Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are
fictitious unless otherwise noted. No part of this guide may be reproduced or transmitted in any form or by any means,
electronic or mechanical, for any purpose, without the express written permission of WatchGuard Technologies, Inc.
Microsoft®, Internet Explorer®, Windows® 95, Windows® 98, Windows NT® and Windows® 2000 are either
registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Netscape and Netscape Navigator are registered trademarks of Netscape Communications Corporation in the United
States and other countries.
RealNetworks, RealAudio, and RealVideo are either a registered trademark or trademark of RealNetworks, Inc. in the
United States and/or other countries.
Java and all Jave-based marks are trademarks or registered trademarks of Sun Microsystems, Inc. in the United
States and other countries. All right reserved.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://
www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from
this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without
prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software
developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL
PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com). This product includes software written by Tim
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic'
can be left out if the routines from the library being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you
must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e.
this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]
The mod_ssl package falls under the Open-Source Software label because it's distributed under a BSD-style license. The
detailed license information follows.
Copyright (c) 1998-2001 Ralf S. Engelschall. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment:
"This product includes software developed by Ralf S. Engelschall <rse@engelschall.com> for use in the mod_ssl
project (http://www.modssl.org/)."
4. The names "mod_ssl" must not be used to endorse or promote products derived from this software without prior
written permission. For written permission, please contact rse@engelschall.com.
5. Products derived from this software may not be called "mod_ssl" nor may "mod_ssl" appear in their names without
prior written permission of Ralf S. Engelschall.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software
developed by Ralf S. Engelschall <rse@engelschall.com> for use in the mod_ssl project (http://www.modssl.org/)."
THIS SOFTWARE IS PROVIDED BY RALF S. ENGELSCHALL ``AS IS'' AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL RALF S.
ENGELSCHALL OR HIS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
Reference Guideiii
Page 4
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The Apache Software License, Version 1.1
Copyright (c) 2000 The Apache Software Foundation. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The end-user documentation included with the redistribution, if any, must include the following acknowledgment:
"This product includes software developed by the Apache Software Foundation (http://www.apache.org/)." Alternately,
this acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments normally
appear.
4. The names "Apache" and "Apache Software Foundation" must not be used to endorse or promote products derived
from this software without prior written permission. For written permission, please contact apache@apache.org.
5. Products derived from this software may not be called "Apache", nor may "Apache" appear in their name, without
prior written permission of the Apache Software Foundation.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION
OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This software consists of voluntary contributions made by many individuals on behalf of the Apache Software
Foundation. For more information on the Apache Software Foundation, please see <http://www.apache.org/>.
Portions of this software are based upon public domain software originally written at the National Center for
Supercomputing Applications, University of Illinois, Urbana-Champaign.
All other trademarks or trade names mentioned herein, if any, are the property of their respective owners.
Part No:
WFS Software Number 7.0
ivWatchGuard Firebox System
Page 5
Contents
CHAPTER 1 Internet Protocol Reference..................... 1
Internet Protocol Header.................................................. 1
Internet Protocol Options................................................. 6
Transfer Protocols............................................................ 7
IP header number list..................................................... 2
Set Log Encryption Key dialog box............................... 246
Index .................................................................... 247
Reference Guidexi
Page 12
xiiWatchGuard Firebox System
Page 13
CHAPTER 1Internet Protocol Reference
Internet Protocol (IP) specifies the format of packets and the addressing
scheme for sending data over the Internet. By itself, it functions like a
postal system allowing you to address a package and drop it into the
system. There is, however, no direct link between you and the recipient.
In other words, there is no package.
Most networks combine IP with higher-level protocols like Transmission
Control Protocol (TCP). Unlike simple IP, TCP/IP establishes a
connection between two host servers so that they can send messages back
and forth. TCP/IP provides the “packaging.”
Internet Protocol Header
IP is an Internet standard that enables the shipment of datagrams – selfcontained packets of information that include their own address and
delivery instructions. IP prepends a header to each datagram. The IP
header contains a minimum of twelve attributes as well as additional
optional attributes.
Reference Guide1
Page 14
CHAP TER 1: Internet Protocol Reference
AttributeSizeDescription
Version4 bitsIP format number (Current version = 4)
IHL4 bitsHeader length in 32-bit words (Minimum = 5)
TOS8 bitsType of service sets routing priorities. It is
Tot _Le n16 bitsTotal length of packet measured in octets. It is
ID16 bitsPacket ID, used for reassembling fragments.
Flags3 bitsMiscellaneous flags
Frag_Off13 bitsIdentifies fragment part for this packet.
TTL8 bitsTime to live. It sets the maximum time the
Protocol8 bitsIP protocol number. Indicates which of TCP,
generally under-utilized because few application
layers can set it.
used in reassembling fragments.
datagram remains alive in the system.
UDP, ICMP, IGMP, or other Transport protocol
is inside.
Check16 bitsChecksum for the IP header
Sour_Addr32 bitsSource IP address
Dest_Addr32 bitsDestination IP address
Options24 bitsIP Options (Present if IHL is 6)
IP header number list
The IP Protocol header contains an 8-bit field that identifies the protocol
for the transport layer for the datagram.
KeywordNumberProtocol
ICMP1 Internet Control Message
IGMP2 Internet Group Management
GGP 3 Gateway-to-Gateway
IP4 IP-within-IP (encapsulation)
0 Reserved
ST5 Stream
2WatchGuard Firebox System
Page 15
Internet Protocol Header
KeywordNumberProtocol
TCP 6 Transmission Control Protocol
UCL 7 UCL
EGP 8 Exterior Gateway Protocol
IGP 9 Any private interior gateway
BBN-RCC-
10BBN RCC Monitoring
MON
NVP-II11Network Voice Protocol
PUP 12PUP
ARGUS 13ARGUS
EMCON 14EMCON
XNET15Cross Net Debugger
CHAOS 16Chaos
UDP 17User Datagram Protocol
MUX 18Multiplexing
DCN-MEAS19DCN Measurement Subsystems
HMP 20Host Monitoring
PRM 21Packet Radio Measurement
XNS-IDP 22XEROX NS IDP
TRUNK-1 23Trunk-1
TRUNK-2 24Trunk-2
LEAF-125Leaf-1
LEAF-226Leaf-2
RDP 27Reliable Data Protocol
IRTP28Internet Reliable Transaction
ISO-TP4 29ISO Transport Protocol Class 4
NETBLT30Bulk Data Transfer Protocol
MFE-NSP 31MFE Network Services Protocol
MERIT-INP 32MERIT Internodal Protocol
SEP 33Sequential Exchange Protocol
3PC 34Third Party Connect Protocol
Reference Guide3
Page 16
CHAP TER 1: Internet Protocol Reference
KeywordNumberProtocol
IDPR35Inter-Domain Policy Routing Protocol
XTP 36XTP
DDP 37Datagram Delivery Protocol
IDPR-CMTP 38IDPR Control Message Transport
TP++39TP++ Transport Protocol
IL40IL Transport Protocol
SIP 41Simple Internet Protocol
SDRP42Source Demand Routing Protocol
SIP-SR43SIP Source Route
SIP-FRAG44SIP Fragment
IDRP45Inter-Domain Routing Protocol
RSVP46Reservation Protocol
Protocol
GRE 47General Routing Encapsulation
MHRP48Mobile Host Routing Protocol
BNA 49BNA
ESP50Encapsulated Security Payload
AH 51Authentication Header
I-NLSP52Integrated Net Layer Security TUBA
SWIPE 53IP with Encryption
NHRP54NBMA Next Hop Resolution Protocol
55-60 Unassigned
61Any host internal protocol
CFTP62CFTP
63Any local network
SAT-EXPAK 64SATNET and Backroom EXPAK
KRYPTOLAN 65Kryptolan
RVD 66MIT Remote Virtual Disk Protocol
IPPC67Internet Pluribus Packet Core
4WatchGuard Firebox System
68Any distributed file system
Page 17
Internet Protocol Header
KeywordNumberProtocol
SAT-MON 69SATNET Monitoring
VISA70VISA Protocol
IPCV71Internet Packet Core Utility
CPNX72Computer Protocol Network Executive
CPHB73Computer Protocol Heart Beat
WSN 74Wang Span Network
PVP 75Packet Video Protocol
BR-SAT-
76Backroom SATNET Monitoring
MON
SUN-ND77SUN NDPROTOCOL-Temporary
WB-MON78WIDEBAND Monitoring
WB-EXPAK79WIDEBAND EXPAK
ISO-IP80ISO Internet Protocol
VMTP81VMTP
SECURE-
82SECURE-VMTP
VMTP
VINES 83VINES
TTP 84TTP
NSFNET-IGP85NSFNET-IGP
DGP 86Dissimilar Gateway Protocol
TCF 87TCF
IGRP88IGRP
OSPFIGP 89OSPFIGP
SPRITE-RPC90Sprite RPC Protocol
LARP91Locus Address Resolution Protocol
MTP 92Multicast Transport Protocol
AX.25 93AX.25 Frames
IPIP94IP-within-IP Encapsulation Protocol
MICP95Mobile Internetworking Control
Reference Guide5
Protocol
Page 18
CHAP TER 1: Internet Protocol Reference
KeywordNumberProtocol
SCC-SP96Semaphore Communications Security
ETHERIP 97Ethernet-within-IP Encapsulation
ENCAP 98Encapsulation Header
99Any private encryption scheme
GMTP100 GMTP
101-254 Unassigned
255 Reserved
Internet Protocol Options
Internet Protocol options are variable-length additions to the standard IP
header. Unfortunately, enabling IP options can be risky; hackers can use
them to specify a route that helps them gain access to your network.
Because most applications make it very obscure or difficult to use IP
options, they are rarely used.
Protocol
There are several kinds of IP options:
Security
Control routing of IP packets that carry sensitive data. Security
options are rarely supported.
Stream ID (SID)
The stream ID option is rarely supported.
Source Routing
Both the loose source route option and the strict source route
option enable the source of an Internet packet to provide routing
information. Source routing options can be very dangerous,
because a clever attacker might use them to masquerade as
another site. However, loose source routing and the traceroute
facility can also help debug some obscure routing problems.
Record Route
The record route option was originally intended for use in testing
the Internet. Unfortunately, record route can record only ten IP
6WatchGuard Firebox System
Page 19
addresses. On the present Internet, typical long-haul
transmissions can involve twenty or thirty hops, rendering the
record route option obsolete.
Time Stamp
The time stamp option helps measure network propagation
delays. This task is done more effectively, however, with higherlevel time protocols or time-stamp messages.
Transfer Protocols
The IP protocol encapsulates information contained in the transport layer.
The transport layer has several protocols that specify how to transmit
data between applications: for example, UDP, TCP, ICMP, and others.
UDP
Transfer Protocols
User Datagram Protocol (UDP) is a connectionless, potentially unreliable
datagram protocol. It trades reliability for speed and low overhead. To
ensure accurate transmission, it requires that the application layer verify
that packets arrive at their destination.
Characteristics of UDP include:
•Often used for services involving the transfer of small amounts of
data where retransmitting a request is not a problem.
•Used for services such as time synchronization in which an
occasionally lost packet will not affect continued operation. Many
systems using UDP resend packets at a constant rate to inform their
peers about interesting events.
•Primarily used on LANs, in particular for Network File System (NFS)
services where its low overhead gives it a substantial performance
advantage. (Network File System is a popular TCP/IP service for
providing shared file systems over a network.) A lack of congestion
control means that using UDP for bulk data transfer over long-haul
connections is not recommended.
•Supports broadcasts.
•Provides abstraction of ports.
Reference Guide7
Page 20
CHAP TER 1: Internet Protocol Reference
•A connection is described by its source and destination ports and its
source and destination IP addresses. In typical usage, port numbers
below 1024 are reserved for well-known services (destinations), and
the client side is supposed to use ports above 1023 for the source of
the connection. However, this rule has many notable exceptions. In
particular, NFS (port 2049) and Archie (port 1525) use server ports at
numbers above 1024. Some services use the same source and
destination port for server-to-server connections. Common examples
are DNS (53), NTP (123), syslog (514), and RIP (520).
TCP
Transmission Control Protocol (TCP) provides reliable stream-oriented
services. It trades speed and overhead for increased reliability. Like UDP,
TCP provides source and destination ports that are used in a similar
fashion.
TCP uses a rather complicated state machine to manage connections.
