Information in this guide is subject to change without notice. Companies, names, and data used in
examples herein are fictitious unless otherwise noted. No part of this guide may be reproduced or
transmitted in any form or by any means, electronic or mechanical, for any purpose, without the
express written permission of WatchGuard Technologies, Inc.
trademarks of WatchGuard Technologies, Inc. in the United States and other countries. This product
is covered by one or more pending patent applications.
All other trademarks and tradenames are the property of their respective owners.
Printed in the United States of America.
DocVer:WatchGuard Firebox System 4.6 Reference Guide - 4.6.1
ii
Page 3
Table of Contents
CHAPTER 1 Internet Protocol Reference............................................. 1
Internet Protocol header................................................................1
Internet Protocol options............................................................... 5
Transfer protocols...........................................................................5
Standard ports and random ports.................................................. 7
Index ............................................................................................... 73
iv
Page 5
CHAPTER 1Internet Protocol Reference
Internet Protocol (IP) specifies the format of packets and the addressing scheme for
sending data over the Internet. By itself, it functions like a postal system allowing you
to address a package and drop it into the system. There is, however, no direct link
between you and the recipient. In other words, there is no package.
Most networks combine IP with higher-level protocols like Transmission Control
Protocol (TCP). Unlike simple IP, TCP/IP establishes a connection between two host
servers so that they can send messages back and forth. TCP/IP provides the
“packaging.”
Internet Protocol header
Internet Protocol (IP) is an Internet standard and enables the shipment of datagrams
– self-contained packets of information that include their own address and delivery
instructions. IP prepends a header to each datagram. The IP header contains a
minimum of twelve attributes as well as additional optional attributes.
AttributeSizeDescription
Version4 bitsIP format number (Current version = 4)
IHL4 bitsHeader length in 32-bit words (Minimum = 5)
TOS8 bitsType of service sets routing priorities. It is generally
Tot _L en16 bitsTotal length of packet measured in octets. It is used in
ID16 bitsPacket ID, used for reassembling fragments.
Flags3 bitsMiscellaneous flags
Frag_Off13 bitsIdentifies fragment part for this packet.
TTL8 bitsTime to live. It sets the maximum time the datagram
under-utilized because few application layers can set it.
reassembling fragments.
remains alive in the system.
Reference Guide1
Page 6
Internet Protocol header
AttributeSizeDescription
Protocol8 bitsIP protocol number. Indicates which of TCP, UDP, ICMP,
Check16 bitsChecksum for the IP header
Sour_Addr32 bitsSource IP address
Dest_Addr32 bitsDestination IP address
Options24 bitsIP Options (Present if IHL is 6)
IP header number list
The IP Protocol header contains an 8-bit field that identifies the protocol for the
Transport layer for the datagram.
KeywordNumberProtocol
ICMP1 Internet Control Message
IGMP2 Internet Group Management
GGP 3 Gateway-to-Gateway
IP4 IP-within-IP (encapsulation)
ST5 Stream
TCP 6 Transmission Control Protocol
UCL 7 UCL
EGP 8 Exterior Gateway Protocol
IGP 9 Any private interior gateway
BBN-RCC-MON 10BBN RCC Monitoring
NVP-II11Network Voice Protocol
PUP 12PUP
ARGUS 13ARGUS
EMCON 14EMCON
XNET15Cross Net Debugger
CHAOS 16Chaos
UDP 17User Datagram Protocol
MUX 18Multiplexing
DCN-MEAS19DCN Measurement Subsystems
HMP 20Host Monitoring
PRM 21Packet Radio Measurement
XNS-IDP 22XEROX NS IDP
TRUNK-1 23Trunk-1
TRUNK-2 24Trunk-2
LEAF-125Leaf-1
LEAF-226Leaf-2
IGMP, or other Transport protocol is inside.
0 Reserved
2
Page 7
Internet Protocol header
KeywordNumberProtocol
RDP 27Reliable Data Protocol
IRTP28Internet Reliable Transaction
ISO-TP4 29ISO Transport Protocol Class 4
NETBLT30Bulk Data Transfer Protocol
MFE-NSP 31MFE Network Services Protocol
MERIT-INP 32MERIT Internodal Protocol
SEP 33Sequential Exchange Protocol
3PC 34Third Party Connect Protocol
IDPR35Inter-Domain Policy Routing Protocol
XTP 36XTP
DDP 37Datagram Delivery Protocol
IDPR-CMTP 38IDPR Control Message Transport Protocol
Internet Protocol options are variable-length additions to the standard IP header. IP
options can either be of limited usefulness or very dangerous. There are several kinds
of IP options:
Security
Control routing of IP packets that carry sensitive data. Security options are
rarely supported.
Stream ID (SID)
The stream ID option is rarely supported.
Source Routing
Both the loose source route option and the strict source route option enable
the source of an Internet packet to provide routing information. Source
routing options can be very dangerous, because a clever attacker might use
them to masquerade as another site. However, loose source routing and the
traceroute facility can also help debug some obscure routing problems.
Record Route
The record route option was originally intended for use in testing the Internet.
Unfortunately, record route can record only ten IP addresses. On the present
Internet, typical long-haul transmissions can involve twenty or thirty hops,
rendering the record route option obsolete.
Internet Protocol options
Time Stamp
The time stamp option helps measure network propagation delays. This task
is done more effectively, however, with higher-level time protocols or timestamp messages.
Because most applications make it very obscure or difficult to use IP options, they are
rarely used.
Transfer protocols
The IP protocol encapsulates information contained in the transport layer. The
transport layer has several protocols that specify how to transmit data between
applications: for example, UDP, TCP, ICMP, and others.
UDP
User Datagram Protocol (UDP) is a connectionless, potentially unreliable datagram
protocol. It trades reliability for speed and low overhead. To ensure accurate
transmission, it requires that the application layer verify that packets arrive at their
destination.
Characteristics of UDP include:
Reference Guide5
Page 10
Transfer protocols
• Often used for services involving the transfer of small amounts of data where
retransmitting a request is not a problem.
• Used for services such as time synchronization in which an occasionally lost
packet will not affect continued operation. Many systems using UDP resend
packets at a constant rate to inform their peers about interesting events.
• Primarily used on LANs, in particular for NFS services where its low overhead
gives it a substantial performance advantage. A lack of congestion control
means that using UDP for bulk data transfer over long-haul connections is not
recommended.
• Supports broadcasts.
• Provides abstraction of ports.
• A connection is described by its source and destination ports and its source and
destination IP addresses. In typical usage, port numbers below 1024 are
reserved for well-known services (destinations), and the client side is supposed
to use ports above 1023 for the source of the connection. However, this rule has
many notable exceptions. In particular, NFS (port 2049) and Archie (port 1525)
use server ports at numbers above 1024. Some services use the same source and
destination port for server-to-server connections. Common examples are DNS
(53), NTP (123), syslog (514), and RIP (520).
TCP
Transmission Control Protocol (TCP) provides reliable stream-oriented services. It
trades speed and overhead for increased reliability. Like UDP, TCP provides source
and destination ports that are used in a similar fashion.
TCP uses a rather complicated state machine to manage connections. There are
several attribute bits that control the state of a connection. Three very important
attribute bits of TCP packets are the SYN, ACK, and FIN bits. The SYN bit is set only
on the first packet sent in each direction for a given connection. The ACK bit is set
when the other side is acknowledging the receipt of data to the peer. The FIN bit is set
when either side chooses to close the connection.
ICMP
The Internet Control Message Protocol (ICMP) is used primarily to deliver error
information about other services. It is otherwise quite similar in practical operation to
UDP. That is, it is connectionless and does not guarantee that packets are delivered to
their destination. One dangerous ICMP packet is the ICMP redirect packet, which can
change routing information on the machines that receive it.
Other protocols
The vast majority of the traffic on the Internet uses one of the three protocols
mentioned above. There are some others that are of interest:
IGMP (Internet Group Multicast Protocol)
A protocol supporting multicasts used by SGI’s Dogfight game.
6
Page 11
IPIP (IP-within-IP)
An encapsulation protocol used to build virtual networks over the Internet.
GGP (Gateway-Gateway Protocol)
A routing protocol used between autonomous systems.
GRE
A protocol used for PPTP.
ESP
An encryption protocol used for IPSec.
Standard ports and random ports
UDP and TCP encapsulate information contained within the application layer. The
appropriate application processes are designated by source and destination port
numbers. These port numbers, along with the source and destination IP addresses,
specify a unique connection on the Internet.
Standard ports and random ports
For example, it is reasonable to have two telnet sessions from one host to another.
However, since telnet uses a well-known service number of 23, something must
distinguish these two connections. The other port in these cases will be a port that is
typically greater than 1023. This alternative port designation is dynamically allocated
by the operating system on the client side.
Random ports can cause a great amount of trouble if they happen to match a wellknown service on a port above 1023. If some client machine assigns a random port of
2049, the connection may mysteriously fail. Similar problems can occur with the X
Window and Archie services.
In practice, most operating systems cycle port numbers between 1024 and a number
somewhere in the range of 2100, depending on how many TCP connections are
currently open and whether a recently closed connection used a similar port number.
