 <--> 203.0.113.13
When the 1-to-1 NAT rule is applied, the Firebox creates the bidirectional routing and NAT relationship between the
pool of private IP addresses and the pool of public addresses.
To connect to a computer located on a different Firebox interface that uses 1-to-1 NAT, you can use the private (NAT
base) IP address for that computer. Or, you can create a 1-to-1 NAT mapping for the other interface.
Interface
The name of the device Ethernet interface on which 1-to-1 NAT is applied. The Firebox applies 1-to-1 NAT for
packets sent in to, and out of, the interface. In our example above, the rule is applied to the external interface.
Real base
The IP address assigned to the physical Ethernet interface of the computer to which you apply the 1-to-1 NAT
policy. When packets from a computer with a real base address go through the interface specified, the 1-to-1
action is applied. In our example above, the real base is 10.0.2.11.
NAT base
The IP address that the real base IP address changes to when 1-to-1 NAT is applied. In our example above,
the NAT base is 203.0.113.11.
NAT Loopback
With NAT loopback, local network users can connect to an internal server with the public IP address or domain name
of that server. When the Firebox receives a local user request to connect to that server, the Firebox changes the
public IP address or domain name to the private IP address. The connection loops back to the internal network
instead of out to the Internet.
To map a public IP address to a private IP address, you must use static NAT (SNAT) or 1-to-1 NAT. In most cases,
we recommend SNAT.
For more information about these NAT methods, see the Static NAT (SNAT) and 1-to-1 NAT sections in this guide.
1. Create a SNAT action that maps the public IP address to the private IP address.
2. Create or edit a policy for traffic to the server.
3. In the From field, specify one or more aliases for users on your local network, such as Any-Trusted and Any-
Optional.
4. Add the SNAT action to the policy.
Firewall Policies
Firewall policies control what types of connections and content the Firebox allows.
For a list of additional resources on these topics, see Firewall Policies Additional Resources.
The members of the source and destination lists can be an IPv4 or IPv6 host IP address, host IP range, host name,
network address, user name, alias, VPN tunnel, FQDN, or any combination of these objects. A destination can also
be a static NAT action.
Aliases
An alias is a shortcut that identifies a group of hosts, networks, or interfaces. When you configure a policy, you can
use aliases in the From and To lists to specify the traffic sources and destinations the policy applies to.
There are four default aliases that group interfaces based on interface type, which are also known as zones:
n Any-Trusted — Any network you can get access to through Firebox interfaces configured as Trusted
n Any-Optional — Any network you can get access to through Firebox interfaces configured as Optional
n Any-External — Any network you can get access to through Firebox interfaces configured as External
n Any-BOVPN — All BOVPN (IPSec) virtual interfaces and tunnel routes
Host Name Performs a one-time DNS lookup on the host name and adds resolved IP addresses to
(DNS lookup) the alias.
FQDN (Fully Qualified Performs forward DNS resolution and analyzes DNS replies for the specified FQDN
Domain Name) (includes wildcard domains). Resolved IP addresses from the primary domain and any
subdomains are added to the alias.
Tunnel address Defined by a user or group, address, and name of the tunnel.
FQDN
You can use FQDNs to specify a specific host domain (host.example.com) or a wildcard domain
(*.example.com). For example, the wildcard domain *.example.com includes:
a.example.com
b.example.com
a.b.example.com
*.b.example.com
*.b.c.example.com
*.b.c.d.example.com
When you use an FQDN, your Firebox performs forward DNS resolution for the specified domain and stores the IP
mappings. For wildcard domains, the Firebox analyzes DNS replies that match the FQDN. As DNS traffic passes
through the Firebox, it stores the IP mapping responses for the domain and any subdomains. The Firebox stores up
to 255 IP addresses for each domain.
With FQDNs, you can allow traffic to software update sites or antivirus signature update sites, even though all other
traffic is blocked. This is especially useful when these sites are hosted on content networks (CDNs) that frequently
add and change IP addresses.
USE CASE:
To configure an HTTPS policy to allow connections to Windows update sites, specify these wildcard
FQDNs in the policy To list:
*.windowsupdate.com
*.microsoft.com
*.windows.com
officecdn.microsoft.com.edgesuite.net
officecdn.microsoft.edgesuite.net
Management Policies
The WatchGuard and WatchGuard Web UI policies allow management connections to the
Firebox. It is important not to delete or disable these policies.
In the Firebox configuration, two management policies control management connections to the Firebox:
WatchGuard Web UI
This policy allows connections to the Fireware Web UI, hosted on the Firebox. This policy allows
TCP connections to the port used for Fireware Web UI (port 8080 is the default).
WatchGuard
This policy allows management connections to the Firebox from WatchGuard System Manager and the
Fireware Command Line Interface (CLI). This policy allows connections from WatchGuard System Manager
on TCP port 4117, and connections from the CLI on TCP port 4118.
Do not delete or disable these management policies. If you delete these policies you cannot
connect to the Firebox to manage it.
By default, these policies allow management connections from Any-Trusted and Any-Optional to the Firebox. This
means that an administrative user can connect from any computer on the trusted or optional network. You can edit
the From list to more explicitly control who can connect to the Firebox for management.
By default, FireboxV and Firebox Cloud allow management connections from Any-External. We
recommend that you remove the Any-External alias from the From list of the management
policies after initial setup.
We recommend that you do not add the Any-External alias to the From list of the management
policies. This allows anyone outside the network to try to log in to manage your Firebox. A
more secure way to enable remote management is for administrators to use a VPN to connect
to the trusted network and then connect to the Firebox. Or, in the policy From list, add the
specific public IP addresses from which you want to allow management connections. For
example, you could add the public IP address of your main office Firebox.
The default policies provide a good starting point for your configuration. You can change the source and destination
of the policies and configure additional policies to further limit allowed traffic based on the connections and protocols
you want to allow, deny, or control.
We always recommend that you configure policies with the concept of "least privilege", which
means that you only allow traffic through specific ports necessary to conduct business-related
activities.
Before you edit the policy configuration, consider which connections and content types you want to allow, deny, or
control. It is important to configure policies with a limited scope to allow only the traffic that is necessary for your
users.
n Web server — Do you want to protect a public web server on the private network?
o Add HTTP-proxy and HTTPS-proxy policies to allow incoming connections to that server.
n Other resources — Do you have other servers or resources that must be accessible from outside your private
network?
o Add a policy that allows traffic with the required port and protocol to the server.
n Users and groups — Do you want to allow different access for different users or monitor user activity?
o Set up authentication and add different policies for each user group.
n Communication between internal networks — Do you want to allow internal hosts to connect to resources on
other internal networks?
o Edit the default HTTP-proxy and HTTPS-proxy policies to enable communication between internal
networks.
Examine the default policies and consider whether you can modify these to further control outbound connections from
your network.
Outgoing Policy
The default Outgoing policy is a TCP-UDP policy that allows all TCP and UDP connections from any trusted or
optional source on your network to any external network. Because it is a packet filter policy, not a proxy policy,
the Outgoing policy has limited filtering capabilities.
You can add other proxy policies and services to filter and control other outgoing TCP and UDP connections.
However, there are some types of TCP and UDP connections (particularly on non-standard ports) that cannot have
all services applied.
For all policies, consider whether you can limit the sources and destinations for allowed connections.
If you want to remove the Outgoing policy, but you want to allow trusted users on your network to connect to web
sites, make sure the configuration includes an HTTP-proxy policy for port 80, an HTTPS-proxy policy for port 443,
and a DNS policy for port 53 to allow DNS query resolution.
When you create a DNS policy, we recommend that you add the specific IP addresses of the
DNS servers to the To list, instead of adding Any-External.
Policy Precedence
Only one policy applies to each connection. The Firebox uses the highest-precedence policy to
determine whether to allow or deny a connection. Network traffic that does not match any policy
is denied as an unhandled packet.
Precedence refers to the order in which the Firebox examines network traffic and applies a policy rule. The Firebox
sorts policies automatically, from the most specific to the most general. For example, a very specific policy might
match only traffic on TCP port 25 from one IP address, while a more general policy might match all traffic on UDP
ports 40,000 to 50,000. You can also set the precedence of each policy manually.
By default, the Firebox policies are configured in Auto-Order mode. In Auto-Order mode, the Firebox automatically
sorts policies from the most specific to the most general, based on a comparison of these policy properties:
n Policy (specificity)
n Ports and protocols
n Source and destination (From and To)
n Disposition (Firewall action)
n Schedule
In the policy list, the Order column shows the order of policy precedence.
Policies higher in the list have higher precedence. When the Firebox receives a packet, it applies the highest
precedence policy that matches the characteristics of the packet. When Auto-Order mode is enabled, if two policies
are equally specific, a proxy policy takes precedence over a packet filter policy. Only the highest precedence policy
that matches the port, protocol, source, and destination applies to a packet. You can also disable Auto-Order mode
and manually change the order of policies.
To allow different levels of access to network resources for different users, groups, or networks, you can add multiple
policies for the same port/protocol with different sources or destinations. For example, you could configure an HTTP-
proxy policy for a specific department to allow more limited or broader access to resources than the lower priority
default HTTP-Proxy policy.
We recommend that you use Auto-Order mode to set policy precedence until it does not work
for your specific situation. If you change to Manual-Order mode, make sure that you test the
order of policies carefully.
Policy Checker
To use Policy Checker to test the outcome of configured policies on the Firebox:
n Specify the source network interface
In Fireware Web UI, you can use Policy Checker to see how your Firebox manages particular traffic so you can
troubleshoot issues with your policies. For example, you might run into issues where the Firebox allows or denies
traffic in a way you did not expect.
To determine how the traffic is processed by your policies with Policy Checker, you specify:
n An active source network interface — The interface you select is the source interface where the traffic
originates. For example, if you select the External interface, the Firebox will treat the connection as inbound.
n Protocol (Ping, TCP, or UDP)
n Source and Destination IP address
n Source and Destination Port (if the protocol is TCP or UDP)
Hidden Policies
The Firebox uses a high precedence hidden policy to allow traffic from the Firebox itself, and
two low precedence policies to deny unhandled packets received from internal and external
networks. It also has a hidden policy to allow IPSec VPN connections to the Firebox.
The Firebox has four hidden policies in addition to the firewall policies you configure. These policies do not appear in
the configuration, but do appear in the Service Watch tab in Firebox System Manager.
Unhandled Packets
The Firebox fails closed. This means that the Firebox denies all traffic that does not match the configured policies. To
do this, the Firebox uses hidden policies that have lower precedence than all the configured policies.
These policy names appear in log messages when the hidden policies deny unhandled traffic.
If you want to see this policy in the policy list, and add other policies to control Firebox-generated traffic, you can
enable the Enable configuration of policies for traffic generated by the Firebox global setting.
Enable this setting with care. Incorrect configuration of policies for Firebox-generated traffic,
can cause serious problems. For example, a configuration error could prevent management
connections to the Firebox, prevent updates to Firebox services, and prevent Firebox
connections to a Management Server, Dimension, or WatchGuard Cloud.
Before you enable this setting, see Fireware Help for more information and configuration examples.
Allow-IKE-to-Firebox
Allows IPSec VPN connections to the Firebox itself.
This hidden policy exists when the Enable the built-in IPSec Policy check box is selected in the global VPN
settings. This check box is selected by default. If you disable this setting, the hidden policy is removed and IPSec
VPN connections will fail.
By default, policies send a log message when they deny a connection. You can also configure
policies to send a log message when they allow a connection. A separate log setting controls
whether policies send log messages used by Dimension and WatchGuard Cloud to generate
reports.
Policies that deny connections always send a log message when a connection is denied.
If you do not need to actively monitor allowed connections in the log file, we recommend you
do not select Send a log message for policies that allow traffic. This increases CPU load on
the Firebox and reduces log storage in Dimension.
If you use Dimension or WatchGuard Cloud, make sure that you configure all policies to send a log message
for reports.
In packet filter policies that allow connections, you configure this setting in the policy.
In proxy policies, you enable logging for reports in the proxy action on the General Settings tab. When you
select Enable logging for reports in a proxy action, the log messages for allowed traffic also appear in Traffic
Monitor.
Because the Firebox denies all traffic from the external network by default, you will see traffic log messages that
contain Unhandled External Packet. For example:
2019-06-07 16:38:36 Deny 203.0.113.110 203.0.113.10 2055/udp 57233 2055 0-External Firebox Denied
1492 64 (Unhandled External Packet-00) proc_id="firewall" rc="101" msg_id="3000-0148" Traffic
A policy that denies traffic is configured by default to send a log message when it denies a connection.
For more information on how to see Policy logs in Traffic Monitor, see Read Traffic Log Messages in Traffic Monitor in
the Logging and Monitoring section of this guide.
Send Notification
This option configures the policy to send notifications about alarms.
When you enable notification, you specify a notification method. We recommend that you select the default
Email notification method. Dimension and WatchGuard Cloud cannot generate pop-up notifications.
Alarms trigger the notifications and appear on the Alarms report in Dimension and WatchGuard Cloud.
Policy Schedules
You can configure policies to be operational only at the times you specify. A policy is always operational unless you
set a custom policy schedule in the policy advanced settings.
In the policy schedule you select the days of the week and the hours when the policy is operational. For example, you
could create a schedule that allows specific types of traffic only during business hours.
You can apply the same policy schedule to multiple policies. By default, all policies use the Always On predefined
policy schedule.
If two policies are otherwise the same, the policy with the more limited schedule has higher precedence.
Fireware supports two types of policies, packet filters and proxy policies. These policy types examine data at different
layers of the OSI model.
This table shows the types of information each policy type can examine:
Source
IP Header Destination
Port(s)/Protocols
Packet body
Attachments/Files
Packet Content
RFC compliance
Commands
Packet filters are an easy way to allow or deny large amounts of traffic. Proxies can prevent potential threats from
reaching your network without blocking the entire connection. The Firebox configuration includes default sets of rules,
called proxy actions, for each type of proxy policy. You can use the default settings for each type of proxy action, or
you can customize them.
In this guide, the term policies refers to both packet filters and proxies, unless otherwise
indicated.
n DNS
n Explicit Proxy
n FTP
n H323 (ALG)
n SIP (ALG)
n HTTP
n HTTPS
n SMTP
n POP3
n IMAP
n TCP-UDP (TCP and UDP on all ports)
The FTP packet filter and proxy policies do transparent connections management for the FTP
data channel. The FTP policy is configured for TCP port 21, which is used for the
FTP handshake. The FTP policy dynamically opens another negotiated port for data transfer.
Security Services
Security services extend the built-in defenses of your Firebox to help you secure your network.
For a list of additional resources on these topics, see Security Services Additional Resources.
WatchGuard partners with third-party vendors to supply our services, so we can offer the industry’s best features and
protection.
You can enable and configure these security services on your device:
Access Portal
Clientless VPN solution that provides a central location for your users to connect to cloud-hosted applications
and internal resources.
Application Control
Monitors and controls the use of applications on your network. Application Control uses signatures that can
identify and deny over 1000 applications.
APT Blocker
Cloud-based service that uses emulation analysis to identify the characteristics and behavior of zero-day
malware.
