To use this guide you need to be familiar with your computer’s
operating system. If you have questions about navigating in your
computer’s environment, please refer to your system user manual.
The following conventions are used in this guide.
ConventionIndication
Bold typeMenu commands, dialog box options, Web page
NOTEImportant information, a helpful tip or additional
options, Web page names. For example: “On the
System Information page, select Disabled.”
instructions.
iiWatchGuard Firebox SOHO 6 Wireless
Page 3
Abbreviations used in this user guide
3DESTriple Data Encryption Standard
DESData Encryption Standard
DNSDomain Name Service
DHCPDynamic Host Control Protocol
DSLDigital Subscriber Line
IPInternet Protocol
IPSecInternet Protocol Security
ISDNIntegrated Services Digital Network
ISPInternet Service Provider
MACMedia Access Control
MUVPNMobile User Virtual Private Network
NATNetwork Address Translation
PPPPoint-to-Point Protocol
PPPoEPoint-to-Point Protocol over Ethernet
TCPTransfer Control Protocol
UDPUser Datagram Protocol
URLUniversal Resource Locator
VPNVirtual Private Network
WANWide Area Network
WSEPWatchGuard Security Event Processor
User Guideiii
Page 4
Certifications and Notices
FCC Certification
This appliance has been tested and found to comply with limits for
a Class A digital appliance, pursuant to Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
•This appliance may not cause harmful interference.
•This appliance must accept any interference received,
including interference that may cause undesired operation.
IMPORANT NOTICE: Changes or modifications not expressly
approved by the party responsible for compliance could void the
user's authority to operate the equipment.
This equipment has been tested and found to comply with the
limits for a Class A digital device, pursuant to Part 15 of the FCC
Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a
commercial environment. This equipment generates, uses, and can
radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment
in a residential area is likely to cause harmful interference in which
case the user will be required to correct the interference at his own
expense.
ivWatchGuard Firebox SOHO 6 Wireless
Page 5
CE Notice
The CE symbol on your WatchGuard Technologies equipment
indicates that it is in compliance with the Electromagnetic
Compatibility (EMC) directive and the Low Voltage Directive
(LVD) of the European Union (EU).
Industry Canada
This Class A digital apparatus meets all requirements of the
Canadian Interference-Causing Equipment Regulations.
Cet appareil numerique de la classe A respecte toutes les exigences
du Reglement sur le materiel broulleur du Canada.
CANADA RSS-210
The term “IC:” before the radio certification number only signifies
that Industry of Canada technical specifications were met.
Operation is subject to the following two conditions:
• This device may not cause interference.
• This device must accept any interference, including
interference that may cause undesired operation of the
device.
IMPORTANT - READ CAREFULLY BEFORE ACCESSING WATCHGUARD SOFTWARE
This WatchGuard SOHO Software End-User License Agreement
("EULA") is a legal agreement between you (either an individual or a single
entity) and WatchGuard Technologies, Inc. ("WATCHGUARD") for the
WATCHGUARD SOHO software product, which includes computer
software (whether installed separately on a computer workstation or on the WatchGuard hardware
product) and may include associated media, printed materials, and on-line
or electronic documentation, and any updates or modifications thereto, including those received
through the WatchGuard LiveSecurity service (or its equivalent) (the "SOFTWARE PRODUCT").
WATCHGUARD is willing
to license the SOFTWARE PRODUCT to you only on the condition that you
accept all of the terms contained in this EULA. Please read this EULA
carefully.
By installing or using the SOFTWARE PRODUCT you agree to be bound by
the terms of this EULA. If you do not agree to the terms of this EULA,
WATCHGUARD will not license the SOFTWARE PRODUCT to you, and you will
not have any rights in the SOFTWARE PRODUCT. In that case, promptly
return the SOFTWARE PRODUCT, along with proof of payment, to the
authorized dealer from whom you obtained the SOFTWARE PRODUCT for a full
refund of the price you paid.
1. Ownership and License.
The SOFTWARE PRODUCT is protected by copyright laws and international
copyright treaties, as well as other intellectual property laws and
treaties. This is a license agreement and NOT an agreement for sale.
All title and copyrights in and to the SOFTWARE PRODUCT (including but
not limited to any images, photographs, animations, video, audio, music,
text, and applets incorporated into the SOFTWARE PRODUCT), the accompanying
printed materials, and any copies of the SOFTWARE PRODUCT are owned by
WATCHGUARD or its licensors. Your rights to use the SOFTWARE PRODUCT are
as specified in this EULA, and WATCHGUARD retains all rights not expressly
granted to you in this EULA. Nothing in this EULA constitutes a waiver
of our rights under U.S. copyright law or any other law or treaty.
2. Permitted Uses.
You are granted the following rights to the SOFTWARE PRODUCT:
(A) You may use the SOFTWARE PRODUCT solely for the purpose of operating
the SOHO hardware product in accordance with the SOHO or user documentation.
viiiWatchGuard Firebox SOHO 6 Wireless
Page 9
If you are accessing the SOFTWARE PRODUCT via a Web based installer program,
you are granted the following additional rights to the SOFTWARE PRODUCT:
(A) You may install and use the SOFTWARE PRODUCT on any computer with an associated
connection to the SOHO hardware product
in
accordance with the SOHO user documentation;
(B) You may install and use the SOFTWARE PRODUCT on more than one computer
at once without licensing an additional copy of the SOFTWARE PRODUCT for each
additional computer on which you want to use it, provided that each computer on which you install
the SOFTWARE PRODUCT has an associated connection to the same SOHO hardware product
; and
(C) You may make a single copy of the SOFTWARE PRODUCT for backup or
archival purposes only.
3. Prohibited Uses.
You may not, without express written permission from WATCHGUARD:
(A) Reverse engineer, disassemble or decompile the SOFTWARE PRODUCT;
(B) Use, copy, modify, merge or transfer copies of the SOFTWARE PRODUCT or
printed materials except as provided in this EULA;
(C) Use any backup or archival copy of the SOFTWARE PRODUCT (or allow someone
else to use such a copy) for any purpose other than to replace the original
copy in the event it is destroyed or becomes defective;
(D) Sublicense, lend, lease or rent the SOFTWARE PRODUCT; or
(E) Transfer this license to another party unless
(i) the transfer is permanent,
(ii) the third party recipient agrees to the terms of this EULA, and
(iii) you do not retain any copies of the SOFTWARE PRODUCT.
