Watchguard Firebox X6500E, Firebox X55E, Firebox X10E, Firebox X Peak e-Series, Firebox X Core e-Series, Firebox X Edge e-Series v10.0, Firebox X8500E, Firebox X20E Reference Manual
Specifications and Main Features
Frequently Asked Questions
User Manual
Reference Guide
Firebox X Core/Peak e-Series
with WatchGuard System Manager/Fireware v10.0
Firebox X Edge e-Series v10.0
Revised: 2/1/2008
Notice to Users
Information in this guide is subject to change without notice. Companies, names, and data used in examples
herein are fictitious unless otherwise noted. No part of this guide may be reproduced or transmitted in any
form or by any means, electronic or mechanical, for any purpose, without the express written permission of
WatchGuard Technologies, Inc.
Complete copyright, trademark, patent, and licensing
information can be found in Chapter 7 of this Reference Guide.
A copy of this book is automatically installed into a subfolder of
the installation directory called Documentation. You can also
find it online at:
http://www.watchguard.com/help/documentation/
All trademarks or trade names mentioned herein, if any, are the property of their respective owners.
ABOUT WATCHGUARD
Since 1996, WatchGuard Technologies has provided reliable, easy to manage
security appliances to hundreds of thousands of businesses worldwide. Our
Firebox X family of unified threat management (UTM) solutions provides the
best combination of strong, reliable, multi-layered security with the best ease
of use in its class. All products are backed by LiveSecurity® Service, a
ground-breaking support and maintenance program. WatchGuard is a
privately owned company, headquartered in Seattle, Washington, with offices
throughout North America, Europe, Asia Pacific, and Latin America. For
more information, please call 206.613.6600 or visit www.watchguard.com
ii
ADDRESS
505 Fifth Avenue South
Suite 500
Seattle, WA 98104
SUPPORT
www.watchguard.com/support
U.S. and Canada +877.232.3531
All Other Countries +1.206.521.3575
.
SALES
U.S. and Canada +1.800.734.9905
All Other Countries +1.206.613.0895
WatchGuard System Manager
Contents
CHAPTER 1
Internet Protocol Reference
Internet Protocol Header ...............................................................................2
IP header number list ..................................................................................3
Internet Protocol Options ..............................................................................6
Transfer Protocols ........................................................................................6
Internet Protocol (IP) sets the format of packets and the address pattern for sending data through the
Internet. It operates as a postal system, and allows you to address a package and drop it into the
system. But, there is no direct link between you and the recipient. In other words, there is no package.
Most networks mix IP with higher level protocols such as Transmission Control Protocol (TCP). TCP/IP
makes a connection between two host servers. Then, they can send messages to each other. TCP/IP
supplies the “packaging.”
Reference Guide1
Internet Protocol Header
Internet Protocol (IP) is an Internet standard that enables the sending of datagrams — packets of
information that include an address and instructions on how to send the datagram to its destination.
IP prepends a header to each datagram. The IP header contains a minimum of 12 properties, and other
optional properties.
PropertySizeDescription
Version4 bitsIP format number (Current version = 4)
IHL4 bitsHeader length in 32-bit words (Minimum = 5)
TOS8 bitsType of service sets routing priorities. It is usually not used because not many
application layers can set it.
To t_ Len16 bitsTotal length of packet measured in octets. It is used to assemble fragments.
ID16 bitsPacket ID, used to assemble fragments.
Flags3 bitsMiscellaneous flags
Frag_Off13 bitsIdentifies fragment part for this packet.
TTL8 bitsTime to live. It sets the maximum time the datagram remains alive in the system.
Protocol8 bitsIP protocol number. Indicates which of TCP, UDP, ICMP, IGMP, or other Transport
protocol is inside.
Check16 bitsChecksum for the IP header
Sour_Addr32 bitsSource IP address
Dest_Addr32 bitsDestination IP address
Options24 bitsIP Options (Present if IHL is 6)
2
WatchGuard System Manager
IP header number list
The IP Protocol header contains an 8-bit field that identifies the protocol for the transport layer for the
datagram.