This makes the above problem rare.
Reference Guide7
Page 12
Standard ports and random ports
8
Page 13
CHAPTER 2Content Types
A content-type header is used by applications to determine what kind of data they
are receiving, thus allowing them to make decisions about how it should be handled.
It allows clients to correctly identify and display video clips, images, sound, or nonHTML data. People are probably most familiar with the MIME content-types sent in
e-mail.
The WatchGuard Proxied HTTP service uses content-type headers to determine
whether to allow or deny an HTTP transaction. Use the Policy Manager to configure
the Proxied HTTP service to allow or deny content-types. Content types are also used
in SMTP and are configurable in the SMTP proxy. This chapter contains a list of the
more commonly used MIME content-types. The MIME content-types are written as
follows:
type/sub-type
Wildcards may be used to select all sub-types within a type, thereby denying all or
allowing all of that MIME type. For example, to allow all content-types that are text
(including text/enriched, text/plain, and others), use the content-type
New, registered MIME content-types appear regularly. WatchGuard
recommends frequent checking of an online reference for the most current list.
One source of current MIME types is
Well-known services are a combination of port number and transport protocol for
specific, standard applications. This chapter contains several tables that list service
names, port number, protocol and description.
Ports used by WatchGuard products
The WatchGuard Firebox, Management Station, and LiveSecurity Event Processor
(LSEP) use several ports during normal functioning.
Port #ProtocolPurpose
4100TCPAuthentication applet
4101TCPLSEP and Management Station
4107TCPLSEP and Firebox
Port #ProtocolUsed
By
4103TCPdbfetchConnect to webblocker.sealabs.com to retrieve
4102TCPFireboxUsed only in LSS 3.0x or earlier for logs
Purpose
WebBlocker database
Reference Guide19
Page 24
Ports used by Microsoft products
Ports used by Microsoft products
Port #ProtocolPurpose
137, 138UDPBrowsing
67, 68UDPDHCP Lease
135TCPDHCP Manager
138
139
135TCPDNS Administration
53UDPDNS Resolution
139TCPEvent Viewer
139TCPFile Sharing
137, 138
139
138UDPNetLogon
137, 138
139
139TCPPerformance Monitor
1723
47
137, 138
139
139TCPRegistry Editor
139TCPServer Manager
137, 138
139
139TCPUser Manager
139TCPWinNT Diagnostics
137, 138
139
42TCPWINS Replication
135TCPWINS Manager
137TCPWINS Registration
UDP
TCP
UDP
TCP
UDP
TCP
TCP
IP
UDP
TCP
UDP
TCP
UDP
TCP
Directory Replication
Logon Sequence
Pass Through Validation
PPTP
Printing
Trust s
WinNT Secure Channel
Port #ProtocolPurpose
135TCPClient/Server
135TCPExchange Administrator
143TCPIMAP
993TCPIMAP (SSL)
389TCPLDAP
636TCPLDAP (SSL)
20
Communications
Page 25
Port #ProtocolPurpose
102TCPMTA - X.400 over TCP/IP
110TCPPOP3
995TCPPOP3 (SSL)
135TCPRCP
25TCPSMTP
119TCPNNTP
563TCPNNTP (SSL)
Well-known services list
In addition to the ports used by services described above, WatchGuard maintains a
list of well-known services. Because software developers regularly add new services,
this does not represent a comprehensive list of all possible services. For more
information, see J. Reynolds and J. Postel, Assigned Numbers, RFC1700, available at
these Web sites:
WebBlocker works in conjunction with the HTTP proxy to provide content-based
URL-filtering capabilities.
WebBlocker categories
WebBlocker relies on a URL database built and maintained by SurfControl. The
Firebox automatically and regularly downloads a current version of the WebBlocker
database from the WatchGuard Web site to your log host. The Firebox then copies the
new version into memory. This process ensures the most up-to-date Web filtering
and blocking capabilities.
SurfControl constantly searches the Internet to update the list of blocked sites. The
WebBlocker database contains the following 14 categories.
In all of the categories sites to be blocked are selected by advocacy
rather than opinion or educational material. For example, the Drugs/
Drug Culture category blocks sites describing how to grow and use
marijuana but does not block sites discussing the historical use of
marijuana.
Alcohol/Tobacco
Pictures or text advocating the sale, consumption, or production of alcoholic
beverages and tobacco products.
Illegal Gambling
Pictures or text advocating materials or activities of a dubious nature that may
be illegal in any or all jurisdictions, such as illegal business schemes, chain
letters, copyright infringement, computer hacking, phreaking (using
someone’s phone lines without permission), and software piracy. Also
includes text advocating gambling relating to lotteries, casinos, betting,
numbers games, online sports, or financial betting, including non-monetary
dares.
Reference Guide29
Page 34
WebBlocker categories
Militant/Extremist
Pictures or text advocating extremely aggressive or combative behavior or
advocacy of unlawful political measures. Topic includes groups that advocate
violence as a means to achieve their goals. It also includes pages devoted to
“how to” information on the making of weapons (for both lawful and
unlawful reasons), ammunition, and pyrotechnics.
Drug Culture
Pictures or text advocating the illegal use of drugs for entertainment. Includes
substances used for other than their primary purpose to alter the individual’s
state of mind, such as glue sniffing. This does not include (that is, if selected
these sites would not be WebBlocked under this category) currently illegal
drugs legally prescribed for medicinal purposes (such as, drugs used to treat
glaucoma or cancer).
Satanic/Cult
Pictures or text advocating devil worship, an affinity for evil, wickedness, or
the advocacy to join a cult. A cult is defined as: A closed society that is headed
by a single individual where loyalty is demanded and leaving is punishable.
Intolerance
Pictures or text advocating prejudice or discrimination against any race, color,
national origin, religion, disability or handicap, gender, or sexual orientation.
Any picture or text that elevates one group over another. Also includes
intolerant jokes or slurs.
Gross Depictions
Pictures or text describing anyone or anything that is either crudely vulgar,
grossly deficient in civility or behavior, or shows scatological impropriety.
Topic includes depictions of maiming, bloody figures, and indecent depiction
of bodily functions.
Violence/Profanity
Pictures or text exposing extreme cruelty or profanity. Cruelty is defined as:
Physical or emotional acts against any animal or person that are primarily
intended to hurt or inflict pain. Topic includes obscene words, phrases, and
profanity in either audio, text, or pictures.
Search Engines
Search engine sites such as AltaVista, InfoSeek, Yahoo!, and WebCrawler.
Sports and Leisure
Pictures or text describing sporting events, sports figures, or other
entertainment activities.
Sex Education
Pictures or text advocating the proper use of contraceptives. Topic includes
sites devoted to the explanation and description of condoms, oral
contraceptives, intrauterine devices, and other types of contraceptives. It also
includes discussion sites devoted to conversations with partners about
sexually transmitted diseases, pregnancy, and sexual boundaries. Not
30
Page 35
Searching for Blocked Sites
included in this category are commercial sites selling sexual paraphernalia
(topics included under Sexual Acts).
Sexual Acts
Pictures or text exposing anyone or anything involved in explicit sexual acts
and/or lewd and lascivious behavior. Topic includes masturbation,
copulation, pedophilia, as well as intimacy involving nude or partially nude
people in heterosexual, bisexual, lesbian, or homosexual encounters. It also
includes phone sex advertisements, dating services, adult personals, and sites
devoted to selling pornographic CD-ROMs and videos.
Full Nudity
Pictures exposing any or all portions of human genitalia. Topic does not
include sites categorized as Partial/Artistic Nudity containing partial nudity
of a wholesome nature. For example, it does not include Web sites for
publications such as National Geographic or Smithsonian magazine nor sites
hosted by museums such as the Guggenheim, the Louvre, or the Museum of
Modern Art.
Partial/Artistic Nudity
Pictures exposing the female breast or full exposure of either male or female
buttocks except when exposing genitalia which is handled under the Full
Nudity category. Topic does not include swimsuits, including thongs.
Searching for Blocked Sites
To verify whether WebBlocker is blocking a site as part of a category block, visit the
Search/Submit form on the Cyber Patrol Web site.
1Open a Web browser and enter:
http://www.cyberpatrol.com/cyberNOT/default.htm
2Scroll down to display the Cyber Patrol CyberNOT
3Type the URL of the site to check.
4Click Check if the URL is on the CyberNOT List.
The search engine results notify you whether or not the site is on the CyberNOT list. Use this site
also to suggest a new site for both the CyberNOT and CyberYES list, as well as to request a site
review.
®
Search Engine.
Reference Guide31
Page 36
Searching for Blocked Sites
32
Page 37
CHAPTER 5Resources
There are many resources you can draw upon to support your efforts to improve
network security. This chapter lists several sources of information commonly used by
WatchGuard engineers, developers, and Technical Support teams to learn more
about network security in general and the WatchGuard product line in particular.
These include:
•Publishers
• Books
• White Papers and Requests for Comments
•Mailing Lists
•Web Sites
•Newsgroups
Publishers
Several publishers emphasize network security in their offerings.
Addison Wesley Longman, Inc.