Botnet Detection
Denies known botnet site IP addresses.
DNSWatch
Detects and denies DNS requests to known malicious domains.
Gateway AntiVirus
Scans files to detect viruses in email messages and web or FTP traffic.
Geolocation
Denies connections to or from the countries you specify.
IntelligentAV
Uses artificial intelligence and machine learning to identify and deny known and unknown malware.
spamBlocker
Identifies and denies unwanted and dangerous spam email messages.
WebBlocker
Controls access to websites based on content categories.
If you do not want to scan a specific file with APT Blocker, Data Loss Prevention, Gateway
AntiVirus, and IntelligentAV, you can add the MD5 hash of the file to the File Exceptions list.
Access Portal1
Application Control
APT Blocker
Botnet Detection
DNSWatch
EDR Core
Gateway AntiVirus
Geolocation
IntelligentAV1
spamBlocker
WebBlocker
1 Available on Firebox T40, T45, T80, and T85, Firebox M Series devices, Firebox Cloud, and FireboxV.
2 Not available on Firebox T20, T25, T40, T45, T80, T85, M290, M390, M590, M690, M4800, and M5800 devices.
WatchGuard EDR Core is included in the Firebox Total Security Suite and is a replacement for
the TDR Host Sensor. EDR Core includes a subset of the endpoint security features available
with WatchGuard EDR and supports XDR capabilities through ThreatSync.
Signature Updates
The Gateway AntiVirus, Intrusion Prevention Service, Application Control, Data Loss Prevention, Botnet Detection,
and Geolocation security services use a frequently-updated set of signatures to identify the latest viruses, threats,
and applications. IntelligentAV does not use signatures to identify viruses, but does need to download occasional
updates. You can manually get the latest signatures or updates for these services from the Subscription Services
tab in Firebox System Manager or Fireware Web UI.
Tor Exit Node Blocking uses a database of known Tor exit node IP addresses from Reputation Enabled Defense
(RED). You can manually get the latest updates for this service from the Subscription Services page in Fireware
Web UI.
If the signatures on the Firebox are not current, you are not protected from the latest viruses and intrusions. To make
sure that you always have the latest signature updates, configure all signature-based services to update signatures
automatically. To do this, click Update Server when you configure the service, then select the signatures you want to
update automatically.
To make sure that the Firebox can connect to the update server, you must add at least one DNS server to your
network configuration. The Firebox uses DNS to resolve the update server URL to an IP address.
You can enable these security services in any packet filter policy or proxy policy:
n Application Control
n Geolocation
n Intrusion Prevention Service
n Tor Exit Node Blocking
To use all services except WebBlocker, Botnet Detection, Geolocation, and DNSWatch for
HTTPS traffic, you must configure the HTTPS proxy to use the Inspect action, and select the
HTTP proxy action that has the services enabled.
Intrusion Prevention Service and Application Control are enabled in the proxy policy, not in the
proxy action. They require content inspection to fully function. If you enable these services in an
HTTPS proxy policy, you must also enable Content Inspection in the HTTPS proxy action.
When a new intrusion threat appears on the Internet, the features that make the intrusion unique are recorded as a
signature. To make sure that you always have the latest IPS signatures, enable automatic signature updates.
You configure the Intrusion Prevention Service globally. When you enable IPS, it is enabled for
all policies by default. You can selectively disable it for specific policies, if needed. We
recommend that you disable IPS on default Firebox management policies, such as the
WatchGuard Web UI policy.
Full Scan
IPS scans all packets within connections handled by policies with IPS enabled. This mode is the most secure
because it catches evasion techniques, but there is a performance trade-off.
Fast Scan
IPS scans fewer packets within each connection to improve performance. This option greatly improves the
throughput for scanned traffic, but does not provide the comprehensive evasion coverage of Full Scan mode.
The actions IPS can take for each threat level are:
n Allow — Allows the content, even if it matches an IPS signature.
n Drop — Drops the content and drops the connection. No information is sent to the sender.
n Block — Blocks the packet, and adds the source IP address to the Blocked Sites list.
By default, IPS drops and logs all traffic that matches an IPS signature at the Critical, High,
Medium, or Low threat level.
You can configure exceptions for specific signature IDs if IPS blocks content that you want to allow. Exceptions apply
to all policies that have IPS enabled.
Application Control
Application Control is a security service that enables you to monitor and control the use of web-based applications on
your network. Application Control uses over 1800 signatures that can identify and block traffic for over 1000
applications.
The Application Control signatures are updated frequently to identify new applications and to
stay current with changes to existing applications. To make sure that you always have the
latest signatures, enable automatic signature updates.
You can deny the use of specific applications or all applications in an application category. For example, you could
create an Application Control action to drop all applications in the Social Networks and Online Games categories.
For some applications, you can configure an Application Control action to selectively allow some application
behaviors (such as chat), but drop others (such as file transfer).
We recommend that you do not modify the predefined Global Application Control action.
Clone the action or create a new one.
If you have configured Traffic Management actions, you can also use Traffic Management
actions in the Application Control action to control the bandwidth used for allowed application
traffic.
USE CASE:
The flexibility offered by policy-based Application Control enables you to exercise granular control over
the use of applications on your corporate network. For example, you can:
n Block YouTube, Skype, and QQ
n Block P2P applications for users who are not part of the IT team
n Allow the marketing department to use social networking sites such as Facebook and Twitter
n Allow use of Windows Live Messenger for instant messaging, but disallow file transfers
n Limit the use of streaming media application to specific hours
n Limit the bandwidth used by certain applications with traffic management
For a list of additional resources on these topics, see Proxies and Proxy-Based Services Additional Resources.
Proxies and ALGs provide a more secure method for moving traffic through a Firebox. Proxies open the packets,
inspect the data payload, manipulate data, repackage the data, and send the packets on. This gives you more
visibility and control over the traffic that passes through a connection.
Proxies and ALGs also pass traffic more slowly than packet filters, because the Firebox inspects and applies rules to
more than the IP headers. Proxies enforce specific RFC protocol compliance. If traffic is not compliant with the
protocol, the proxy denies it.
Because proxy policies scan all packets, proxies use more resources than packet filter policies.
Use proxies only when there is a specific need to do so. For example, use proxy policies when
you want to limit, scan, or filter certain kinds of traffic to enforce your company security policy.
Proxy Actions
A proxy action is a set of rules that determines whether the proxy policy allows, denies, or takes some other action for
the traffic it inspects. You configure many security service settings in proxy actions.
Most proxy policies or ALGs have both a predefined client and a server proxy action with different configuration
options. The exceptions are the DNS-proxy, which has incoming and outgoing proxy actions, the Explicit-proxy,
which has only one proxy action, and the H.323-ALG and SIP-ALG, which only have client proxy actions.
In the proxy action list, the predefined proxy actions are in blue.
Proxy actions with names that include the suffix .Standard use settings recommended by WatchGuard. When you
add a new proxy policy, a .Standard proxy action is selected by default. Because different Fireboxes have different
licensed features, the predefined proxy actions do not enable or configure subscription-based security services.
If the Firebox does not have a feature key when you run the setup wizard, these proxy actions are not configured to
enable any subscription services.
If you add a new outgoing FTP, HTTP, or HTTPS policy, to make sure that licensed services
are enabled, use the Default-FTP-Client, Default-HTTP-Client, or Default-HTTPS-Client
proxy action instead of the .Standard predefined proxy actions.
WatchGuard Gateway AntiVirus and IntelligentAV work together to scan content and identify
viruses. Select the AV Scan action to use Gateway AV and IntelligentAV to scan content.
For most content you want to allow, select the AV Scan action in your proxy action rules.
Select the Allow action only for content you want to allow without scanning.
The Default-FTP-Client, Default-HTTP-Client, and Default-HTTPS-Client proxy actions all enable the AV Scan
action in the proxy action rules. These default proxy actions are a good starting point because they enable
recommended scanning of FTP, HTTP, and HTTPS content.
The Default-FTP-Client proxy action Upload rules, with the AV Scan action selected
In addition to a Gateway AntiVirus scan, the AV Scan action also enables subsequent scans by IntelligentAV and
APT Blocker, if those services are enabled. These three services examine the content in different ways to provide
better detection of known viruses and other emerging threats.
n Intelligent AV is enabled.
3. APT Blocker scans content only when:
n Gateway AntiVirus scan has completed with a clean result.
Gateway AntiVirus always scans content first. IntelligentAV and APT Blocker do not scan content when Gateway
AntiVirus is disabled. IntelligentAV is not a dependency for APT Blocker.
If Data Loss Prevention is enabled, DLP scans happen after all antivirus scans are complete.
IntelligentAV and APT Blocker are covered in more detail in these sections:
n IntelligentAV
n APT Blocker
To enable Gateway AntiVirus to scan HTTPS content, you must enable content inspection in the HTTPS-proxy and
select an HTTP proxy action with Gateway AntiVirus configured, and the AV Scan option selected in the proxy action
rules.
Allow
Allows the packet to go to the recipient, even if the content contains a virus.
In addition, Gateway AntiVirus can scan traffic that matches rules in several categories in each proxy.
In the Proxy Action Configuration dialog box, in the Categories list, select one of these categories to get access to
the ruleset:
Proxy Categories
FTP-proxy Download
Upload
Attachments: Filenames
Attachments: Filenames
Gateway AV can also extract and scan files in a compressed archive, such as a Zip file. The number of compression
levels to scan in a compressed file depends on the amount of RAM the Firebox has. Firebox models with less than 2
GB RAM scan eight levels of compressed files. Firebox models with 2 GB or more RAM scan up to 16 levels of
compressed files.
The Firebox cannot scan encrypted files or files that use a type of compression that Gateway AntiVirus does not
support, such as password-protected Zip files. For a full list of compressed file types that Gateway AntiVirus can
scan, see Fireware Help.
IntelligentAV
IntelligentAV only scans content that Gateway AV has scanned with a clean result.
The IntelligentAV subscription service uses artificial intelligence and machine learning to add another layer of
protection to Gateway AntiVirus. Before you can enable IntelligentAV, you must enable Gateway AntiVirus for one or
more active proxy policies. For a proxy policy to scan content with Gateway AntiVirus and IntelligentAV, you must
select the AV Scan action in the proxy action.
When IntelligentAV is enabled, Gateway AntiVirus uses two scan engines to detect malware. First, Gateway
AntiVirus scans the file. If Gateway AntiVirus does not detect a virus, IntelligentAV scans the file again. If
IntelligentAV identifies the file as a threat, the Firebox takes the action specified in the Gateway AntiVirus
configuration for the proxy.
IntelligentAV is available for Firebox T40, T45, T80, and T85, Firebox M Series (except M200/M300), Firebox Cloud,
and FireboxV. IntelligentAV does not scan files when Gateway AntiVirus is disabled or when the Gateway AntiVirus
feature key expires, even if IntelligentAV is enabled.
To use IntelligentAV with Firebox Cloud or FireboxV, the VM must have 4 GB or more RAM.
APT Blocker
A proxy uses APT Blocker when both APT Blocker and Gateway AntiVirus are enabled and the
AV Scan action is configured in the proxy action. APT Blocker only scans files that have been
scanned and processed as clean by Gateway AntiVirus.
An Advanced Persistent Threat (APT) is a type of advanced malware that attacks your network to gain access to
networks and confidential data. APT malware is designed to reside and spread within a network for extended periods
of time and to evade detection.
Because APT attacks leverage the latest targeted malware techniques and zero-day exploits (flaws which software
vendors have not yet discovered or fixed), traditional signature-based scan techniques do not provide adequate
protection against these threats. To detect malware in files, APT Blocker performs threat analysis in a cloud-based
sandbox.
To enable APT Blocker to scan HTTPS content, you must enable content inspection in the HTTPS-proxy, and select
an HTTP proxy action with Gateway AntiVirus and APT Blocker configured, and the AV Scan option selected in the
proxy action rules.
When the Firebox scans file with these services, it generates an MD5 hash for the file. This is used by Gateway
AntiVirus, IntelligentAV, APT Blocker, and Data Loss Prevention, in that order, to track the progress of the file through
the scan engines.
APT Blocker scans compatible file types if they are enabled in the Gateway AntiVirus configuration. For a proxy policy
to scan content with Gateway AntiVirus and APT Blocker, you must select the AV Scan action in the proxy action.
For each analyzed file, the data center stores the MD5 hash and threat level.
If the MD5 value of a file does not match a previously analyzed file, the Firebox uploads the entire file to the data
center for threat analysis. For proxies other than the SMTP and IMAP proxies, the Firebox allows the file while it waits
for the analysis result. When the Firebox receives the analysis result, if a threat was identified, the Firebox can
generate an alarm notification.
The Firebox stores APT Blocker results in a local cache so that if it encounters the same file again, the Firebox knows
the result and does not send the MD5 hash of the file to the data center.
The IMAP proxy always holds the message while it waits for an analysis result. For the SMTP proxy, an APT Blocker
setting in the SMTP proxy action controls whether the SMTP proxy releases messages when an attachment was sent
for APT Blocker analysis.
The High, Medium, and Low threat levels indicate the severity of malware. The Clean threat level indicates the file
was scanned by the initial file hash check or by upload to the cloud data center, and was determined to be free of
malware. The Clean threat level helps you track the status of files that have been analyzed and are determined to not
contain malware.
We recommend you consider the High, Medium, and Low threat levels as malware and use
the default action of Drop.
For each threat level you can select one of these actions:
Allow
Allows and delivers the file or email attachment to the recipient, even if the content contains detected malware.
Drop
Drops the connection. No information is sent to the source of the message. For the SMTP-proxy and POP3-
proxy, the attachment is stripped before the message is delivered to the recipient.
Block
Blocks the connection and adds the IP address of the sender to the Blocked Sites list. For the SMTP-proxy and
POP3-proxy, the attachment is stripped before the message is delivered to the recipient.
For the HTTP-proxy and FTP-proxy, this action is converted to a Drop action. For the POP3-proxy, this action
is converted to a Strip action.
When the scan results indicate that advanced malware is detected, you need to know immediately. To enable the
Firebox to send alarm notifications when APT Blocker detects a threat, in the APT Blocker notification settings,
enable notifications with the email notification method. The Firebox sends the alarm to WatchGuard Cloud or
Dimension. You can configure WatchGuard Cloud or Dimension to send email notifications for alerts received from
your Fireboxes.
For PDF files, you can specify whether APT Blocker submits unrecognized PDF files to the data center for analysis.
For a full list of supported file and archive types, see Fireware Help.
An HTTP-proxy policy examines and filters HTTP traffic. The setup wizard automatically adds
an outgoing HTTP-proxy policy and configures the Default-HTTP-Client proxy action with
recommended services and settings.
HTTP (Hypertext Transfer Protocol) is a protocol used to send and display text, images, sound, video, and other
multimedia files on the Internet. The WatchGuard HTTP-proxy is a high-performance content filter. It examines web
traffic to identify suspicious content, such as malformed content, spyware, and other types of attacks. The HTTP-
proxy enforces RFC compliance with the HTTP protocol to prevent potential threats such as buffer overflow attacks.