KeywordNumberProtocol
0 Reserved
ICMP1 Internet Control Message
IGMP2 Internet Group Management
GGP 3 Gateway-to-Gateway
IP4 IP-within-IP (encapsulation)
ST5 Stream
TCP 6 Transmission Control Protocol
UCL 7 UCL
EGP 8 Exterior Gateway Protocol
IGP 9 Any private interior gateway
BBN-RCC-MON 10BBN RCC Monitoring
NVP-II11Network Voice Protocol
PUP 12PUP
ARGUS 13ARGUS
EMCON 14EMCON
XNET15Cross Net Debugger
CHAOS 16Chaos
UDP 17User Datagram Protocol
MUX 18Multiplexing
DCN-MEAS19DCN Measurement Subsystems
HMP 20Host Monitoring
PRM 21Packet Radio Measurement
XNS-IDP 22XEROX NS IDP
TRUNK-1 23Tr unk-1
TRUNK-2 24Tr unk-2
LEAF-125Leaf-1
LEAF-226Leaf-2
RDP 27Reliable Data Protocol
IRTP28Internet Reliable Transaction
ISO-TP4 29ISO Transport Protocol Class 4
NETBLT30Bulk Data Transfer Protocol
MFE-NSP 31MFE Network Services Protocol
MERIT-INP 32MERIT Internodal Protocol
SEP 33Sequential Exchange Protocol
3PC 34Third Party Connect Protocol
IDPR35Inter-Domain Policy Routing Protocol
Reference Guide3
KeywordNumberProtocol
XTP 36XTP
DDP 37Datagram Delivery Protocol
IDPR-CMTP 38IDPR Control Message Transport Protocol
Internet Protocol (IP) options are additions to the standard IP header that can be of different lengths.
Enabling IP options can be dangerous. Hackers can use them to create routing that helps them get
access to your network. Because most software applications make it very difficult to use IP options,
they are not frequentlyused.
There are different types of IP options:
Security
These options control the routing of IP packets that transmit sensitive data. Security options are
not frequently supported.
Stream ID (SID)
The stream ID option is not frequently supported.
Source Routing
The loose source route option and the strict source route option enable the source of an Internet
packet to give routing information. Source routing options can be very dangerous, because an
attacker could use them to masquerade as a different user. But, loose source route option and
the traceroute tool can also help debug some unusual routing problems.
Record Route
The record route option was first used to do tests on the Internet. But, record route can record
only ten IP addresses. On the current Internet, a typical connection can include 20 or 30 different
routers, making the record route optionout of date.
Time Stamp
The time stamp option measures the time for a packet to make one full cycle (source -->
destination --> source). Higher level time protocols or time stamp messages do this task better
than the time stamp option.
Transfer Protocols
The Internet Protocol (IP) includes information kept in the transport layer. The transport layer has
different protocols that tell how to transmit data between software applications: for example, UDP, TCP,
ICMP, and others.
UDP
User Datagram Protocol (UDP) is a datagram protocol that does not use connections. It is a very fast
protocol, and it does not use much bandwidth or CPU. But, you cannot trust that datagrams will get to
their destination. A software application that uses UDP must make sure that the full message gets to its
destination in the correct sequence.
Characteristics of UDP include:
•Frequently used for services that include the exchange of small quantities of data where sending
a datagram more than one time is not a problem.
•Used for services such as time synchronization in which a missing packet does not have an effect
on continued operation. Many systems using UDP send packets again at a constant rate to tell
other systems about unusual events.
•Frequently used on LANs. Because of its low system and bandwidth requirements, it gives a large
performance advantage to Network File System (NFS) services users. Network File System is a
popular TCP/IP service for supplying shared file systems over a network.
•Gives supports to broadcasts.
6
WatchGuard System Manager
Transfer Protocols
•Gives abstraction of ports. A connection is made of its source and destination ports and its
source and destination IP addresses. In typical use, port numbers less than 1024 are saved for
well-known services (destinations). The client side can use ports higher than 1023 for the source
of the connection. But, this rule has many exceptions: NFS (port 2049) and Archie (port 1525) use
server ports at numbers higher than 1024. Some services use the same source and destination
port for server to server connections. Examples include DNS (53), NTP (123), syslog (514), and RIP
(520).
TCP
Transmission Control Protocol (TCP) enables two hosts to make a connection and send streams of data
to each other. TCP makes sure that the data that is sent gets to its destination. It also makes sure that
packets are put in the same sequence as when they were sent.
TCP manages connections with properties that control the condition of a connection. Three very
important properties of TCP packets are the SYN, ACK, and FIN bits. The SYN bit is set only on the first
packet sent in each direction for a given connection. The ACK bit is set when the other side gets the
data. The FIN bit is set when the source or destination closes the connection.
ICMP
The Internet Control Message Protocol (ICMP) is used most frequently to supply error information
about other services. It operates by using the same method as UDP. That is, ICMP does not use
connections and does not make sure that packets reach their destination. One dangerous ICMP packet
is the ICMP redirect packet, which can change routing information on the devices that receive it.