O'Reilly & Associates, Inc. (ORA)
Publishes a Professional Computing Series that includes several titles about
networking and network security.
http://www.awl.com/
Publishes many books on network security.
http://www.ora.com/
Reference Guide33
Page 38
Books
Books
Non-Fiction
Amoroso, Edward and Bellovin, Steven. Intranet and Internet Firewall Strategies.
Indianapolis: Que Corporation, 1996. ISBN 1562764225
Chapman, Brent, and Zwicky, Elizabeth D. Building Internet Firewalls. Sebastopol:
O'Reilly & Associates, 1994. ISBN 1-56592-124-0.
Cheswick and Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker.
Reading, MA: Addison Wesley Longman, Inc., 1994. ISBN 0-201-63357-4.
Curry, David A. UNIX System Security: A Guide for Users and System Administrators.
Reading, MA: Addison Wesley Longman, Inc., 1992.
Denning, Dorothy E. Information Warfare and Security. Addison-Wesley, 1999. ISBN
0201433036.
Farley, Stearns, and Mark Farley Hsu, Tom Stearns, and Jeffrey Hsu, LAN Times Guide to Security and Data Integrity. Berkeley: Osborne McGraw-Hill, 1996. ISBN 0-07882166-5.
Garfinkel and Spafford, Simson Garfinkel and Gene Spafford. Practical Unix and Internet Security. Sebastopol: O'Reilly & Associates, 1994. ISBN 1565921488.
Goncalves, Marcus, Firewalls Complete. New York: McGraw-Hill, 1998. ISBN 0-07-
024645-9.
McClure, Stewart; Scambray, Joel; and Kurtz, George. Hacking Exposed. Second
Edition. McGraw-Hill Publishing, January 2000. ISBN 0072127481.
Power, Richard. Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace. Que;
September 2000. ISBN 078973443x.
Schneier, Bruce. Applied Cryptography. Second Edition. New York: John Wiley & Sons,
Inc., 1996. ISBN 0-471-11709-9.
Schwartau, Winn. Cybershock: Surviving Hacker, Phreakers, Identity Theives, Internet Terrorists and Weapons of Mass Disruption. New York: Thunder’s Mouth Press, 2000.
ISBN 1-56025-246-4.
Sheldon, Tom (Editor); Cox, Phil. Windows 2000 Security Handbook. McGraw-Hill
Publishing, November 2000. ISBN 0072124334.
Use your newsreader or electronic messaging application to subscribe to the
comp.security.firewalls Usenet newsgroup.
Deja.com
Deja.com provides a Web-based alternative to news reader services. In
addition to comp.security.firewalls, it includes several discussion groups and
the occasional room discussing network security issues. It can be found at:
http://www.deja.com/
Reference Guide37
Page 42
Newsgroups
38
Page 43
CHAPTER 6Firebox Read-Only System Area
WatchGuard ships all Fireboxes with a fixed, baseline set of functionality stored on
the read-only system area of the Firebox flash disk memory. It is possible to start the
Firebox using this read-only system area when the primary user area is
misconfigured or corrupted. This functionality allows you to:
• Troubleshoot problems where all access to the Firebox is lost
• Reset Firebox passphrases when you do not know or have forgotten them
Fireboxes shipped before LiveSecurity System 4.1 shipped with the original, standard
functionality called the read-only system area. Fireboxes shipped with LiveSecurity
System 4.1 or later contain both the older functions and a new set of features designed
to enhance usability, called the enhanced system area.
Read-only system area
All Fireboxes, both new and old, have a read-only system area which the unit can be
booted into utilizing the serial cable shipped with the Firebox. When a Firebox is
running from the read-only system area, the SysB light on the front panel is yellow
and the Armed light is green.
With the Firebox running the read-only system area, use one of two methods to
initialize the Firebox and prepare it for configuration:
• Out-of-band via a modem
• Direct via a serial cable
Enhanced System Mode
By default, all new Fireboxes (shipped with LiveSecurity System 4.1 or later) boot into
an Enhanced System Mode. When a Firebox is running from the Enhanced System
Mode, the SysA light on the front panel flickers yellow in a repeating pattern.
In a Firebox installed with Enhanced System Mode, the following methods are
available to initialize the Firebox and prepare it for configuration:
Reference Guide39
Page 44
Initializing a Firebox using Hands-Free Installation
• Out-of-band via a modem
• Direct via a serial cable
• Hands-Free Installation via a local area network
• IP connection using Remote Provisioning
Initializing an older Firebox with the LiveSecurity System 4.1 or later automatically
upgrades the Firebox and enables the Firebox to run in the Enhanced System Mode
from that point forward. Until a Firebox is initialized with LiveSecurity System 4.1 or
later, it can not run in Enhanced System Mode.
Initializing a Firebox using Hands-Free Installation
Hands-Free Installation is the recommended method for installing a new Firebox. It
requires that a Firebox is capable of running in Enhanced System Mode. All Fireboxes
shipped with LiveSecurity System (Firebox System) 4.1 or later can run in Enhanced
System Mode; any older box already initialized using System 4.1 or later is
automatically upgraded to run in Enhanced System Mode.
To confirm that your Firebox is upgraded to run in Enhanced System
Mode, use a cross-over cable to connect any two Firebox Ethernet
interfaces. Turn on the Firebox. A flickering SysA light indicates that
the Firebox is running System 4.1 or later.
• A newly shipped Firebox or any model of Firebox already
initialized with System 4.1 or later
• Management Station running LSS/WFS that can attach via local
LAN connection to the Trusted interface of the Firebox
1Use a cross-over cable to connect the Firebox External and Optional ethernet
interfaces.
A red, cross-over cable is included with the Firebox for this purpose.
2Connect the Management Station to the same LAN as the Firebox Trusted
interface.
3Turn the Firebox off and then on. Allow time for the Firebox to boot, then confirm
that the SysA light is flickering.
If the Firebox SysA light is not flickering, the Firebox is running release prior to System 4.1 and
you must use either the serial or modem initialization methods.
4Use the QuickSetup Wizard to configure and initialize the Firebox. When
prompted to upload the security policy, select Use TCP/IP to Configure.
For more information, see the
Install Guide
.
Initializing a Firebox using a serial cable
For Fireboxes that shipped prior to LiveSecurity System 4.1, the read-only system
area is accessible using the Flash Disk Management Tool. It is necessary to restart the
Firebox from the read-only system area to
• Initialize a Firebox version 4.0 or prior for the first time
40
Page 45
Initializing a Firebox using a serial cable
• Troubleshoot problems where all access to the Firebox is lost
Before starting this procedure, establish a connection between the
Firebox console port and an available serial port on the
Management Station. Use a null modem cable (not a standard
serial cable). A null modem cable is shipped with the Firebox.
Also, make sure the Ethernet cables are plugged into the Trusted
interface.
• Any model Firebox
• Management Station running System 4.1 or later
Booting from the system area
From the Control Center:
1Select LiveSecurity Control Center => Tools => Advanced => Flash Disk
Management.
The Flash Disk Management Tool dialog box appears.
2Select Serial Line Creation.
3Select Boot From the System Area. Click Continue.
A verification prompt appears. Verify that the Management Station connects to the Firebox
Trusted interface or through a direct connection (null modem cable).
4Click Yes.
The read-only system area Setup dialog box appears.
5Enter the IP address you want to temporarily assign to the Firebox Trusted
interface. Click OK.
The Firebox uses this address for only a brief period of time until the Firebox reboots. However,
the address
Setup dialog box appears.
6Turn the Firebox off and then on.
Check the Firebox front panel indicator lights. The SysB light should be illuminated indicating
that the Firebox is running from its read-only system area configuration. An Operation Complete
dialog box appears.
7Click OK.
must
be available on the same IP subnet as the Management Station. The COM Port
Working with a Firebox booted from the read-only system area
After you successfully boot the Firebox from the read-only system area, you can copy
a new configuration file to the primary area of the Firebox flash disk and reset Firebox
passphrases. The read-only system area configuration file enables you to
Reference Guide41
Page 46
Initializing a Firebox using a serial cable
communicate only with the Firebox Trusted interface; while booted from the readonly system area, the Firebox will not pass traffic or perform other normal operations.
Do not attempt to use the read-only system area configuration file as a
base or template for your working configuration. It will not work. You
must create a new configuration file using the QuickSetup Wizard or
open an existing configuration file.
1Verify that you can communicate with the Firebox.
The Firebox read-only system area configuration image allows the Firebox to respond to
network pings. Ping the temporary address assigned to the Trusted interface. If the Firebox does
not respond to the ping command, you may have a connectivity problem.
2Start the Policy Manager. Use it to copy a valid configuration file to the primary
area of the Firebox flash disk.
- Initializing an older Firebox for the first time– Create a valid
configuration file using the Policy Manager.
- Recovering a previously configured Firebox– Use the configuration file on
the Management Station hard drive.
- Attempting to solve some other problem– Create a valid configuration file
using the Policy Manager.
3Save the configuration file to the primary area of the Firebox flash disk.
For instructions, see the
Firebox.”