HTTP-proxy
The HTTP-proxy operates between a web server and a client web browser. It processes each HTTP packet from the
server and checks for any potentially harmful content before it sends the packet to the client. The HTTP-proxy can
also act as a buffer between your web server and potentially harmful web clients.
Explicit-proxy
In a normal proxy configuration, the Firebox transparently proxies and inspects client connections to servers. In an
Explicit-proxy configuration, the Firebox accepts direct requests from clients, performs a DNS lookup and connects to
specified servers, and then retrieves the information on behalf of the client. In this configuration, the client is
specifically configured to use the Firebox as a proxy server. The Explicit-proxy also supports FTP and HTTPS.
Do not configure an Explicit-proxy for connections from Any-External. This creates an open proxy
accessible to the Internet, which makes it possible for someone to use your public IP address to
attack others.
For more information about using an explicit HTTP proxy, see Fireware Help.
HTTP-Client.Standard
Select this proxy action for an outbound HTTP-proxy. The HTTP-Client proxy action is configured to give
comprehensive protection to your network from the content your trusted users download from web servers.
Default-HTTP-Client
Select this proxy action for an outbound HTTP-proxy. This has the same settings as the HTTP-Client.Standard
proxy action, but also enables licensed services, such as WebBlocker. This proxy action is created by the Web
Setup Wizard or Quick Setup Wizard when you set up the Firebox.
If it exists in your configuration, we recommended that you use this proxy action for outbound HTTP proxies
because it enables security services.
HTTP-Server.Standard
Select this proxy action for an inbound HTTP-proxy. The HTTP-Server proxy action is configured to allow most
HTTP connections through to your public web server, but to stop any attempts to upload or delete files.
Do not select the proxy actions HTTP-Client or HTTP-Server. These proxy actions are
obsolete and do not enable all recommended settings. This can cause web browsing issues.
HTTP proxy actions are also available in the HTTPS-proxy when you select the Inspect action to decrypt and inspect
HTTPS content. For more information about HTTPS and content inspection, see HTTPS-proxy Policies.
In an HTTP-proxy, you can also select a content action, HTTP-Content.Standard. For information about when to use
a content action, see Content Actions and Routing Actions.
Security Services
To further protect your network, you can enable these security services in the HTTP proxy action:
WebBlocker
Controls the websites trusted users are allowed to browse to. WebBlocker is available for the Default-HTTP-
Client, HTTP-Client.Standard and HTTPS.Client.Standard proxy actions, and any other proxy action you
configure for an outbound HTTP or HTTPS proxy.
APT Blocker
Scans HTTP traffic and blocks APT (Advanced Persistent Threat) malware that takes advantage of zero-day
exploits to gain access to your network. APT Blocker uses full system emulation analysis to identify suspicious
characteristics and behavior of advanced malware and assign a threat score. For more information, see APT
Blocker.
The Web Setup Wizard and Quick Setup Wizard automatically enable these services (if licensed) in the HTTP-proxy
policy and configure the Default-HTTP-Client proxy action.
You configure these settings in the HTTP Request and HTTP Response categories in HTTP-Client proxy actions.
HTTP Request
General Settings
Use this ruleset to control the idle timeout and maximum URL length HTTP parameters. If you set a value
to zero (0) bytes, the Firebox ignores the size of HTTP request headers. You can also enforce Safe
Search settings for web browser search engines.
You can configure the Firebox to send a log message with summary information for each HTTP
connection request. Make sure to select the Enable logging for reports check box if you want to see
usage information in Dimension and WatchGuard Cloud reports.
Request Methods
The Request Method ruleset lets you control the types of HTTP request methods allowed through the
Firebox as part of an HTTP request. Some applications, such as Google Desktop and Microsoft
FrontPage, require additional request methods. webDAV is used for collaborative online authoring and
has many additional request methods. The HTTP-proxy supports webDAV request method extensions by
default, according to the specifications in RFC 2518.
Many web pages get information from site visitors, such as location, email address, and name.
If you disable the POST command, the Firebox denies all POST operations to web servers on
the external network. This feature can prevent your users from sending information to a website
on the external network.
URL Paths
Use this ruleset to filter the content of the host and path of a URL. For best results, use URL path filters
together with Content Types and Body Content Types rules. You can use this feature to restrict access
to specific domains, parts of a website, or specific files by file name or extension.
Usually, if you filter URLs with the HTTP request URL Paths ruleset, you must configure a
complex pattern that uses regular expression syntax configured in the Advanced View of a
ruleset. It is easier and better to filter by Content Types or Body Content Types than it is to filter
URL paths.
Header Fields
This ruleset supplies content filtering for the full HTTP header. By default, the HTTP-proxy allows all
headers. This ruleset matches the full header, not only the name.
Authorization
This ruleset sets the criteria for content filtering of HTTP request header authorization fields. When a web
server starts a WWW-Authenticate challenge, it sends information about which authentication methods it
can use. The proxy puts limits on the type of authentication sent in a request.
HTTP Response
General Settings
Use this ruleset to configure basic HTTP response parameters, including idle time out, maximum line
length, and maximum total length of an HTTP response header. If you set a value control to zero (0) bytes,
the Firebox ignores the size of HTTP response headers.
Header Fields
This ruleset controls which HTTP response header fields the Firebox allows. Response headers can be
used to specify cookies, supply modification dates for caching, instruct the browser to reload the page
after a specified time interval, and several other tasks.
Most websites require custom headers (X headers) to operate correctly, so the proxy action
allows them all by default.
Content Types
This ruleset controls the IANA media types (formerly known as MIME types) allowed in HTTP response
headers. This is a common way to restrict the types of files that users can download from websites.
Cookies
Use this ruleset to control cookies included in HTTP responses. HTTP cookies are used to track and store
information about users who visit a website. The default ruleset allows all cookies.
This ruleset identifies a file based on a hexadecimal file signature (also known as a magic number or
magic byte). For example, the file signature for a Zip archive is the hexadecimal value 50 4b 03 04. Lists of
hexadecimal file signatures are widely available on the Internet.
WebBlocker
Select a WebBlocker action to restrict web access by website category. In a WebBlocker action you specify
what to do when users try to open websites in each content category. You can select from these options:
n Allow — The website opens.
n Deny — The website does not open and a notification page appears in the browser.
n Warn — The website does not open and a warning page appears in the browser. Users can select to
continue to the website or go back to the previous page.
For more information, see WebBlocker and the HTTP and HTTPS Proxies.
Gateway AV
This ruleset specifies the actions to take if Gateway AntiVirus finds a virus, a scan error occurs, or when
content is encrypted. You can also set the scan size limit, which defines the maximum file size to scan. For
more information about these settings, see AntiVirus Scanning and Proxies
Deny Message
Use this feature to customize the HTML deny message that your trusted users see if the Firebox denies HTTP
content. The deny message appears in the browser when content is blocked by a Deny action configured in
the HTTP proxy.
APT Blocker
If you have an APT Blocker subscription, use this ruleset to enable APT Blocker to analyze HTTP traffic for
advanced malware.
If the HTTP-proxy denies content you want to allow, you can look at the deny log messages to see why the content
was denied. The log messages help you to identify which proxy action settings you must adjust if you want to allow
the content. For more information about specific messages, see the WatchGuard Log Catalog.
The Firebox creates a log message for each HTTP transaction. You can use Dimension or WatchGuard Cloud to
search log messages and run detailed reports.
Use WebBlocker with the HTTP and HTTPS-proxy policies to prevent connections to websites
in specific content categories. The Default-WebBlocker action, created by the setup wizards,
denies connections to websites in risky categories by default.
WebBlocker uses a database of websites, organized into categories based on their content. You configure
WebBlocker to control which website categories your users can connect to. When a user on your network browses
the Internet, the Firebox automatically checks the WebBlocker Server for the site category. If you configured
WebBlocker to deny the site category, the user receives a message that access to the site was denied.
You can configure your Firebox to use WebBlocker Cloud or an on-premises WebBlocker Server for database
lookups. Both servers support the same website category database. WebBlocker uses WebBlocker Cloud by default.
WebBlocker works with the HTTPS-proxy even without content inspection enabled, because the domain is not
encrypted. WebBlocker can use the domain to look up the website category.
With content inspection disabled, WebBlocker filters based only on the root domain. For more
accurate WebBlocker categorization we recommend you enable HTTPS content inspection.
WebBlocker Actions
If your Firebox has a WebBlocker subscription, the Web Setup Wizard or Quick Setup Wizard automatically enables
WebBlocker and adds an HTTP-proxy policy with an HTTP proxy action that denies the WebBlocker categories you
select in the wizard. The Default-WebBlocker action, created by the setup wizard, denies risky categories by default.
You can configure multiple WebBlocker actions. In a WebBlocker action you specify what to do when users try to
open websites in each content category. You can select from these options:
n Allow — The website opens.
n Deny — The website does not open and a notification page appears in the browser.
n Warn — The website does not open and a warning page appears in the browser. Users can select to continue
to the website or go back to the previous page.
You can use the same WebBlocker action in more than one proxy policy.
Content Categories
In a WebBlocker action, you select the content categories you want WebBlocker to deny or warn users about. The
WebBlocker Cloud database contains content categories such as Adult Material, Drugs, Gambling, and Security.
Each category has multiple subcategories to give you more granular control over which content to deny.
WebBlocker Exceptions
You can add an exception to the WebBlocker categories to always allow or deny connections to a specific website.
WebBlocker compares a URL to the exception list before it considers other configured WebBlocker categories.
You can add exceptions based on IP addresses, a pattern based on a URL, or a regular expression.
To create a WebBlocker pattern match exception, you can use of any part of a URL. You can set a port number, path
name, or string that must be denied for a special website.
Regular expressions are more accurate and more efficient, in terms of CPU usage on the
Firebox, than pattern matches. If you add many WebBlocker exceptions, you can improve
performance by configuring your WebBlocker exceptions as regular expressions rather than
pattern matches. You can create a regular expression that is equivalent to a pattern match.
For example, the regular expression ^[0-9a-zA-Z\-\_]\.hostname\.com. is equivalent to the
pattern match *.hostname.com/*. For more information about regular expressions, see
Fireware Help.
If you add different WebBlocker actions for policies that apply to different groups or users, and you want to add the
same WebBlocker exceptions for everyone, add the exceptions in the WebBlocker global settings. This eliminates
the need to add the same exceptions to multiple WebBlocker actions.
In the WebBlocker exceptions list, below the list of exception rules, you can configure the action to occur if the URL
does not match the exceptions you configure. Select one of these options:
A more effective way to implement a URL whitelist is to configure HTTP Request URL Paths in
the HTTP-Proxy action settings, as described in HTTP-proxy Policies and Proxy Actions
WebBlocker Override
When your users browse the Internet, WebBlocker denies access to websites in content categories that you
configured the WebBlocker action to deny. If you want to allow users to get temporary access to a website that the
WebBlocker action denies, you can enable and configure WebBlocker override.
You can configure a WebBlocker action to use one of two override methods:
n Passphrase – Specify a passphrase that users type to override the WebBlocker settings and get access to
denied content.
n User Group – Select an existing Firebox-DB or Active Directory user group. Users who are members of the
selected group can type their credentials to override the WebBlocker settings and get access to denied
content.
When override is enabled, you can select which denied categories users can override.
This feature operates with the HTTP-proxy and Explicit-proxy policies, and with the HTTPS-proxy policy when
content inspection is enabled.
If you want to always allow specific users to have access to a different set of websites, a better
alternative is to require users to authenticate to the Firebox, and then create separate policies
for those users or groups, with a different WebBlocker action. For example, you could create
policies for your IT group that are less restrictive than policies that apply to other users.
HTTPS-proxy Policies
To apply most security services to HTTPS content, you must enable content inspection in the
HTTPS proxy action. Content inspection causes browser errors on web clients by default.
Before you enable content inspection in an HTTPS-proxy:
n Make sure that all network clients trust the Proxy Authority CA Certificate on the Firebox.
n Test the policy with a limited set of clients before you enable it for everyone.
If possible, add a CA certificate from a local PKI as the Proxy Authority certificate on the
Firebox. This avoids the need to import certificates to many client devices. This also makes it
easier to replace your Firebox with a newer model, because clients already trust the
CA certificate.
Even without content inspection, the HTTPS-proxy supports domain name rules, routing
actions, and WebBlocker, and provides more control and security than an HTTPS packet filter
policy.
Hyper Text Transfer Protocol Secure (HTTPS) is a secure web protocol that encrypts the connection between a web
browser and a web server. HTTPS uses the Transport Layer Security (TLS) protocol to encrypt the communication
protocol and establish a secure communication channel. The HTTPS-proxy policy enables you to manage and filter
secure HTTP (HTTPS) traffic on TCP port 443. You can use the HTTPS-proxy to protect your network clients, or an
HTTPS server on your network.
It is important to select the correct proxy action for incoming or outgoing HTTPS connections so
that the proxy uses the appropriate certificate.
n HTTPS-Client proxy actions use the outbound Proxy Authority CA certificate.
n HTTPS-Server proxy actions use the Proxy Server web server certificate.
You can select the Inspect action if you want the HTTPS-proxy to decrypt, inspect, and re-encrypt the content. In the
HTTPS proxy action, the Domain Names rules and WebBlocker settings determine how and when content inspection
occurs. To inspect content, you select the Inspect action and specify an HTTP proxy action to use to inspect the
decrypted content.
Content inspection is a very resource-intensive feature, which can have a noticeable impact
on Firebox performance, particularly for smaller Firebox models. To limit the performance
impact, use the Inspect action for specific sites or content categories only, not for all content.
Content Inspection
TLS Profile
Select the Transport Layer Security (TLS) profile to use for content inspection. In a TLS profile you can
configure these security settings:
n Minimum Protocol Version — Specify the minimum TLS protocol version to allow. To meet the
requirements of the Payment Card Industry Data Security Standard (PCI DSS), set the minimum
protocol version to TLS v1.2.
n Allow only TLS-compliant traffic — Specify whether to enforce compliance to the TLS protocol. The
HTTPS-proxy is the only proxy where protocol enforcement is optional. This setting is disabled by
default.
Enabling the Allow only TLS-compliant traffic setting can interfere with applications that
send non-HTTPS traffic on port 443. It is more secure to enable this setting, because
malware can also use port 443, and the proxy drops the non-compliant traffic.
n Use OCSP to validate certificates — Specify whether to use Online Certificate Status Protocol
(OCSP) to check for revocation of web server certificates. This setting applies only for HTTPS-Client
proxy actions. OCSP can add some latency. To improve performance, disable this setting.
A preconfigured TLS profile is selected by default. The TLS profile settings appear in the content
inspection summary.
Do not specify a URL in a domain name rule. For example, a domain name rule with a pattern
like example.com/* will not work. The slash indicates a URL path, which can never be
matched, because all URLs are encrypted in HTTPS.
For each domain name rule, you can specify one of these actions:
n Allow — Allows the HTTPS request through and does not decrypt it.
n Inspect — Decrypts the connection and uses an HTTP proxy action to inspect the content.
n Deny — Denies the specific request but keeps the connection if possible. Sends a response to the
client.
n Drop — Denies the request, drops the connection, and sends a response to the client.
n Block — Denies the request, drops the connection, adds the site to the temporary blocked sites list,
and sends a response to the client.