4. Limited Warranty.
WATCHGUARD makes the following limited warranties for a period of ninety (90)
days from the date you obtained the SOFTWARE PRODUCT from WATCHGUARD or an
authorized dealer;
(A) Media. The disks and documentation will be free from defects in materials
and workmanship under normal use. If the disks or documentation fail to
conform to this warranty, you may, as your sole and exclusive remedy,
obtain a replacement free of charge if you return the defective disk or
documentation to us with a dated proof of purchase; and
(B) SOFTWARE PRODUCT. The SOFTWARE PRODUCT will materially conform to the
documentation that accompanies it. If the SOFTWARE PRODUCT fails to
operate in accordance with this warranty, you may, as your sole and
exclusive remedy, return all of the SOFTWARE PRODUCT and the documentation
to the authorized dealer from whom you obtained it, along with a dated
proof of purchase, specifying the problems, and they will provide you
with a new version of the SOFTWARE PRODUCT or a full refund at their
User Guideix
Page 10
election.
Disclaimer and Release.
THE WARRANTIES, OBLIGATIONS AND LIABILITIES OF WATCHGUARD, AND
YOUR REMEDIES, SET FORTH IN PARAGRAPHS 4, 4(A) AND 4(B) ABOVE
ARE EXCLUSIVE AND IN SUBSTITUTION FOR, AND YOU HEREBY WAIVE,
DISCLAIM AND RELEASE ANY AND ALL OTHER WARRANTIES, OBLIGATIONS
AND LIABILITIES OF WATCHGUARD AND ITS LICENSORS AND ALL OTHER RIGHTS,
CLAIMS AND
REMEDIES YOU MAY HAVE AGAINST WATCHGUARD AND ITS LICENSORS, EXPRESS
OR IMPLIED,
ARISING BY LAW OR OTHERWISE, WITH RESPECT TO ANY NONCONFORMANCE
OR DEFECT IN THE SOFTWARE PRODUCT (INCLUDING, BUT NOT LIMITED
TO, ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE, ANY IMPLIED WARRANTY ARISING FROM COURSE OF
PERFORMANCE, COURSE OF DEALING, OR USAGE OF TRADE, ANY WARRANTY
OF NONINFRINGEMENT, ANY WARRANTY THAT THIS SOFTWARE PRODUCT WILL
MEET YOUR REQUIREMENTS, ANY WARRANTY OF UNINTERRUPTED OR
ERROR-FREE OPERATION, ANY OBLIGATION, LIABILITY, RIGHT, CLAIM OR
REMEDY IN TORT, WHETHER OR NOT ARISING FROM THE NEGLIGENCE
(WHETHER ACTIVE, PASSIVE OR IMPUTED) OR FAULT OF WATCHGUARD AND
ANY OBLIGATION, LIABILITY, RIGHT, CLAIM OR REMEDY FOR LOSS OR
DAMAGE TO, OR CAUSED BY OR CONTRIBUTED TO BY, THE SOFTWARE
PRODUCT).
Limitation of Liability.
WATCHGUARD'S LIABILITY (WHETHER IN CONTRACT, TORT, OR OTHERWISE;
AND NOTWITHSTANDING ANY FAULT, NEGLIGENCE, STRICT LIABILITY OR
PRODUCT LIABILITY) WITH REGARD TO THE SOFTWARE PRODUCT WILL IN
NO EVENT EXCEED THE PURCHASE PRICE PAID BY YOU FOR SUCH PRODUCT. THIS
WILL BE TRUE EVEN IN THE EVENT OF THE FAILURE OF AN AGREED REMEDY.
IN NO EVENT WILL WATCHGUARD BE LIABLE TO YOU OR ANY THIRD PARTY,
WHETHER ARISING IN CONTRACT (INCLUDING WARRANTY), TORT
(INCLUDING ACTIVE, PASSIVE OR IMPUTED NEGLIGENCE AND STRICT
LIABILITY AND FAULT), FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR
CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOSS OF
BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS
INFORMATION) ARISING OUT OF OR IN CONNECTION WITH THIS WARRANTY
OR THE USE OF OR INABILITY TO USE THE SOFTWARE PRODUCT, EVEN IF
WATCHGUARD HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS
WILL BE TRUE EVEN IN THE EVENT OF THE FAILURE OF AN AGREED REMEDY.
5. United States Government Restricted Rights.
The enclosed SOFTWARE PRODUCT and documentation are provided with
xWatchGuard Firebox SOHO 6 Wireless
Page 11
Restricted Rights. Use, duplication or disclosure by the U.S Government
or any agency or instr umentality thereof is subject to restrictions as
set forth in subdivision (c)(1)(ii) of the Rights in Technical Data and
Computer Software clause at DFARS 252.227-7013, or in subdivision (c)(1)
and (2) of the Commercial Computer Software -- Restricted Rights
Clause at 48 C.F.R. 52.227-19, as applicable. Manufacturer is WatchGuard
Technologies, Incorporated, 505 5th Ave. South, Suite 500,Seattle,
WA 98104.
6. Export Controls.
You agree not to directly or indirectly transfer the SOFTWARE PRODUCT or
documentation to any countr y to which such transfer would be prohibited
by the U.S. Export Administration Act and the regulations issued thereunder.
7. Termination.
This license and your right to use the SOFTWARE PRODUCT will automatically
terminate if you fail to comply with any provisions of this EULA, destroy
all copies of the SOFTWARE PRODUCT in your possession, or voluntarily return
the SOFTWARE PRODUCT to WATCHGUARD. Upon termination you will destroy all
copies of the SOFTWARE PRODUCT and documentation remaining in your control
or possession.