There are several attribute bits that control the state of a connection. Three
very important attribute bits of TCP packets are the SYN, ACK, and FIN
bits. The SYN bit is set only on the first packet sent in each direction for a
given connection. The ACK bit is set when the other side is
acknowledging the receipt of data to the peer. The FIN bit is set when
either side chooses to close the connection.
ICMP
The Internet Control Message Protocol (ICMP) is used primarily to
deliver error information about other services. It is otherwise quite similar
in practical operation to UDP. That is, it is connectionless and does not
guarantee that packets are delivered to their destination. One dangerous
ICMP packet is the ICMP redirect packet, which can change routing
information on the machines that receive it.
Other protocols
The vast majority of the traffic on the Internet uses one of the three
protocols mentioned in the previous section. Some other protocols are as
follows:
8WatchGuard Firebox System
Page 21
Standard Ports and Random Ports
IGMP (Internet Group Multicast Protocol)
A protocol primarily designed for hosts on multiaccess networks
to inform locally attached routers of their group membership
information.
IPIP (IP-within-IP)
An encapsulation protocol used to build virtual networks over the
Internet.
GGP (Gateway-Gateway Protocol)
A routing protocol used between autonomous systems.
GRE
A protocol used for PPTP.
ESP
An encryption protocol used for IPSec.
Standard Ports and Random Ports
UDP and TCP encapsulate information contained within the application
layer. The appropriate application processes are designated by source and
destination port numbers. These port numbers, along with the source and
destination IP addresses, specify a unique connection on the Internet.
For example, it is reasonable to have two telnet sessions from one host to
another. However, since telnet uses a well-known service number of 23,
something must distinguish these two connections. The other port in
these cases will be a port that is typically greater than 1023. This
alternative port designation is dynamically allocated by the operating
system on the client side.
Random ports can cause a great amount of trouble if they happen to
match a well-known service on a port above 1023. If some client machine
assigns a random port of 2049, the connection may mysteriously fail.
Similar problems can occur with the X Window and Archie services.
In practice, most operating systems cycle port numbers between 1024 and
a number somewhere in the range of 2100, depending on how many TCP
connections are currently open and whether a recently closed connection
used a similar port number. This makes the above problem rare.
Reference Guide9
Page 22
CHAP TER 1: Internet Protocol Reference
10WatchGuard Firebox System
Page 23
CHAPTER 2MIME Content Types
A content-type header is used by applications to determine what kind of
data they are receiving, thus allowing them to make decisions about how
it should be handled. It allows clients to correctly identify and display
video clips, images, sound, or non-HTML data. People are probably most
familiar with the MIME content types sent in email.
The WatchGuard Proxied HTTP service uses content-type headers to
determine whether to allow or deny an HTTP transaction. Use Policy
Manager to configure the Proxied HTTP service to allow or deny contenttypes. Content types are also used in SMTP and are configurable in the
SMTP proxy. This chapter contains a list of the more commonly used
MIME content-types.
Wildcards may be used to select all subtypes within a type, thereby
denying all or allowing all of that MIME type. For example, to allow all
content-types that are text (including text/enriched, text/plain, and
others), use the content-type
New, registered MIME content types appear regularly. WatchGuard
recommends frequent checking of an online reference for the most current
list. One source of current MIME types is:
v n d . j a p a n n e t - p a y m e n t - w a k e u p [Fujii]
v n d . j a p a n n e t - d i r e c t o r y - s e r v i c e [Fujii]
applicationvnd.intertrust.digibox [Tomasello]
vnd.intertrust.nncp [Tomasello]
prs.alvestrand.titrax-sheet [Alvestrand]
vnd.noblenet-sealer [Solomon]
vnd.webturbo [Rehem]
vnd.noblenet-web [Solomon]
vnd.noblenet-directory [Solomon]
prs.nprend [Doggett]
hyperstudio [Domino]
vnd.shana.informed.formtemplat
[Selzler]
e
vnd.shana.informed.formdata [Selzler]
vnd.shana.informed.package [Selzler]
vnd.shana.informed.interchange [Selzler]
vnd.$commerce_battelle [Applebaum]
vnd.osa.netdeploy [Klos]
vnd.ibm.MiniPay [Herzberg]
vnd.japannet-jpnstore-wakeup [Yoshitake]
vnd.japannet-setstore-wakeup [Yoshitake]
vnd.japannet-verification [Yoshitake]
vnd.japannet-registration [Yoshitake]
vnd.hp-HPGL [Pentecost]
vnd.hp-PCL [Pentecost]
vnd.hp-PCLXL [Pentecost]
vnd.musician [Adams]
16WatchGuard Firebox System
vnd.FloGraphIt [Floersch]
vnd. int ercon. for mnet [Gurak]
Page 29
vemmi [RFC2122]
vnd.ms-asf [Fleischman]
vnd.ecdis-update [Buettgenbach]
vnd.powerbuilder6 [Guy]
vnd.powerbuilder6-s[Guy]
applicationvnd.lotus-wordpro [Wattenberger]
vnd.lotus-approach [Wattenberger]
vnd.lotus-1-2-3 [Wattenberger]
vnd.lotus-organizer [Wattenberger]
vnd.lotus-screencam [Wattenberger]
vnd.lotus-freelance [Wattenberger]
vnd.fujitsu.oasys [Togashi]
vnd.fujitsu.oasys2 [Togashi]
vnd.swiftview-ics [Widener]
vnd.dna [Searcy]
prs.cww [Rungchavalnont]
vnd.wt.stf [Wohler]
vnd.dxr [Duffy]
vnd.mitsubishi.misty-
[Tanaka]
guard.trustweb
vnd.ibm.modcap [Hohensee]
vnd.acucobol [Lubin]
vnd.fujitsu.oasys3 [Okudaira]
marc [RFC2220]
vnd.fujitsu.oasysprs [Ogita]
vnd.fujitsu.oasysgp [Sugimoto]
vnd.visio [Sandal]
vnd.netfpx [Mutz]
vnd.audiograph [Slusanschi]
vnd.epson.salt [Nagatomo]
vnd.3M.Post-it-Notes [O'Brien]
Reference Guide17
Page 30
CHAPTER 2: MIME Content T yp es
applicationpkcs7-mime [RFC2311]
pkcs7-signature [RFC2311]
pkcs10 [RFC2311]
vnd.novadigm.EDX [Swenson]
vnd.novadigm.EXT [Swenson]
vnd.novadigm.EDM [Swenson]
vnd.claymore [Simpson]
vnd.comsocaller [Dellutri]
vnd.yellowriver-custom-menu [Yellow]
vnd.ecowin.chart [Olsson]
vnd.ecowin.series [Olsson]
vnd. eco win.filerequest [Olsson]
vnd. eco win.fileupdate [Olsson]
vn d.e cow in. seri es requ est [Olsson]
vn d.e cow in. seri es upda te [Olsson]
EDIFACT [RFC1767]
EDI-X12 [RFC1767]
EDI-Consent [RFC1767]
vnd.wrq-hp3000-labelled [Bartram]
vnd.minisoft-hp3000-save [Bartram]
vnd.ffsns [Holstage]
vnd.hp-hps [Aubrey]
vn d.f uji xer ox.d oc uwor ks [Taguchi]
xml [RFC3023]
x ml - ex t er n a l- pa r s ed -e n t it y [RFC3023]
xml-dtd [RFC3023]
vnd.anser-web-funds-transfer-
[Mori]
initiation
vnd.anser-web-certificate-issue-
[Mori]
initiation
18WatchGuard Firebox System
vnd.is-xpr [Natarajan]
Page 31
vnd.intu.qbo [Scratchley]
vnd.publishare-delta-tree [Ben-Kiki]
vnd.cybank [Helmee]
batch-SMTP [RFC2442]
vnd.uplanet.alert [Martin]
applicationvnd.uplanet.cacheop [Martin]
vnd.uplanet.list [Martin]
vnd.uplanet.listcmd [Martin]
vnd.uplanet.channel [Martin]
vnd.uplanet.bearer-choice [Martin]
vnd.uplanet.signal [Martin]
vnd.uplanet.alert-wbxml [Martin]
vnd.uplanet.cacheop-wbxml [Martin]
vnd.uplanet.list-wbxml [Martin]
vnd.uplanet.listcmd-wbxml [Martin]
vnd.uplanet.channel-wbxml [Martin]
vnd.uplanet.bearer-choice-wbxml [Martin]
vnd. ep so n. qu ic ka ni me [Gu]
vnd.commonspace [Chandhok]
vnd.fut-misnet [Pruulmann]
vnd.xfdl [Manning]
vnd.intu.qfx [Scratchley]
vnd.epson.ssf [Hoshina]
vnd.epson.msf [Hoshina]
vnd.powerbuilder7 [Shilts]
vnd.powerbuilder7-s [Shilts]
vnd.lotus-notes [Laramie]
pkixcmp [RFC2510]
vnd.wap.wmlc [Stark]
vnd.wap.wmlscriptc [Stark]
Reference Guide19
vnd.motorola.flexsuite [Patton]
Page 32
CHAPTER 2: MIME Content T yp es
applicationvnd.motorola.flexsuite.gotap [Patton]
ipp [RFC2910]
ocsp-request [RFC2560]
ocsp-response [RFC2560]
vnd.wap.wbxml [Stark]
vnd.motorola.flexsuite.wem [Patton]
vnd.motorola.flexsuite.kmr [Patton]
vnd.motorola.flexsuite.adsi [Patton]
vnd.motorola.flexsuite.fis [Patton]
vnd.motorola.flexsuite.ttc [Patton]
vnd.ufdl [Manning]
vnd.accpac.simply.imp [Leow]
vnd.accpac.simply.aso [Leow]
vnd.vcx [T.Sugimoto]
vnd.previewsystems.box [Smolgovsky]
vnd.mediastation.cdkey [Flurry]
vnd.pg.format [Gandert]
vnd.pg.osasli [Gandert]
vnd.hp-hpid [Gupta]
pkix-cert [RFC2585]
pkix-crl [RFC2585]
vnd.Mobius.TXF [Kabayama]
vnd.Mobius.PLC [Kabayama]
vnd.Mobius.DIS [Kabayama]
vnd.Mobius.DAF [Kabayama]
vnd.Mobius.MSL [Kabayama]
vnd.cups-raster [Sweet]
vnd.cups-postscript [Sweet]
vnd.cups-raw [Sweet]
index [RFC2652]
index.cmd [RFC2652]
20WatchGuard Firebox System
Page 33
index.response [RFC2652]
index.obj [RFC2652]
index.vnd [RFC2652]
vnd.triscape.mxs [Simonoff]
vnd.powerbuilder75 [Shilts]
applicationvnd.powerbuilder75-s [Shilts]
vnd.dpgraph [Parker]
http [RFC2616]
sdp [RFC2327]
vnd.eudora.data [Resnick]
v n d . f u j i x e r o x . d o c u w o r k s . b i n d e r [Matsumoto]
vnd.vectorworks [Pharr]
vnd.grafeq [Tupper]
vnd.bmi [Gotoh]
vnd.ericsson.quickcall [Tidwell]
vnd.hzn-3d-c ro ss word [Minnis]
vnd.wap.slc [WAP-Forum]
vnd.wap.sic [WAP-Forum]
vnd.groove-injector [Joseph]
vnd.fujixerox.ddd [Onda]
vnd.groove-account [Joseph]
vnd.groove-identity-message [Joseph]
vnd. gr oo ve -t oo l- me ss ag e [Joseph]
vnd. gr oo ve -t oo l- te mp la te [Joseph]
vnd.groove-vcard [Joseph]
vnd.ctc-posml [Kohlhepp]
vnd.canon-lips [Muto]
vnd.canon-cpdl [Muto]
vnd.trueapp [Hepler]
vnd.s3sms [Tarkkala]
iotp [RFC2935]
Reference Guide21
Page 34
CHAPTER 2: MIME Content T yp es
vnd.mcd [Gotoh]
applicationvnd.contact.cmsg [Patz]
vnd.epson.esf [Hoshina]
whoispp-query [RFC2957]
whoispp-response [RFC2958]
vnd.mozilla.xul+xml [McDaniel]
parityfec [RFC3009]
vnd.palm [Peacock]
vnd.fsc.weblaunch [D.Smith]
vnd.tve-trigger [Welsh]
vnd.httphone [Lefevre]
vnd.informix- vi sionar y [Gales]
vnd.msign [Borcherding]
vnd.ms-lrm [Ledoux]
dvcs [RFC3029]
sieve [RFC3028]
vnd.vividence.scriptfile [Risher]
vnd. hhe.le sson-player [Jones]
beep+xml [RFC3080]
font-tdpfr [RFC3073]
vnd.mseq [Le Bodic]
vnd.aether.imp [Moskowitz]
vnd.Mobius.MQY [Devasia]
vnd.Mobius.MBK [Devasia]
v nd . vi d so f t .v i dc o nf e re n ce [Hess]
vnd. ibm .afplined ata [Buis]
v n d . i r e p o s i t o r y . p a c k a g e + x m l [Knowles]