All HTTPS-Client proxy actions include predefined domain name rules that allow HTTPS requests to
servers required by WatchGuard products and services.
For an HTTPS-Server proxy action, when you select the Allow or Inspect action in a domain name rule,
you can configure a routing action and port to send the request to a different destination than what is
specified in the policy. This enables the Firebox to route incoming HTTPS requests originally sent to the
same public IP address to different internal IP addresses or ports based on the domain pattern.
Do not specify a URL in a domain name rule. The URL is encrypted and cannot be used for
matching in a domain name rule. To route inbound traffic based on a URL path, choose the
Inspect action, and then select an HTTP Content Action with URLs/paths defined. For more
information, see Content Actions and Routing Actions.
WebBlocker action
Select a WebBlocker action. The WebBlocker action specifies the action to take when users try to open
websites in each content category, either Allow, Warn, or Deny.
WebBlocker can allow and deny most HTTPS content even without content inspection enabled
because the client-requested domain is often not encrypted. For connections that use TLS 1.3,
the domain is encrypted and WebBlocker content filtering is more limited. With TLS 1.3, the only
domain information that WebBlocker can use for filtering might be the CN in the website
certificate if the SNI is encrypted.
General Settings
Configure settings for alarms and logging. If you use reports in Dimension or WatchGuard Cloud, make sure
the Enable logging for reports check box is selected. This option is enabled by default.
You cannot add rules to the Content Inspection Exceptions list. If you want to add a custom exception, you must add
a rule to the Domain Names rules list.
The HTTP proxy action you use for content inspection can be the same one you use for the HTTP-proxy.
The Default-HTTP-Client proxy action created by the setup wizards enables licensed
security services and is a good choice unless you have configured another custom proxy
action.
When you configure the HTTPS proxy action, consider all of these settings.
An HTTPS proxy action with the order of operations for content inspection
When the Firebox re-encrypts the inspected traffic, it uses the Proxy Authority certificate on the Firebox to sign the
website certificates. Because the default Proxy Authority certificate is a self-signed CA certificate, it is not trusted by
clients on your network. This causes certificate warnings to appear in the web browser of all clients.
To create a proxy authority certificate for use with the HTTPS-proxy content inspection feature, you must
create a CA certificate that can re-sign other certificates. For example, you could generate a subordinate CA
certificate for the Firebox to use as the Proxy Authority certificate. To do this, you can create a Certificate
Signing Request (CSR) with Firebox System Manager, Fireware Web UI, or from OpenSSL, and have your
internal CA server sign that certificate. Then, import the CA certificate and the subordinate CA certificate to the
Firebox. For more details, see Create a Certificate CSR in Help Center.
WatchGuard recommends that you use a certificate signed by your own internal CA.
Public CA providers will not provide a CA certificate with permission to sign other certificates.
We recommend that you use a certificate signed by your own internal CA.
To view, import, and export certificates from the Firebox, in Firebox System Manager, select View > Certificates.
To download the Proxy Authority certificate from the Certificate Portal on the Firebox, go to:
http://<Firebox IP address>:4126/certportal
The certificate portal is a good option for guest users, or non-domain computers that do not trust your local Active
Directory or PKI server.
If your Firebox allows other traffic that uses the HTTPS port, such as SSL VPN traffic, we
recommend that you test and evaluate the content inspection feature carefully.
If your Firebox allows outbound SSL VPN traffic, make sure that HTTPS content inspection does not interfere with
those connections. To do this, you can add an HTTPS packet filter policy to allow port 443 connections to the
destination IP addresses or domains the VPN clients connect to. Make sure the HTTPS packet filter policy is higher in
the policy list than the HTTPS-proxy policy that performs content inspection.
An HTTP content action can apply to incoming HTTP or decrypted HTTPS traffic. In an
HTTP content action, you specify content rules. Each content rule defines where to route the
request (the routing action) and specifies the HTTP proxy action to use for content inspection.
You can also use routing actions in domain name rules to redirect HTTPS requests based on
the domain name without content inspection.
If you use the same public IP address for inbound connections to multiple public web servers protected by the
Firebox, you can configure routing actions or HTTP content actions to route incoming requests to the correct web
server.
Routing Actions
A routing action specifies the IP address and port of a server. To redirect HTTPS requests based on the domain
name without content inspection, specify a routing action in a domain name rule in the HTTPS-Server proxy action.
Do not specify a URL in a domain name rule. The URL is encrypted and cannot be used for
matching in a domain name rule. To route inbound traffic based on a URL path, select the
Inspect action, and then select an HTTP content action with URLs/paths defined.
You can use the policy default destination and port, or you can configure custom settings for each rule.
TLS/SSL Offloading
TLS/SSL Offload reduces the CPU load on the Firebox and removes the burden of TLS/SSL encryption and
decryption from your internal web server. Traffic is encrypted (HTTPS) between external clients and the
Firebox. Traffic is clear-text (HTTP) between the Firebox and the internal server.
To route inbound HTTP requests to multiple servers based on the URL path or domain name in the HTTP request,
use an HTTP content action. In an HTTP content action, you configure rules that specify:
n A pattern to match a domain name, URL path, or both
n A routing action (IP address and port)
n An HTTP proxy action
You can select an HTTP content action instead of a proxy action in:
n Inbound HTTP-proxy policies
n HTTPS-Server proxy actions in domain name rules with content inspection
Content Rules
In an HTTP content action, you configure:
n Content rules for patterns to match against HTTP requests
n The action to take if a no content rule is matched
Each HTTP content rule specifies a pattern to match in the HTTP host header and HTTP request. The pattern in a
content rule can match a domain, a path, or both.
example.com
mail.example.com
Path */blog/*
*/audio/*
blog.example.com/resource/*
*.example.com/docs/*
Rule Actions
Rule actions control where to route requests and which proxy action to use when the domain and path of an HTTP
request matches a specified pattern.
Proxy Action
Select the HTTP proxy action to use for connections to the internal server.
Routing Action
Specify the IP address of an internal server, or route to the default destination in the proxy policy.
Routes specified in the content action override the destinations configured in the policy. When you configure a
proxy policy to use a content action, the destinations configured in the policy To field are not used unless you
specify Use Policy Default in the content action.
The HTTPS port is used only when the content action is used in an HTTPS-proxy policy with content
inspection enabled.
TLS/SSL Offload
When you enable the TLS/SSL Offload option, HTTPS is used for traffic between external clients and the
Firebox. HTTP is used for traffic between the Firebox and the internal server.
Authentication
When you require users to authenticate through the Firebox, you can create policies for traffic from specific users and
groups. You can also see user names in log messages and reports, which gives you information about user traffic on
your network.
Authentication is important when you use dynamic IP addressing (DHCP) for computers on trusted or optional
networks. It is also important if you must identify your users before you let them connect to resources on the external
network or other internal networks.
For a list of additional resources on these topics, see Mobile VPN Additional Resources.
Authentication Servers
You can configure these types of authentication servers on your Firebox:
n Firebox Authentication (also known as Firebox-DB)
n AuthPoint
n Third-party authentication servers (Active Directory, LDAP, RADIUS, SAML, and SecurID)
To configure authentication servers, select Setup > Authentication > Authentication Servers. Select a tab to
configure that type of server.
You can configure more than one authentication server type on the Firebox.
Firebox Authentication
When you configure the Firebox as an authentication server, the Firebox stores user accounts that you create to give
users access to your network.
Firebox authentication is often used by organizations that do not have a third-party authentication server and do not
need to manage user accounts centrally for multiple applications. Firebox authentication works with policies, all VPN
types, management access, and all other Firebox features that authenticate users.
To make sure user credentials stored on the Firebox are secure, the Firebox encrypts user passphrases with an NT
hash in the device configuration file. If the configuration file is exported to a clear text file, the Firebox encrypts the
passphrase with an AES key wrap. This protects user passphrases, for example, when a configuration file is exported
to a clear text file for communication between the Firebox and a Fireware device configuration management tool.
For networks with many users, we recommend a third-party authentication server rather than
Firebox authentication. With Firebox authentication, an administrator must log in to the
Firebox to specify and reset user passwords. Users cannot specify or change their own
passwords.
3. The authentication page sends the user name and password to the selected authentication server using
Password Authentication Protocol (PAP). PAP is unencrypted. Passwords are hashed.
4. If the authentication server responds that the user is authenticated, the user can connect to approved network
resources.
5. The user can close the browser window after authentication is complete.
The user stays authenticated for the amount of time specified in the global or user timeout settings. The user can click
Logout on the authentication web page to close the session before the timeout period elapses. If the web page was
previously closed, the user must open it again and click Logout to disconnect.
You can also require your users to authenticate to the authentication portal before they can get access to the Internet.
You can choose to automatically send users to the portal, which applies only to HTTP and HTTPS connections. Or,
you can require users to manually go to the portal.
This diagram shows the basic authentication sequence for Firebox Authentication.
To prevent a user from authenticating, you must disable the user account on the authentication
server.
To send an authentication request through a gateway Firebox to a different Firebox, the WatchGuard Authentication
policy must allow this traffic. On the gateway Firebox, edit the WatchGuard Authentication policy so it allows traffic to
the IP address of the destination Firebox.
User Timeouts
To control how long Firebox-DB users remain authenticated, you can specify timeout values that apply globally or
only to specified users. The Firebox uses the global setting only if no timeout value is specified in the Firebox-DB user
settings.
To configure global timeout settings, select Setup > Authentication > Authentication Settings. By default, the
Session Timeout is 0 and the Idle Timeout is 2 hours.
To configure timeout settings for a user account, select Setup > Authentication > Authentication Servers >
Firebox-DB > Users > Add. By default, the Session Timeout is 8 hours and the Idle Timeout is 30 minutes.
For users authenticated by third-party servers, the timeout values configured on those servers override the global
authentication timeouts.
Server Timeouts
On the Firebox, you can configure these timers for authentication server communication:
n Timeout — How long the Firebox waits for a response from the server before it closes the connection and tries
to connect again.
n Retries — How many times the Firebox attempts to contact the server before it marks the server as inactive.
This setting applies only to RADIUS servers.
n Dead Time — The time after which an inactive server is marked as active again.
Login Limits
You can limit your users to a specific number of authenticated sessions. If you select this option, you can specify the
number of times users can type the same credentials to log in to one authentication server from different IP
addresses.
You can specify what happens when an authenticated user tries to authenticate again. Select one of these options:
n Allow subsequent login attempts and log off the first session
n Reject subsequent login attempts
You can configure these settings at Setup > Authentication > Users and Groups when you Add or Edit a user or
group.
Multi-User Systems
The Firebox associates a user name to an IP address. This means that the Firebox authenticates one user for each
computer.
Your network might include multi-user systems such as a Terminal Server or Citrix server. If your users log in to a
Terminal Server or Citrix server, we recommend that you install WatchGuard Terminal Services Agent on those
servers. The Terminal Services Agent is also known as the TO (Traffic Owner) Agent.
The TO Agent monitors traffic generated by individual users and reports the user session ID to the Firebox for each
traffic flow generated by a Terminal Server or Citrix server client. The Firebox can then correctly identify each user
and apply the correct security policies to the traffic for each user, based on user or group names.
In Fireware v12.11 and higher, the Mobile VPN with SSL client download page is removed from
the Firebox.
This feature is supported in Fireware v12.10.4 and higher. In Fireware v12.10.4, this feature is
disabled by default. In Fireware v12.11 and higher, this feature is enabled by default.
When you enable Block IP Addresses with Consecutive Failed Logins, the Firebox temporarily blocks an IP address
after a specified number of consecutive failed authentication attempts within a specified time period. The Firebox
automatically adds the blocked IP address to the Blocked Sites list with a Reason of block failed logins.
The number of consecutive failed authentication attempts you enter is used for the total number of failed attempts to
all login pages on the Firebox.
You can use the AuthPoint authentication server on your Firebox to configure multi-factor authentication for:
n Mobile VPN with SSL
n Mobile VPN with IKEv2
n Firebox Web UI
n Firebox Authentication Portal
The AuthPoint authentication server on the Firebox is disabled by default. To enable the AuthPoint authentication
server on a Firebox, you must configure a Firebox resource in AuthPoint. In AuthPoint, resources are the applications
and services that your users connect to, such as a VPN or your Firebox.
After you configure the Firebox resource in AuthPoint, the AuthPoint authentication server is enabled on the Firebox.
AuthPoint Configuration
To configure AuthPoint and enable the AuthPoint authentication server on a Firebox, you must:
n Register and connect the Firebox to WatchGuard Cloud as a locally-managed Firebox.
n Add a Firebox resource in AuthPoint.
n Add users and groups in AuthPoint.
n Add authentication policies in AuthPoint to specify which resources AuthPoint users can authenticate to and
which authentication methods they can use.
Firebox Configuration
To require that users authenticate with multi-factor authentication, you must configure the Firebox to use the
AuthPoint authentication server.
n Mobile VPN with SSL — In Fireware, configure AuthPoint as the primary authentication server for your Mobile
VPN with SSL configuration.
n Mobile VPN with IKEv2— In Fireware, configure AuthPoint as the primary authentication server for your
Mobile VPN with IKEv2 configuration.
n Firebox Authentication Portal — In Fireware, specify AuthPoint as the authentication server for users and
groups.
n Fireware Web UI — In Fireware, go to System > Users and Roles and add Device Management users with
AuthPoint as the authentication server.
When you configure the Firebox to use the AuthPoint authentication server:
password).
n LDAP users — AuthPoint tells the Firebox to contact Active Directory to validate the first factor (password).
AuthPoint validates the second factor (push or one-time password).
3. The Firebox prompts the user to select an authentication option:
n If the user selects the push option, AuthPoint sends a push request to the user’s phone.
n If the user selects the one-time password option, the Firebox prompts the user to specify a one-time
password (OTP).
You can add multiple Active Directory and RADIUS servers to the Firebox configuration. For example, you could add
three primary Active Directory servers and specify a backup Active Directory server for each primary server.
When you configure a third-party authentication server on the Firebox, you must specify these settings:
n Active Directory — Server IP address and search base. The text you specify in the first Domain Name text box
is used only for Firebox log messages.
n LDAP — Server IP address, search base, and group attribute. In most cases, you must also specify the DN of a
searching user.
n SAML — FQDN that resolves to the Firebox external interface and an IdP metadata URL.
n RADIUS and SecurID — Server IP address and shared secret.
For example, you configure a primary and backup authentication server. The Firebox attempts to contact the primary
authentication server for the amount of time specified by the Timeout value. By default, this is 10 seconds.
If a primary or secondary RADIUS authentication server does not respond after the Timeout
interval elapses, the Firebox attempts to contact the server again. If the server does not
respond after the number of attempts specified in the Retries value, the Firebox marks the
server as inactive.
You can define policies that only allow connections for authenticated users, or you can limit
connections to specific users.
An authenticated user can send traffic through the Firebox only if the traffic is allowed by a Firebox policy. After you
add a user or group to a policy, the Firebox automatically adds the WatchGuard Authentication policy. This policy
controls access to the Authentication Portal web page.