8. Miscellaneous Provisions. This EULA will be governed by and construed
in accordance with the substantive laws of Washington excluding the 1980
United National Convention on Contracts for the International Sale of Goods,
as amended. This is the entire EUL A between us relating to the contents of
this package, and supersedes any prior purchase order, communications,
advertising or representations concerning the SOFTWARE PRODUCT
AND BY USING THE SOFTWARE PRODUCT YOU AGREE TO THESE TERMS. IF THE
SOFTWARE PRODUCT IS BEING USED BY AN ENTITY, THE INDIVIDUAL INDICATING
AGREEMENT TO THESE TERMS REPRESENTS AND WARRANTS THAT (A) SUCH
INDIVIDUAL IS DULY AUTHORIZED TO ACCEPT THIS EULA ON BEHALF OF THE ENTITY
AND TO BIND THE ENTITY TO THE TERMS OF THIS EULA; (B) THE ENTITY HAS THE
FULL POWER, CORPORATE OR OTHERWISE, TO ENTER INTO THIS EULA AND PERFORM
ITS OBLIGATIONS UNDER THIS EULA AND; (C) THIS EULA AND THE PERFORMANCE OF
THE ENTITY’S OBLIGATIONS UNDER THIS EULA DO NOT VIOLATE ANY THIRD-PARTY
AGREEMENT TO WHICH THE ENTITY IS A PARTY.
No change or modification of this EULA will be valid unless it is in
writing, and is signed by WATCHGUARD.
User Guidexi
Page 12
Notice to Users
Information in this guide is subject to change without notice. Companies, names, and data used in
examples herein are fictitious unless otherwise noted. No part of this guide may be reproduced or
transmitted in any form or by any means, electronic or mechanical, for any purpose, without the
express written permission of WatchGuard Technologies, Inc.
Microsoft®, Internet Explorer®, Windows® 95, Windows® 98, Windows NT® and Windows®
2000 are either registered trademarks or trademarks of Microsoft Corporation in the United
States and/or other countries.
Netscape and Netscape Navigator are registered trademarks of Netscape Communications
Corporation in the United States and other countries.
RealNetworks, RealAudio, and RealVideo are either a registered trademark or trademark of
RealNetworks, Inc. in the United States and/or other countries.
Java and all Jave-based marks are trademarks or registered trademarks of Sun Microsystems,
Inc. in the United States and other countries. All right reserved.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment: "This product includes software developed by the OpenSSL Project for use in the
OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote
products derived from this software without prior written permission. For written permission,
please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in
their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This
product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http:/
/www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com). This product includes software written by Tim
Hudson (tjh@cryptsoft.com).
and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgement: "This product includes cryptographic software written by Eric Young
(eay@cryptsof t.com)" The word 'cryptographic' can be left out if the routines from the library
being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory
(application code) you must include an acknowledgement: "This product includes software written
by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publicly available version or derivative of this code
cannot be changed. i.e. this code cannot simply be copied and put under another distribution
licence [including the GNU Public Licence.]
The mod_ssl package falls under the Open-Source Software label because it's distributed under a
BSD-style license. The detailed license information follows.
Copyright (c) 1998-2001 Ralf S. Engelschall. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment:
"This product includes software developed by Ralf S. Engelschall <rse@engelschall.com> for use
in the mod_ssl project (http://www.modssl.org/)."
xivWatchGuard Firebox SOHO 6 Wireless
Page 15
4. The names "mod_ssl" must not be used to endorse or promote products derived from this
software without prior written permission. For written permission, please contact
rse@engelschall.com.
5. Products derived from this software may not be called "mod_ssl" nor may "mod_ssl" appear in
their names without prior written permission of Ralf S. Engelschall.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This
product includes software developed by Ralf S. Engelschall <rse@engelschall.com> for use in the
mod_ssl project (http://www.modssl.org/)."
THIS SOFTWARE IS PROVIDED BY RALF S. ENGELSCHALL ``AS IS'' AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL RALF S. ENGELSCHALL OR HIS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The Apache Software License, Version 1.1
Copyright (c) 2000 The Apache Software Foundation. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. The end-user documentation included with the redistribution, if any, must include the following
acknowledgment:
"This product includes software developed by the Apache Software Foundation (http://
www.apache.org/)." Alternately, this acknowledgment may appear in the software itself, if and
wherever such third-party acknowledgments normally appear.
4. The names "Apache" and "Apache Software Foundation" must not be used to endorse or promote
products derived from this software without prior written permission. For written permission,
please contact apache@apache.org.
User Guidexv
Page 16
5. Products derived from this software may not be called "Apache", nor may "Apache" appear in
their name, without prior written permission of the Apache Software Foundation.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
This software consists of voluntary contributions made by many individuals on behalf of the
Apache Software Foundation. For more information on the Apache Software Foundation, please
see <http://www.apache.org/>.
Portions of this software are based upon public domain software originally written at the National
Center for Supercomputing Applications, University of Illinois, Urbana-Champaign.
All other trademarks or trade names mentioned herein, if any, are the property of their respective
owners.
Limited Hardware Warranty
This Limited Hardware Warranty (the “Warranty”) applies to the enclosed WatchGuard hardware
product (the “Product”), not including any associated software which is licensed pursuant to a
separate end-user license agreement and warranty. BY USING THE PRODUCT, YOU AGREE TO
THE TERMS HEREOF. If you do not agree to these terms, please return this package, along with
proof of purchase, to the authorized dealer from which you purchased it for a full refund.
WatchGuard Technologies, Inc. (”WatchGuard”) and you agree as follows:
1. Limited Warranty. WatchGuard warrants that upon delivery and for one (1) year thereafter (the
“Warranty Period”): (a) the Product will be free from material defects in materials and
workmanship, and (b) the Product, when properly installed and used for its intended purpose and
in its intended operating environment, will perform substantially in accordance with WatchGuard
applicable specifications.
This warranty does not apply to any Product that has been: (i) altered, repaired or modified by any
party other than WatchGuard; or (ii) damaged or destroyed by accidents, power spikes or similar
events or by any intentional, reckless or negligent acts or omissions of any party. You may have
additional warranties with respect to the Product from the manufacturers of Product components.
However, you agree not to look to WatchGuard for, and hereby release WatchGuard from any
xviWatchGuard Firebox SOHO 6 Wireless
Page 17
liability for, performance of, enforcement of, or damages or other relief on account of, any such
warranties or any breach thereof.