Other protocols
Most traffic on the Internet uses TCP, UDP, or ICMP protocols. Some other protocols are as follows:
IGMP (Internet Group Multicast Protocol)
A protocol used by a host on multicast access networks to notify a locally attached router to
which group the router belongs.
IPIP (IP-within-IP)
An encapsulation protocol that is used to assemble virtual networks on the Internet.
GGP (Gateway-Gateway Protocol
A routing protocol that is used between different systems.
GR
A protocol used for PPTP.
ES
An encryption protocol used for IPSec.
Reference Guide7
Transfer Protocols
Standard Ports and Random Ports
UDP and TCP use encapsulation of information contained in the application layer. The software
application procedures are specified by source ad destination port numbers. These port numbers,
together with the source and destination IP addresses, supply a unique connection on the Internet.
For example, you can have two telnet sessions from one host to a different host. Because telnet uses a
well-known service port number of 23, something must be different between these two connections.
The other port in these conditions is a port that is usually larger than 1023. The operating system on
the client side assigns this port number automatically.
Random ports can cause problems if they match a well-known service on a port higher than 1023. If
some client computer assigns a random port of 2049, no connection can be made. This type of
problem frequently occurs with the X Window and Archie services.
Most operating systems assign port numbers between 1024 and 2100 so this problem does not occur
frequently.
8
WatchGuard System Manager
2
MIME Content Types
Software applications use content type headers to identify the type of data they receive. Content type
headers tell the software application how to correctly identify and display video clips, images, sound,
or other data. Usually, people are most familiar with the MIME content types used in email.
Some of the available proxy policies in your Firebox configuration can use content type headers to
determine whether to allow or deny traffic. This chapter contains a list of many common MIME content
types for your reference.
New, registered MIME content types appear regularly. We recommend frequent checks of an online
source for the most current list. One source of current MIME types is:
www.iana.org/assignments/media-types/
Note that software applications can use incorrect content types, or content types that are not
registered.
applicationvnd.japannet-jpnstore-wakeupYo s hi ta k e
applicationvnd.japannet-payment-wakeupFujii
applicationvnd.japannet-registrationYo sh it ak e
applicationvnd.japannet-registration-wakeupFujii
applicationvnd.japannet-setstore-wakeupYo sh it a ke
applicationvnd.japannet-verificationYo sh it a ke
applicationvnd.japannet-verification-wakeupFujii
applicationvnd.loanCole
applicationvnd.lotus-1-2-3Wattenberger
applicationvnd.lotus-approachWattenberger
applicationvnd.lotus-freelanceWattenberger
applicationvnd.lotus-organizerWattenberger
applicationvnd.lotus-screencamWattenberger
applicationvnd.lotus-wordproWattenberger
applicationvnd.meridian-slingshotWedel
applicationvnd.mifWexler
applicationvnd.minisoft-hp3000-saveBartram
applicationvnd.mitsubishi.misty-guard.trustwebTan ak a
applicationvnd.ms-artgalrySlawson
applicationvnd.ms-asfFleischman
applicationvnd.ms-powerpointGill
applicationvnd.ms-projectGill
applicationvnd.ms-tnefGill
applicationvnd.ms-worksGill
applicationvnd.ms.wms-hrd.asfv1Gill
applicationvnd.music-niffButler
applicationvnd.musicianAdams
applicationvnd.netfpxMutz
applicationvnd.noblenet-directorySolomon
applicationvnd.noblenet-sealerSolomon
applicationvnd.noblenet-webSolomon
applicationvnd.novadigm.EDMSwenson
applicationvnd.novadigm.EDXSwenson