You can configure authentication differently for each policy. For example, you can force some users to authenticate
before they connect to an FTP server, but allow them to browse the Internet before they authenticate.
The user or group name must use the same capitalization on the Firebox and your third-party authentication server.
When you add a group or user, you have these Authentication Server options:
n Any — Works for any type of authentication server configuration on the Firebox. As a best practice, to avoid
unintended access to certain authentication servers, only select this option if it is acceptable for the group or
user to authenticate to any server.
n [Server name] — Restricts authentication to only this server. You can also use this option to later add policies
for groups or users who authenticate to a specific server.
To allow authentication to more than one, but not all, servers, add the group or user multiple times. For example, you
can specify these authentication servers on your Firebox:
n example.net (RADIUS)
n example.test (RADIUS)
n example.com (Active Directory)
n example.org (Active Directory)
To allow the Accounting group to authenticate to both Active Directory servers, but not the RADIUS servers, add the
Accounting group twice — once for example.com, and again for example.org. To allow the Marketing group to
authenticate to the RADIUS servers, but not the Active Directory servers, add the Marketing group twice — once for
example.net, and again for example.test. To allow the IT group to authenticate to all servers, select Any.
Policies
The first time you add a user or group to the From field of any policy, the Firebox automatically adds a policy named
WatchGuard Authentication (WG-Auth). The policy has this configuration:
n From — Any-Trusted, Any-Optional
n To — Firebox
The WatchGuard Authentication policy gives your users the ability to authenticate to the Firebox.
If you see the message Decrypted traffic does not match any policy, make sure
that the user is in a group with the same name as your Mobile VPN group. Or,
Login Limits
For both individual users and user groups, you can enable login limits. When you enable unlimited concurrent logins
for a user or group, you allow more than one user or member of a group to authenticate with the same user
credentials at the same time, to each authentication server.
The other option you can select for user and group login limits is to limit your users or members of a group to a single
authenticated session. If you select this option, your users cannot log in to one authentication server from different IP
addresses with the same credentials. When a user is already authenticated and tries to authenticate again, you can
select whether to terminate the first user session when the additional session is authenticated, or reject the additional
session.
You can also configure global login limits in the Fireware Authentication settings. By default, the Firebox allows
unlimited concurrent logins from the same account.
Mobile VPN
A Mobile VPN (Virtual Private Network) enables trusted mobile or remote users to connect and log on from an
external network. Fireware supports four types of mobile VPNs: Mobile VPN with IKEv2, Mobile VPN with SSL,
Mobile VPN with L2TP, and Mobile VPN with IPSec.
For a list of additional resources on these topics, go to Mobile VPN Additional Resources.
A VPN tunnel is a secure connection between a mobile user and resources on your network. A
VPN client on the remote user’s computer sends traffic for your network through the VPN
tunnel. When your Firebox receives traffic through a VPN tunnel, it forwards that traffic to the
correct destination.
To use a mobile VPN, you must first configure mobile VPN on your Firebox. You must also configure VPN settings for
each user or group of users. Mobile VPN users authenticate either to the Firebox authentication server or to an
external authentication server.
Topology
This diagram shows a common mobile VPN topology.
Each mobile VPN type uses different ports, protocols, and encryption algorithms to establish a connection. The
required ports and protocols must be open between the mobile device and your Firebox for the mobile VPN to
function.
You can configure all mobile VPN types on your Firebox and use them simultaneously. You can also configure client
computers to use one or more mobile VPN types.
Mobile VPN with IPSec uses the IKEv1 Aggressive Mode protocol. Because of a known
vulnerability with the IKEv1 Aggressive Mode protocol, we recommend that you consider any
mobile VPN option other than Mobile VPN with IPSec. In this guide, we do not cover Mobile
VPN with IPSec. For more information about Mobile VPN with IPSec, go to Fireware Help.
Encryption Support
Encryption algorithms protect the data so it cannot be read by a third party while in transit through the VPN. Each
VPN type supports different encryption algorithms. Larger encryption key sizes are more secure. AES is the most
secure encryption algorithm, and is supported by all VPN types.
Firebox
(Firebox-DB)
Mobile Active Local
VPN 1 Directory LDAP RADIUS SecurID SAML Authentication
Authpoint
Mobile Yes Yes2 No Yes No No Yes
VPN with
IKEv2
The IPSec VPN Users value in the feature key is a combined limit for Mobile VPN with IKEv2 and Mobile VPN with
IPSec. For example, if a feature key allows 250 IPSec VPN user connections and 200 Mobile VPN with IPSec users
are connected, 50 Mobile VPN with IKEv2 users can connect.
The SSL VPN Users value in the feature key is a combined limit for Mobile VPN with SSL and BOVPN over TLS.
To see the feature key for your device in Policy Manager, select Setup > Feature Keys.
VPN
Type Windows macOS Android and iOS
L2TP Users manually configure Users manually configure the Users manually configure the native
the native VPN client or native VPN client or any VPN client.
any L2TPv2 client that L2TPv2 client that complies
complies with RFC 2661. with RFC 2661.
SSL Users authenticate to the Users authenticate to the Users must install an OpenVPN
Firebox to download and Firebox to download and install client. Users can authenticate to the
install the client the client configuration file. Firebox to download the Mobile VPN
configuration file. with SSL client configuration file to
The client computer must
import to the OpenVPN client.
The client computer must support TLS 1.1 or higher.
support TLS 1.1 or
higher.
*For computers with Windows 7, you must manually configure the native IKEv2 VPN client. The .bat script is not
supported.
For detailed instructions on how to configure native VPN clients and strongSwan, go to Fireware Help.
Other Considerations
Mobile VPN with IKEv2 offers the highest level of security, best performance, and easiest deployment. This VPN type
has certificate-based client authentication instead of a pre-shared key. Mobile VPN with IKEv2 supports MOBIKE, a
mobility protocol that makes sure your remote workers remain connected to the VPN even if they move to a different
network.
Mobile VPN with IKEv2 and Mobile VPN with SSL support full tunnel and split tunnel configurations.
Mobile VPN with IKEv2 and L2TP work only when the required ports and protocols are allowed on the remote
networks. This means these mobile VPN types might not work on all remote networks.
Mobile VPN with IKEv2 supports full tunnel and split tunnel configurations.
Security
Mobile VPN with IKEv2 uses certificates for endpoint verification. For authentication, Mobile VPN with IKEv2 uses
EAP and MS-CHAPv2.
This type of mobile VPN supports local authentication on the Firebox (Firebox-DB), RADIUS, and AuthPoint
authentication servers.
Performance
Mobile VPN with IKEv2 performs better than Mobile VPN with L2TP and Mobile VPN with SSL.
Connection Settings
Mobile VPN with IKEv2 uses these ports, protocols, and encryption algorithms to establish a connection:
Required ports ESP and UDP 500; UDP 500 and 4500 for NAT-T
Transport and authentication protocols IKEv2 (Internet Key Exchange Tunneling Protocol v2)
Mobile VPN with SSL supports full tunnel and split tunnel configurations.
Fireware v12.11 expands support for SAML authentication and includes Firebox authentication. The Mobile VPN with
SSL v12.11 client for Windows, and the Mobile VPN with SSL v12.11.2 client for macOS, support SAML
authentication.
By default, Mobile VPN with SSL uses TCP 443 for tunnel traffic. This makes Mobile VPN with SSL portable to almost
any environment that allows outbound HTTPS and does not decrypt the traffic. In the Mobile VPN with SSL
configuration, you configure these channels:
Data channel
The data channel is used to send data after a VPN connection is established.
If you change the data channel to a port other than 443, users must manually type this port in the Mobile VPN
with SSL connection dialog box. For example, if you change the data channel port to 444, and the Firebox IP
address is 203.0.113.2, users must type 203.0.113.2:444.
Configuration channel
In Fireware v12.11 and higher, the Mobile VPN with SSL client download page is removed from
the Firebox.
The configuration channel specifies where Mobile VPN with SSL users can download SSL client software. For
example, if the Firebox IP address is 203.0.113.2, and the port is 443, users can connect to
https://203.0.113.2/sslvpn.html to download client software.
If the data channel protocol is TCP, the configuration channel automatically uses the same port and protocol.
If you set the data channel protocol to UDP, you can specify a different port than the data channel. For
example, if you specify port 444 for the configuration channel, users can connect to
https://203.0.113.2:444/sslvpn.html to download client software.
Although Mobile VPN with SSL usually works on most networks, it can fail because of firewall restrictions:
n Content inspection — If a network device decrypts HTTPS traffic to inspect it for malicious content, Mobile
VPN with SSL fails.
n Protocol enforcement — If you enable the Allow only TLS-compliant traffic option on your Firebox, Mobile
VPN with SSL might fail.
n Application control — If an application control service blocks the open-source OpenVPN software, Mobile
VPN with SSL fails.
Other software vendors might have different names for these settings and services. However, if these settings and
services work as described here, Mobile VPN with SSL fails.
Security
Mobile VPN with SSL is a secure mobile VPN option, but it is less secure than IPSec-based VPNs because:
n It does not support multi-layer encryption.
n An attacker needs to know only the Firebox IP address and client login credentials to connect.
Mobile VPN with SSL uses both TLS and certificates for encryption.
It works with any combination of authentication servers available through the Firebox.
Performance
Mobile VPN with SSL is slower than other mobile VPN types. It is not the best option for latency-sensitive traffic such
as VoIP or high-bandwidth file transfers. However, you can improve Mobile VPN with SSL performance if you select
UDP for the data channel and use AES-GCM ciphers.
Android and iOS users download a profile from the Firebox portal for use with an OpenVPN client.
Connection Settings
Mobile VPN with SSL uses these ports, protocols, and encryption algorithms to establish a connection:
Other TCP and UDP ports are less likely to be allowed by remote
networks
Transport and authentication TLS (Transport Layer Security) — requires TLS 1.1 or higher
protocols
Authentication: SHA-1, SHA-256, SHA-512
3DES: 168-bit
Setup Overview
For each mobile VPN type, you can use a Setup Wizard or manually configure the settings. We
recommend the wizard because it simplifies configuration.
Wizard Configuration
The Setup Wizards help you to configure these settings:
IP address range
This is a pool of IP addresses reserved for mobile VPN users. When a mobile user connects to the VPN, the
Firebox assigns the user's device an IP address from this pool.
To avoid IP address conflicts, make sure the pool does not overlap with other networks.
Authentication servers
Select an authentication server. The list includes all authentication servers you previously specified in the
Firebox configuration.
n Non-default group names do not appear in the list of groups on the Firebox. However, the mobile VPN
policy applies to all users and groups specified in the mobile VPN configuration.
When a Mobile VPN with L2TP tunnel is created, the identity of each endpoint must be verified with a key. This
key can be a:
n Passphrase or pre-shared key known by both endpoints.
n Third-party certificate or self-signed certificate.
n Certificate from the Management Server.
After the wizard completes, you can edit the configuration to change these and other settings. Settings that do not
appear in the wizard are set to default values.
Manual Configuration
To manually configure mobile VPN settings for the first time, select to skip the wizard.
On the manual configuration page, you have access to settings that do not appear in the wizard.
Networking
By default, all traffic from VPN clients goes through the VPN tunnel and your Firebox policies. This includes traffic
destined for the Internet and your internal network. This option provides consistent security but reduced performance.
This option is known as full tunneling.
To send only some traffic from VPN clients through the VPN tunnel, you can specify allowed resources. Only traffic
destined for selected networks goes through the VPN tunnel. This option is also known as split tunneling.
All mobile VPN types support full tunneling. In the Mobile VPN with IKEv2 and Mobile VPN with SSL configurations,
you can also configure settings for split tunneling. You cannot configure settings for split tunneling in the Mobile VPN
with L2TP configuration.
For more information about these options, go to the Mobile VPN Routing Options section.
The Diffie-Hellman setting applies to all mobile VPN types except Mobile VPN with SSL.
In most cases, you can keep these default values. For better VPN performance, we recommend AES-GCM
encryption for mobile VPN types that support this option.
Make sure the settings you configure on the Firebox are the same as the settings on the VPN client.
DNS
In the configuration for each mobile VPN type, you can specify which domain name, DNS servers, and WINS servers
that VPN clients use. Select one of these options:
n Assign the Network (global) DNS/WINS settings to mobile clients — VPN clients use the global name
resolution settings that you specify in the Firebox configuration at Network > Interfaces > DNS/WINS. This
includes settings for the domain name suffix, DNS servers, and WINS servers. This is the default setting for
new mobile VPN configurations.
n Do not assign DNS or WINS settings to mobile clients — VPN clients do not use name resolution settings
from the Firebox. You must specify domain name suffix, DNS server, and WINS server settings on the client.
n Assign these settings to mobile clients — VPN clients use the settings that you specify here. For Mobile VPN
with L2TP, you can specify DNS servers. For Mobile VPN with IKEv2, you can specify DNS servers, WINS
servers, and a domain name suffix (Fireware v12.9.2 or higher). For Mobile VPN with SSL, you can specify
DNS servers, WINS servers, and a domain name suffix.
Policies
When you configure a mobile VPN, the Firebox automatically adds two policies:
n A policy that allows VPN connections to terminate on the Firebox
n A policy that allows all traffic from users in the group to the resources available through the tunnel
Although the mobile VPN connection is secure, you might want to edit the default policies or create custom policies to
limit the types of traffic allowed through the tunnel.
For more information about hidden policies, go to the Hidden Policies section of this guide.
Client Configuration
After you configure the Firebox, you must configure the mobile VPN clients, as specified in the next section.
For some mobile VPN types, you can download client configuration files. These files contain the
settings necessary for VPN clients to connect.
You can use these files to easily configure VPN profiles on user computers.
Windows devices
Run the .bat script on the user's computer, which automatically configures the native IKEv2 VPN client.
If you have a large number of users, consider Group Policy for automated deployment. For example, you can
configure Group Policy to automatically push the WG IKEv2.bat script to users each time they log in to the
domain. Group Policy deployment has several benefits:
n Save time with zero-touch deployment.
n Avoid connection issues caused by users who specify incorrect settings in the VPN client.
n Automatically push VPN client configuration updates when users log in to the domain.
For information about Group Policy, go to the Microsoft documentation.
Android devices
Import the configuration file in the third-party strongSwan VPN app.
For computers with Windows 7, you must manually configure the native IKEv2 client. The
automatic configuration script is not supported.
In Fireware v12.11 and higher, the Mobile VPN with SSL client download page is removed from
the Firebox. To download the .OVPN file, go to VPN > Mobile VPN on the Firebox.
When you configure Mobile VPN with SSL, a client configuration file is automatically created and saved on the
Firebox. The client automatically gets the configuration file from the Firebox each time it connects to the Firebox.
Users with the open-source OpenVPN client can also download a Mobile VPN with SSL client profile (.ovpn file) from
your Firebox.
To download the Mobile VPN with SSL client or the .ovpn configuration file, go to:
https://[external interface IP address]/sslvpn.html
Default route is the default option for all mobile VPN types. Default route is usually the default setting on all
operating systems.