2. Remedies. If any Product does not comply with the WatchGuard warranties set forth in Section
1 above, WatchGuard will, at its option, either (a) repair the Product, or (b) replace the Product;
provided, that you will be responsible for returning the Product to the place of purchase and for all
costs of shipping and handling. Repair or replacement of the Product shall not extend the
Warranty Period. Any Product, component, part or other item replaced by WatchGuard becomes
the property of WatchGuard . WatchGuard shall not be responsible for return of or damage to any
software, firmware, information or data contained in, stored on, or integrated with any returned
Products.
3. Disclaimer and Release. THE WARRANTIES, OBLIGATIONS AND LIABILITIES OF
WATCHGUARD, AND YOUR REMEDIES, SET FORTH IN PARAGRAPHS 1 AND 2 ABOVE
ARE EXCLUSIVE AND IN SUBSTITUTION FOR, AND YOU HEREBY WAIVE, DISCLAIM
AND RELEASE ANY AND ALL OTHER WARRANTIES, OBLIGATIONS AND LIABILITIES OF
WATCHGUARD AND ALL OTHER RIGHTS, CLAIMS AND REMEDIES YOU MAY HAVE
AGAINST WATCHGUARD, EXPRESS OR IMPLIED, ARISING BY LAW OR OTHERWISE,
WITH RESPECT TO ANY NONCONFORMANCE OR DEFECT IN THE PRODUCT
(INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED WARRANTY OF MERCHANTABILITY
OR FITNESS FOR A PARTICULAR PURPOSE, ANY IMPLIED WARRANTY ARISING FROM
COURSE OF PERFORMANCE, COURSE OF DEALING, OR USAGE OF TRADE, ANY
WARRANTY OF NONINFRINGEMENT, ANY WARRANTY OF UNINTERRUPTED OR ERRORFREE OPERATION, ANY OBLIGATION, LIABILITY, RIGHT, CLAIM OR REMEDY IN TORT,
WHETHER OR NOT ARISING FROM THE NEGLIGENCE (WHETHER ACTIVE, PASSIVE OR
IMPUTED) OR FAULT OF WATCHGUARD OR FROM PRODUCT LIABILITY, STRICT
LIABILITY OR OTHER THEORY, AND ANY OBLIGATION, LIABILITY, RIGHT, CLAIM OR
REMEDY FOR LOSS OR DAMAGE TO, OR CAUSED BY OR CONTRIBUTED TO BY,THE
PRODUCT).
4. Limitation of Liability. WATCHGUARD TECHNOLOGIES’ LIABILITY (WHETHER ARISING
IN CONTRACT (INCLUDING WARRANTY), TORT (INCLUDING ACTIVE, PASSIVE OR
IMPUTED NEGLIGENCE AND STRICT LIABILITY AND FAULT) OR OTHER THEORY) WITH
REGARD TO ANY PRODUCT WILL IN NO EVENT EXCEED THE PURCHASE PRICE PAID
BY YOU FOR SUCH PRODUCT. THIS SHALL BE TRUE EVEN IN THE EVENT OF THE
FAILURE OF ANY AGREED REMEDY. IN NO EVENT WILL WATCHGUARD
TECHNOLOGIES BE LIABLE TO YOU OR ANY THIRD PARTY (WHETHER ARISING IN
CONTRACT (INCLUDING WARRANTY), TORT (INCLUDING ACTIVE, PASSIVE OR
IMPUTED NEGLIGENCE AND STRICT LIABILITY AND FAULT) OR OTHER THEORY) FOR
COST OF COVER OR FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES (INCLUDING WITHOUT LIMITATION LOSS OF PROFITS, BUSINESS, OR DATA)
ARISING OUT OF OR IN CONNECTION WITH THIS WARRANTY OR THE USE OF OR
INABILITY TO USE THE PRODUCT, EVEN IF WATCHGUARD TECHNOLOGIES HAS BEEN
User Guidexvii
Page 18
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS SHALL BE TRUE EVEN IN
THE EVENT OF THE FAILURE OF ANY AGREED REMEDY.
5. Miscellaneous Provisions. This Warranty will be governed by the laws of the state of
Washington, U.S.A., without reference to its choice of law rules. The provisions of the 1980
United Nations Convention on Contracts for the International Sales of Goods, as amended, shall
not apply. You agree not to directly or indirectly transfer the Product or associated documentation
to any country to which such transfer would be prohibited by the U.S. Export laws and regulations.
If any provision of this Warranty is found to be invalid or unenforceable, then the remainder shall
have full force and effect and the invalid provision shall be modified or partially enforced to the
maximum extent permitted by law to effectuate the purpose of this Warranty. This is the entire
agreement between WatchGuard and you relating to the Product, and supersedes any prior
purchase order, communications, advertising or representations concerning the Product AND BY
USING THE PRODUCT YOU AGREE TO THESE TERMS. No change or modification of this
Agreement will be valid unless it is in writing, and is signed by WatchGuard.
Software Version Number: 6.2
Part No 1230-000
Online documentation and FAQs.........................180
Special notices......................................................180
Index ................................................................. 181
xxWatchGuard Firebox SOHO 6 Wireless
Page 23
CHAPTER 1Introduction
This manual shows how to use your WatchGuard® Firebox®
SOHO 6 Wireless or SOHO 6tc Wireless security appliance for
secure access to the Internet.
User Guide 1
Page 24
The only difference between these two appliances is the VPN
feature. VPN is available as an upgrade option for the SOHO 6
Wireless. The SOHO 6tc Wireless includes the VPN upgrade
option.
The SOHO 6 Wireless provides security and wireless networking
when your computer is connected to the Internet with a highspeed cable modem, DSL modem, leased line, or ISDN.
The newest installation and user information is available from the
WatchGuard Web site:
http://support.watchguard.com/sohoresources/
Package contents
Make sure that the package contains all of these items:
• SOHO 6 Wireless QuickStart Guide
• Wireless User Guide
• LiveSecurity Service
• Hardware Warranty card
• AC adapter (12 V, 1.2 A)
®
activation card
• Straight-through Ethernet cable
• SOHO 6 Wireless security appliance
• Two 5dBi detachable antennae
How does a firewall work?