User Guide
4To test whether the configuration file saved successfully to the Firebox, use the
Policy Manager to open it.
For instructions, see the
from the Firebox.”
User Guide
chapter on Firebox Basics, “Saving a Configuration to the
chapter on Firebox Basics, “Opening a Configuration File
Troubleshooting
The COM was successful, but I didn’t get the “Operation Complete” dialog box
when I rebooted the Firebox.
Check the cables. The null modem cable must be connected from the Console
port of the Firebox to the COM port on the Management Station.
Confirm that the COM port is enabled.
Try a different cable or another device (like a modem) to test that the COM
port is responding.
If these solutions do not work, contact WatchGuard Technical Support.
Why is the Flash Disk Management Tool unable to open the COM port on my
computer?
Enable the serial port (COM). The COM port must be enabled for the Flash
Disk Management Tool to recognize it.
Verify that you do not have two sessions of the Flash Disk Management Tool
open.
42
Page 47
Initializing a Firebox using a modem
The WatchGuard Firebox can accept both external and PCMCIA modems. Use a
modem for out-of-band initialization and configuration in cases where the Firebox is
located remotely from the Management Station
• Management Station running System 4.1 or later and
equipped with a modem, Dial-Up Networking software, and
a working telephone line
• Any Firebox model, equipped with an external modem and
modem cable or PCMCIA modem and a working telephone
line
To initialize a Firebox via out-of-band over a modem, the Firebox must first be
prepared:
• Use the blue null serial cable and adaptors included with the Firebox to connect
the Firebox CONSOLE port and external serial port in a loopback
configuration. Connect the Firebox CONSOLE port and external serial.
• Turn the power on the Firebox off then on. Confirm that the SysB light is lit.
• The Firebox is now ready to accept the out-of-band connection.
Initializing a Firebox using a modem
Initializing using remote provisioning
Use remote provisioning to initialize a Firebox in the case where a router sits between
the Management Station and the Firebox network connection. Because of the
flexibility of being able to initialize a Firebox from virtually any location on a
network, it is a very versatile option. However, remote provisioning has the
following restrictions:
• During provisioning, the Firebox and the router should be the only devices on
the network
• You must be able to flush the local router’s ARP tables, preferably by rebooting
• The Firebox must be running System 4.1 or later
• Firebox model initialized with System 4.1 or later
• Firebox attached as the only device behind a working router
• Management Station running System 4.1 or later that has
IP connectivity to the network on which the Firebox is
connected
• The network address and the netmask of the net behind the
router must be known
• One or more unused IP connections behind the router.
In order to provision a Firebox remotely via an IP connection, the Firebox must
belong to one of the following categories:
• New Firebox– By default, newly shipped Fireboxes boot into Enhanced
System Mode which supports remote provisioning.
Reference Guide43
Page 48
Managing flash disk memory
• Older Firebox– For Fireboxes shipped before LiveSecurity System 4.1,
initialize the Firebox with LiveSecurity System 4.1 software. Then use the red
cross-over cable supplied with the Firebox to connect the Trusted and Optional
Ethernet interfaces in a loopback configuration.
During remote provisioning, one light appears on the front panel Traffic Volume
Indicator for each successful IP address the Firebox claims. The Firebox can claim up
to eight addresses.
The Processor Load Indicator marks the total number of different MAC addresses the
Firebox sees on the cable. If the number exceeds eight, the Firebox stops claiming
addresses; the SysA light remains lit. This feature is designed to prevent an
uninitialized Firebox from claiming addresses on a busy LAN. (If this happens,
reboot into Enhanced System Mode and try again.)
The Firebox and the router should be the only two devices on the LAN. Complete the
following:
1Attach both the Firebox External interface and the router’s interface to a common
local area network, or use the red cross-over cable to connect them directly.
2Turn the Firebox off and then on. Allow time for the Firebox to boot. Confirm that
there is a flashing pattern with a red, blinking, Trusted deny light on the lower
edge of the Security Triangle Display.
3Flush the router ARP cache.
Rebooting the router will usually accomplish this.
4From the Policy Manager on the Management Station, select File => Open
Firebox.
5Select an unused IP address behind the router on the same network to which the
Firebox is attached. Set the Firebox’s read-write passphrase to wg. Set the timeout
to 90 seconds. Click OK.
6If the procedure is successful, the open operation on the Management Station
completes. You can then follow regular procedures described in the User Guide to
configure and download a new flash image to the Firebox.
Managing flash disk memory
The Flash Disk Management Tool performs specific tasks involving the Firebox flash
memory. The flash disk is divided into three areas:
• System (SysB)– Contains a permanently stored, basic Firebox software image
with the passphrase wg.
• Primary (SysA)– Contains the Firebox software image used in normal
operation and the enhanced read-only system area.
• Backup– Contains a copy of the user-defined configuration file.
The Flash Disk Management Tool performs three different tasks for manipulating the
Firebox boot configuration file.
44
Page 49
Managing flash disk memory
Making a backup of the current configuration file
To ensure that you always have a backup version of a current, working configuration
file, copy the configuration file stored in the primary area to the Firebox flash disk
backup area. From the Control Center:
2Select Make Backup of Current Image. Click Continue.
A verification prompt appears. Verify that the Management Station connects to the Firebox
Trusted interface either over the network (TCP/IP) or via a modem using out-of-band
management.
3Click Yes.
The Connect To Firebox dialog box appears.
4Use the Firebox drop list to select a Firebox or type the IP address used by the
Management Station to communicate with the Firebox. Enter the configuration
(read/write) passphrase. Click OK.
When the backup is successful, an Operation Complete alert appears.
5Click OK.
You do not need to reboot the Firebox.
Restoring a backup configuration file
Backing up and restoring a configuration file acts not only on the configuration file
but on the enture flash image. This is important to note if you are loading a new
version, patch, or component onto the Firebox.
Restore the backup configuration file to the primary area of the Firebox flash disk
when:
• You incorrectly overwrite the primary configuration file.
• The primary configuration file is incorrectly configured or is otherwise
unusable.
This procedure is only possible when a backup configuration
file is on the backup area of the Firebox's flash disk. See
“Making a backup of the current configuration file” on
page 45. There is no backup file on the Firebox until you copy
one there.
The Flash Disk Management Tool dialog box appears.
2Select Restore Backup Image. Click Continue.
A verification prompt appears. Verify that the Management Station connects to the Firebox
Trusted interface either over the network (TCP/IP) or via a modem using out-of-band
management.
3Click Yes.
The Connect To Firebox dialog box appears.
4Use the Firebox drop list to select a Firebox or type the IP address used by the
Management Station to communicate with the Firebox. Enter the configuration
(read/write) passphrase. Click OK.
The Firebox copies the configuration file from the backup area to the primary area of its flash
disk and reboots from the backup configuration file.
Reference Guide45
Page 50
Managing flash disk memory
46
Page 51
CHAPTER 7Out-of-Band Initialization Strings
This chapter provides a reference list of PPP and modem initialization strings used to
configure out-of-band (OOB) management.
PPP initialization strings
These are the strings and syntaxes available for use when configuring a Firebox for
out-of-band management in Policy Manager:
asyncmap <map>
Set the async character map to <map>. This map describes which control
characters cannot be successfully received over the serial line. Pppd will ask
the peer to send these characters as a 2-byte escape sequence. The argument is
a 32-bit hex number with each bit representing a character to escape. Bit 0
(00000001) represents the character 0x00; bit 31 (80000000) represents the
character 0x1f or ^_. If multiple asyncmap options are given, the values are
ORed together. If no asyncmap option is given, no async character map will
be negotiated for the receive direction; the peer should then escape all control
characters. To escape transmitted characters, use the escape option.
escape xx,yy,..
Specifies that certain characters should be escaped on transmission
(regardless of whether the peer requests them to be escaped with its async
control character map). The characters to be escaped are specified as a list of
hex numbers separated by commas. Note: Almost any character can be
specified for the escape option, unlike the asyncmap option which only allows
control characters to be specified. The characters which may not be escaped
are those with hex values 0x20 — 0x3f or 0x5e.