applicationvnd.novadigm.EXTSwenson
12
WatchGuard System Manager
Typ eSubtypeReference (where available)
applicationvnd.osa.netdeployKlos
applicationvnd.powerbuilder6Guy
applicationvnd.powerbuilder6-sGuy
applicationvnd.publishare-delta-treeBen-Kiki
applicationvnd.rapidSzekely
applicationvnd.rn-realplayer
applicationvnd.seemailWebb
applicationvnd.shana.informed.formdataSelzler
applicationvnd.shana.informed.formtemplateSelzler
applicationvnd.shana.informed.interchangeSelzler
applicationvnd.shana.informed.packageSelzler
applicationvnd.street-streamLevitt
applicationvnd.svdBecker
applicationvnd.swiftview-icsWidener
applicationvnd.truedocChace
applicationvnd.uplanet.alertMartin
applicationvnd.uplanet.alert-wbxmlMartin
applicationvnd.uplanet.bearer-choi-wbxmlMartin
applicationvnd.uplanet.bearer-choiceMartin
applicationvnd.uplanet.cacheopMartin
applicationvnd.uplanet.cacheop-wbxmlMartin
applicationvnd.uplanet.channelMartin
applicationvnd.uplanet.channel-wbxmlMartin
applicationvnd.uplanet.listMartin
applicationvnd.uplanet.list-wbxmlMartin
applicationvnd.uplanet.listcmdMartin
applicationvnd.uplanet.listcmd-wbxmlMartin
applicationvnd.uplanet.signalMartin
applicationvnd.visioSandal
applicationvnd.webturboRehem
applicationvnd.wrq-hp3000-labelledBartram
applicationvnd.wt.stfWohler
applicationvnd.xaraMatthewman
applicationvnd.yellowriver-custom-menuYello
applicationvnd.wita
applicationvnd.workperfect5.1
applicationwrite
applicationx-alpha-form
applicationx-asap
Reference Guide13
Typ eSubtypeReference (where available)
applicationx-bcpio
applicationx-chat
applicationx-cpio
applicationx-sch
applicationx-cu-seemee
applicationx-demoshield
applicationx-director
applicationx-dvi
applicationx-framemaker
applicationx-gtar
applicationx-ica
applicationx-installshield
applicationx-javascript
applicationx-koan
applicationx-latex
applicationx-mif
applicationx-msaddr
applicationx-mms-framed
applicationx-mswallet
applicationx-net-install
applicationx-nokia-9000-add-on-software
applicationx-ns-proxy-autoconfig
applicationx-oleobject
applicationx-olescript
applicationx-p3d
applicationx-pcn
applicationx-pdf
applicationx-perl
applicationx-pn-realaudio
applicationx-pn-realmedia
applicationx-pointplus
applicationx-rad-powermedia
applicationx-sh
applicationx-shar
applicationx-shockwave-flash
applicationx-sprite
applicationx-stuffit
applicationx-tar
applicationx-tcl
14
WatchGuard System Manager
Typ eSubtypeReference (where available)
applicationx-tex
applicationx-texinfo
applicationx-troff
applicationx-troff-man
applicationx-troff-me
applicationx-troff-ms
applicationx-ustar
applicationx-wais-source
applicationx-watchguard-cloaked
applicationx-webbasic
applicationx-wintalk
applicationx-wls
applicationx-wms-LogStats
applicationx400-bp
applicationxmlRFC 3023
applicationzipLindner
audio*
audio32kadpcmRFC 2421, RFC 2422
audiobasicRFC 2045, RFC 2046
audioechospeech
audiovnd.qcelp
audiovoxware
audiox-aiff
audiox-mpeg
audiox-mpeg-2
audiox-wav
chemical*
chemicalx-cdx
chemicalx-cif
chemicalx-chem3d
chemicalx-cmdf
chemicalx-cml
chemicalx-daylight-smiles
chemicalx-csml
chemicalx-galactic-spc
chemicalx-gaussian-input
chemicalx-gaussian-cube
Reference Guide15
Typ eSubtypeReference (where available)
chemicalx-isostar
chemicalx-jcamp-dx
chemicalx-kinemage
chemicalx-mdl-molfile
chemicalx-mdl-rxnfile
chemicalx-macmolecule
chemicalx-macromode1-input
chemicalx-mopac-input
chemicalx-pdb
chemicalx-xyz
chemicalx-vmd
drawing*
drawingx-dwf
graphics*
graphicsx-inventor
image*
imagecgmFrancis
imagefif
imageg3fax
imagegifRFC 2045, RFC 2046
imageiefRFC 1314
imagejpegRFC 2045, RFC 2046
imagenaplpsFerber
imagepngRanders-Pehrson
imageprs.btifSimon
imagetiff
imagevnd.dwgMoline
imagevnd.dxfMoline
imagevnd.fastbidsheetBecker
imagevnd.fpxSpencer
imagevnd.net-fpxSpencer
imagevnd.svfMoline
imagevnd.xiffS. Martin