vnd.sss-ntf [Bruno]
vnd.sss-dtf [Bruno]
vnd.sss-cod [Dani]
vnd.pvi.ptid1 [Lamb]
22WatchGuard Firebox System
Page 35
isup [RFCISUP]
qsig [RFCISUP]
timestamp-query [RFC3161]
timestamp-reply [RFC3161]
v n d . p w g- x h t m l - pr i n t + x m l [Wright]
image jpeg [RFC2045,RFC2046]
gif [RFC2045,RFC2046]
ief [RFC1314]
g3fax [RFC1494]
tiff [RFC2302]
cgm[Francis]
naplps [Ferber]
vnd.dwg [Moline]
vnd.svf [Moline]
vnd.dxf [Moline]
png [Randers-Pehrson]
vnd.fpx [Spencer]
vnd.net-fpx [Spencer]
vnd.xiff [SMartin]
prs.btif [Simon]
vnd.fastbidsheet [Becker]
vnd.wap.wbmp [Stark]
prs.pti [Laun]
vnd.cns.inf2 [McLaughlin]
vnd.mix [Reddy]
vnd. fu ji xe ro x. ed mi cs -r lc [Onda]
v n d . f u j i x e r o x . e d m i c s - m m r [Onda]
vnd.fst [Fuldseth]
audio basic [RFC2045,RFC2046]
32kadpcm [RFC2421,RFC2422]
vnd.qcelp [Lundblade]
Reference Guide23
Page 36
CHAPTER 2: MIME Content T yp es
audiovnd.nortel.vbk [Parsons]
L16 [RFC2586]
vnd.everad.plj [Cicelsky]
telephone-event [RFC2833]
tone [RFC2833]
vnd.digital-winds [Strazds]
vnd.lucent.voice [Vaudreuil]
vnd.octel.sbc [Vaudreuil]
vnd.rh etor ex.3 2k ad pcm [Vaudreuil]
vnd.vmx.cvsd [Vaudreuil]
vnd.cns.anp1 [McLaughlin]
vnd.cns.inf1 [McLaughlin]
prs.sid [Walleij]
vnd.nuera.ecelp4800 [Fox]
vnd.nuera.ecelp7470 [Fox]
mpeg [RFC3003]
parityfec [RFC3009]
MP4A-LATM [RFC3016]
vnd.nuera.ecelp9600 [Fox]
G.722.1 [RFC3047]
mpa-robust [RFC3119]
vnd.cisco.nse [Kumar]
video mpeg [RFC2045,RFC2046]
quicktime [Paul Lindner]
vnd.vivo [Wolfe]
vnd.motorola.video [McGinty]
vnd.motorola.videop [McGinty]
vnd.fvt [Fuldseth]
pointer [RFC2862]
parityfec [RFC3009]
vnd.mpegurlRecktenwald]
24WatchGuard Firebox System
Page 37
MP4V-ES [RFC3016]
vnd.nokia.interleaved-multimedia [Kangaslampi]
model * [RFC2077]
iges [Parks]
vrml [RFC2077]
mo de l mesh [RFC2077]
vnd.dwf [Pratt]
vnd.gtw [Ozaki]
vnd.flatland.3dml [Powers]
vnd.vtu [Rabinovitch]
vnd.mts [Rabinovitch]
vnd.gdl [Babits]
vnd.gs-gdl [Babits]
vnd.parasolid.transmit.text [Dearnaley, Juckes]
vnd.parasolid.transmit.binary [Dearnaley, Juckes]
Reference Guide25
Page 38
CHAPTER 2: MIME Content T yp es
26WatchGuard Firebox System
Page 39
CHAPTER 3Services and Ports
Well-known services are a combination of port number and transport
protocol for specific, standard applications. This chapter contains several
tables that list service names, port number, protocol, and description.
Reference Guide27
Page 40
CHAPTER 3: Services and Ports
Ports Used by WatchGuard Products
The WatchGuard Firebox, Management Station, and WatchGuard
Security Event Processor use several ports during normal functioning.
Port #ProtocolPurpose
4100TCPAuthentication applet
4101TCPWSEP and Management Station
4105TCPWatchGuard service
4106TCPWebBlocker
4107TCPWSEP and Firebox
4103TCPRetrieve WebBlocker database
4102TCPUsed only in Firebox System (LSS) 3.0x
or earlier for logs
28WatchGuard Firebox System
Page 41
Ports used by Microsoft Products
Port #ProtocolPurpose
137, 138UDPBrowsing
67, 68UDPDHCP Lease
135TCPDHCP Manager
Ports used by Microsoft Products
138
139
UDP
TCP
Directory Replication
135TCPDNS Administration
53UDPDNS Resolution
139TCPEvent Viewer
139TCPFile Sharing
137, 138
139
UDP
TCP
Logon Sequence
138UDPNetLogon
137, 138
139
UDP
TCP
Pass Through Validation
139TCPPerformance Monitor
1723
47
137, 138
139
TCP
IP
UDP
TCP
PPTP
Printing
139TCPRegistry Editor
139TCPServer Manager
137, 138
139
139TCPUser Manager
139TCPWinNT Diagnostics
137, 138
139
42TCPWINS Replication
135TCPWINS Manager
137TCPWINS Registration
Reference Guide29
UDP
TCP
UDP
TCP
Tru sts
WinNT Secure Channel
Page 42
CHAPTER 3: Services and Ports
Port #ProtocolPurpose
135TCPClient/Server
Communications
135TCPExchange Administrator
143TCPIMAP
993TCPIMAP (SSL)
389TCPLDAP
636TCPLDAP (SSL)
102TCPMTA - X.400 over TCP/IP
110TCPPOP3
995TCPPOP3 (SSL)
135TCPRCP
25TCPSMTP
137UDPSMB
138UDPSMB
139TCPSMB
445TCP/UDPSMB
119TCPNNTP
563TCPNNTP (SSL)
Well-Known Services List
In addition to the ports used by services described above, WatchGuard
maintains a list of well-known services. Because software developers
regularly add new services, this does not represent a comprehensive list
of all possible services. For more information, see J. Reynolds and J.
Postel, Assigned Numbers, RFC1700, available at these Web sites:
acr-nema104TCP/UDPACR-NEMA Digital Imag. Comm. 300
cso105TCP/UDPCCSO name server protocol
csnet-ns105TCP/UDPMailbox Name Nameserver
3com-tsmux106TCP/UDP3COM-TSMUX
rtelnet107TCP/UDPRemote Telnet Service
snagas108TCP/UDPSNA Gateway Access Server
pop2109TCP/UDPPost Office Protocol - Version 2
pop3110TCP/UDPPost Office Protocol - Version 3
sunrpc111TCP/UDPSUN Remote Procedure Call
mcidas 112TCP/UDPMcIDAS Data Transmission Protocol
Reference Guide33
Page 46
CHAPTER 3: Services and Ports
Service NamePort #ProtocolDescription
auth(ident)113TCP/UDPAuthentication Service
audionews114TCP/UDPAudio News Multicast
sftp115TCP/UDPSimple File Transfer Protocol
ansanotify116TCP/UDPANSA REX Notify
uucp-path 117TCP/UDPUUCP Path Service
sqlserv118TCP/UDPSQL Services
nntp119TCP/UDPNetwork News Transfer Protocol
cfdptkt120TCP/UDPCFDPTKT
erpc121TCP/UDPEncore Expedited RPC
smakynet122TCP/UDPSMAKYNET
ntp123TCP/UDPNetwork Time Protocol
ansatrader124TCP/UDPANSA REX Trader
locus-map125TCP/UDPLocus PC-Interface Net Map
unitary126TCP/UDPUnisys Unitary Login
locus-con127TCP/UDPLocus PC-Interface Conn Server
gss-xlicen128TCP/UDPGSS X License Verification
pwdgen129TCP/UDPPassword Generator Protocol
cisco-fna130TCP/UDPcisco FNATIVE
cisco-tna131TCP/UDPcisco TNATIVE
cisco-sys132TCP/UDPcisco SYSMAINT
statsrv133TCP/UDPStatistics Service
ingres-net134TCP/UDPINGRES-NET Service
epmap135TCP/UDPDCE-RPC Endpoint resolution
profile136TCP/UDPPROFILE naming system
netbios-ns137TCP/UDPNETBIOS Name Service
netbios-dgm138TCP/UDPNETBIOS Datagram Service
netbios-ssn139TCP/UDPNETBIOS Session Service
imap143TCP/UDPInternet Message Access Protocol
news144TCP/UDPNewS
jargon148TCP/UDPJargon
34WatchGuard Firebox System
Page 47
Service NamePort #ProtocolDescription
sql-net150TCP/UDPSQL-NET
bftp152TCP/UDPBackground File Transfer
sgmp153TCP/UDPSGMP
sqlsrv156TCP/UDPSQL Service
pcmail-srv158TCP/UDPPCMail Server
sgmp-traps160TCP/UDPSGMP-TRAPS
snmp161TCP/UDPSNMP
snmptrap162TCP/UDPSNMPTRAP
cmip-man163TCP/UDPCMIP/TCP Manager
cmip-agent164TCPCMIP/TCP Agent
smip-agent164UDPCMIP/TCP Agent
namp167TCP/UDPNAMP
rsvd168TCP/UDPRSVD
Well-Known Services List
send169TCP/UDPSEND
xyplex-mux173TCP/UDPXyplex MUX
xdmcp177TCP/UDPX Display Manager Control Protocol
NextStep178TCP/UDPNextStep Window Server
bgp179TCP/UDPBorder Gateway Protocol
unify181TCP/UDPUnify
irc194TCP/UDPInternet Relay Chat Protocol
at-rtmp201TCP/UDPAppleTalk Routing Maintenance
at-nbp202TCP/UDPAppleTalk Name Binding
at-3203TCP/UDPAppleTalk Unused
at-echo204TCP/UDPAppleTalk Echo
at-5205TCP/UDPAppleTalk Unused
at-zis206TCP/UDPAppleTalk Zone Information
at-7207TCP/UDPAppleTalk Unused
at-8208TCP/UDPAppleTalk Unused
qmtp209TCP/UDPQuick Mail Transfer Protocol
z39.50210TCP/UDPANSI Z39.50 (WAIS)
Reference Guide35
Page 48
CHAPTER 3: Services and Ports
Service NamePort #ProtocolDescription
ipx213TCP/UDPIPX
imap3220TCP/UDPInteractive Mail Access Protocol v3
fln-spx221TCP/UDPBerkeley rlogind with SPX auth
rsh-spx222TCP/UDPBerkeley rshd with SPX auth
backweb371UDPBackWeb
ulistserv372TCP/UDPUnix Listserv
netware-ip396TCP/UDPNovell Netware over IP
biff512UDPUsed by mail system to notify users
exec512TCPRemote process execution
login513TCP/UDPLogin Host Protocol
who513UDPMaintains databases showing who’s who
cmd514TCPLike exec, but automatic
syslog514UDPlogging facilities
printer515TCP/UDPSpooler
talk517TCP/UDPTalk protocol
ntalk518TCP/UDPanother Talk
utime519TCP/UDPUnixtime
router520UDPRIP local routing process (on site)
timed525TCP/UDPTimeserver
tempo526TCP/UDPNewdate
courier530TCP/UDPRpc
conference531TCP/UDPChat
netnews532TCP/UDPReadnews
netwall533TCP/UDPFor emergency broadcasts
uucp540TCP/UDPUucpd
uucp-rlogin541TCP/UDPUucp-rlogin Stuart Lynne
klogin543TCP/UDPKerberos (v4/v5)
kshell544TCP/UDPkrcmd Kerberos (v4/v5)
dhcpv6-client546TCP/UDPDHCPv6 Client
dhcpv6-server547TCP/UDPDHCPv6 Server
36WatchGuard Firebox System
Page 49
Well-Known Services List
Service NamePort #ProtocolDescription
cybercash551TCP/UDPCybercash
remotefs556TCP/UDPRfs server
9pfs564TCP/UDPPlan 9 file service
whoami565TCP/UDPWhoami
msn569TCPMicrosoft Network
doom666TCP/UDPDoom Id Software
kerberos-adm749TCP/UDPKerberos administration
webster765TCP/UDPNetwork dictionary
phonebook767TCP/UDPPhone
socks1080TCP/UDPSocks
hermes1248TCP/UDPHermes
lotusnote1352TCP/UDPLotus Notes
netware-csp1366TCP/UDPNovell NetWare Comm Service Platform
novell-lu6.21416TCP/UDPNovell LU6.2
netopia1419
8000
UDP
TCP
Netopia Virtual Office
ms-sql-s1433TCP/UDPMicrosoft-SQL-Server
ms-sql-m1434TCP/UDPMicrosoft-SQL-Monitor
winframe1494TCPWinFrame
watcom-sql1498TCP/UDPWatcom-SQL
ingreslock1524TCP/UDPIngres
groupwise1677TCPGroupWise
nfs2049TCP/UDPNetwork File Server
www-dev2784TCP/UDPWorld Wide Web - development
Squid3128TCP/UDPWeb proxy/caching service -- frequently scanned
for vulnerabilities
ccmail3264TCP/UDPCc:mail/lotus
ICQ2109
4000
Firstclass3000
TCP
Used for chat
UDP
TCPFirstClass (ftp channel on 510 TCP)
30004
Reference Guide37
Page 50
CHAPTER 3: Services and Ports
Service NamePort #ProtocolDescription
compuserve4144TCPCompuServe Online
rfe5002TCP/UDPRadio free ethernet
aol5190TCPAmerica Online
x116000TCP/UDPX Window System (through 6063)
font-service7100TCP/UDPX Font Service
nas8000TCP/UDPNCD Network Audio Server
iphone6670TCPfor connecting to the phone server
iphone22555UDPfor audio
iphone25793TCPfor the address server, in 4.x and 5.0
iphone1490TCPfor the conference engine in 4.x and 5.0
38WatchGuard Firebox System
Page 51
CHAPTER 4Types of Services
This chapter describes well-known services, their protocols, and their
ports as well as special considerations for adding the service to a security
policy configuration. Rather than explain every service in detail, this
chapter explains the telnet service thoroughly as an example from which
to extrapolate configuration details for similar services. Services fall into
two broad categories–packet filters and proxies.