Reference Guide47
Page 52
PPP initialization strings
mpfto <period>
Specifies how long the PPP session should wait for a valid management
session to begin. If no valid session starts, then PPP will disconnect after this
time-out period. The default is 90 seconds.
mru n
Set the MRU (Maximum Receive Unit) value to n. Pppd will ask the peer to
send packets of no more than n bytes. The minimum MRU value is 128. The
default MRU value is 1,500. A value of 296 is recommended for slow links (40
bytes for TCP/IP header + 256 bytes of data).
mtu n
Set the MTU (Maximum Transmit Unit) value to n. Unless the peer requests a
smaller value via MRU negotiation, pppd will request that the kernel
networking code send data packets of no more than n bytes through the PPP
network interface.
passive
Enables the “passive” option in the LCP. With this option, pppd will attempt
to initiate a connection; if no reply is received from the peer, pppd will then
just wait passively for a valid LCP packet from the peer, instead of exiting, as
it would without this option.
bsdcomp nr,nt
Request that the peer compress packets that it sends, using the BSD-Compress
scheme, with a maximum code size of nr bits, and agree to compress packets
sent to the peer with a maximum code size of nt bits. If nt is not specified, it
defaults to the value given for nr. Values in the range 9 to 15 can be used for nr
and nt; larger values give better compression but consume more kernel
memory for compression dictionaries. Alternatively, a value of 0 for nr or nt
disables compression in the corresponding direction. Use nobsdcomp or
bsdcomp 0 to disable BSD-Compress compression entirely.
debug
Enables connection debugging facilities. If this option is given, pppd will log
the contents of all control packets sent or received in a readable form.
default-asyncmap
Disable asyncmap negotiation, forcing all control.
default-mru
Disable MRU (Maximum Receive Unit) negotiation. With this option, pppd
will use the default MRU value of 1,500 bytes for both the transmit and
receive direction.
deflate nr,nt
Request that the peer compress packets that it sends, using the Deflate
scheme, with a maximum window size of 2**nr bytes, and agree to compress
packets sent to the peer with a maximum window size of 2**nt bytes. If nt is
not specified, it defaults to the value given for nr. Values in the range 8 to 15
can be used for nr and nt; larger values give better compression but consume
more kernel memory for compression dictionaries. Alternatively, a value of 0
48
Page 53
PPP initialization strings
for nr or nt disables compression in the corresponding direction. Use
nodeflate or deflate 0 to disable Deflate compression entirely.
Pppd requests Deflate compression in preference to BSDCompress if the peer can do either.
idle n
Specifies that pppd should disconnect if the link is idle for n seconds. The link
is idle when no data packets (that is, IP packets) are being sent or received.
Note: It is not advisable to use this option with the persist option without the
demand option. If the active-filter option is given, data packets that are
rejected by the specified activity filter also count as the link being idle.
ipcp-accept-local
With this option, pppd will accept the peer’s idea of our local IP address, even
if the local IP address was specified in an option.
ipcp-accept-remote
With this option, pppd will accept the peer’s idea of its (remote) IP address,
even if the remote IP address was specified in an option.
ipcp-max-configure n
Set the maximum number of IPCP configure-request transmissions to n
(default 10).
ipcp-max-failure n
Set the maximum number of IPCP configure-NAKs returned before starting to
send configure-rejects instead to n (default 10).
ipcp-max-terminate n
Set the maximum number of IPCP terminate-request transmissions to n
(default 3).
ipcp-restart n
Set the IPCP restart interval (retransmission time-out) to n seconds (default 3).
lcp-echo-failure n
If this option is given, pppd will presume the peer to be dead if n LCP echorequests are sent without receiving a valid LCP echo-reply. If this happens,
pppd will terminate the connection. Use of this option requires a non-zero
value for the lcp-echo interval parameter. This option can be used to enable
pppd to terminate after the physical connection has been broken (for example,
the modem has hung up) in situations where no hardware modem control
lines are available.
lcp-echo-interval n
If this option is given, pppd will send an LCP echo-request frame to the peer
every n seconds. Normally the peer should respond to the echo-request by
sending an echo-reply. This option can be used with the lcp-echo-failure
option to detect that the peer is no longer connected.
Reference Guide49
Page 54
PPP initialization strings
lcp-max-configure n
Set the maximum number of LCP configure-request transmissions to n
(default 10).
lcp-max-failure n
Set the maximum number of LCP configure-NAKs.
lcp-max-terminate n
Set the maximum number of LCP terminate-request transmissions to n
(default 3).
lcp-restart n
Set the LCP restart interval (retransmission time-out) to n seconds (default 3).
local
Don't use the modem control lines. With this option, pppd will ignore the
state of the CD (Carrier Detect) signal from the modem and will not change
the state of the DTR (Data Terminal Ready) signal.
maxconnect n
Terminate the connection when it has been available for network traffic for n
seconds (that is, n seconds after the first network control protocol comes up).
modem
Use the modem control lines. This option is the default. With this option,
pppd will wait for the CD (Carrier Detect) signal from the modem to be
asserted when opening the serial device (unless a connect script is specified),
and it will drop the DTR (Data Terminal Ready) signal briefly when the
connection is terminated and before executing the connect script.
netmask n
Set the interface netmask to n, a 32-bit netmask in decimal dot notation (for
example, 255.255.255.0). If this option is given, the value specified is ORed
with the default netmask. The default netmask is chosen based on the
negotiated remote IP address; it is the appropriate network mask for the class
of the remote IP address, ORed with the netmasks for any non-point-to-point
network interfaces in the system that are on the same network.
noauth
Do not require the peer to authenticate itself.
nobsdcomp
Disables BSD-Compress compression; pppd will not request or agree to
compress packets using the BSD-Compress scheme.
noccp
Disable CCP (Compression Control Protocol) negotiation. This option should
only be required if the peer is buggy and gets confused by requests from pppd
for CCP negotiation.
50
Page 55
Modem initialization strings
nocrtscts
Disable hardware flow control (that is, RTS/CTS) on the serial port. If neither
the crtscts nor the nocrtscts option is given, the hardware flow control setting
for the serial port is left unchanged.
noipdefault
Disables the default behavior when no local IP address is specified, which is to
determine (if possible) the local IP address from the hostname. With this
option, the peer will have to supply the local IP address during IPCP
negotiation (unless it was specified explicitly on the command line or in an
options file).
nomagic
Disable magic number negotiation. With this option, pppd cannot detect a
looped-back line. This option should only be needed if the peer is buggy.
nopersist
Exit once a connection has been made and terminated. This is the default
unless the persist or demand option has been specified.
novjccomp
Disable the connection-ID compression option in Van Jacobson-style TCP/IP
header compression. With this option, pppd will not omit the connection-ID
byte from Van Jacobson compressed TCP/IP headers, nor ask the peer to do
so.
silent
Pppd will not transmit LCP packets to initiate a connection until a valid LCP
packet is received from the peer (as for the “passive” option with older
versions of pppd).
xonxoff
Use software flow control (that is, XON/XOFF) to control the flow of data on
the serial port.
Modem initialization strings
These parameters specify a chat session that occurs between the Firebox and the
modem to properly initialize the modem. In most cases the default initializations
work with a wide variety of modems. The default initializations are known to work
with the list of approved modems.
In the default initializations below, the parameters marked with ^ specify what the
Firebox should expect back from the modem, and the portions marked with '_____'
specify what is to be sent to the modem:
Reference Guide51
Page 56
Modem initialization strings
"" +\p+\p+\d\r\pATH "" \dAT&F OK ATE0 OK ATS0=1 OK
^^ ________________ ^^ ______ ^^ ____ ^^ ______ ^^
123456789
Explanation of fields
1Specifies that the Firebox should expect nothing back from the modem at this
point in the chat.
2Specifies that three plus characters (+) should be sent with short pauses in
between, then a 1-second delay, then a return character, a short pause, then the
characters “ATH” are sent, finally followed by a carriage return (which is not
shown, but implied). This sequence commands most modems to hang up.
3Specifies that the Firebox should expect nothing back from the modem at this
point in the chat.
4Send a 1-second delay followed by the characters “AT&F” to command the
modem to recall its factory-default configuration.
5Expect “OK” back from the modem.
6Send “ATE0” to modem, which directs it not to echo back commands characters
sent.
7Expect “OK” back.
8Send “ATS0=1” to direct the modem to answer incoming calls after one ring.
9Expect back a final “OK” from the modem.
For an out-of-band management connection, the modem needs to be set up to answer the phone
when it rings, and to use hardware flow control on the serial line. The Flow Control and Modem
Initialization fields on the OOB tab enable you to make these settings.
Common initialization string values
Auto-answer
Send the string
pickup after one ring, enter
ATS0=
x, where x = the number of rings before answering. For a
ATS0=1
.
Special sequences
TIMEOUT value
The initial time-out value is 45 seconds. Once changed, the time-out setting
remains in effect until it is changed again.
EOT
The special reply string of EOT indicates that the chat program should send
an EOT character to the remote. This is normally the end-of-file character
sequence. A return character is not sent following the EOT. The EOT sequence
can be embedded into the send string using the sequence Ctrl+D.
52
Page 57
BREAK
The special reply string of BREAK will cause a break condition to be sent. The
break is a special signal on the transmitter. The break sequence can be
embedded into the send string using the \K sequence.
Escape sequences
The expect and reply strings may contain escape sequences. All of the sequences are
legal in the reply string. Many are legal in the expect sequence. Those that are not
valid in the expect sequence are so indicated.
"" or ‘ ‘
Expect or send a null string. If you send a null string, it will still send the
return character. This sequence can either be a pair of apostrophes or quotes.
\b
Backspace.
\c
Suppress the new line at the end of the reply string. This is the only method to
send a string without a trailing return character. It must be at the end of the
send string. For example, the sequence hello\c will simply send the characters
h, e, l, l, o (not valid in expect).
Modem initialization strings
\d
Delay for 1 second (not valid in expect).
\K
Insert a BREAK (not valid in expect).
\n
Send a newline or linefeed character.
\N
Send a null character. The same sequence can be represented by \0 (not valid
in expect).