If you manually configure the client in Windows 10, you might need to change the IPv4 adapter
properties for the IKEv2 VPN connection so that Use default gateway on remote network is
selected. This is the default-route (full tunnel) option.
Split tunnel
With split tunnel, users can browse the Internet, but their Internet traffic is not sent through the VPN tunnel. A
split tunnel VPN has better network performance than a default route VPN. However, split tunneling decreases
security because the Firebox policies you create are not applied to the Internet traffic.
For both default route and split tunnel, we recommend that each client computer has security
software. For example, anti-virus software and WatchGuard Endpoint Security on the client
computer can protect the client from malicious software. This can help protect your corporate
network from malicious traffic that might arrive from the client through the VPN.
BOVPN Introduction
A branch office VPN (BOVPN) is an encrypted and authenticated connection between two
networks. Companies use a BOVPN to securely send data through an untrusted network such
as the Internet. A BOVPN connection is also known as a site-to-site tunnel.
The Firebox can build an IPSec VPN tunnel to another Firebox or to any 3rd-party IPSec-compliant VPN endpoint.
When an IPSec tunnel is created, the two tunnel endpoints authenticate with each other to send and receive
encrypted data.
The Firebox examines traffic to and from computers on the network it protects. It uses the source and destination IP
address of the traffic and the VPN settings to decide what traffic to encrypt and send to the remote VPN gateway.
Topology
This diagram shows a Firebox and a third-party endpoint as the BOVPN gateway endpoints. Third-party endpoints
must support site-to-site tunnels. You can also create a VPN between two Fireboxes.
When you add a BOVPN gateway and tunnels to configure a BOVPN, you set both the source and destination
for the traffic you want to send through the tunnel. The device routes a packet through the BOVPN tunnel if the
source and destination of the packet match a configured VPN tunnel route.
This type of BOVPN works with all Fireboxes and most third-party devices (except cloud services). Manual
BOVPN does not support dynamic routing or static routes with metrics.
This type of BOVPN works with any third-party device that supports Cisco VTI or GRE over IPSec. BOVPN
virtual interfaces support VPN connections to cloud-based endpoints such as Microsoft Azure and Amazon
AWS.
You cannot use the Management Server to configure a BOVPN virtual interface.
Managed VPN tunnels are not discussed in detail in this guide but use the same security settings and
protocols as a manual VPN tunnel. For more information about managed VPN tunnels, go to Fireware Help.
We recommend BOVPN over TLS only when your network cannot pass IPSec traffic. For a full or partial mesh
VPN configuration on a network that allows IPSec traffic, we recommend that you configure an IPSec BOVPN
tunnel. An IPSec BOVPN tunnel is better suited for environments that require high VPN performance.
Manual With a manual BOVPN, traffic is always routed through the tunnel if the source and destination IP
BOVPN addresses match a tunnel route in the VPN configuration.
BOVPN With a BOVPN virtual interface, traffic is routed through the VPN if the VPN route has the route
Virtual distance with the highest priority to the destination. You assign a route distance from 1 to 254 to
Interface each BOVPN virtual interface route. A route distance of 1 has highest priority.
You can use this type of tunnel in many different network routing scenarios, such as SD-WAN,
metric-based failover and failback, dynamic routing, and routing of IPv6 traffic through an IPv4
tunnel.
Use this type of VPN if you want to separate the routing from the VPN security association. The
VPN security association is the secure, authenticated channel between two gateway endpoints.
Managed Managed BOVPN tunnels are useful if you want to create and manage a large number of tunnels
BOVPN between Fireboxes that are managed by a WatchGuard Management Server. On the
Management Server, you can create Security Templates and VPN Firewall Policy Templates that
can be used for one or more managed VPN tunnels. The templates make it easier to configure a
large number of VPN tunnels with consistent settings.
Use this type of VPN for VPN tunnels between Fireboxes managed by a WatchGuard
Management Server.
BOVPN If your network does not allow IPSec traffic, BOVPN over TLS tunnels are useful because they
over TLS send traffic over port 443, which is usually open on most networks. Manual BOVPN tunnels and
BOVPN Virtual Interfaces use IPSec.
Because this is the slowest type of VPN, we recommend it only when these conditions are true:
n Your network cannot pass IPSec traffic. For example, some ISPs might not allow IPSec
traffic, and some older NAT devices might drop packets related to IPSec traffic. Or, your
business operates in a location where you do not have full control of the network and
cannot open ports required for an IPSec BOVPN.
n You do not require a full mesh VPN.
Manual BOVPN tunnels, BOVPN virtual interfaces, and managed BOVPN tunnels use the same IKEv1 protocols and
tunnel negotiation procedure. Manual BOVPN and BOVPN virtual interfaces also support IKEv2. In this section, we
focus on what you must know to configure and monitor manual BOVPN gateways and tunnels.
The value in the feature key limits the number of security associations (SAs) that can be active at the same time. A
BOVPN tunnel route counts as one SA. A BOVPN virtual interface counts as one SA, regardless of the number of
tunnel routes.
The feature key does not limit the number of tunnel routes you can configure for BOVPNs.
When two IPSec gateway devices attempt to establish a VPN connection, they exchange a series of messages about
encryption and authentication, and agree on many different parameters. This process of agreeing on the VPN
parameters is called VPN negotiations.
Phase 1
The main purpose of Phase 1 is to set up a secure authenticated channel through which the two devices can
negotiate Phase 2. Phase 1 communication occurs between the external interfaces of the VPN peers. If Phase
1 fails, the devices cannot begin Phase 2.
Phase 2
The purpose of Phase 2 negotiations is for the two VPN gateways to agree on a set of parameters that define
what traffic can go through the VPN tunnel, and how to encrypt and authenticate the traffic. This agreement is
called a Security Association.
For detailed information about what happens during Phase 1 and Phase 2, go to the VPN Negotiations section.
Both VPN gateway devices must use the same Phase 1 and Phase 2 settings to negotiate a VPN tunnel. For
example, if you configure an endpoint for IKEv1, the other endpoint must use IKEv1. The next sections discuss Phase
1 and 2 settings.
IKEv1
IKE is a protocol used to set up security associations for IPSec. Security associations establish shared session
secrets. Keys are derived from security associations and used to encrypt data in the IPSec tunnel. IKE is also used to
authenticate the two IPSec peers.
Fireware supports IKEv1 and IKEv2 for BOVPN and BOVPN virtual interface configurations. Fireware does not
support for IKEv2 for managed BOVPNs.
Main Mode
Main mode is more secure. This mode uses three separate message exchanges, six messages total, for
Phase 1. The first two messages negotiate policy, the next two exchange Diffie-Hellman data, and the last two
authenticate the Diffie-Hellman exchange. This mode allows you to use multiple transforms.
Use Main Mode when both VPN peers have static IP addresses.
Aggressive Mode
This mode is faster because it uses only three messages to exchange data and identify the two VPN
endpoints. The identification of the VPN endpoints makes Aggressive Mode less secure. Also, the IKEv1
Aggressive Mode vulnerability described in CVE-2002-1623 means that Aggressive Mode is less secure than
Main Mode unless you configure a certificate. IKEv2 is a better option than IKEv1 and easier than certificate
configuration.
When you use Aggressive Mode, the endpoints exchange only three messages for Phase 1, which is half as
many as Main Mode. The exchange relies mainly on the ID types used in the exchange by both appliances.
Aggressive Mode does not ensure the identity of the peer. Main Mode ensures the identity of both peers, but
can only be used if both sides have a static IP address. If your device has a dynamic IP address, you should
use Aggressive Mode for Phase 1.
For IKEv1, Phase 1 sends six to nine messages, depending on the mode. Phase 2 sends only
three messages.
IKEv2
IKEv2 does not have multiple modes. It differs from IKEv1 in several other ways:
n IKEv2 has a simpler Phase 1 message exchange.
n IKEv2 requires only four messages to establish a tunnel.
n IKEv2 is more reliable than IKEv1:
n Better logging when a settings mismatch occurs
n Cryptographic enhancements
n Payload enhancements
n IKEv2 interoperates with third-party gateways that use IKEv2
n IKEv2 does not support the obsolete IKE Keep-Alive setting.
n NAT Traversal is always enabled.
n Dead Peer Detection (DPD) is always enabled.
n Dead Peer Detection can be Traffic-Based or Timer-Based.
n IKEv2 uses shared Phase 1 settings for all BOVPN gateways that have a peer with a dynamic IP address.
We recommend IKEv2 because it is fast, it is the most secure option, and it works with static or
dynamic endpoints. We recommend IKEv2 unless the remote device does not support it.
Encryption Algorithms
Encryption algorithms protect data so it cannot be read by a third-party while in transit. Longer encryption keys are
more secure. Fireware BOVPNs support these encryption algorithms:
n AES (Advanced Encryption Standard) — AES is the strongest encryption algorithm available. Fireware can
use AES encryption keys of these lengths: 128, 192, or 256 bits.
n 3DES (Triple-DES) — An encryption algorithm based on DES that uses the DES cipher algorithm three times
to encrypt the data. The encryption key is 168-bit. 3DES is slower than AES. The Sweet32 vulnerability affects
3DES.
n DES (Data Encryption Standard) — Uses an encryption key that is 56 bits long. DES is the weakest of the
three algorithms, and it is considered to be insecure.
In the Phase 2 settings, you can also specify AES-GCM. GCM is an authenticated encryption algorithm known for its
security, efficiency, and performance. For increased performance, we recommend AES-GCM. With AES-GCM,
authentication and encryption occur simultaneously, which eliminates the need for an additional hashing algorithm
calculation. Fireware can use AES-GCM encryption keys of these lengths: 128, 192, or 256 bits.
We strongly recommend that you select an AES or AES-GCM variant. DES and 3DES are
weaker than AES and are considered to be insecure.
Authentication Algorithms
Authentication algorithms verify that data packets are complete and not sent by a third-party. Each algorithm
produces a message digest, also called a hash, which represents a set of data packets. When the data packets are
received by the other BOVPN gateway, that device can use the same authentication algorithm to verify the data.
Longer hashes are more secure.
SHA-2 is not supported on most XTM series devices. The hardware cryptographic acceleration
in those models does not support SHA-2. All T Series and M Series Fireboxes support SHA-2.
The Diffie-Hellman (DH) key exchange algorithm is a method for two VPN gateways to share an encryption key
without sending the key itself as unencrypted information. When the key exchange is complete, both VPN gateways
can use the same key to encrypt VPN data.
A Diffie-Hellman key group is a group of integers used for the Diffie-Hellman key exchange. Fireware supports these
Modular Exponential (MODP) and Elliptic Curve Cryptography (ECC) groups:
MODP — 1, 2, 5, 14, and 15. For MODP, higher group numbers are more secure but require additional time to
compute the key. Group 14 is the lowest Diffie-Hellman group considered to be secure.
ECC — 19, 20, and 21. These groups are faster and more secure than MODP groups.
We recommend Group 14 or higher. For even better security and performance, we recommend
Group 19, 20 or 21.
AH (Authentication Header)
Defined in RFC 2402, AH is a protocol that you can use in manual BOVPN Phase 2 VPN negotiations. To provide
security, AH adds authentication information to the VPN data. While AH provides protection against spoofed packets,
most VPN tunnels do not use AH because it does not provide encryption.
Performance Impact
The Phase 2 settings that you select impact BOVPN throughput. Stronger algorithms offer greater security but impact
performance more. The elliptic curve Diffie-Hellman groups (19, 20, and 21) usually offer better performance and
security than MODP Diffie-Hellman groups. WatchGuard supports MODP groups 15 or lower.
If you do not add the tunnel to the default BOVPN policies, you must create a custom VPN policy to allow the types of
traffic you want to allow. You can also use the default BOVPN policies and configure additional BOVPN policies for
other types of traffic such as HTTP traffic.
The BOVPN Policy Wizard adds two policies of the type you select. For example, if you select HTTP in the BOVPN
Policy Wizard, it creates two policies, one for inbound HTTP traffic through the tunnel, and one for outbound HTTP
traffic through the tunnel. You can also add aliases which identify the names of the BOVPN or BOVPNs you selected
in the wizard.
To run the BOVPN Policy Wizard, in Policy Manager, select VPN > Create BOVPN Policy.
You can also add your own policies to allow connections to the remote VPN network.
n From — Specific addresses behind your Firebox
n To — Specific addresses on the other side of the VPN, or a BOVPN virtual interface name
You can also specify a tunnel name in a policy. For example, in the policy, click Add > Add Other > Choose Type >
Tunnel Address. From the Tunnel drop-down list, select a tunnel name or select an alias created by the BOVPN
Policy Wizard.
VPN Negotiations
The Phase 1 negotiation process depends on which version of IKE the gateway endpoints use. IKE authenticates
IPSec peers and negotiates IKE SAs during this phase, setting up a secure communications channel for negotiating
IPSec SAs in Phase 2.
1. The devices agree on the IKE version to use (IKEv1 or IKEv2). Each device can use IKEv1 or IKEv2. The IKE
version for both devices must match.
2. The devices exchange credentials.
The credentials can be a certificate or a pre-shared key. Both gateway endpoints must use the same
credential method, and the credentials must match.
Each device provides a Phase 1 identifier, which can be an IP address, domain name, domain information, or
an X500 name. The VPN configuration on each device specifies the Phase 1 identifier of the local and the
remote device. The configurations must match.
4. For IKEv1, the VPN gateways decide whether to use Main Mode or Aggressive Mode for Phase 1
negotiations.
The VPN gateway that starts the IKE negotiations sends either a Main Mode proposal or an Aggressive Mode
proposal. The other VPN gateway can reject the proposal if it is not configured to use that mode.
n Main Mode ensures the identity of both VPN gateways, but can be used only if both devices have a static
IP address. Main Mode validates the IP address and gateway ID.
n Aggressive Mode is faster but less secure than Main Mode because it requires fewer exchanges between
two VPN gateways. In Aggressive Mode, the exchange relies mainly on the ID types used in the
exchange by both VPN gateways. Aggressive Mode does not ensure the identity of the VPN gateway.
The IKEv1 Aggressive Mode vulnerability described in CVE-2002-1623 means that Aggressive Mode is
less secure than Main Mode unless you configure a certificate.
5. The VPN gateways agree on Phase 1 parameters.
n Whether to use NAT traversal
n Whether to use IKE Keep-Alive (between Fireboxes only)
n Whether to use Dead Peer Detection (RFC 3706)
IKE Keep-Alive is an obsolete setting. We recommend DPD instead.
For IKEv2, NAT Traversal and DPD are always enabled, and IKE Keep-Alive is not supported.
6. The VPN gateways agree on Phase 1 Transform settings. The settings in the Phase 1 transform on each
IPSec device must exactly match, or IKE negotiations fail.
The items you can set in the Phase 1 transform are:
n Authentication — The type of authentication (SHA-2, SHA-1, or MD5)
n Encryption — The type of encryption algorithm (DES, 3DES, or AES) and key length
n SA Life — The amount of time until the Phase 1 Security Association expires
n Key Group — The Diffie-Hellman key group
1. The VPN gateways use the Phase 1 SA to secure Phase 2 negotiations. The VPN gateways agree on whether
to use Perfect Forward Secrecy (PFS).