Packet Filter Services
Packet filter services examine the source and destination headers of each
packet. Packets are then either allowed or denied passage based on
whether the headers appear to be coming from and going to legitimate
addresses.
Any
The Any service should be used only to allow ALL traffic between any
two specific, trusted IP or network addresses. Configuring the Any
service opens a “hole” through the Firebox, allowing all traffic to flow
unfiltered between specific hosts. WatchGuard strongly recommends that
the Any service be used only for traffic over a VPN.
Reference Guide39
Page 52
CHAPTER 4: Types of Services
The Any service has different semantics from other services. For example,
if you allow FTP to a specific host, all other FTP sessions are implicitly
denied by that service (unless you have also configured other FTP service
icons). The Any service, however, does not implicitly deny like other
services.
You also cannot use an Any service unless specific IP addresses, network
addresses, host aliases, group names, or user names are used in the From
or To lists – otherwise the Any service is deemed too permissive and will
not function.
Characteristics
•Protocol: Any
•Client Port: Ignore
•Port Number: None
AOL
The America Online proprietary protocol allows access to the AOL
service through a TCP/IP network, instead of the usual dial-up
connection. The AOL client must be specifically configured to use TCP/IP
instead of a modem.
Characteristics
•Protocol: TCP
•Server Port(s): 5190
•Client Port(s): client
archie
archie is a search protocol used to find files on FTP servers. Because there
are a limited number of archie servers, it is safe to provide outgoing archie
service. A current list of archie servers is available via anonymous FTP
from:
External hosts can be spoofed; WatchGuard cannot verify that these
packets were actually sent from the correct location. You can configure
40WatchGuard Firebox System
Page 53
WatchGuard to add the source IP address to the Blocked Sites List
whenever an incoming archie connection is denied. All of the usual
logging options can be used with archie.
WatchGuard recommends that you use the available WWW interfaces to
archie, such as: http://www.macsch.com/stress/archie.html
Characteristics
•Protocol: UDP
•Server Port(s): 1525
•Client Port(s): greater than 1023
auth (ident)
auth (ident) is a protocol used to map TCP connections back to a user
name. It is used primarily by large public SMTP and FTP servers and
certain security packages. While useful for logging, the information is
seldom reliable, as attackers can make modified servers that return
incorrect information. Incoming auth service responds with “fake”
information to hide internal user information.
Packet Filter Services
When using SMTP with incoming static NAT, you must add auth to the
Services Arena. Configure auth to allow incoming to the Firebox. This
enables outgoing mail messages to flow unrestricted from behind the
Firebox to the numerous SMTP servers on the Internet that use auth to
verify other mail servers’ identities, and allows these servers to return
messages through the Firebox to their senders.
If you are not using incoming sdymtatic NAT, allow incoming auth to the
IP address of your mail server.
WatchGuard recommends that both incoming and outgoing auth services
be allowed, but be aware that such services can collect valid user names
which can be used for hacking purposes.
Characteristics
•Protocol: TCP
•Server Port(s): 113
•Client Port(s): greater than 1023
Reference Guide41
Page 54
CHAPTER 4: Types of Services
•RFC: 1413
Citrix ICA (WinFrame)
Citrix ICA is a protocol used by Citrix for their applications, including the
Winframe product. Winframe is a server-based application from Citrix
that provides access to Windows from a variety of clients. ICA uses TCP
port 1494 for its WinFrame software.
Adding the Citrix ICA service could compromise network security
because it allows traffic inside the firewall without authentication. In
addition, your Winframe server may be subject to denial of service
attacks. WatchGuard recommends using VPN options to provide
additional security for such a configuration. All of the usual logging
options can be used with WinFrame.
Characteristics
•Protocol: TCP
•Server Port(s): 1494, 1604
•Client Port(s): client
For more information on adding the Citrix ICA service, refer to the
Advanced FAQs in the Knowledge Base. (Go to www.watchguard.com/support and log in to the LiveSecurity Service.)
Clarent-gateway
Clarent Corporation is an IP telephony technology supplier to
mainstream carriers and service providers. Clarent products enable voiceover-IP for doing voice calls between Clarent gateways across the
Internet. This service supports the Clarent v3.0 product and later.
Clarent products use two sets of ports, one for gateway-to-gateway
communications (UDP ports 4040, 4045, and 5010) and one for gatewayto-command center communications (UDP ports 5001 and 5002). Use the
Clarent-command service icon for the latter.
Enable incoming connections only from specific external gateways to
your gateway or command center.
42WatchGuard Firebox System
Page 55
Clarent also supports the use of PCAnywhere for management. Refer to
the PCAnywhere implementation notes for further information.
Adding the Clarent-gateway service could compromise network security
because it allows traffic inside the firewall based only on network address
which is not a reliable method of authentication. In addition, your Clarent
server may be subject to denial of service attacks in this configuration.
Where possible, WatchGuard recommends using VPN options to provide
additional security for such a configuration.
Characteristics
•Protocol: UDP
•Client Port: ignore
•Port Number(s): 4040, 4045, 5010
Clarent-command
Packet Filter Services
Clarent Corporation is an IP telephony technology supplier to
mainstream carriers and service providers. Clarent products enable voiceover-IP for doing voice calls between Clarent gateways across the
Internet. This service supports the Clarent v3.0 product and later.
The Clarent products use two sets of ports, one for gateway-to-gateway
communications (UDP ports 4040, 4045, and 5010) and one for gatewayto-command center communications (UDP ports 5001 and 5002). Use the
Clarent-gateway service icon for the former.
Enable incoming connections only from specific external gateways to
your gateway or command center.
Clarent also supports the use of PCAnywhere for management. Refer to
the PCAnywhere implementation notes for further information.
Adding the Clarent-command service could compromise network
security because it allows traffic inside the firewall based only on network
address which is not a reliable method of authentication. In addition, your
Clarent server may be subject to denial of service attacks in this
configuration. Where possible, WatchGuard recommends using VPN
options to provide additional security for such a configuration.
Reference Guide43
Page 56
CHAPTER 4: Types of Services
Characteristics:
•Protocol: UDP
•Client Port: ignore
•Port Numbers(s): 5001, 5002
CU-SeeMe
CU-SeeMe is a program used to do video conferencing over the Internet.
For CU-SeeMe to work through the Firebox, you must ensure that you are
not on a network using outgoing dynamic NAT, and configure the CUSeeMe service for both incoming and outgoing access.
The nature of the CU-SeeMe protocol dictates that you configure this
service for both incoming and outgoing, regardless of which side is
originating the connection. The CU-SeeMe icon allows the proper
combination of ports to enable use of CU-SeeMe versions 2.X and 3.X.
CU-SeeMe Version 2.X runs on UDP port 7648. Version 3.X, in addition to
UDP port 7648, runs on UDP port 24032 (for H.323 conferences) and TCP
port 7648 (video conference directories).
Characteristics
Because CU-SeeMe has a three-step send/receive/send sequence, its
protocol and port information is grouped in triads.
Dynamic Host Configuration Protocol (DHCP) provides a means of
dynamically allocating IP addresses to devices on a network.
Characteristics
•Service Name: DHCP-Server or DHCP-Client
•Protocol: UDP
•Client Port: client
•Port Number: Server: 68; Client: 67
44WatchGuard Firebox System
Page 57
DNS
Domain Name Service (DNS) maps host names to IP addresses. You will
probably not need to add a DNS service icon unless you maintain a public
DNS server behind the Firebox, because outgoing UDP traffic is enabled
by default. The DNS multi-service icon allows UDP DNS traffic, as well as
TCP zone transfers to occur as specified. All of the usual logging options
can be used with DNS.
Characteristics
•Protocol: Multi: TCP (for server-server zone transfers) and UDP (for
client-server lookups)
•Server Port(s): 53
•Client Port(s): ignore
•RFC: 883
Packet Filter Services
Filtered-HTTP
The multi-service rule Filtered-HTTP combines configuration options for
incoming HTTP on port 80 with a rule allowing all outgoing TCP
connections by default. Using Filtered-HTTP will not result in applying
the HTTP proxy rule set to any traffic. To proxy HTTP traffic, use the
Proxied-HTTP service. WatchGuard recommends that incoming HTTP be
allowed only to any public HTTP servers maintained behind the Firebox.
External hosts can be spoofed. WatchGuard cannot verify that these
packets were actually sent from the correct location. Configure
WatchGuard to add the source IP address to the Blocked Sites List
whenever an incoming HTTP connection is denied. All of the usual
logging options can be used with HTTP.
Characteristics
•Protocol: Multi (includes top and http)
•Client Port: ignore
•Port Number: 80
Reference Guide45
Page 58
CHAPTER 4: Types of Services
Filtered-SMTP
Filtered SMTP allows SMTP traffic (email) without using the SMTP proxy.
One use of Filtered-SMTP eliminates the need for outgoing mail to be
routed through the SMTP proxy twice. With the Filtered SMTP icon
between the trusted network and the mail server on the optional network,
mail is only proxied when it is outbound to the Internet.
Characteristics
•Protocol: TCP
•Server Port(s): 25
•Client Port(s): client
finger
finger is a protocol used to list information about users on a given host.
Although this information is often useful, it can also reveal too much
information that can be abused.
WatchGuard does not recommend putting finger servers on the trusted
interface.
Characteristics
•Protocol: TCP
•Server Port(s): 79
•Client Port(s): greater than 1023
Common Scenario
Description
There is a specially built finger server running on the optional
interface.
Icons in the Services Arena
A finger service icon–Incoming allow from Any to the finger
server on the optional interface.
46WatchGuard Firebox System
Page 59
Gopher
Gopher is a data-retrieval protocol developed at the University of
Minnesota. As HTML has proliferated and Web browsers improved
Gopher servers replaced by Web servers. It is unlikely that you will ever
need to run a Gopher server.
Characteristics
•Protocol: TCP
•Server Port(s): 70 although servers can and are configured to use other
ports
•Client Port(s): greater than 1023
HTTPS
HTTPS is a secured and encrypted version of the HTTP protocol. The
client and the web server set up an encrypted session over TCP port 443.