\p
Pause for a fraction of a second. The delay is 1/10th of a second (not valid in
expect).
\q
Suppress writing the string to the logging system. The string ?????? is written
to the log in its place (not valid in expect).
\r
Send or expect a carriage return.
\s
A space character in the string. This can be used when it is not desirable to
quote the strings that contains spaces. For example, the sequence 'HI TIM' and
HI\sTIM are the same.
Reference Guide53
Page 58
Modem initialization strings
\t
Send or expect a tab character
\\
Send or expect a backslash character
\ddd
Collapse the octal digits (ddd) into a single ASCII character and send that
character. Some characters are not valid in Ctrl+C; for these characters,
substitute the sequence with the control character represented by C. For
example, the character DC1 (17) is shown as Ctrl+Q. Some characters are not
valid in expect.
54
Page 59
CHAPTER 8Glossary
This glossary contains a list of terms, abbreviations, and acronyms frequently used
when discussing networks, firewalls, and WatchGuard products.
active mode FTP
One of two ways an FTP data connection is made. In active mode, the FTP
server establishes the data connection. In passive mode, the client establishes
the connection. In general, FTP user agents use active mode and Web user
agents use passive mode.
Address Resolution Protocol (ARP)
A TCP/IP protocol used to convert an IP address into a physical address such
as an Ethernet address.
address space probe
An intrusion measure in which a hacker sequentially attacks IP addresses.
These probes are usually attempts to map IP address space to look for security
holes that a sender might exploit to compromise system security.
AH (authentication header)
A protocol used in IPSec available for use with IPSec Branch Office VPN. AH
provides authentication for as much of the IP header as possible (except for
mutable fields that are nondeterministic, such as TTL fields) and all upper
protocols and payload. It offers the functionality of ESP except for
confidentiality, which ESP’s encryption provides.
Alias
Aliases are shortcuts that enable you to identify groups of hosts, networks, or
users with one identifying name. They are used to speed user authentication
and service configuration.
armed
When a Firebox is armed, it is actively guarding against intrusion and attack.
ARP
See Address Resolution Protocol.
Reference Guide55
Page 60
ARP tables
A table of active ARP addresses on a computer.
ascending
A method of ordering a group of items from lowest to highest, such as from A
to Z.
authentication
Authentication is a method of mapping a username to a workstation IP
address, allowing the tracking of connections based on name rather than IP
address. With authentication, it doesn’t matter what IP address is used or
from which machine a person chooses to work.
backbone
A term often used to describe the main network connections composing the
Internet.
Bandwidth Meter
A monitoring tool that provides a real-time graphical display of network
activities across a Firebox. Formerly known as the Mazameter.
bastion host
A computer placed outside a firewall to provide public services (such as
WWW and FTP) to other Internet sites. The term is sometimes generalized to
refer to any host critical to the defense of a local network. In WatchGuard
documentation, also called the Optional network.
bitmask
A pattern of bits for an IP address that determines how much of the IP address
identifies the host and how much identifies the network.
blocked port
A security measure in which a specific port associated with a network service
is explicitly disabled, blocking users outside the firewall from gaining access
to that service port. A blocked port takes precedence over any service settings
that are generally enabled.
blocked site
An IP address outside the Firebox explicitly blocked so it cannot connect with
hosts behind the Firebox. Blocked sites can be manual and permanent, or
automatic and temporary.
boot up
To star t a compu ter.
Branch Office Virtual Private Networking (BOVPN)
BOVPN creates a secure tunnel over an unsecure network, between two
networks that are protected by the WatchGuard LiveSecurity System, or
between a WatchGuard Firebox and an IPSec-compliant device. It allows you
to connect two or more locations over the Internet while protecting the
resources on the Trusted and Optional networks.
56
Page 61
broadcast address
An address used to broadcast a request to a network, usually to discover the
presence of a machine.
browser
See Web browser.
cascade
A command that arranges windows so that they are overlapped, with the
active window in front.
CD-ROM (Compact Disc Read-Only Memory)
A disk on which data is stored.
checkbox
A dialog box option that is not mutually exclusive with other options.
Clicking a checkbox inserts or removes an X or a checkmark.
CIDR (Classless Inter-Domain Routing)
A routing mechanism designed to deal with the exhaustion of Class B
network addresses, and the subsequent allocation of multiple Class C
addresses to sites. CIDR is described in RFC 1519.
cipher block chaining
A form of DES encryption that requires the entire message to decrypt rather
than a portion of the message.
Class A, Class B, Class C
See Internet address class.
click
To press the primary mouse button once.
client
Software installed on a hard disk used to access resources on the Internet.
cold boot
The process of starting a computer by turning on the power to the system
unit.
compress
To compact a file or group of files so that they occupy less disk space. See also
decompress.
connected enterprise
A company or organization with a computer network exchanging data with
the Internet or some other public network.
Control Center
The WatchGuard Control Center is a toolkit of applications run from a single
location, enabling configuration, management, and monitoring of a network
security policy.
Reference Guide57
Page 62
Control Panel
The set of Windows 95/98 or Windows NT programs used to change system
hardware, software, and Windows settings.
coprocessor
A separate processor designed to assist in specific functions, such as handling
complex mathematics or graphics, and to temporarily reduce the workload of
the microprocessor.
CPU (central processing unit)
The microprocessor chip that interprets and carries out instructions.
CRYPTOCard
An authentication system that uses an offline card to hash encryption keys,
which increases their safety against unauthorized decryption.
CSLIP (Compressed Serial Line Internet Protocol)
A protocol for exchanging IP packets over a serial line, which compresses the
headers of many TCP/IP packets.
custom filter rules
Filter rules created in WatchGuard Policy Manager to allow specific content
types through the Firebox.
data
Distinct pieces of information, usually formatted in a special way.
datagram
A packet of data that stands alone. Generally used in reference to UDP and
ICMP packets when talking about IP protocols.
Allows connections bound for port 135 on a machine. These initial calls
typically result in a response from the trusted machine that redirects the client
to a new port for the actual service the client wants.
descending
A method of ordering a group of items from highest to lowest, such as from Z
to A.
decompress
To expand a compressed file or group of files so that the file or files can be
opened. See also compress.
decrypt
The process of decoding data that has been encrypted and requires a key or
password.
default
A predefined setting that is built into a program and is used when an
alternative setting is not specified.
58
Page 63
default packet handling
Default packet handling automatically and temporarily blocks hosts that
originate probes and attacks against a network.
denial of service (DoS)
A way of monopolizing system resources so that other users are ignored. For
example, someone could Finger an unsecured host continuously so that the
system is incapable of running or executing other services.
DES (Data Encryption Standard)
A block-oriented cipher that encrypts blocks of 64 bits. The encryption is
controlled by a key of 56 bits. See also Triple-DES.
DHCP (Dynamic Host Configuration Protocol)
A means of dynamically allocating IP addresses to devices on a network.
dialog box
A box that displays additional options when a command is chosen from a
menu.
dial-up connection
A connection between your remote computer and a server using software, a
modem, and a telephone.
dimmed
The grayed appearance of a command or option that is unavailable.
disarmed
The state of a Firebox when it is not actively protecting a network.
DMZ (Demilitarized Zone)
Another name for the optional bastion network. One common use for this
network is as a public Web server.
DNS (Domain Name System)
A network system of servers that converts numeric IP addresses into readable,
hierarchical Internet addresses.
Domain Name System (DNS)
A network system of servers that converts numeric IP addresses into readable,
hierarchical Internet addresses.
dotted notation
The notation used to write IP addresses as four decimal numbers separated by
dots (periods), sometimes called dotted quad – 123.212.12.4 is an example.
double-click
To press the primary mouse button twice rapidly.
download
To transfer a file from a remote computer to your local computer.
Reference Guide59
Page 64
drop-in configuration
A configuration in which the Firebox is physically located between the router
and the LAN without any of the computers on the Trusted interface being
reconfigured. This protects a single network that is not subdivided into
smaller networks.
drop-in network
This configuration allows for distribution of logical address space across the
Firebox interface.
DVCP (Dynamic VPN Configuration Protocol)
A WatchGuard proprietary protocol that simplifies configuration of VPNs.
dynamic NAT
Dynamic NAT is also known as IP masquerading or port address translation.
It hides network addresses from hosts on the external network. Hosts
elsewhere on the Internet see only outgoing packets from the Firebox itself.
dynamic packet filtering
Filtering based not only on service types, but also on conditions surrounding
the initiation of a connection.
encryption
The translation of data into a secret code. To read an encrypted file, you must
use a key or password that enables decryption.
ESP (Encapsulation Security Payload)
A protocol used in IPSec available for use with IPSec Branch Office VPN. ESP
encapsulates and authenticates IP packets to be passed over the tunnel,
providing confidentiality, data integrity, and origin authentication. ESP is
similar to AH, except that it provides encryption.
Event Processor
See LiveSecurity Event Processor.
expand
To display all subordinate entries in an outline or in a folder.
extension
See file extension.