The Internet connects your network to resources. Some examples
of resources are the World Wide Web, email and video/audio
2WatchGuard Firebox SOHO 6 Wireless
Page 25
How does a firewall work?
conferencing. A connection to the Internet is dangerous to the
privacy and the security of your network. A firewall divides your
internal network from the Internet to reduce this danger. The
appliances on the trusted side of your SOHO 6 Wireless firewall
are protected. The illustration below shows how the SOHO 6
Wireless physically divides your trusted network from the
Internet.
The SOHO 6 Wireless controls all traffic between the external
network (the Internet) and the trusted network (your computers).
All suspicious traffic is stopped. The rules and policies that
identify the suspicious traffic are shown in “Configure incoming
and outgoing services” on page 71.
User Guide3
Page 26
How does information travel on the Internet?
The data that is sent through the Internet is divided into packets.
To make sure that the packets are received at the destination,
information is added to the packets. The protocols for these tasks
are called TCP and IP. TCP disassembles and reassembles the data,
for example an email message or a program file. IP adds
information to the packets, which includes the destination and the
handling requirements.
IP addresses
An IP address identifies a computer on the Internet that sends and
receives packets. Each computer on the Internet has an address.
The SOHO 6 Wireless is also a computer and has an IP address.
When you configure a service behind a firewall, you must include
the trusted network IP address for the computer that supplies the
service.
A URL (Uniform Resource Locator) identifies each IP address on
the Internet. An example of a URL is:
http://www.watchguard.com/.
Protocols
A protocol defines how a packet is assembled and transmitted
through a network. The most frequently used protocols are TCP
and UDP (User Datagram Protocol). There are other IP protocols
that are less frequently used.
Port numbers
During the communication between computers, port numbers
identify which programs or applications are connected.
4WatchGuard Firebox SOHO 6 Wireless
Page 27
How does the SOHO 6 Wireless process information?
How does the SOHO 6 Wireless process
information?
Services
A service is the group of protocols and port numbers for a
specified program or type of application. The standard
configuration of the SOHO 6 Wireless contains the correct settings
for many standard services.
Network Address Translation
All connections from the trusted network to the external network
through a SOHO 6 Wireless use dynamic NAT. Dynamic NAT
prevents that private IP addresses from your trusted network are
sent through the Internet.
The SOHO 6 Wireless replaces the private IP addresses with the
public IP address to protect the trusted network. Each packet sent
through the Internet contains IP address information. Packets sent
through the SOHO 6 Wireless with Dynamic NAT include only the
public IP address of the SOHO 6 Wireless and not the private IP
address of the computer in the trusted network. Because only the
IP address of the SOHO 6 Wireless is sent to the external network,
unauthorized access by the computers in the public network to the
computers in the trusted network is prevented.
How Does Wireless Networking Work?
Wireless networking creates a network by transmitting and
receiving data as radio-frequency signals between your computers
and the SOHO 6 Wireless using the 802.11b standard defined by
User Guide5
Page 28
the Institute of Electrical and Electronics Engineers (IEEE) and is
part of a series of wireless standards.
Unless adequately protected, a wireless network is susceptible to
access from the outside by unauthorized users to compromise your
machine or simply to access a free Internet connection.
Increase your corporate network security by forcing users to
authenticate with a Mobile User VPN client, creating a secure
IPSec tunnel from the wireless computer to the SOHO 6 Wireless.
Separation of the trusted network from the optional network
further protects the connection from the wireless computer to the
SOHO 6 Wireless. For information on how to configure this, see
Chapter 11 “MUVPN Clients” on page 119.
SOHO 6 Wireless hardware description
The hardware of the SOHO 6 Wireless uses newer technology than
earlier SOHO models.
Faster Processor
The SOHO 6 Wireless has a new network processor that
runs at a speed of 150 MHz. Ethernet and encryption
technology are included.
Ethernet ports
The SOHO 6 Wireless has five 10/100 Base TX ports. The
Ethernet ports have the labels 0 through 3 and WAN.
6WatchGuard Firebox SOHO 6 Wireless
Page 29
SOHO 6 Wireless hardware description
Wireless
Wireless operating range--indoors (these values are
approximations):
100 feet at 11 Mbps
165 feet at 5.5 Mbps
230 feet at 2 Mbps
300 feet at 1 Mbps
Understanding IEEE 802.11b Wireless
Communication
In general, transmitted RF power and signal bandwidth place an
upper limit on the rate that data can be transmitted over a wireless
link. The basic equation to determines the maximum data rate is:
Channel Capacity =
Channel Bandwidth x Log2(1 + Signal Strength/Noise Level
This equation says the maximum amount of data (bits/s) that can
be transmitted over a given channel depends on:
• The Channel Bandwidth: (22Mbits/s) for 802.11b
• The Signal Strength: (15dBm transmitted) for Soho6 Wireless
• The Noise Level: Depends on the channel environment and
the receiver design.
Data rate cannot exceed channel capacity. Channel capacity
depends on signal strength, noise, and transmitted power.
User Guide7
Page 30
Noise Level (watts)
The more in-band RF noise there is the less data can be
transmitted over a given channel (wireless link). The noise
level is primarily due to three factors:
First, there is a minimum level of background noise due to
the ambient temperature of the channel (atmosphere) and
the bandwidth.
Second, the 802.11b receiver will have an innate noise level
due to its own components operating temperature.
Third, there are many unlicensed transmitters using the
same frequency bands as 802.11. Some of these are:
- Cordless phones,
- Other 802.11b devices operating on adjacent channels.
Note that only channels 1, 6, and11 are unique. All other
channels overlap because while the center frequencies
increment by 5MHz per channel, the bandwidths are
22MHz.
-Microwave ovens,
- Sodium type lighting systems (fusion lamps),
- Arc welders (broadband spark gap transmitters)
- Blue-Tooth transmitters. Note that a Blue-Tooth
transmitter operates at lower power levels and would
need to be near an 802.11b receiver to interfere with it.
- Industrial, Scientific, and Medical equipment can also use
these bands.
Signal Strength (watts)
The signal strength depends primarily on:
- How much RF signal power is transmitted
8WatchGuard Firebox SOHO 6 Wireless
Page 31
SOHO 6 Wireless hardware description
- How much directional antenna gain there is at the
transmitter and receiver
- The signal attenuation (path-loss) between the transmitter
and receiver.