Because this session is encrypted on both ends, the proxy cannot examine
packet contents; therefore, this icon enables a packet-filter service, not a
proxy.
Packet Filter Services
The HTTPS service is needed only if you are hosting an HTTPS server, or
if you do not have an Outgoing, Filtered-HTTP, Proxy or Proxied HTTP
icon in your configuration.
Characteristics
•Protocol: TCP
•Server Port(s): 443
•Client Port(s): client
IMAP
Internet Mail Access Protocol (IMAP) is a method of accessing email or
bulletin board messages residing on a remote mail server as if they were
local. Thus e-mail stored on an IMAP server can be accessed from
N
OTE
Reference Guide47
Page 60
CHAPTER 4: Types of Services
multiple sites (such as home, work, or laptop) without the need to transfer
messages and files back and forth.
Characteristics
•Protocol: TCP
•Server Port(s): 143
•Client Port(s): client
LDAP
Lightweight Directory Access Protocol (LDAP) is an open-standard
protocol for accessing online directory services. The protocol runs over
Internet transport protocols, such as TCP, and can be used to access standalone directory servers or X.500 directories.
Characteristics
•Protocol: TCP
•Server Port(s): 389
•Client Port(s): client
Lotus Notes
Lotus Notes is an integrated client/server platform for conferencing,
databases, e-mail, and publishing and accessing compound documents.
Adding an icon for this service enables the proprietary Lotus Notes
protocol. Because the protocol supports encapsulation and tunneling, as
well as access to internal data, WatchGuard does not recommend adding
the Lotus Notes service for addresses outside of the trusted network.
Characteristics
•Protocol: TCP
•Server Port(s): 1352
•Client Port(s): client
48WatchGuard Firebox System
Page 61
NNTP
Network News Transfer Protocol (NNTP) is used to transmit Usenet news
articles.
The best way to use NNTP is to set internal hosts to internal news servers,
and external hosts to news feeds. In most cases NNTP has to be enabled in
both directions. If you are running a public newsfeed, you must allow
NNTP connections from all external hosts. External hosts can be spoofed;
WatchGuard cannot verify that these packets were actually sent from the
correct location.
Configure WatchGuard to add the source IP address to the Blocked Sites
List whenever an incoming NNTP connection is denied. All of the usual
logging options can be used with NNTP.
Characteristics
•Protocol: TCP
Packet Filter Services
•Server Port(s): 119
•Client Port(s): greater than 1023
•RFC: 977
Common Scenarios
Scenario 1
Description
There exists a “public” NNTP server on the optional network.
Icons in the Services Arena
An NNTP icon–Incoming Allow From Any To the server.
Scenario 2
Description
There exists a “public” NNTP server on the Trusted network.
Icons in the Services Arena
The configuration will be the same as for Scenario 1.
Reference Guide49
Page 62
CHAPTER 4: Types of Services
NTP
Network Time Protocol (NTP) is a protocol built on TCP/IP that ensures
accurate local timekeeping by synchronizing computer clocks with other
clocks located on the Internet. NTP is capable of synchronizing times
within milliseconds over extended time periods.
Characteristics
•Protocol: UDP, TCP
•Server Port(s): 123
•Client Port(s): client
Outgoing Services
Outgoing TCP connections can be allowed or denied. This service icon
serves as a default setting for all outgoing TCP connections, and is
overridden by other service settings. Outgoing connections will not work
unless Proxied-HTTP, Filtered-HTTP, Outgoing, or Proxy icons are
present in the Services Arena. This icon will not enable outgoing FTP
which will function only with an FTP service.
pcAnywhere
pcAnywhere is an application used to remotely access Windows
computers. To enable this protocol, add the PCAnywhere service, and
then allow incoming access from the hosts on the Internet that need to
gain access to internal pcAnywhere servers, and to the internal
pcAnywhere servers.
pcAnywhere is not a particularly secure service and may compromise
network security, because it allows traffic inside the firewall without
authentication. In addition, your pcAnywhere server may be subject to
denial of service attacks. WatchGuard recommends using VPN options to
provide additional security.
Characteristics
•Protocol: Multi: UDP and TCP
•Server Port(s):
-22/UDP
50WatchGuard Firebox System
Page 63
- 5632/UDP
- 5631/TCP
- 65301/TCP
•Client Port: ignore (all cases)
ping
ping can be used to determine whether a host can be reached and is
operable and on the network). To intercept DOS-based or Windows-based
traceroute packets, configure the ping service.
Like traceroute, it is generally a bad idea to allow ping into a network;
however, outgoing ping is useful for troubleshooting.
Characteristics
•Protocol: ICMP
•Server Port(s): Not Applicable
Packet Filter Services
•Client Port(s): Not Applicable
POP2 and POP3
POP2 and POP3 (Post Office Protocol) are mail transport protocols,
generally used to retrieve individual users’ mailboxes from a POP server.
Characteristics
•Protocol: TCP
•Server Port(s): 109 (POP2), and 110 (POP3)
•Client Port(s): greater than 1023
Common Scenarios
Scenario 1
Description
A POP server on the Trusted interface, generally running on the
same machine as the SMTP server.
Reference Guide51
Page 64
CHAPTER 4: Types of Services
Icons in the Services Arena
No icons are needed for this scenario as the connections will never
reach the Firebox.
Scenario 2
Description
A POP server on the Optional interface, generally running on the
same machine as the SMTP server.
Icons needed in the Services Arena
Either a Proxy icon or an Outgoing icon allowing all outgoing
TCP connections. In the absence of one of these, a POP icon
allowing outgoing connections to the server.
PPTP
PPTP is a VPN tunnelling protocol with encryption. It uses one TCP port
(for negotiation and authentication of a VPN connection) and one IP
protocol (for data transfer) to connect the two peers in a VPN. Configure
the PPTP service to allow incoming access from Internet hosts to an
internal network PPTP server. PPTP cannot access hosts’ static NAT
because incoming NAT cannot forward IP protocols. Because this service
enables a tunnel to the PPTP server and does not perform any security
checks at the firewall, use of this service should be limited. In addition,
older versions of PPTP were less secure and were prone to password
sniffing and denial of service attacks.
Characteristics
•Protocol: TCP, IP
•Server Port(s): 1723 (TCP); 47 (IP)
•Client Port(s): client
RADIUS
The Remote Authentication Dial-In User Service (RADIUS) provides
remote users with secure access to corporate networks. RADIUS is a
client-server system that stores authentication information for users,
remote access servers, and VPN gateways in a central user database that
is available to all servers. Authentication for the entire network happens
52WatchGuard Firebox System
Page 65
from one location. RADIUS prevents hackers from intercepting and
responding to authentication requests by transmitting an authentication
key that identifies it to the RADIUS client.
Characteristics
•Protocol: UDP
•Server Port(s): 1645
•Client Port(s): client
RIP
RIP is a routing protocol that predates IP, making it one of the oldest
protocols on the Internet. It is used to automatically build routing tables
for local routers. Because it is directionless, it is quite similar to DNS in
configuration. You should enable RIP only if your Internet service
provider requires that you run a routing daemon.
Packet Filter Services
Incorrect or deceptive routing information can wreak havoc with local
networks, could cause service denial problems, and possibly completely
compromise the local network. Enable this service only after careful
consideration.
Characteristics
•Protocol: UDP
•Server Port(s): 520
•Client Port(s): greater than 1023
SMB (Windows Networking)
Server Message Block (SMB) is used by Windows to share files,
computers, printers, and other network resources.
If you set up replication, you may see repeated attempts to use the port
mapper service on port 135. This will eventually fail, and fall back to
using port 42. Refer to the RFC for DCE, and the DCE-RPC proxy sections
for more details.
Reference Guide53
Page 66
CHAPTER 4: Types of Services
Allowing SMB through the Firebox is extremely insecure, and is strongly
discouraged unless used through a VPN connection. These configuration
settings are to be used only if there is no other alternative, and service
icon settings should be as specific as possible.
Characteristics
•Protocol: SMB (over TCP and UDP)
•Server Port(s): 137 (UDP), 138 (UDP), 139 (TCP), 42 (TCP for WINS
replication), 445 (TCP and UDP)
•Client Port(s): 136 (UDP), 137 (UDP), 139 (TCP)
•RFC: No RFC, but see:
http://www.microsoft.com
N
OTE
Common Scenarios
Scenario 1
Description
Clients on the trusted interface need to talk to a Windows NT
server on the optional network. Although not required, WINS
servers should be installed on both trusted and optional networks;
configure the clients on the optional network to use the optional
WINS server as a primary and the trusted WINS server as a
secondary.
Configure the clients on the trusted interface to use the trusted
WINS server as a primary and the optional WINS server as a
secondary. If you choose to use two WINS servers, it would be
beneficial to allow WINS replication across the Firebox as well as
adding the browser service to the WINS servers.
Icons in the Services Arena
SMB is a multi-service icon. You may, however, need to add these
icons to your services arena:
- One UDP icon for port 137. Set client port to “port” to enable
NetBIOS lookups.
54WatchGuard Firebox System
Page 67
- One UDP icon for port 138. Set client port to “port” to enable the
- One TCP icon for port 139. Set client port to “client.” This sets up
SNMP
Simple Network Management Protocol (SNMP) can be used to collect
information about and configure remote computers. This has proven to be
dangerous. A great many Internet attacks have used SNMP.
Characteristics
•Protocols: UDP, TCP
•Server Port(s): 161 (trap servers use 162)
•Client Port(s): greater than 1023
Packet Filter Services
NetBIOS datagram service to transfer information between
hosts.
a NetBIOS TCP channel for passing information between hosts.
Because SNMP could cause quite unpredictable changes in a network if
enabled, carefully consider alternatives and log everything.
SNMP-Trap
Simple Network Management Protocol (SNMP) traps are notification
messages that an SNMP agent (for example, a router) sends to a network
management station. These messages generally report an important event
that should be logged or otherwise investigated.
Characteristics
•Protocols: UDP
•Server Port(s): 162
•Client Port(s): greater than 1023
SQL*Net
Oracle uses one port for its sql*net software. By default, this port is either
1526/tcp or port 1521/tcp, but it is user-configurable by editing the
tnsnames.ora file. To allow sql*net through the Firebox, set up a service
icon for the port that your sql*net server is using, with a protocol of tcp,
Reference Guide55
Page 68
CHAPTER 4: Types of Services
and a client port of ignore. Then set up incoming access from the allowed
external hosts to the sql*net server.
Characteristics
•Protocols: TCP
•Server Port(s): 1521, 1526
•Client Port(s): ignore
Sybase SQL-Server
Sybase uses one port for the Sybase Central and SQL Advantage software.
There is no factory default port. Rather, the administrator configures the
port during the installation process using the Sybase Network
Connections dialog box. For WinSock TCP/IP, the port number is
specified as the number following the host name. For example, specify
MyHost,10000 as your connection information to set the Sybase SQL-
Server port to 10000.
The Sybase SQL-Server service is set to server port 10000. Verify that your
Sybase SQL-Server is configured for port 10000. If it is not, either
reconfigure the SQL-Server to port 10000 or create a new service with the
server port to the number that matches the SQL-Server installation. In that
case make sure to set the protocol to TCP and the client port to ignore, as
shown under Characteristics below.
With both the WatchGuard SQL-Server and a custom built service,
configure the rest of the service the same way: list the external clients that
should be allowed to connect to the Sybase server as Incoming From, and
the Sybase server address as Incoming To.
Characteristics
•Protocols: TCP
•Server Port(s): 10000
•Client Port(s): ignore
ssh
Secure Shell (ssh) is a free program which allows remote login, command
execution, and file transfer to another computer over a network. It
56WatchGuard Firebox System
Page 69
provides strong authentication and secure (encrypted) communications.
WatchGuard recommends the use of ssh instead of more vulnerable
protocols like telnet, rssh, and rlogin.
If you use ssh, you should also use its strong authentication mechanisms.
Strong encryption mechanisms are available for U.S. customers, Canadian
customers, and customers who have been approved for use of strong
encryption by WatchGuard and/or the U.S. Government. If you would
like to use strong encryption (128 bit, 3DES) or IPSec, please contact
WatchGuard Technical Support.
UNIX versions are available from ftp.cs.hut.fi (see ftp://ftp.cs.hut.fi/
pub/ssh), and information on versions for Windows can be found at
DataFellows (http://www.datafellows.com).