External interface
An interface connected to the external network that presents the security
challenge, typically the Internet.
failover
Configuration that allows a secondary machine to take over in the event of a
failure in the first machine, thus allowing normal use to return or continue.
fail-shut mode
A condition in which a firewall blocks all incoming and outgoing traffic in the
event of a firewall failure. This is the opposite of fail-open mode, in which a
60
Page 65
firewall crash opens all traffic in both directions. Fail-shut is the default failure
mode of the WatchGuard LiveSecurity System.
field
An area in a form or Web page in which to enter or view specific information
about an individual task or resource.
file extension
A period and up to three characters at the end of a file name. The extension
can help identify the kind of information a file contains.
filters
Small, fast programs in a firewall that examine the header files of incoming
packets and route or reject the packets based on the rules for the filter.
Firebox
The WatchGuard firewall appliance, consisting of a red box with a purposebuilt computer and input/output architecture optimized as the resident
computer for network firewall software.
firewall
Any technological measures taken to secure a computer network against
unwanted use and abuse via net connections.
firewalling
The creation or running of a firewall.
flash disk
An 8-megabyte, on-board flash ROM disk that acts like a hard disk in a
Firebox.
FTP (File Transfer Protocol)
The most common protocol for copying files over the Internet. See also active
mode FTP.
gateway
The IP address through which messages pass.
graphical user interface (GUI)
The visual representation on a computer screen that allows users to view,
enter, or change information.
header
A series of bytes at the beginning of a communication packet that provide
identification information about the packet such as its computer of origin, the
intended recipient, packet size, and destination port number.
Help system
A form of online information about a software or hardware system.
High Availability
High Availability enables the installation of two Fireboxes on one network in
a failover configuration. At any given moment, one Firebox is in active mode
while the other is in standby mode, ready to take over if the first box fails.
Reference Guide61
Page 66
home page
The first page of a Web site used as an entrance into the site.
host route
A setup in which an additional router is behind the Firebox and one host is
behind that router. You configure a host route to inform the Firebox of this
additional host behind the additional router.
HostWatch
A graphical monitor providing a real-time display of which hosts are
connected from behind the Firebox to hosts on the Internet.
HTML (HyperText Markup Language)
A set of rules used to format Web pages, including methods to specify text
characteristics, graphic placement, and links. HTML files are read and
interpreted by a Web browser.
HTTP (HyperText Transfer Protocol)
A communications standard designed and used to transfer information and
documents created using languages such as HTML.
HTTPS (Secure HTTP)
A variation of HTTP enabling the secure transmission of data and HTML files.
Generally used in conjunction with Secure Sockets Layer (SSL).
hyperlink
An object on a Web page such as a graphic or underlined text that represents a
link to another location in the same file or a different file. When clicked, the
page or graphic appears.
IANA (Internet Assigned Number Authority)
The central authority charged with assigning parameter values to Internet
protocols. For example, IANA controls the assignment of well-known TCP/IP
port numbers. Currently IANA manages port numbers 1 through 1023.
ICMP (Internet Control Message Protocol)
A protocol used to pass control and error messages back and forth between
nodes on the Internet.
IKE (Internet Key Exchange)
Used with IPSec virtual private networks. Automates the process of
negotiating keys, changing keys and determining when to change keys.
initialize
To prepare a disk for information storage.
installation wizard
A wizard specifically designed to guide a user through the process of
installing software. See wizard.
62
Page 67
Internet address class
To efficiently administer the 32-bit IP address class space, IP addresses are
separated into three classes that describe networks of varying sizes:
Class AIIf the first octet of an IP address is less than 128, it is a Class A
address. A network with a Class A address can have up to about 16 million
hosts.
Class B If the first octet of an IP address is from 128 to 191, it is a Class B
address. A network with a Class B address can have up to 64,000 hosts.
Class C If the first octet of an IP address is from 192 to 223, it is a Class C
address. A network with a Class C address can have up to 254 hosts.
intranet
A self-contained network that uses the same communications protocols and
file formats as the Internet.
IP (Internet Protocol)
A protocol used by the Internet that enables computers to communicate over
various physical media.
IP address host
The 32-bit address that identifies a host. Technically, a host is a network
device connected to the Internet. In common usage, a host is a computer or
some other device that has a unique IP address. Computers with more than
one IP address are known as multihomed hosts.
IP fragment
An IP datagram that is actually part of a larger IP packet. IP fragments are
typically used when an IP packet is too large for the physical media that the
data must cross. For example, the IP standard for Ethernet limits IP packets to
about 1,500 bytes, but the maximum IP packet size is 65,536 bytes. To send
packets larger than 1,500 bytes over an Ethernet, IP fragments must be used.
IP masquerading
See dynamic NAT.
IP options
Extensions to the Internet Protocol used mainly for debugging and special
applications on local networks. In general, there are no legitimate uses of IP
options over an Internet connection.
IPSec (Internet Protocol Security)
An open-standard methodology of creating a secure tunnel through the
Internet, connecting two remote hosts or networks. IPSec provides several
encryption and authentication options to maximize the security of the
transmission over a public medium such as the Internet.
ISP (Internet service provider)
Typically, a business that sells access to the Internet. A government
organization or an educational institution may be the ISP for some
organizations.
Reference Guide63
Page 68
Java applet
A Java applet is a program written in the Java programming language that can
be included on an HTML page, much in the same way an image is included.
When you use a Java technology—enabled browser to view a page that
contains an applet, the applet’s code is transferred to your system and carried
out by the browser's Java virtual machine (JVM).
LAN (local area network)
A computer network that spans a relatively small area generally confined to a
single building or group of buildings.
link
See hyperlink.
LiveSecurity Event Processor (LSEP)
A program that controls notification and logging on the log hosts. It provides
critical timing services for the Firebox and includes its own GUI.
LiveSecurity Inbox
The client software for the WatchGuard LiveSecurity Service.
LogViewer
As a part of the Control Center, the LogViewer displays a static view of the
Logdb file.
loopback interface
A pseudo interface that allows a host to use IP to talk to its own services. A
host is generally configured to trust packets coming from addresses assigned
to this interface. The Class A address group 127.0.0.0 has been reserved for
these interfaces.
LSEP
See LiveSecurity Event Processor.
mail server
Refers to both the application and the physical machine tasked with routing
incoming and outgoing electronic mail.
Management Station
The computer on which you run the WatchGuard LiveSecurity System
Control Center and Policy Manager; sometimes referred to as the
administration host.
network address translation (NAT)
Network address translation hides internal network addresses from hosts on
an external network.
MAC address
Media Access Control address that is unique to your computer, and is used to
identify its hardware.
64
Page 69
masquerading
In the LiveSecurity System, masquerading sets up addressing so that a
Firebox presents its IP address to the outside world in lieu of the IP addresses
of the hosts protected by the Firebox.
Mazameter
See Bandwidth Meter.
MIME (Multipurpose Internet Mail Extensions)
Extensions to the SMTP format that allow binary data, such as that found in
graphic files or documents, to be published and read on the Internet.
MSDUN
Microsoft Dial-Up Networking is an executable program required for remote
user VPN.
multiple network configuration
A configuration used in situations in which a Firebox is placed with separate
logical networks on its interface.
MUVPN
Multi-user VPN.
network address translation (NAT)
Network address translation hides or masquerades network addresses from
hosts on another network, protecting the confidentiality and architecture of
the network.
netmask
An inverse mask of the significant bits of a network address. On a local net,
the range of addresses one can expect to be found directly connected to the
network. Netmasks generally occur with a Class C license address space of 8
bits, so the netmask is 255.255.255.0. It can be a smaller number of bits if
subnetting is in effect. Some systems require the netmask to be an even
number of bits.
Network Configuration wizard
Creates a basic Firebox configuration. It consists of a series of windows that
prompt for essential configuration information for drop-in or advanced
network installations.
NFS (Network File System)
A popular TCP/IP service for providing shared file systems over a network.
NTP (Network Time Protocol)
An Internet service used to synchronize clocks between Internet hosts.
Properly configured, NTP can usually keep the clocks of participating hosts
within a few milliseconds of each other.
octet
A byte. Used instead of “byte” in most IP documents because historically
many hosts did not use 8-bit bytes.
Reference Guide65
Page 70
Optional interface
An interface that connects to a second secured network, typically any network
of servers provided for public access.
out-of-band (OOB)
A management feature that enables the Management Station to communicate
with the Firebox via a telephone line and a modem. OOB is very useful for
remotely configuring a Firebox when Ethernet access is unavailable.
packet filtering
Controlling access to a network by analyzing the incoming and outgoing
packets and letting them pass or halting them based on the IP addresses of the
source and destination. Packet filtering is one technique, among many, for
implementing security firewalls.
passive mode FTP
See active mode FTP.
PCMCIA (Personal Computer Memory Code International Association) card
A standard compact physical interface used in personal computers. The most
common application of PCMCIA cards is for modems and storage.
permission
Authorization to perform an action.
PLIP (Parallel Line Internet Protocol)
A protocol for exchanging IP packets over a parallel cable.