Path Loss:
The path-loss is directly proportional to line-of-site
distance between transmitter and receiver, and inversely
proportional to the wavelength of the transmitted signal.
The equation for Signal Loss is:
Loss = 20xLog10(4xpi x(Distance/Wavelength)).
- Wavelength = (speed-of-light/ frequency). This means
that the higher the frequency the shorter the wavelength
and the greater the path-loss will be for a given frequency.
- For an average office environment, a rule-of-thumb is that
line-of-sight signal loss will only pertain to about the first
20 feet and will then increase by about 30 dB per 100 feet,
due the effect of walls, and cubicles and widows, etc.
Second, the signals can arrive by different paths depending
on how many surfaces reflect the signal. This is called
multi-path. Many surfaces will reflect a signal at 2.4 GHz.
The problem is that some combinations of reflected signals
will result in cancellation at a given point, thus by moving a
receiver by as little as ½ wavelength, the signal could vary
by as much as 30dB. The effect is called fading due to
multi-path reflections.
The signal fading effect is highly dependent on antenna
position, so the SOHO 6 Wireless uses antenna receiver
diversity (2 antennas spaced more than ½ wavelength
apart) to reduce the effect of multi-path fading. On the
SOHO 6 Wireless the antenna receiving the stronger signal
is selected automatically.
User Guide9
Page 32
NOTE
Laptop computers typically have one antenna, which is more susceptible
to signal fading depending on position. This can lead to a situation where
the SOHO 6 Wireless hears the laptop’s signal, but the laptop doesn’t
hear the access point.
Antenna Directional Gain:
Antenna Gain is the result of how directional the radiation
(transmit/receive signal strength) pattern is. The higher the
gain, then the more directional the antenna is.
The SOHO 6 Wireless ships with 5dBi antennas. This
means they have a maximum 5 dBi gain pattern
perpendicular to the antenna position. A laptop computer
antenna gain will vary but might be as low as -10dBi for
embedded wireless antennas.
Transmitted Power:
SOHO 6 Wireless transmits at 15dBm (0.032 watts), which
is compatible with US and European and other
requirements. In the USA 802.11b devices may transmit at
up to (1 watt) and up to (0.1 watt) in Europe. Allocated
channels vary for USA and Europe.
Signal strength is a function, both of how much power was
transmitted, and how much power was received. This is impacted
by the antenna gain at the transmitter and receiver as well as the
distance and the environment in between them. Due principally to
the effect of cluttered environment, signal loss increases faster in
an office building than it would for line-of-sight transmission.
Channel Bandwidth:
This varies with the type of modulation scheme. 802.11b devices
use CCK (11 Mbps, 5.5 Mbps), DQPSK (2 Mbps), and DBPSK
10WatchGuard Firebox SOHO 6 Wireless
Page 33
SOHO 6 Wireless hardware description
(1Mbps). The factor that determines which modulation scheme is
used is the Packet Error Rate (PER). The modulation scheme
switches automatically to maintain the PER at or below 8% by
using slower data rates (different modulation schemes) as
necessary.
SOHO 6 Wireless front and rear views
There are 14 indicator lights on the front panel of the SOHO 6
Wireless. The illustration below shows the front view.
PWR
PWR is lit while the SOHO 6 Wireless is connected to a
power supply.
Status
Status is lit while a management connection is in use.
Link
Link indicators are lit while there is an active physical
connection to the related Ethernet port. A link indicator
flashes when data flows through the Ethernet port.
100
The 100 indicator is lit when a port is in use at 100 Mb. The
100 indicator is not lit when a port is in use at 10 Mb.
User Guide11
Page 34
WAN
WAN is lit while there is an active physical connection to
the WAN port. The indicator flashes when data flows
through the port.
Mode
Mode is lit while there is a connection to the Internet.
There are five Ethernet ports, a reset button, and a power input on
the rear of the SOHO 6 Wireless. The illustration below shows the
rear view.
RESET button
Push the reset button to reset to the SOHO 6 Wireless to the
factory default configuration. See “Reset the SOHO 6
Wireless to the factory default settings” on page 32 for
more information about this procedure.
WAN port
The WAN port is for the external interface.
Four numbered ports (0-3)
These Ethernet ports are for the trusted network
connections.
Power input
Connect the power input to a power supply using the 12
volt 1.2a AC adapter supplied with the SOHO 6 Wireless.
12WatchGuard Firebox SOHO 6 Wireless
Page 35
CHAPTER 2Installation
The SOHO 6 Wireless protects computers that are connected to it
by Ethernet cable or wireless connection. Follow the procedures in
this chapter to install the SOHO 6 Wireless and set up the wireless
network.
Because WatchGuard is concerned about the security of your
network, the wireless feature is turned off on the SOHO 6 Wireless
we ship you. This allows you to enable the wireless network after
you set up the desired security.
To install the SOHO 6 Wireless, you complete the following steps:
• Identify and record your TCP/IP settings.
• Disable the HTTP proxy setting of your Web browser.
•Enable your computer for DHCP.
• Make the physical connections between the SOHO 6
Wireless and your network.
User Guide 13
Page 36
To set up the wireless network, you complete the following steps:
• Set up the Wireless Network
• Set up the Wireless Access Point
• Configure the Wireless Card on your computer
See the SOHO 6 Wireless QuickStart Guide included with the
SOHO 6 Wireless for a summary of this information.
Before you Begin the Installation
Before you install the SOHO 6, Wireless, make sure you have:
• DSL/cable modem
• Firebox SOHO 6 Wireless with Ethernet cables and power
supply
• Computer connected by Ethernet cable to the Firebox SOHO
6 Wireless
• Computer with wireless card (for Wireless)
You also need to follow these steps:
1Make sure there are a 10/100BaseT Ethernet card or an 802.11b
wireless networking card installed in your computer.
2Make sure you have a functional Internet connection. If the
Internet connection is not functional, call your ISP. The Internet
connection must be a cable modem or DSL modem with a 10/
100BaseT port, an ISDN router, or a direct LAN connection.