Characteristics
•Protocol: TCP
•Server Port(s): 22
Packet Filter Services
•Client Port(s): less than 1024
•RFC: No number yet, but see:
http://www.cs.hut.fi/ssh/
Common Scenario
Description
There are one or more ssh servers on the trusted network.
Icons in the Services Arena
An ssh icon – Allowing Incoming To the desired trusted servers,
and Allowing Outgoing From Any To Any.
syslog
syslog is a service used to log operating system events on UNIX hosts.
The most common reason to enable syslog data on a firewall is to collect
data from a host outside the firewall.
Because the syslog port is blocked by default, to allow one log host to
collect logs from multiple Fireboxes:
•Remove port 514 from the Blocked Ports list
Reference Guide57
Page 70
CHAPTER 4: Types of Services
•Add the WatchGuard Logging icon to the Services Arena
Attacks often focus on flooding syslog with log entries so that attacks are
either lost in the noise or the disk fills up and attack attempts are not
recorded. Generally, syslog traffic should not pass through the Firebox.
Characteristics
•Protocol: UDP
•Server Port(s): 514
TACACS
TACACS user authentication is a server that uses existing user accounts
to authenticate users into a dial-up modem pool, eliminating the need to
maintain duplicate accounts on a UNIX system. TACACS does not
support TACACS+ or RADIUS.
N
OTE
Characteristics
•Protocol: UDP
•Server Port(s): 49
•Client Port(s): greater than 1023
TACACS+
TACACS+ user authentication is a server that uses existing user accounts
to authenticate users into a dial-up modem pool, eliminating the need to
maintain duplicate accounts on a UNIX system. TACAS+ supports
RADIUS.
Characteristics
•Protocol: TCP
•Server Port(s): 49
•Client Port(s): greater than 1023
58WatchGuard Firebox System
Page 71
telnet
The telnet service is used to log in to a remote computer, and is similar to
using dial-up access except that the connection is made over a network.
Characteristics
•Protocol: TCP
•Server Port(s): 23
•Client Port(s): greater than 1023
•RFC: 854
Common Scenario
Description
Telnet access is not allowed in to any machines on the trusted
network, but access is allowed out to external and/or optional
machines.
Packet Filter Services
TFTP
Icons in the Services Arena
The Proxied-HTTP, Filtered-HTTP, Proxy, or Outgoing icon in the
Services Arena automatically set to Allow Outgoing but Deny
Incoming connections (the default WatchGuard stance). For a
different stance (for example, to allow selected Incoming, or to
restrict Outgoing), add the telnet services and configure as
needed.
Trivial File Transfer Protocol (TFTP) is a simple file transfer protocol
similar to FTP that is usually used to download boot code to diskless
workstations. It supports timeout and retransmission techniques.
Use of this protocol is not recommended because it can allow
unauthorized remote access to system or user files without asking for a
password. WatchGuard recommends TFTP be used only for accessing
limited subdirectory trees that cannot result in root access. TFTP should
be restricted by using a TCP wrapper and filtering packets coming in on
port 111.
Reference Guide59
Page 72
CHAPTER 4: Types of Services
Characteristics
•Protocols: UDP
•Server Port(s): 69
•Client Port(s): generally greater than 1023
Timbuktu
Timbuktu Pro is remote control and file transfer software used to gain
access to Windows computers. The protocol uses TCP port 1417 and UDP
port 407. Add the Timbuktu service and allow incoming access from the
hosts on the Internet that need to gain access to internal Timbuktu
servers, and to the internal Timbuktu servers.
Timbuktu is not a particularly secure service and may compromise
network security. It allows traffic inside the firewall without
authentication. In addition, the Timbuktu server may be subject to denial
of service attacks. WatchGuard recommends using VPN options to
provide additional security.
Characteristics
•Protocols: UDP, TCP
•Server Port(s): UDP 407, TCP 1417
•Client Port(s): ignore (both cases)
Time
The Time service is similar to NTP and used to synchronize clocks
between hosts on a network. Time is generally less accurate and less
efficient than NTP over a WAN. WatchGuard recommends using NTP.
Characteristics
•Protocols: UDP
•Server Port(s): 37
traceroute
traceroute is an application that can be used to build maps of networks. It
is very helpful for network debugging, analyzing routes, and determining
60WatchGuard Firebox System
Page 73
a site’s Internet service provider. The WatchGuard traceroute service is
for filtering UNIX-based UDP-style traceroute only. For DOS-based or
Windows-based traceroute packet filtering, use the ping service instead
(see “ping” on page 51).
traceroute uses ICMP and UDP packets to build pathways across
networks using the UDP TTL field to return packets from every router
and machine between a source and a destination. Letting traceroute into a
network may enable an outsider to create a map of your private network.
However, outbound traceroute can be useful for troubleshooting.
Characteristics
•Protocols: UDP, ICMP
•Server Port(s): Not Applicable
•Client Port(s): generally greater than 32768
WAIS
Packet Filter Services
Wide Area Information Services (WAIS) is a protocol used to search for
documents over the Internet originally developed at Thinking Machines
Incorporated. Although WAIS servers are becoming rare, some WWW
sites use WAIS to scan searchable indices, so it might be a good idea to
enable outgoing WAIS.
WAIS is based on the ANSI Z39.50 search protocol, and the terms Z39.50
and WAIS are often used interchangeably.
Characteristics
•Protocol: TCP
•Server Port(s): 210 although servers can be (and often are) configured
on other ports, much like HTTP servers
•Client Port(s): greater than 1023
WatchGuard
The basic WatchGuard service allows configuration and monitoring
connections to be made to the Firebox. WatchGuard recommends
allowing this service only to the Management Station. The service is
typically set up on the trusted interface.
Reference Guide61
Page 74
CHAPTER 4: Types of Services
Characteristics
•Protocol: TCP
•Server Port(s): 4105
•Client Port(s): client
WatchGuard Encrypted Connections
WatchGuard uses one of three levels of encrypted connections to allow
remote configuration and monitoring on ports 4101, 4102, and 4103. The
levels are low, medium, and strong encryption. The level you have
depends on your purchase agreement with WatchGuard. This service
allows or denies connections, and without it, you will not be able to access
a Firebox remotely. If you would like to use strong encryption (128 bit,
TripleDES) or IPSec, please contact WatchGuard Technical Support.
WatchGuard Logging
The WatchGuard Logging service is necessary only if a second Firebox
needs access to a log host on the trusted interface of a Firebox. If there is
only one Firebox, this icon is unnecessary.
Characteristics
•Protocol: TCP
•Server Port(s): 4107
WGAgent
WatchGuard Agent is a service that is primarily used for the management
of software and security policies. It uses one TCP port allowing
WatchGuard Agents to communicate with each other using an SSL
secured connection. For this service to work properly, add the HTTPS
service as well.
Characteristics
•Protocol: TCP
•Server Port(s): 4114
•Client Port(s): client
62WatchGuard Firebox System
Page 75
whois
The whois protocol gives information about who administers Internet
sites and networks. It is often useful for finding administrative contacts at
other sites.
Because very few sites run whois servers, the only service necessary to
access these sites is an Outgoing or a Proxy icon. In the absence of these,
use a whois icon allowing outgoing connections to the required whois
servers, the most common one being
Characteristics
•Protocol: TCP
•Server Port(s): 43
•Client Port(s): greater than 1023
Proxied Services
rs.internic.net.
Proxied Services
This section describes the services proxied by the WatchGuard Firebox
System, including a separate description of the transparent proxies,
HTTP, SMTP, and FTP. The proxied service opens packets of its particular
type, strips out any embedded forbidden data types, and reassembles the
packets with the proxy’s own origin and destination headers.
Configuring and activating proxies is done the same way you add packet
filtering services.
DCE-RPC
The Distributed Computing Environment (DCE) Remote Procedure Call
(RPC) service allows connections bound for a trusted machine's port 135.
Initial calls typically result in a response from the trusted machine that
redirects the client to a new port for the actual service the client wants.
This service allows the initial port mapper requests used by remote
Windows Name Service (WINS) administration, remote Exchange
administration, Outlook, and other software that relies on DCE RPC. Be
aware that the standard SMB or NetBios ports may also need to be
allowed so that the above software will work properly.
Reference Guide63
Page 76
CHAPTER 4: Types of Services
DCE-RPE allows
the configured addresses and ports as appropriate)—it does not filter any
of the packets for harmful content.
Characteristics
•Service Name: DCE-RPC
•Protocol: DCE-RPC
•Client Port: client
•Port Number: 135
FTP
FTP is File Transfer Protocol, one of the most common ways to move files
over the Internet.
There is a “public” FTP server on the optional network.
Icons in the Services Arena
An FTP icon must be present for FTP to work. Incoming
connections must be Allowed To the FTP server. Outgoing
connections are usually Allowed From Any to To Any.
Scenario 2
Description
There is a “public” FTP server on the Trusted network.
64WatchGuard Firebox System
Page 77
Icons in the Services Arena
Configuration is the same as for Scenario 1.
H323
The H323 service enables applications based on the H.323 protocol to be
used through the Firebox. Popular products that use this protocol include:
•Microsoft NetMeeting
•Intel Internet VideoPhone
This service does not do any filtering for harmful content. It does not
support QoS or rsvp protocol, nor does it support any type of NAT.
Considerations
For incoming connections:
•Any external host must be able to route to the internal host directly.
Use the ping utility if necessary to ensure that the connection is valid.
Proxied Services
•Dynamic NAT must be turned off for the incoming H323 connection
to work properly.
There are no equivalent special considerations for outgoing H323
connections.
HTTP is the Hypertext Transfer Protocol used by the World Wide Web to
move information around the Internet.
The WatchGuard service called HTTP Proxy is not to be confused with an
HTTP caching proxy. An HTTP caching proxy is a separate machine, and
it performs caching of Web data. If you use an external caching proxy,
N
OTE
Reference Guide65
Page 78
CHAPTER 4: Types of Services
you must explicitly enable (by adding service icons) any outgoing services
you intend to use. If you do not, outgoing TCP connections won’t work
properly.
Characteristics
•Protocol: TCP
•Server Port(s): 80 (although servers can be run on any port, a common
alternative is 8080, and Secure Socket Layer (SSL) connections are
generally served on port 443)
•Client Port(s): greater than 1023
•RFC: 1945
Common Scenarios
Scenario 1
Description
“Public” HTTP server on the optional network.
Icons in the Services Arena
An HTTP icon, with Incoming From Any to the HTTP server.
Scenario 2
Description
“Public” HTTP server on the trusted network.
Icons in the Services Arena
Even with dynamic NAT, the HTTP server must have a “public”
address. Configuration is exactly the same as in Scenario 1.
Proxied-HTTP
Proxied-HTTP combines configuration options for HTTP on port 80 with
a rule allowing all outgoing TCP connections by default. Using the
Proxied-HTTP rule ensures that all outgoing HTTP traffic, regardless of
port, will be proxied according to the HTTP proxy rules.
WatchGuard recommends that you allow incoming HTTP only to any
public HTTP servers maintained behind the Firebox. External hosts can be
66WatchGuard Firebox System
Page 79
spoofed, as WatchGuard cannot verify that these packets were actually
sent from the correct location.
Configure WatchGuard to add the source IP address to the Blocked Sites
List whenever an incoming HTTP connection is denied. Adjusting the
settings and MIME types is the same as for the HTTP Proxy.
RTSP
The Real-Time Streaming Protocol (RTSP) establishes and controls either
a single or several time-synchronized streams of continuous media such
as audio and video. It is the protocol used by RealNetworks G2 and Apple
QuickTime real time streaming media players.
Characteristics
•Protocol: RTSP
•Server Port: 554
Proxied Services
SMTP
•Client Port: any
•RFC: 2326
N
OTE
In addition to these TCP ports, there are some UDP ports that both the
client and the server use. The ports are determined dynamically but the
mostly commonly used ports on the client side are 6970 and 6971.
Simple Mail Transfer Protocol (SMTP) is the Internet standard protocol
for transmitting and receiving email. Generally SMTP servers are (by
nature) “public” servers.
When using incoming static NAT with SMTP, auth must be added (see
“auth (ident)” on page 41) to the Services Arena. Configure auth to allow
incoming auth to the Firebox. This enables outgoing mail messages to
flow unrestricted from behind the Firebox to the numerous SMTP servers
on the Internet that use auth to verify other mail servers’ identities and
allows these servers to return messages through the Firebox to the
senders.