Policy Manager
One component in the WatchGuard LiveSecurity System, consisting of the
user interface used to modify and upload a Firebox configuration file.
pop-up window
A window that suddenly appears (pops up) when an option is selected with a
mouse or a function key is pressed.
port
A channel for transferring electronic information between a computer and a
network, peripherals, or another computer.
port address translation
See dynamic NAT.
port forwarding
In the LiveSecurity System, an option in which the Firebox redirects IP
packets to a specific masqueraded host behind the firewall based on the
original destination port number.
port space probe
An intrusion measure whereby a hacker sequentially attacks port numbers.
These probes are usually attempts to map port space to look for security holes
which the sender might exploit.
66
Page 71
port, TCP or UDP
A TCP or UDP service endpoint. Together with the hosts’ IP addresses, ports
uniquely identify the two peers of a TCP connection.
PPP (Point-to-Point Protocol)
A link-layer protocol used to exchange IP packets across a point-to-point
connection, usually a serial line.
PPTP (Point-to-Point Tunneling Protocol)
One of the two standards for dial-up connection of computers to the Internet,
with stable data negotiation, compression, and error correction.
principle of precedence
Rules that determine which permissions and prohibitions override which
others when creating a combination of security policies.
probe
A type of hacking attempt characterized by repetitious, sequential access
attempts. For example, one might try to probe a series of ports for one that is
more open and less secure.
provisioning
The process of setting the parameters of the Firebox or SOHO before it is sent
to a customer. With respect to the Firebox, the minimum Policy Manager
configuration is set with the most basic services on the box, Ping and
WatchGuard. It also sets the IP addresses on the Firebox.
proxy server
A server that stands in place of another server. In firewalling, a proxy server
poses as a specific service but has more rigid access and routing rules.
protocol
An agreed-upon format for transmitting data between two devices. The
protocol determines the following: the type of error checking to be used, data
compression method, if any; how the sending device will indicate that it has
finished sending a message, and how the receiving device will indicate that it
has received a message.
RADIUS server
RADIUS (Remote Authentication Dial-In User Service) is an open, crossplatform system for authenticating network users.
related hosts
A method to place hosts on the Optional or External interface when using a
simple or drop-in network configuration. Examples include placing a router
on the External interface or an HTTP server on the Optional interface.
related networks
Networks on the same physical wire as the Firebox interfaces but with
network addresses that belong to an entirely different network.
Reference Guide67
Page 72
report
A formatted collection of information that is organized to provide project data
on a specific subject.
RFC (Request for Comments)
RFC documents describe standards used or proposed for the Internet. Each
RFC is identified by a number, such as RFC 1700. RFCs can be retrieved either
by e-mail or FTP.
route
The sequence of hosts through which information travels to reach its
destination host.
routed configuration or network
A configuration with separate network addresses assigned to at least two of
the three Firebox interfaces. This type of configuration is intended for
situations in which the Firebox is put in place with separate logical networks
on its interfaces.
router
A device, connected to at least two networks, that receives and sends packets
between those networks. Routers use headers and a forwarding table to
forward packets to their destination. Most rely on ICMP to communicate with
one another and configure the best route between any two hosts.
RUVPN (Remote User VPN)
Remote User Virtual Private Networking establishes a secure connection
between an unsecured remote host and a protected network over an
unsecured network.
scalable architecture
Software and/or hardware constructed so that, after configuring a single
machine, the same configuration can be propagated to a group of connected
machines.
screening router
A machine that performs packet filtering.
secondary network
A network on the same physical wire as a Firebox interface that has an
address belonging to an entirely different network.
SecurID server
Each time an end user connects to the specialized-HTTP server running on the
Firebox on port 4100, a Java-enabled applet opens prompting for the
username, password, and whether or not to use SecurID (PAP)
Authentication. The username and password are DES-encrypted using a
secret key shared between the Java client and the Firebox. The Firebox then
decrypts the name and password to create a RADIUS PAP Access-Request
packet, and then sends it to the configured RADIUS server.
68
Page 73
Security Triangle Display
An LED indicator on the front of a Firebox that indicates the directions of
traffic between the three Firebox interfaces.
self-extracting file
A compressed file that automatically decompresses when double-clicked.
Server Message Block (SMB)
A message format used by DOS and Windows to share files, directories and
devices. NetBIOS is based on the SMB format, and many network products
use SMB. These SMB-based networks include LAN Manager, Windows for
Workgroups, Windows NT, and LAN Server.
Services Arena
An area in Policy Manager that displays the icons that represent the services
(proxies and packet filters) configured for a Firebox.
ServiceWatch
A graphical monitor that provides a real-time display graphing how many
connections exist, by service.
session stealing
An intrusion maneuver whereby a hacker sends a command to an already
existing connection in order to have that command provide the information
needed to stage a separate attack.
shared secret
A passphrase or password that is the same on the host and the client
computer. It is used for authentication.
SHTTP
See HTTPS.
slash notation
A format for writing IP addresses in which the number of bits in the IP
number is specified at the end of the IP address. For example: 192.168.44.0/24.
SLIP (Serial Line Internet Protocol)
A protocol for exchanging IP packets over a serial line.
SMS (Security Management System)
The former name of the GUI used to configure a Firebox. Now known as the
WatchGuard Policy Manager.
SMTP (Simple Mail Transfer Protocol)
A protocol for sending electronic messages between servers.
social engineering attack
An attack in which an individual is persuaded or tricked into divulging
privileged information to an attacker.
SOHO
Small Office—Home Office. Also the name of the WatchGuard firewall devices
designed for this segment of the market.
Reference Guide69
Page 74
spam
The practice of sending unsolicited e-mail to many recipients, much like an
electronic version of junk mail.
spoofing
Altering packets to falsely identify the originating computer to confuse or
attack another computer. The originating computer is usually misidentified as
a trusted computer within an organization.
SSL (Secure Sockets Layer)
A protocol for transmitting private documents over the Internet. SSL works
by using a private key to encrypt data transferred over an SSL connection.
stance
The policy of a firewall regarding the default handling of IP packets. Stance
dictates what the firewall will do with any given packet in the absence of
explicit instructions. WatchGuard’s default stance is to discard all packets that
are not explicitly allowed, often stated as “That which is not explicitly allowed
is denied.”
static NAT
Static network address translation works on a host-to-host basis. Incoming
packets destined for a public address on an external network are remapped to
an address behind the firewall.
subnet
To split a network into multiple smaller networks. For example, one could
take a class C network with 256 available addresses and create two additional
netmasks under it that separate the first 128 and last 128 addresses into
separate identifiable networks. Subnetting enables a client with a single
network to create multiple networks; the advanced or multiple network
configurations can then be used when setting up the Firebox.
TCP (Transmission Control Protocol)
A reliable byte-streaming protocol that implements a virtual connection. Most
long-haul traffic on the Internet uses TCP.
Tel ne t
A terminal emulation program for TCP/IP networks. It runs on a computer
and connects a workstation to a server on a network.
tooltip
A name or phrase that appears when you pause the mouse pointer over a
button or icon.
triple-DES
An advanced form of encryption using three keys rather than one or two. It is
roughly as secure as single DES would be if it had a 112-bit key.
Trusted interface
The interface on the Firebox that connects to the internal network, which
should be protected to the maximum practical amount.
70
Page 75
tunnel
A technology that enables one network to send its data via another network’s
connections. Tunneling works by encapsulating a network protocol within
packets carried by the second network. For example, Microsoft’s PPTP
technology enables organizations to use the Internet to transmit data across a
virtual private network (VPN). It does this by embedding its own network
protocol within the TCP/IP packets carried by the Internet.
UDP (User Datagram Protocol)
A connectionless protocol. Used less frequently for long-distance connections,
largely because it lacks TCP’s congestion control features. Used quite heavily
in local area networks for NFS.
URL (Universal Resource Locator)
The user-friendly address that identifies the location of a Web site such as
http:// www.watchguard.com.
VPN (virtual private network)
A virtual, secured network over a public or unsecure network (such as the
Internet) where the alternative – a dedicated physical network – is either
prohibitively expensive or impossible to create. Companies with branch
offices commonly use VPNs to connect multiple locations.
WAN (wide area network)
A computer network that spans a relatively large geographical area.
Typically, a WAN consists of two or more local area networks (LANs).
WatchGuard LiveSecurity Service
Part of the WatchGuard Firebox System offering, separate from the software
and the Firebox, which keeps your defenses current. It includes the broadcast
network that transmits alerts, editorials, threat responses, and software
updates directly to your desktop; your technical support contract; and a Web
site containing information, archives, and the latest software.
Web browser
Software that interprets and displays documents formatted for the Internet or
an intranet.
Web page
A single HTML-formatted file.
Web site
A collection of Web pages located in the directory tree under a single home
page.
WebBlocker
An optional WatchGuard software module that blocks users behind the
Firebox from accessing undesirable Web sites based content type, on time of
day, and/or specific URL.
Reference Guide71
Page 76
WINS (Windows Internet Name Service)
WINS provides name resolution for clients running Windows NT and earlier
versions of Microsoft operating systems. With name resolution, users access
servers by name rather than needing to use an IP address.
wizard
A tool that guides you through a complex task by asking questions and then
performing the task based on responses.
World Wide Web (WWW)
The collection of available information on the Internet viewable using a Web
browser.