imagewavelet
imagex-cals
imagex-cmu-raster
16
WatchGuard System Manager
Typ eSubtypeReference (where available)
imagex-cmx
imagex-dwg
imagex-dxf
imagex-mgx-dsf
imagex-ms-bmp
imagex-photo-cd
imagex-pict
imagex-png
imagex-portable-anymap
imagex-portable-bitmap
imagex-portable-graymap
imagex-portable-pixmap
imagex-rgb
imagex-svf
imagex-xbitmap
imagex-xwindowdump
imagexpm
message*
messagedelivery-statusRFC 1894
messagedisposition-notificationRFC 2298
messageexternal-bodyRFC 2045, RFC 2046
messagehttpRFC 2616
messagenewsRFC 1036, H. Spencer
messagepartialRFC 2045, RFC 2046
messagerfc822RFC 2045, RFC 2046
model*
modeligesParks
modelmeshRFC 2077
modelvnd.dwfPratt
modelvrmlRFC 2077
multipart*
multipartalternativeRFC 2045, RFC 2046
multipartappledoubleFals trom
multipartbyterangesRFC 2068
multipartdigestRFC 2045, RFC 2046
multipartencryptedRFC 1847
Reference Guide17
Typ eSubtypeReference (where available)
multipartform-dataRFC 2388
multipartheader-setCrocker
multipartmixedRFC 2045, RFC 2046
multipartparallelRFC 2045, RFC 2046
multipartrelatedRFC 2387
multipartreportRFC 1982
multipartsignedRFC 1847
multipartvoice-messageRFC 2421, RFC 2423
text*
textcssRFC 2318
textenrichedRFC 1896
texthtmlRFC 2854
textjavascript
textplainRFC 2046, RFC 3676
textrichtextRFC 2045, RFC 2046
textsgmlRFC 1874
texttab-separated-valuesLindner
texturi-listRFC 2483
textvbscript
textvnd.abcAllen
textvnd.fmiflexstorHurtta
textvnd.in3d.3dmlPowers
textvnd.in3d.spotPowers
textvnd.latex-zLubos
textx-setext
textx-speech
textxmlRFC 3023
video*
videompegRFC 2045, RFC 2046
videompeg-2
videoquicktimeLindner
videovdo
videovivoWolfe
videovnd.motorola.videoMcGinty
videovnd.motorola.videopMcGinty
videovnd.vivo
videox-ms-asf
18
WatchGuard System Manager
Typ eSubtypeReference (where available)
videox-msvideo
videox-sgi-movie
workbook*
workbookformulaone
x-conferencex-cooltalk
x-formx-openscape
x-modelx-mesh
x-musicx-midi
x-scriptx-wfxclient
x-world*
x-worldx-3dmf
x-worldx-svr
x-worldx-vream
x-worldx-vrml
x-worldx-vrt
x-worldx-wvr
Reference Guide19
20
WatchGuard System Manager
3
Services and Ports
Well-known services are a mixture of port number and transport protocol for specified, standard
software applications. This chapter contains tables that list service names, port number, protocol, and
description.
Ports Used by WSM and Fireware
The WatchGuard Firebox, management station, and WatchGuard servers use specified ports during
usual operations.
Port #ProtocolPurpose
4100TCPAuthentication service
4107
4115
4103
4105
4117
4118
4110
4112
4113
4109TCPSecure access to SOHO and Edge Fireboxes with a
5003TCP and UDPWebBlocker
TCPWatchGuard Log Server
TCPWatchGuard Firebox configuration and
management
TCPWatchGuard Management Server
web browser
Reference Guide21
Ports Used by Microsoft Products
Ports Used by Microsoft Products
Many Firebox users want to create policies that specifically allow or block Microsoft applications. Here
is a list of ports used by some Microsoft products.
Port #ProtocolPurpose
137, 138UDPBrowsing
67, 68UDPDHCP Lease
135TCPDHCP Manager
138
139
135TCPDNS Administration
53UDPDNS Resolution
139TCPEvent Viewer
139TCPFile Sharing
137, 138
139
138UDPNetLogon
137, 138
139
139TCPPerformance Monitor
1723
47
137, 138
139
139TCPRegistry Editor
139TCPServer Manager
137, 138
139
139TCPUser Manager
139TCPWinNT Diagnostics
137, 138
139
42TCPWINS Replication
135TCPWINS Manager
137TCPWINS Registration
UDP
TCP
UDP
TCP
UDP
TCP
TCP
IP
UDP
TCP
UDP
TCP
UDP
TCP
Directory Replication
Logon Sequence
Pass Through Validation
PPTP
Printing
Tru sts
WinNT Secure Channel
Port(s)ProtocolPurpose
135TCPClient/Server Communications
135TCPExchange Administrator
143TCPIMAP
993TCPIMAP (SSL)
389TCPLDAP
22
WatchGuard System Manager
Loading...
+ 130 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.