Reference Guide67
Page 80
CHAPTER 4: Types of Services
Logging incoming SMTP is recommended, but may produce copious log
output. If you do not want to use the SMTP proxy, create a new service
using the Services dialog box with the TCP protocol and port 25.
Characteristics
•Protocol: TCP
•Server Port(s): 25
•Client Port(s): greater than 1023
•RFC: 821
Common Scenarios
Scenario 1
Description
There is an SMTP server on the optional interface.
Icons in the Services Arena
A SMTP service icon – The Incoming tab should Allow To the
SMTP server from Any. The Outgoing tab should Allow To Any
from Any.
Scenario 2
Description
There is an SMTP server on the trusted interface.
Icons in the Services Arena
This scenario is configured exactly as in Scenario 1.
68WatchGuard Firebox System
Page 81
CHAPTER 5Common Log Messages
This chapter provides explanations for many of the log messages most
commonly generated by the Firebox. For more information on log
messages, refer to the In-Depth FAQs in the WatchGuard Knowledge
Base. Go to the following Web site and log into the LiveSecurity Service:
http://www.watchguard.com/support
Log messages in this chapter are arranged alphabetically.
xxx.xxx.xxx.xxx's mac address changed to XX:XX:XX:XX:XX:XX
Reports that the ARP table was changed or updated to reflect the
MAC address of a particular IP address. This occurs most
frequently in the case of High Availability where the active
Firebox has failed over and the standby Firebox assumes its IP
address.
authentication[] Time limit exceeded
Indicates that a user’s authentication timed out. Because some
authentication methods are time-sensitive, the Firebox allows you
to configure a timeout value when waiting for user input. The
defaults vary depending on the authentication method being
used.
chat-ttyS0[x]: Failed
The Firebox failed to communicate with the modem. This is not a
problem if you do not have a modem and are not using out-of-
Reference Guide69
Page 82
CHAPTER 5: Common Log Messages
band management. The Firebox always attempts to communicate
with a PCMCIA modem and will report this error if none is found.
controld: ERROR: Receiving another configuration file from
firebox 10.1.16.2.
Indicates that the current configuration file is corrupted or
incomplete. The Event Processor will close the connection.
A psh ack is an acknowledgement of a push. Push is a type of TCP
message that tells the receiving process to push the data directly
to the receiving application instead of caching it locally for
transmit. This message appears either because the source is a
blocked site or port, a spoofed source address, or an Any service
with logging enabled.
TCP connections are controlled through a series of packets
exchanged by the two computers involved in the connection. Old,
stale TCP connections are reset with an RST packet. RST packets
have a sequence number that must be valid according to certain
TCP rules. For example, Denial of Service (DoS) attacks can be
launched against some hosts by spoofing TCP RST packets
against connections that conflict with current connections. Bare
TCP RST packets can also be sent as a type of OS fingerprinting to
determine the target's operating system.
dns-proxy[xx] dns_setup_connect_udp: Unable to create UDP
socket for port: Invalid argument
The DNS proxy has only 256 file descriptors available for its use,
which limits the number of DNS connections in a NAT
environment. Every UDP request that uses dynamic NAT uses a
file descriptor for the duration of the UDP timeout. Every TCP
session that uses dynamic, static, or 1-to-1 NAT uses a file
descriptor for the duration of the session.
The file descriptor limit is rarely a problem, but an occasional site
may notice slow name resolution and many instances of the above
log message
You can work around this problem in two ways (the first method
is the most secure):
70WatchGuard Firebox System
Page 83
- Avoid using dynamic NAT between your clients and your DNS
server.
- Disable the outgoing portion of the DNS proxied service and
replace it with a filtered DNS service.
The cs_server is the process that listens for management
connections to the Firebox. There are two conditions under which
the error shown above occurs:
- Incorrectly entered passphrase
- Attempt to make two concurrent read-write connections to the
Firebox
Firebox System Manager was unable to successfully complete a
connection to the Firebox. There are several potential causes of
this error; a common one is a very high traffic load at the time of
connection.
IP options are obsolete IP parameters now used primarily for OS
fingerprinting and other types of IP stack-based probes. Most
routers strip IP options. By default, the Firebox denies them. This
feature can be modified using the Default Packet Handling dialog
box in Policy Manager.
firewalld[]: File synchronization completed
Indicates that the Management Station successfully completed the
transfer of a configuration file to the Firebox.
firewalld[] Pid xxx, died from signal 6.
A Pid is a process ID. In the Linux kernel, any new application is
assigned a process ID. In any case where a Pid dies, it is important
to determine what process was associated with the Pid number.
For instance, the Pid in a real log message may be 106. Earlier logs
could show that the HTTP Proxy was the process assigned Pid
106. In that case, this message would indicate that the HTTPproxy process aborted abnormally.
Reference Guide71
Page 84
CHAPTER 5: Common Log Messages
firewalld [xxx] proxy accept() failed (Connection reset by
peer)
Indicates that a Web browser reset or failed to complete a
connection. This occurs if the user clicks the Stop or Reload
buttons during load.
firewalld[]: Putting file wg.cfg (from x.x.x.x)
Indicates that the Management Station at x.x.x.x sent a new
configuration file to the Firebox.
firewalld[]: Restarted by x.x.x.x
Indicates that the Firebox was issued a restart command by a
Management Station at IP address x.x.x.x.
ftp-proxy []: Proxy bind() failed (Address already in use)
On rare occasions, the FTP Proxy attempts to bind to a port used
by a static process on the Firebox such as 4105 or 4110. When this
happens, the bind fails.
Indicates that the proxy was unable to connect to a FTP server.
The Proxy Connect Timeout defines the amount of time (in
seconds) that the proxies will wait before giving up trying to
forward a connection to an unreachable or non-responsive host.
After a connection is established, the standard proxy timeout
values apply. The default value for Proxy Connect Timeout is 10
seconds. If you experience trouble reaching sites through the
proxy that normally require more than 10 seconds before a
connection can be acknowledged (such as systems over slow links
in distant parts of the world, or heavily loaded servers), you can
try raising this value by adding (or editing) the following
property in the configuration file:
Because this property is per proxy service, it may be different for
each FTP proxy icon configured.
fwcheck[x] fwcheck in low memory mode
Indicates that fwcheck is active because the Firebox passed its
predefined low memory threshold.
72WatchGuard Firebox System
Page 85
fwcheck[] Killing process http-proxy (pid x)
Fwcheck is the process responsible for low memory scavenging
on the Firebox. If Firebox memory is overloaded for some reason,
fwcheck kills other processes until memory usage returns to a
safer state.
http-proxy[] [x.x.x.x:1091 x.x.x.x:80] Request denied: No
URI found
This message indicates a connection to a Web server was not
compliant with RFC 2068. The problem is not with the code of the
Web page but with the server itself. Web servers create headers
when sending packets to clients. These headers contain
information about the page, including information the HTTP
Proxy requires to process the traffic. Part of this is a URI (Uniform
Resource Identifier). According to RFC 2068:
Uniform Resource Identifiers, (URIs) have been known by many
names: WWW addresses, Universal Document Identifiers,
Universal Resource Identifiers, and finally the combination of
Uniform Resource Locators (URL) and Names (URN). As far as
HTTP is concerned, Uniform Resource Identifiers are simply
formatted strings which identify–via name, location, or any other
characteristic–a resource.
RFC 2068 defines the syntax for a URI. ''URI not found'' means
either the URI was not defined or it was defined incorrectly. By
default, HTTP Proxy blocks pages with non-compliant URIs.
Solutions for this problem include:
- Contacting the Web server admin to request an update to make
their server RFC 2068—compliant
Most browsers are lax about requiring precise HTTP header
syntax. If the Firebox HTTP Proxy encounters HTTP headers
either with incorrect syntax or not defined per RFC 2068, it strips
them during transfer. The rest of the document still transfers.
http-proxy[] can't read proxy info file
The proxy info file is a file on the Firebox describing the map
between HTTP Proxy services and their internal ports. It is created
by firewalld at the start of the boot sequence. Difficulty reading
Reference Guide73
Page 86
CHAPTER 5: Common Log Messages
this file indicates that firewalld is taking a long time to create it. A
possible cause is that the configuration file is corrupted.
http-proxy[]: no proxy services configured -- exiting
Indicates that no services defined on the Firebox make use of the
HTTP Proxy. The HTTP Proxy process starts, determines there are
no rules for the process, and then exits.
http-proxy[] proxy connect timeout
Indicates that the HTTP proxy sent a SYN to either an internal or
external HTTP server, but did not receive a SYN-ACK response
within the period of time specified in the Firebox configuration
file. The cause may be a downed HTTP server. The Proxy Connect
Timeout defines the amount of time (in seconds) that proxies wait
before they stop trying to forward a connection to an unreachable
or non-responsive host. After a connection is established, the
standard proxy timeout values apply. You may try raising this
value by adding (or editing) the following property in the
configuration file:
default.proxies.http.timeout: 600
http-proxy[] [x.x.x.x:1620 x.x.x.x:80] server was
unexpectedly closed
Indicates that the server closed the connection before the data
transfer was complete. This can be caused by busy Web servers or
bad network connectivity.
http-proxy[668] [x.x.x.xx:4584 x.x.x.x:80\] Response
denied: Content type required
One feature of the HTTP Proxy is MIME type content checking.
Web servers should send this information, but some do not. The
message above tells you that the HTTP Proxy denied the page
because it lacks a content type.
Some custom applications transfer data using pseudo-HTTP
transfers to enable them to work through most types of HTTP
proxies. If this message appears when a Web page is not being
accessed, it may be because data transfers are being attempted
using HTTP on ports other than 80. The Proxied-HTTP service (as
distinct from the HTTP proxy) proxies any outgoing port, not just
80.
74WatchGuard Firebox System
Page 87
http-proxy[205]: [x.x.x.x:8921 x.x.x.x:80] Error while
sending/receiving: Invalid transfer-encoding type
"Identity"
HTTP has a provision for defining the encoding type used in the
page data transfer. The default is called "Identity," which means
that no encoding or transformations are performed on the page
data. The RFC for HTTP 1.1 says the following about identity:
identity: The default (identity) encoding; the use of no
transformation whatsoever. This content-coding is used only in
the Accept-Encoding header, and SHOULD NOT be used in the
Content-Encoding header.
The HTTP Proxy strictly enforces the "should not" provision of the
RFC. It denies the content-encoding type as invalid. Connections
to the offending server should be made through a packet filtered
port 80 service.
init[1]: Pid xx: exit 0 (could also be 1)
This message appears when a process that finished whatever it
was doing is now exiting normally. The xx indicates the Process
ID number.
ipseccfg[] Error, cfg entry (networking.ipsec.
remote_gw.195.sharedkey) must contain a shared key.
Indicates that the ipseccfg was unable to parse a shared key hash
from the configuration file, possibly due to a corrupted
configuration file. Try reconfiguring your VPN tunnel options
and/or Mobile User IPSec options.
ipseccfg[] Ipsec inbound policy (12) maps to a nonexistent
tunnel (xxxxxxxxx)
Indicates that the ipseccfg was unable to determine the correct
routing, possibly due to a corrupted configuration file. Try
reconfiguring your VPN tunnel options and/or Mobile User IPSec
options.
ipseccfg[] No inbound policies configured, aborting ipseccfg
This indicates that your Firebox has the IPSec component, but no
tunnels configured. It is harmless if you are not using IPSec VPN.
If you are using IPSec VPN when this message appears, your
configuration file might be corrupted. Try reconfiguring your
VPN tunnel options and/or your mobile user IPSec tunnel
options.
Reference Guide75
Page 88
CHAPTER 5: Common Log Messages
ipseccfg[] No remote gateway associated with xxx
Indicates that the ipseccfg was unable to parse a preconfigured
remote gateway from the configuration file, possibly due to a
corrupted configuration file. Try reconfiguring your VPN tunnel
options and/or Mobile User IPSec options.
ipseccfg[]: No Remote Gateways configured, aborting ipseccfg
Indicates there are no IPSec tunnels configured on the Firebox.
ipseccfg[] Unable to verify inbound remote user policy(12),
aborting ipsec config
If this error appears, your configuration file might be corrupted.
Try reconfiguring your VPN tunnel options and/or your mobile
user IPSec tunnel options.
ipseccfg[] Will proxyarp for x.x.x.x on ethx
ipseccfg is the process responsible for managing IPSec tunnels.