3Make sure there are two straight-through Ethernet network
cables with RJ-45 connectors available. Crossover cables, which
are often red or orange in color, are not satisfactory. The
SOHO 6 Wireless package includes one cable. Make sure that
the cables are of sufficient length to connect the modem or
14WatchGuard Firebox SOHO 6 Wireless
Page 37
Before you Begin the Installation
router to the SOHO 6 Wireless and the SOHO 6 Wireless to
your computer.
4Attach the two antennae supplied with the SOHO 6 Wireless.
NOTE
The SOHO 6 Wireless
of at least 20 centimeters from all persons and must not be collocated or
operating in conjunction with any other antenna or transmitter.
must
be installed to provide a separation distance
5Call your ISP to determine the method of network address
assignment. The possible methods are static addressing, DHCP,
or PPPoE. This information is necessary during the installation
procedure. See “External Network Configuration” on page 37
for more information.
6Make sure that the Web browser program installed on your
computer is Netscape Navigator (version 4.77 or higher) or
Internet Explorer (version 5.0 or higher).
7Record the SOHO 6 Wireless serial number. The serial number
is found on the bottom of the appliance.
Examine and record the current TCP/IP settings
Examine the current TCP/IP settings of your computer, and record
the settings in the table below. Follow the instructions for the
operating system that is installed on your computer.
3Record the TCP/IP settings in the table provided.
4Click Cancel.
User Guide15
Page 38
Microsoft Windows NT
1Click Start => Programs => Command Prompt.
2At the default prompt, type
ipconfig /all, then press Enter.
3Record the TCP/IP settings in the table provided.
4Click Cancel.
Microsoft Windows 95 or 98 or ME
1Click Start => Run.
2Type:
winipcfg.
3Click OK.
4Select the “Ethernet Adapter”.
5Record the TCP/IP settings in the table provided.
6Click Cancel.
Macintosh
1Click the Apple m e n u => Control Panels => TCP/IP.
2Record the TCP/IP settings in the table provided.
3Close the window.
Other operating systems (Unix, Linux)
1Consult your operating system guide to locate the TCP/IP
screen.
2Record the TCP/IP settings in the chart provided.
3Exit the TCP/IP configuration screen.
16WatchGuard Firebox SOHO 6 Wireless
Page 39
Before you Begin the Installation
TCP/IP SettingValue
IP Address
Subnet Mask
Default Gateway
DHCP Enabled Yes No
DNS Server(s)Primar y
Secondary
. . .
. . .
. . .
. . .
. . .
NOTE
If you must connect more than one computer to the trusted network
behind the SOHO 6 Wireless, determine the TCP/IP settings for each
computer.
Enable your computer for DHCP
To open the configuration pages for the SOHO 6 Wireless,
configure your computer to receive its IP address through DHCP.
See “Network addressing” on page 37 for more information about
network addressing and DHCP.
NOTE
These configuration instructions are for the Windows 2000® operating
system.
1Click Start => Settings => Control Panel.
The control panel window opens.
User Guide17
Page 40
2Double-click the Network & Dial-up Connections icon.
3Double-click the connection you use to connect to the Internet.
The network connection dialog box opens.
4Click Properties.
The network connection properties dialog box opens.
18WatchGuard Firebox SOHO 6 Wireless
Page 41
Before you Begin the Installation
5Double-click the Internet Protocol (TCP/IP) component.
The Internet Protocol (TCP/IP) Properties dialog box opens.
6Click to select the obtain an IP address automatically
checkbox.
7Click to select the Obtain DNS server address automatically
checkbox.
8Click OK to close the Internet Protocol (TCP/IP) Properties
dialog box.
9Click OK again to close the Network Connection Properties
dialog box.
Disable the HTTP proxy setting of your Web
browser
To configure a SOHO 6 Wireless, you must access the
configuration pages in the SOHO 6 Wireless with your browser. If
User Guide19
Page 42
the HTTP proxy setting in your browser is enabled, you can not
open these pages to complete the configuration procedure.
If the HTTP proxy setting is enabled, the browser only sees Web
pages found on the Internet, and not pages in other locations. If the
HTTP proxy setting is disabled, you can open the configuration
pages in the SOHO 6 Wireless and Web pages on the Internet.
The instructions below show how to disable the HTTP proxy
setting in three browser applications. If a different browser is used,
use the help menus of the browser program to find the necessary
information.
Netscape 4.7
1Open Netscape.
2Click Edit => Preferences.
The Preferences window opens.
3A list of options is shown at the left side of the window. Click
the + symbol to the left of the Advanced option to expand the
list.
4Click Proxies.
5Make sure the Direct Connection to the Internet option is
selected.
6Click OK to save the settings.
Netscape 6.x
1Open Netscape.
2Click Edit => Preferences.
The Preferences window opens.
3A list of options is shown at the left side of the window. Click
the arrow symbol to the left of the Advanced heading to
expand the list.
20WatchGuard Firebox SOHO 6 Wireless
Page 43
Physically Connect to the SOHO 6 Wireless
4Click Proxies.
5Make sure the Direct Connection to the Internet option is
selected.
6Click OK to save the settings.
Internet Explorer 5.0, 5.5, and 6.0
1Open Internet Explorer.
2Click Tools => Internet Options.
The Internet Options window opens.
3Click the Advanced tab.
4Scroll down the page to HTTP 1.1 Settings.
5Disable all of the check boxes.
6Click OK to save the settings.
Physically Connect to the SOHO 6 Wireless
The SOHO 6 Wireless protects computers that are connected to it
by Ethernet cable or wireless connection. This section discusses
how to connect computers to the SOHO 6 Wireless by using
Ethernet cables.
The SOHO 6 Wireless protects one computer or a multi-computer
network and can also function as a hub to connect other
computers.
If you want to set up a wireless network, you still need to connect a
computer to the SOHO 6 using an Ethernet cable. You use this
connection to turn on the wireless network. For more information
on setting up a wireless network, see Figure , “Setting up the
Wireless Network,” on page 26.
User Guide21
Page 44
Cabling the SOHO 6 Wireless for one to four
appliances
A maximum of four computers, printers, scanners, or other
network peripherals can connect directly to the SOHO 6 Wireless.