VPN encryption keys are changed at the interval specified by the Force Key Expiration setting. The interval
is eight hours by default. To prevent SAs from using Phase 1 keys for Phase 2, PFS forces the DH calculation
to happen a second time. This means that Phase 1 and Phase 2 always have different keys, which is harder to
break unless you select a DH group lower than 14.
We recommend that you use PFS to keep your data secure. If you want to use PFS, it must be enabled on both
VPN gateways, and both gateways must use the same Diffie-Hellman key groups.
The Phase 2 proposal includes the algorithm to use to authenticate data, the algorithm to use to encrypt data,
and how often to make new Phase 2 encryption keys.
You can specify the Phase 2 traffic selectors for the local and remote VPN gateway as a host IP address, a
network IP address, or an IP address range. Phase 2 traffic selectors are always sent as a pair in a Phase 2
proposal: one indicates which IP addresses behind the local device can send traffic over the VPN, and the
other indicates which IP addresses behind the remote device can send traffic over the VPN. This is also known
as a tunnel route.
Shared Settings None Transform settings are shared for all dynamic endpoints and Mobile VPN
with IKEv2. Shared settings include:
n NAT Traversal Keep-Alive interval
n Phase 1 transforms
*This is an obsolete setting. We recommend DPD in all cases for reliability, performance, and scalability.
BOVPN Configuration
You can configure these types of BOVPNs on the Firebox:
n Manual BOVPN
n BOVPN virtual interface
n BOVPN over TLS
n Managed BOVPN
At least one of the VPN devices needs to have a known public IP address or FQDN. This is required so that at least
one of the VPN peers knows how to initiate VPN communications.
For information about BOVPN settings not covered in this guide, go to Fireware Help.
The example configuration settings below define a tunnel between the trusted networks at Site A and Site B.
Configuration (Site A)
Gateway
To configure a BOVPN gateway, specify these settings:
General Settings
Address family — IPv4 or IPv6. In the gateway and tunnel settings, the IP addresses you specify must be
from the same family. For example, if you specify the IPv4 Addresses family, you can only specify IPv4
addresses in the gateway and tunnel settings.
IP Address Settings
In this part of the BOVPN configuration, you specify the location of the local and remote gateways.
You must know whether the IP address assigned to the other VPN device is static or dynamic. If the other VPN device
has a dynamic IP address and uses dynamic DNS, you can specify the domain name of that device. If the other
device does not use dynamic DNS, that device can send any non-resolvable domain string if it is the initiator.
For dynamic endpoints, you must use either IKEv1 Aggressive Mode or IKEv2 (recommended).
Phase 1 settings
In Phase 1, the VPN peers establish a secure, authenticated channel for communication. This is known as the
Security Association (SA). The Phase 1 SA creates a secure channel for Phase 2 negotiations. You configure
Phase 2 settings later when you add the BOVPN tunnel.
We recommend that you select strong Phase 1 encryption options. Phase 1 does not directly affect the file
transfer speed on the BOVPN. This means that strong Phase 1 encryption options do not affect performance.
Tunnel
After you add a BOVPN gateway, you configure a BOVPN tunnel.
Phase 2 settings affect BOVPN performance. However, we recommend that you specify strong
ciphers for security reasons. Diffie-Hellman Group 14 is the lowest Diffie-Hellman group
considered to be secure. We recommend that you select Diffie-Hellman Group 14 or higher.
In our example, the Site A Firebox has these tunnel route settings:
n Local — 10.0.10.0/24
n Remote — 10.0.20.0/24
Phase 2
The Site A Firebox uses the default Phase 2 settings:
Configuration (Site B)
The configuration at Site B is exactly the same as at Site A with these exceptions:
n Local and remote gateway IP addresses are reversed
n Local and remote tunnel addresses are reversed
For example, the Site B Firebox or third-party device has this configuration.
Gateway
n Local Gateway IP Address — 192.0.2.20
n Local Gateway ID — 192.0.2.20
n Remote Gateway IP Address — 203.0.113.10
n Remote Gateway ID — 203.0.113.10
Tunnel
n Local — 10.0.20.0/24
n Remote — 10.0.10.0/24
Zero Route
You can force all traffic over a BOVPN to push Internet-bound traffic through the main location. This also helps to
make tunnel switching easier in hub and spoke deployments.
Example 2 — Failover
To help ensure BOVPN availability, you can configure BOVPN failover between two Fireboxes. BOVPN failover is not
supported for third-party endpoints.
Keep DPD enabled. If you disable DPD, the Firebox cannot detect when a peer becomes
inactive, and the Firebox continues to send traffic to the inactive peer.
In this example, we configure the Fireboxes at both sites for full gateway endpoint redundancy.
On both Fireboxes, configure at least two external interfaces and add the external interfaces to Link Monitor. We
recommend that you specify a target other than the default gateway. For more information about Link Monitor, go to
the Link Monitor section of this guide.
In the BOVPN configuration on the Site A Firebox, configure these gateway endpoints:
In the BOVPN configuration at Site B, configure the same gateway endpoint settings, but in reverse.
Each gateway address pair must be listed in the same order in the Gateway Endpoints list on both Fireboxes.
You can configure a BOVPN virtual interface tunnel between two Fireboxes, or between a Firebox and a third-party
endpoint. If you configure a VPN as a BOVPN virtual interface, the VPN on the remote VPN gateway must also be
configured as a BOVPN virtual interface.
When you configure a BOVPN virtual interface, you add a new interface to the Firebox. The interface is virtual
(logical) rather than a physical, hardware-based interface.
BOVPN virtual interfaces can help you with advanced routing needs. For example, with a BOVPN virtual interface,
you can configure:
n Metric-based failover
n Dynamic routing
BOVPN virtual interfaces make sure that replies to Firebox-generated traffic use the VPN tunnel. Examples of
Firebox-generated traffic include DNS and DHCP traffic, Dimension, syslog, SNMP, NTP, authentication (Active
Directory, LDAP, and RADIUS), and other connections established by the Firebox to resources through the tunnel.
Configuration
The BOVPN virtual interface configuration is similar to the manual BOVPN configuration. For example, manual
BOVPNs and BOVPN virtual interfaces have many of the same Phase 1 and 2 options. VPN Routes in the
BOVPN virtual interface configuration is the main difference.
For a BOVPN virtual interface, the Firebox uses its routing table to determine whether to send traffic through the VPN
tunnel. You do not explicitly configure the local and remote addresses for each tunnel route. Instead, for each BOVPN
virtual interface, you can configure static routes that use this BOVPN virtual interface as a gateway.
You configure these routes on the VPN Routes tab. For each route, you specify a destination and a metric:
Static routes that you add to the VPN Routes list also appear in the static routes list for the Firebox. This is different
than a manual BOVPN, which uses a separate IPSec routing table.
Because of the general similarities between manual BOVPN and BOVPN virtual interface settings, this guide does
not include complete configuration procedures for BOVPN virtual interfaces. For step-by-step instructions, go to
Fireware Help.
Examples
In this section, we briefly describe common uses for BOVPN virtual interfaces. For detailed configuration examples,
go to Fireware Help.
Failover
You can configure failover between a physical Firebox interface and a BOVPN virtual interface. Or, you can configure
failover between two BOVPN virtual interfaces.
It is important to understand that routes with lower metrics have higher priority. Routes with
higher metrics have lower priority. For example, a route with a distance of 10 has a higher
priority than a route with a distance of 100.
In this example, two sites are connected by a leased line (an MPLS link). For redundancy, you also have a BOVPN
virtual interface between the sites.
To make sure the BOVPN virtual interface is the secondary (backup) link between the two sites, specify a distance
with a higher number for the route. This means the BOVPN virtual interface route has lower priority than the MPLS
link. Firebox uses the MPLS link (the primary route) when it is available instead of the BOVPN virtual interface.
If the MPLS link is not available, the primary route is either removed from the routing table or it is assigned a distance
with a higher number than the BOVPN virtual interface route. The Firebox then uses the route for the secondary
BOVPN virtual interface because it has the lowest route distance (which means it has higher priority). When the
MPLS route is available again, the Firebox automatically fails back to use the MPLS route because it has a lower
distance (which means it has higher priority).
Dynamic Routing
With a BOVPN virtual interface, you can enable dynamic routing between two sites over a secure VPN. With this
configuration, you do not have to manually add and maintain explicitly configured routes between all the private
networks at each site.
On the VPN Routes tab, you configure virtual IP addresses. Virtual IP addresses must not exist within any other
physical or BOVPN networks. In the dynamic routing configuration on the Firebox, you specify OSPF or BGP
commands to:
n Use the virtual IP addresses as the peer network IP addresses
n Configure which local networks each device propagates routes for
We do not recommend 1-to-1 NAT to resolve an issue with sites that have overlapping
IP addresses. 1-to-1 NAT introduces scalability and management challenges. Instead, we
recommend that you change the IP addressing on one of the sites so the IP addresses do not
overlap. To learn how to configure secondary networks for this purpose, go to the Secondary
Networks section of this guide. However, if you cannot reconfigure IP addressing because you
do not own one of the sites, you could consider 1-to-1 NAT to resolve the issue.
You might configure 1-to-1 NAT over BOVPN for these reasons:
n To hide the true subnet addresses from the remote peer
n To avoid IP address conflicts when the sites have subnets that overlap (recommended only when you do not
own the other site)
For example, Site A and Site B use the same subnet for their trusted networks, 10.0.200.0/24. To create a VPN
tunnel between these networks, you can use 1-to-1 NAT in the tunnel configuration to translate these addresses to
different subnets: 192.168.200.0/24 and 192.168.150.0/24.
This rewrites the 10.0.200.0/24 subnet to 192.168.150.0/24. For example, a computer with the IP address
10.0.200.7 is part of the Site B network. Before traffic from this computer goes through the tunnel, the Firebox
rewrites the IP address to 192.168.150.7. The Firebox rewrites only the first three octets because of the /24 mask.
With these configurations at both sites, 1-to-1 NAT occurs in both directions.
DNAT over BOVPN is most commonly used for connections to a remote network that you do not control, and the
admin of the remote network wants your connection to appear as a certain address. The administrator might do this
because the company does not allow other private subnets on their network or because the administrator wants to
track your network usage with a single IP address.
For example, your local network at site A is 10.0.1.0/24. The remote local network is 10.0.200.0/24. To make
your local network traffic appear as the IP address 5.5.5.5 on the remote network, specify these settings:
For example, Site A connects to Site B through a BOVPN. At Site B, the firewall has an external interface with a
dynamic IP address. If the IP address changes at Site B, Site A no longer knows how to connect to Site B and must
wait for Site B to reconnect.
To make sure Site A can always connect to Site B, you can use one of these methods to specify a gateway ID:
n Specify a Fully Qualified Domain Name (FQDN) for a site with dynamic DNS
n Specify a text string that matches in both device configurations
In the Site A gateway endpoint configuration, you specify an FQDN for the remote gateway ID. In our example, the
FQDN is test.example.com:
Text String
In this example, Site B has a dynamic IP address but does not use dynamic DNS.
You can specify a different type of gateway ID in the Site A configuration. Rather than specify an FQDN as the
Domain Name, specify a text string that is not a resolvable domain name. You can specify any text string, but it must
be the same in the Site A and Site B configurations. In our example, the text string is testID. Keep the Attempt to
Resolve check box clear.
In this configuration, the site with the dynamic IP address (Site B) must initiate the tunnel.
BOVPN Topologies
When you link multiple sites together with BOVPN tunnels, there are several different VPN topologies you could use.
When you configure a mobile VPN, you assign a virtual IP address pool to mobile VPN users. You must add BOVPN
tunnel routes from the virtual IP address pool subnet to the Site B networks.
For split tunnel, you must also add mobile VPN tunnel routes for the Site B networks.
For example, when you ping a device on the remote network, the ping fails if:
n The tunnel is down.
n The source or destination IP address is not allowed by the tunnel route in the VPN configuration.
n The remote device is offline or does not respond to a ping. However, if the remote device is offline or does not
respond to a ping, the ping traffic still brings the tunnel up.
Expand a gateway or VPN interface to see statistics and other status information.
Troubleshoot Problems
To troubleshoot a BOVPN, we recommend that you focus on VPN settings, messages, and logs:
1. Verify that the VPN settings are the same on both devices.
For example, verify that the pre-shared keys, Phase 1, and Phase 2 settings are the same on both devices.
2. In the tunnel route settings for both devices, verify that the IP addresses and subnet masks are correct:
n The local IP address must match the IP address of a local host or network.
n The remote IP address must be the IP address of a host or private network on the remote VPN gateway.
n The tunnel routes on the two devices should look reversed when viewed side-by-side.
3. View VPN diagnostic messages.
4. Run the VPN diagnostic report.
5. Review the IKE log messages on each device during tunnel negotiation.
For a connection that completely times out, try to ping the external interface of the remote device to verify
connectivity. Make sure the remote device is configured to respond to pings. To enable a Firebox to respond to a ping
to the external interface, you must edit the ping policy to allow pings from the Any-External alias.
In any VPN negotiation, one gateway endpoint is the initiator, and the other is the responder.
The initiator sends proposed gateway and tunnel settings, and the responder accepts or rejects
them, based on comparison with locally configured settings. When you troubleshoot IKEv1 or
IKEv2 VPN negotiations, look at the VPN diagnostic messages and VPN Diagnostic Report on
the responder. The responder has information about the settings on both devices. For IKEv2,
we also recommend that you look at the VPN diagnostic messages and VPN Diagnostic Report
on the initiator.
You can also see this message in Firebox System Manager and Fireware Web UI.
VPN diagnostic messages can indicate a problem with the VPN tunnel or gateway configuration. VPN diagnostic
messages for a tunnel include the tunnel name and indicate the problem. VPN diagnostic messages related to a VPN
gateway refer to the gateway endpoint by number. For example, if a gateway has two gateway endpoint pairs, VPN
diagnostic messages refer to the first gateway endpoint as Endpoint 1, and the second as Endpoint 2. This naming
scheme is necessary for BOVPN failover because gateway endpoints function as interfaces for each gateway.
For gateways with backup endpoints, it is normal to see timeout messages for the backup (inactive) endpoints. Only
one gateway endpoint pair is active at a time.
For example, if a VPN between two devices is configured with mismatched settings in the Phase 2 proposal, the VPN
diagnostics messages that appear in Firebox System Manager for the two devices are very different:
The VPN diagnostic messages on the responder contain the most useful information for VPN troubleshooting. When
a VPN setting does not match, the responder does not tell the initiator which setting is expected. This is to make sure
that a remote device cannot learn about your VPN configuration by trial and error. The VPN diagnostic messages that
show which setting does not match only appear for the device that received and rejected the proposal.
To initiate or restart tunnel negotiations from one endpoint, send traffic through the tunnel (recommended) or rekey
the tunnel. A rekey is temporary and might not work as expected for third-party devices.
After you initiate or restart tunnel negotiations, look at error messages on the other gateway endpoint to see why the
tunnel negotiation failed.
To see log messages about tunnel negotiation, the tunnel negotiation must occur during the short time frame that the
VPN Diagnostic Report runs.