This message indicates that the ipseccfg determined that it needs
to proxy-ARP for this IP address. This usually occurs for Mobile
User VPN IP addresses.
kernel: eth2: Setting full-duplex based on MII#31 link
partner capability of 45e1
Indicates that the Firebox determined it can set the Ethernet
interface to full-duplex. Earlier Fireboxes had software-type link
negotiation. Later transceivers did this automatically in hardware.
This message should be seen only on older Fireboxes.
kernel GRE: short packet: 30984\\12)
A GRE packet was corrupted on its way to the Firebox. In other
words, the length in the packet was changed and reported an
incorrect number of bytes.
kernel MASQ failed tcp/udp checksum from 205.181.115.231
Usually indicates packet corruption. A checksum is a count of the
number of bits in a transmission unit. This number is included
with the unit so that the receiver can check to see whether the
specified number of bits arrived. If the counts match, the receiver
assumes that it received a complete transmission.
kernel Memory use at 90 percent, low memory condition in
effect
Indicates that fwcheck will activate because the Firebox passed its
predefined low memory threshold.
76WatchGuard Firebox System
Page 89
kernel Problem: block on freelist at xxxxxxxxx isn't free
If you see this log message, contact WatchGuard Technical
Support immediately. A small number of Fireboxes experienced a
manufacturing problem with their power supply, which causes
this symptom.
kernel: Temporarily blocking host x.x.x.x
Indicates that an IP address was dynamically added to the
blocked site list.
Pid(x) exited status 1
Indicates that a process on the Firebox exited normally.
RBCAST: Error sending data on [some interface]: Network is
unreachable
The Firebox has a rebroadcaster service designed to take UDPdirected broadcast packets from one interface and put them on the
other interfaces. This service is infrequently used. It is enabled
when certain PPTP and MUVPN options are activated.
RBCAST only rebroadcasts directed broadcasts originating on a
primary interface IP address. In other words, secondary networks
will not be the source of an RBCAST. In addition, it will not
rebroadcast to remote interfaces such as PPTP and IPSec
addresses.
RBCAST errors most commonly indicate that your configuration
does not support its use. RBCAST is automatically enabled on
UDP ports 137 and 138 when VPN options are turned on. In
almost all cases, it is safe to ignore these messages.
If you want to obtain more information on this process, open your
configuration file with a text editor. Immediately after the line
that says:
options.proxies.rbcast.ports: 137 138 (might be
additional port numbers)
Insert this line:
options.proxies.rbcast.verbose: ON
If you do not want to see RBCAST messages, use the text editor to
remove the line that says:
options.proxies.rbcast.ports: 137 138
Save this file with the text editor. Open it with Policy Manager,
and save it to the Firebox.
Reference Guide77
Page 90
CHAPTER 5: Common Log Messages
rbcast[] Error sending data on optional--will not use
anymore: Network is unreachable
The RBCAST service is unable to send broadcasts on the optional
interface. Possible causes include:
- Nothing connected to the interface
- Improper or no rule regarding the traffic
The RBCAST service sends directed broadcasts on UDP ports to
other networks. An Outgoing service rule must be associated with
it.
received an unencrypted packet when crypto active
This message can be safely ignored. It indicates that an
unencrypted packet, (normally a connection notification that has
no data and no bearing on the actual connection), has been
received.
Request blocked by WebBlocker (proxy access blocked)
This generally indicates that some browser on the network is
trying to connect to an http proxy server. WebBlocker interprets
this as an attempt to bypass its protections and denies the attempt.
smtp-proxy[]: [x.x.x.x:35105 x.x.x.x:25] Bad command:
XXXXXX"
The client attempted a non-standard SMTP command not
recognized by the SMTP Proxy.
Indicates that the proxy was unable to connect to a mail server.
The Proxy Connect Timeout defines the amount of time (in
seconds) that the proxies will wait before giving up trying to
forward a connection to an unreachable or non-responsive host.
After a connection is established, the standard proxy timeout
values apply. The default value for Proxy Connect Timeout is 10
seconds. If you have trouble reaching sites through the proxy that
normally require more than 10 seconds before a connection can be
acknowledged (such as systems over slow links in distant parts of
the world, or heavily loaded servers), you can try raising this
value by adding (or editing) the following property in the
configuration file:
78WatchGuard Firebox System
Page 91
- For SMTP:
default.proxies.smtp.connect_timeout: <value>
Note that this property is global to all SMTP services, unlike the
FTP version described previously.
smtp-proxy[589]: [x.x.x.x:1098 x.x.x.x:25] proxy connect
failed (Operation now in progress)
This message indicates a Proxy Backlog. The Proxy Backlog
defines the number of connection requests held by the Firebox
until a proxy can be started to handle the connection. The default
Proxy Backlog value is 20. To raise (or lower) this value, add (or
edit) the following property in the configuration file:
This message indicates that a client attempted to send an
unsupported ESMTP command through the SMTP Proxy.
Tried to restart iked 3 times within 5 seconds of each
other--something's wrong!
Iked is the Firebox process responsible for negotiating IPSec
tunnels. This message usually occurs when IPSec mobile users are
in the configuration file with no associated network routing
policies. You can edit the configuration file with a text editor and
remove references to IPSec mobile users. If this error appears in
your logs, iked will not run and no IPSec tunnels will start.
tunneld[]: parse_ranges: some addresses may not be in
channel stack (stack is full)
This message indicates that you have a network range with more
than 50 IP addresses used for PPTP tunnels. The Firebox is limited
to 50 PPTP tunnels. Only the first 50 IP addresses are added to the
stack of available addresses.
webblocker[]: received new WebBlocker database from server
x.x.x.x (nnnn bytes, generated on day-month-year-time)
Indicates that the Webblocker process successfully retrieved the
WebBlocker database from the management station.
Reference Guide79
Page 92
CHAPTER 5: Common Log Messages
80WatchGuard Firebox System
Page 93
CHAPTER 6Resources
You can draw upon many resources to support your efforts to improve
network security. This chapter lists several sources of information
commonly used by WatchGuard engineers, developers, and Technical
Support teams to learn more about network security in general and the
WatchGuard product line in particular. These include:
•Publishers
•Books
•White Papers and Requests for Comments
•Mailing Lists
•Web Sites
•Newsgroups
Publishers
Several publishers emphasize network security in their offerings.
Addison-Wesley & Benjamin Cummings
Publishes a Computer Science series that includes several titles
about networking and network security.
http://www.awl.com/
Reference Guide81
Page 94
CHAPTER 6: Resources
Books
Non-Fiction
Amoroso, Edward and Bellovin, Steven. Intranet and Internet Firewall
Strategies. Indianapolis: Que Corporation, 1996. ISBN 1562764225
Chapman, Brent, and Zwicky, Elizabeth D. Building Internet Firewalls.
Sebastopol: O'Reilly & Associates, 1994. ISBN 1-56592-124-0.
Cheswick and Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Reading, MA: Addison Wesley Longman, Inc., 1994. ISBN 0-20163357-4.
O'Reilly
Publishes many books on network security.
http://www.ora.com/
Curry, David A. UNIX System Security: A Guide for Users and System
Administrators. Reading, MA: Addison Wesley Longman, Inc., 1992.
Denning, Dorothy E. Information Warfare and Security. Addison-Wesley,
1999. ISBN 0201433036.
Farley, Stearns, and Mark Farley Hsu, Tom Stearns, and Jeffrey Hsu, LAN Times Guide to Security and Data Integrity. Berkeley: Osborne McGraw-Hill,
1996. ISBN 0-07-882166-5.
Garfinkel and Spafford, Simson Garfinkel and Gene Spafford. Practical Unix and Internet Security. Sebastopol: O'Reilly & Associates, 1994. ISBN
1565921488.
Goncalves, Marcus, Firewalls Complete. New York: McGraw-Hill, 1998.
ISBN 0-07-024645-9.
McClure, Stewart; Scambray, Joel; and Kurtz, George. Hacking Exposed.
Second Edition. McGraw-Hill Publishing, January 2000. ISBN 0072127481.
Power, Richard. Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace. Que; September 2000. ISBN 078973443x.
82WatchGuard Firebox System
Page 95
Fiction
White Papers & Requests for Comments
Schneier, Bruce. Applied Cryptography. Second Edition. New York: John
Wiley & Sons, Inc., 1996. ISBN 0-471-11709-9.
Schwartau, Winn. Cybershock: Surviving Hacker, Phreakers, Identity Theives, Internet Terrorists and Weapons of Mass Disruption. New York: Thunder’s
Mouth Press, 2000. ISBN 1-56025-246-4.
Sheldon, Tom (Editor); Cox, Phil. Windows 2000 Security Handbook.
McGraw-Hill Publishing, November 2000. ISBN 0072124334.
Stevens, W. Richard. TCP/IP Illustrated. Reading MA: Addison Wesley
Longman, Inc., 1994. ISBN 0201633469. (Note: This is a 3-volume set.)
Stoll, Cliff. Cuckoo’s Egg. Pocket Books, 1995. ISBN 0671726889.
Vacca, John, Intranet Security. Rockland, MA: Charles River Media, Inc.,
1997. ISBN 1-886801-56-8.
Stephenson, Neal. Cryptonomicon. New York, NY: HarperCollins
Publishers, 1999. ISBN 0060512806.
White Papers & Requests for Comments
Reynolds, J. and J. Postel, Assigned Numbers. Available at this Web site:
Use your newsreader or electronic messaging application to
subscribe to the comp.security.firewalls Usenet newsgroup.
Deja.com
Deja.com provides a Web-based alternative to news reader
services. In addition to comp.security.firewalls, it includes several
discussion groups and the occasional room discussing network
security issues. It can be found at: http://www.deja.com/
86WatchGuard Firebox System
Page 99
CHAPTER 7Out-of-Band Initialization
Strings
This chapter provides a reference list of PPP and modem initialization
strings used to configure out-of-band (OOB) management.
The PPP client for Linux is called Pppd.
PPP Initialization Strings
These are the strings and syntaxes available for use when configuring a
Firebox for out-of-band management in Policy Manager:
asyncmap <map>
Set the async character map to <map>. This map describes which
control characters cannot be successfully received over the serial
line. Pppd will ask the peer to send these characters as a 2-byte
escape sequence. The argument is a 32-bit hex number with each
bit representing a character to escape. Bit 0 (00000001) represents
the character 0x00; bit 31 (80000000) represents the character 0x1f
or ^_. If multiple asyncmap options are given, the values are
ORed together. If no asyncmap option is given, no async character
map will be negotiated for the receive direction; the peer should
then escape all control characters. To escape transmitted
characters, use the escape option.
Reference Guide87
Page 100
CHAP TER 7: Out-o f-Band Initia li zation St ring s
escape xx,yy,..
Specifies that certain characters should be escaped on
transmission (regardless of whether the peer requests them to be
escaped with its async control character map). The characters to
be escaped are specified as a list of hex numbers separated by
commas.
Almost any character can be specified for the escape option,
unlike the asyncmap option which allows only control characters
to be specified. The characters that may not be escaped are those
with hex values 0x20 — 0x3f or 0x5e.
mpfto <period>
Specifies how long the PPP session should wait for a valid
management session to begin. If no valid session starts, then PPP
will disconnect after this timeout period. The default is 90
seconds.
mru n
Set the Maximum Receive Unit (MRU) value to n. Pppd will ask
the peer to send packets of no more than n bytes. The minimum
MRU value is 128. The default MRU value is 1,500. A value of 296
is recommended for slow links (40 bytes for TCP/IP header + 256
bytes of data).
mtu n
Set the Maximum Transmit Unit (MTU) value to n. Unless the
peer requests a smaller value via MRU negotiation, pppd will
request that the kernel networking code send data packets of no
more than n bytes through the PPP network interface.
passive
Enables the “passive” option in the LCP. With this option, pppd
will attempt to initiate a connection; if no reply is received from
the peer, pppd will then wait passively for a valid LCP packet
from the peer, instead of exiting, as it would without this option.
bsdcomp nr,nt
Request that the peer compress packets that it sends, using the
BSD-Compress scheme, with a maximum code size of nr bits, and
agree to compress packets sent to the peer with a maximum code
size of nt bits. If nt is not specified, it defaults to the value given
for nr. Values in the range 9 to 15 can be used for nr and nt; larger
88WatchGuard Firebox System
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.