To run the VPN diagnostic report, connect to the Firebox with Firebox System Manager, then, on the Front Panel
tab, right-click the gateway name. While a device at the remote end of the tunnel attempts to send traffic, select VPN
Diagnostic Report so that tunnel negotiation happens while the reports. It could take several tries to get useful log
messages when tunnel negotiation fails.
The report runs automatically for 20 seconds. To run the report again for a longer duration, change the Duration to 60
seconds. While a device at the remote end of the tunnel attempts to send traffic, click Start Report.
The report shows the gateway and tunnel configuration, and information about the status of any active tunnels for the
selected gateway. The VPN Diagnostic Report has several sections.
The next two sections show the configured settings for the selected gateway and all tunnels that use it:
n Gateway Summary — Shows a summary of the gateway configuration, including the configuration of each
configured gateway endpoint
n Tunnel Summary — Shows a summary of the tunnel configuration for all tunnels that use the selected gateway
The last seven sections show run-time information based on the log message data collected when the report was run:
n Run-time Info (bvpn routes) — For a BOVPN virtual interface, shows the static and dynamic routes that use
the selected BOVPN virtual interface, and the distance for each route
n Run-time Info (gateway IKE_SA) — Shows the status of the IKE (Phase 1) security association for the
selected gateway
n Run-time Info (tunnel IPSEC_SA) — Shows the status of the IPSec tunnel (Phase 2) security association for
active tunnels that use the selected gateway
n Run-time Info (tunnel IPSec_SP) — Shows the status of the IPSec tunnel (Phase 2) security policy for active
tunnels that use the selected gateway
n Related Logs — Shows tunnel negotiation log messages, if a tunnel negotiation occurs during the time period
that you run the diagnostic report
n Address Pairs in Firewalld — Shows the address pairs and the traffic direction (IN, OUT, or BOTH)
n Policy Checker Result — Shows policy checker results for policies that manage traffic for each tunnel route
The VPN Diagnostic Report can help you see the status of tunnel negotiations, and help you determine what caused
the tunnel negotiations to fail. It is especially helpful if you have many BOVPN gateways, because it enables you to
focus on the specific gateway you want to troubleshoot.
We recommend that you view log messages on the responder rather than on the initiator. Log
messages on the responder contain more useful information. When a VPN setting does not
match, the responder gives the initiator only basic information such as transform settings. The
responder does not tell the initiator the pre-shared key or tunnel routes. The log messages that
show which setting does not match only appear in the log file for the responder, which is the
device that received and rejected the proposal.
If you have several VPN gateways, you can filter the log messages by the gateway IP address to see only the log
messages for a specific gateway.
Each log message related to a branch office VPN tunnel has a header that shows the IP addresses of the local and
remote gateway. The format of the header is:
(local_gateway_ip<->remote_gateway_ip)
Where:
If your device sends log messages to Dimension or WatchGuard Cloud, you can use those tools
to filter log messages by gateway IP address.
Here are a few common log messages that can help you identify specific types of VPN problems. These messages
appear as red text in WatchGuard System Manager, Firebox System Manager, Fireware Web UI, and the VPN
diagnostic tool.
Retry Timeout
Indicates that the IP address of the remote gateway was not reachable. This might be because of network
connectivity problems, or because UDP 500 is not open.
Mismatched ID Settings
Indicates a problem with the ID specified in the gateway endpoint settings.
No Proposal Chosen
Indicates a problem with mismatched settings in the Phase 1 or Phase 2 proposal. The receiving device
rejects the proposal, because a setting received from the remote device did not match what was expected
based on the local VPN configuration.
On the receiving device, log messages near the NO PROPOSAL CHOSEN log message can indicate why the
proposal was rejected. The log messages show which setting did not match.
We recommend that you keep the default log level, which is Error. If you increase the log
level, this increases load on the Firebox. An increased log level also writes more data to your
log database, which could cause you to lose historical log data.
Additional Resources
This guide provides a summary of the basic information covered in training classes, videos, and product
documentation. To increase your skills and knowledge, we recommend that you get hands-on practice with the
products and review other technical resources. This appendix provides a list of additional resources but you should
explore the product documentation for additional details beyond the suggested topics.
For a list of additional resources for each section of this guide, see:
n Firebox Setup and Management Additional Resources
n Logging, Monitoring, and Reporting Additional Resources
n ThreatSync Additional Resources
n Network Settings Additional Resources
n Firewall Policies Additional Resources
n Security Services Additional Resources
n Proxies and Proxy-Based Services Additional Resources
n Authentication Additional Resources
n Mobile VPN Additional Resources
n BOVPN Additional Resources
Role-based Administration
n About Role-Based Administration
n Manage Users and Roles on Your Firebox
n About Predefined Roles
Feature Keys
n About Feature Keys
Upgrade a Firebox
n Firebox Upgrade, Downgrade, and Migration
Global Settings
n Define Firebox Global Settings
n About Policies for Firebox-Generated Traffic
n Enable NTP and Configure NTP Servers
Policies Overview
n Add Policies to Your Configuration
n Setup Wizard Default Policies and Settings
n Create or Edit a Custom Policy Template
Interfaces
n About Network Modes and Interfaces
n Common Interface Settings
VLANs
n About Virtual Local Area Networks (VLANs)
Multi-WAN
n About Multi-WAN
NAT
n NAT (Network Address Translation)
Management Policies
n Setup Wizard Default Policies and Settings
Policy Precedence
n About Policy Precedence
Hidden Policies
n About Policies for Firebox-Generated Traffic
Policy Schedules
n Create Schedules for Firebox Actions
n Set an Operating Schedule
Application Control
n About Application Control
n Configure Application Control Actions
APT Blocker
n About APT Blocker
n Configure APT Blocker
n Monitor APT Blocker Activity
HTTP Proxies
n About the HTTP-Proxy
HTTPS-proxy
n About the HTTPS-Proxy
n HTTPS-Proxy: Content Inspection
n Create a Certificate CSR
n Use Certificates with HTTPS Proxy Content Inspection
Authentication Servers
n Define a New User for Firebox Authentication
n Configure MFA for a Firebox
n Define or Remove Users or Groups
n Define a New User for Firebox Authentication
BOVPN Introduction
n Manual Branch Office VPN Tunnels
n Managed Branch Office VPN Tunnels (WSM)
BOVPN Configuration
n Quick Start - Set Up a VPN Between Two Fireboxes
n Configure Manual BOVPN Gateways
n Configure Manual BOVPN Tunnels
Key Concepts
To successfully complete the Network Security Essentials for Locally-Managed Fireboxes exam, you must
understand these key concepts:
Fireware Knowledge
n Firebox activation and initial setup
n Network configuration
n Policy and proxy configuration
n Subscription services configuration
n User authentication
n Device monitoring, logging, and reporting
n Branch office and mobile VPN configuration
Exam Description
Content
60 multiple choice (select one option), multiple selection (select more than one option), true/false, and
matching questions.
Passing score
75% correct.
Time limit
Two hours.
Reference material
You cannot look at printed or online materials during the exam.
Test environment
Prerequisites
The Network Security Essentials for Locally-Managed Fireboxes video course and attendance at an instructor-
led lab class is recommended, but not required.
Instructor-Led Training
To get hands-on experience, we recommend that you attend an instructor-led training class. Classes are often held
in-region, sponsored by sales or a local WatchGuard distributor. We also offer complimentary VILT technology-based
lab training classes for partners. WatchGuard end-users can register for instructor-led training with our network of
WatchGuard Certified Training Partners (WCTPs).
n Partners — Register for training in the WatchGuard Learning Center (login required)
n End-users — View the current WCTP training schedule on the WatchGuard website
Assessment Objectives
The Network Security Essentials Exam evaluates your knowledge of the categories in the list below. For each
knowledge category, the Weight column includes the approximate percentage of exam questions from that
knowledge category. Because some exam questions require skills or knowledge from more than one category, the
weights do not exactly correspond to the percentage of exam questions.
Network and Understand basic networking concepts that are not unique to the Firebox. 12%
Network Security
Basics
n IPv4 addresses, subnetting, and routing
n Network Address Translation
n Packet headers (TCP, IP, HTTP)
n MAC addresses
n Network services, ports, and protocols
Administration and Understand how to set up a Firebox with a basic configuration, and 18%
Initial Setup complete basic Firebox administration tasks.
n Firebox default policies and network settings
n Fireware Web Setup Wizard
n Feature keys
n Firebox backup and restore
n Configuration file migration
n Default Threat Protection
Networking and Understand how to configure Firebox network settings and NAT. 20%
NAT
n Network interface types, security zones, and settings
n WINS/DNS
Policies, Proxies, Understand how to configure Firebox policies, proxies, and security 18%
and Security services.
Services
n Packet filter policies and proxy policies
n Policy precedence
n HTTP-proxy
n HTTPS-proxy content inspection
n Content actions and domain name rules
n Fireware subscription security services
Authentication and Understand user authentication and VPN settings on the Firebox. 15%
VPNs
n Authentication servers
n Users and groups in policies
n Mobile VPN routing options and protocols
n Branch Office VPN gateways and tunnel routes
n Branch Office VPN and NAT
n BOVPN virtual interfaces
2. Based on this network diagram, which of these static routes could you add to the Firebox to enable the Firebox
to route traffic from clients on the 192.168.10.0/24 subnet to a server at 10.0.20.80? (Select two.)
3. Symmetric encryption is the only secure way to establish an encrypted connection to a web server.
a. True
b. False
4. A packet filter policy works at the application, network, and transport layers to examine connection data.
a. True
b. False
5. Which of these is a Class C subnet mask? (Select one.)
a. /8
b. /12
c. /16
d. /24
e. /28
6. How many usable host IP addresses are on a network with a /28 CIDR subnet mask? (Select one.)
a. 14
b. 16
c. 30
d. 32
e. 254
7. What type of encryption is used during the initial setup of an HTTPS connection? (Select one.)
a. Asymmetric encryption
b. Symmetric encryption
c. Block cipher encryption
d. IPSec encryption
e. SSL encryption
Answers
Note: Many exam questions test knowledge in more than one area.
Answers
1. b ,c ,e
2. a, c, d, f. The Firebox can prevent Flood attacks, IP spoofing, Port scans, and Denial of service attacks with
Default Packet Handling settings.
3. b, d. When a site is Auto-Blocked by Default Threat Protection, all traffic from the site is blocked and the site is
temporarily on the Blocked Sites list.
4. b, d
Answers
1. a. True. From the Firebox System Manager Authentication List tab, you can see all the authenticated users
connected to your Firebox and log them out.
2. b, d, e. From the Firebox System Manager Status Report, you can find the Process list, IPv4 routing table, and
domain name servers.
3. c. You can see how many intrustions IPS has prevented in Subscription Services dashboard in Fireware Web
UI or the Subscription Services tab in Firebox System Manager.
Answers
1. b. False. Dynamic NAT applies only to outgoing connections.
2. b, c, e
a. No. The HTTPS-proxy policy only allows HTTPS traffic for the Accounting group.
b. No. The Outgoing policy does not allow any traffic from the Sales group.
c. Yes. The HTTP policy allows HTTP and HTTPS traffic for the Sales group.
d. Yes. The Outgoing policy allows HTTPS traffic from the trusted network.
2. If you disable the Outgoing policy, which protocols must be allowed to enable users behind the Firebox to
connect to commonly used websites? (Select three.)
a. HTTP
b. HTTPS
c. DNS
d. FTP
e. DHCP
3. Automatic signature updates for subscription services fail if the Firebox cannot contact a DNS server.
a. True
b. False
4. Which WatchGuard subscription service must you enable in a proxy policy before you can use APT Blocker?
(Select one.)
a. WebBlocker
b. Intrusion Prevention Service
c. Gateway AntiVirus
d. Application Control
e. IntelligentAV
5. Which firewall policies can use the Intrusion Prevention Service to block network attacks? (Select one.)
a. Only packet filter policies
b. Only HTTP and HTTPS proxy policies
c. Only proxy policies
d. Only inbound policies
e. All policies
6. An antivirus update site is hosted on a content delivery network with an IP address that changes dynamically.
The antivirus clients use HTTP to get updates. What type of policy can you configure to allow computers on
your local network to contact the signature update server? (Select one.)
a. Disable the Outgoing policy, then add an HTTPS policy to allow encrypted requests from the IP range
of the computers to the IP addresses of the antivirus update site.
b. Add a policy to allow outbound DNS on port 53 to the host name of the antivirus update site.
c. Add an HTTP policy to allow outbound requests from the IP range of the computers to the wildcard
FQDN of the antivirus update site.
d. Add an HTTP policy that allows access from the IP range of the computers to a Guest subnet.
7. When you create a new packet filter policy that allows traffic through the firewall, by default the policy
generates log messages for allowed traffic.
a. True
b. False
8. What must you configure for an HTTPS-proxy policy to detect known viruses in HTTP traffic that is encrypted
with TLS? (Select two.)
a. Enable the Intrusion Prevention Service.
b. Enable Content Inspection.
c. Configure the HTTP Header Fields action to AV scan.
d. In the HTTPS proxy > TLS Profile settings, select the Allow only TLS-compliant traffic option.
e. Enable Gateway AntiVirus.
Answers
1. d. Yes, the Outgoing policy allows this traffic.
2. a, b, c. If you disable the Outgoing policy, to enable users behind the Firebox to connect to commonly used
websites, you must allow HTTP, HTTPS, and DNS protocols.
3. a. True. Automatic signature updates for subscription services fail if the Firebox cannot contact a DNS server.
4. c. You must enable the Gateway AntiVirus subscription service in a proxy policy before you can use
APT Blocker.
5. e. All firewall policies can use the Intrusion Prevention Service to block network attacks.
6. c. Add an HTTP policy to allow outbound requests from the IP range of the computers to the wildcard FQDN of
the antivirus update site.
7. b. False
8. b, e. For an HTTPS-proxy policy to detect known viruses in HTTP traffic that is encrypted with TLS, you must
Enable Content Inspection and Enable Gateway AntiVirus.
7. You configured multiple external interfaces on your Firebox and a BOVPN virtual interface to a remote site.
How can you configure the local Firebox to fail over the BOVPN virtual interface to a backup external interface
when the primary external interface goes down? (Select one.)
a. In the BOVPN-Allow policies, enable an SD-WAN action that includes both external interfaces.
b. In Firebox Routes, add a new static route for the backup external interface.
c. In the BOVPN-Allow.out policy, add the backup external interface alias to the To field.
d. In the BOVPN Virtual Interface settings, add the backup external interface to the Gateway Endpoints
list.
e. In the Multi-WAN failover configuration, select the BOVPN virtual interface.
Answers
1. c. The WatchGuard Authentication policy allows users to connect to the Authentication Portal from the trusted
or optional networks.
2. b. Phase 2 authentication is configured in the BOVPN Tunnel settings.
3. c. IKEv2
4. b. False
5. b. VPN is the most secure method to allow remote users to connect to resources on your private network.
6. a. True. Mobile VPN with SSL is the only VPN type that requires an application to be installed on all client
devices in order to establish a connection to the Firebox.
7. d. In the BOVPN Virtual Interface settings, add the backup external interface to the Gateway Endpoints list.