These connections use the four trusted network ports (0-3). To
connect a maximum of four appliances, use the SOHO 6 Wireless
as a network hub.
1Shut down your computer.
2If you connect to the Internet through a DSL modem or cable
modem, disconnect the power supply to this device.
22WatchGuard Firebox SOHO 6 Wireless
Page 45
Physically Connect to the SOHO 6 Wireless
3Disconnect the Ethernet cable that connects your DSL modem,
cable modem or other Internet connection to your computer.
Connect this cable to the WAN port on the SOHO 6 Wireless.
The SOHO 6 Wireless is connected directly to the modem or other Internet
connection.
4Connect one end of the straight-through Ethernet cable
supplied with your SOHO 6 Wireless to a trusted network port
(0-3) on the SOHO 6 Wireless. Connect the other end to the
Ethernet port of your computer.
The SOHO 6 Wireless is connected to the Internet and your computer.
5If you connect to the Internet through a DSL modem or cable
modem, reconnect the power supply to this device. The
indicator lights flash and then stop. The modem is ready for
use.
6Attach the AC adapter to the SOHO 6 Wireless. Connect the AC
adapter to a power source.
7Restart the computer.
See “Factory default settings” on page 31 for the factory default
configuration options. See “External Network Configuration” on
page 37 and “Configure the Trusted Network” on page 42 for
special configurations.
Cabling the SOHO 6 Wireless for more than four
appliances
Although the SOHO 6 Wireless has only four trusted network
ports (0-3), you can connect more than four appliances. Use one or
more network hubs to make more connections.
User Guide23
Page 46
The base model SOHO 6 Wireless includes a ten-seat license. This
license allows a maximum of ten appliances on the trusted
network to connect to the Internet at the same time. There can be
more than ten appliances on the trusted network, but the SOHO 6
Wireless will only allow ten Internet connections. A seat is in use
when an appliance connects to the Internet and is free when the
connection is broken. License upgrades are available from the
WatchGuard Web site:
http://www.watchguard.com/sales/buyonline.asp
To connect more than four appliances to the SOHO 6 Wireless,
these items are necessary:
• an Ethernet hub;
• a straight-through Ethernet cable, with RJ-45 connectors, for
each computer;
24WatchGuard Firebox SOHO 6 Wireless
Page 47
Physically Connect to the SOHO 6 Wireless
• a straight-through Ethernet cable to connect each hub to the
SOHO 6 Wireless.
1Shut down your computer. If you connect to the Internet
through a DSL modem or cable modem, disconnect the power
supply from this device.
2Disconnect the Ethernet cable that runs from your DSL
modem, cable modem or other Internet connection to your
computer. Connect the Ethernet cable to the WAN port on the
SOHO 6 Wireless.
The SOHO 6 Wireless is connected directly to the modem or other Internet
connection.
3Connect one end of the straight-through Ethernet cable
supplied with your SOHO 6 Wireless to one of the trusted
network ports (0-3) on the SOHO 6 Wireless. Connect the other
end to the uplink port of the Ethernet hub.
The SOHO 6 Wireless is connected to the Internet and your Ethernet hub.
4Connect an Ethernet cable between each of the computers and
an uplink port on the Ethernet hub.
5If you connect to the Internet through a DSL modem or cable
modem, reconnect the power supply to this device. The
indicator lights flash and then stop. The modem is ready for
use.
6Attach the AC adapter to the SOHO 6 Wireless. Connect the AC
adapter to a power supply.
7Restart your computer.
See “Factory default settings” on page 31 for the factory default
configuration options. See “External Network Configuration” on
page 37 and “Configure the Trusted Network” on page 42 for
special configurations.
User Guide25
Page 48
Setting up the Wireless Network
The SOHO 6 Wireless protects computers that are connected to it
by Ethernet cable or wireless connection. Because WatchGuard is
concerned about the security of your network, the wireless feature
is turned off on the SOHO 6 Wireless we ship you. This allows you
to enable the wireless network after you set up the desired
security.
Now that you have installed the SOHO 6 Wireless device, you can
set up the optional wireless network.
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless.
The default IP address is: http://192.168.111.1
2From the navigation bar on the left side, select Network =>
Optional (802.11b).
The Optional Network Configuration page appears.
3Select the Enable Optional Network checkbox to turn on the
wireless network.
4Type the IP Address and Subnet Mask of the wireless network.
The default IP Address is 192.168.112.1. The default Subnet Mask is
255.255.255.0.
5Select Enable DHCP Server on the Optional Network
checkbox.
6Type the First address for DHCP server.
The default is 192.168.112.2.
For more information on the Optional Network Configuration
page, see “Configure the Optional Network for Wireless
Networking” on page 46.
26WatchGuard Firebox SOHO 6 Wireless
Page 49
Setting up the Wireless Access Point
Setting up the Wireless Access Point
1From the navigation bar on the left side, select Network =>
Wireless Configuration.
The Wireless Network Configuration page appears.
2From the Encryption drop-down list, select Disabled.
3From the Authentication drop-down, select Open System.
4From Basic Settings, write down the number in the SSID text
box for later use.
The SSID is the wireless devices identification number, and it is used to
create the wireless connection. The default SSID is the 5 digit serial
number for your SOHO 6 Wireless device.
5Click Submit.
For more information on configuring the wireless network, see
“Configure the Wireless Network” on page 49.
Configuring the Wireless Card on your
computer
The following instructions are for the Windows XP operating
system. Refer to the WatchGuard SOHO 6 Wireless User Guide for
instruction on other operating systems.
1Click Start => Control Panel => Network Connections.
The Network Connections dialog box appears.
2Double-click on the Wireless Network Connection.
The Wireless Network Connection dialog box appears.
3Click Advanced.
The Wireless Network Connection Properties dialog box appears with the
Wireless Networks tab selected.
4In the Preferred networks section, click Add.
The Wireless Network Properties dialog box appears.
User Guide27
Page 50
5Type the SSID that you wrote down from the Wireless
Network Configuration page into the Network Name (SSID)
text box.
6Click OK to close the Wireless Network Properties dialog box.
7Click Refresh.
The operating system looks for all wireless connections and list them in the
Available Networks text box. Select the SSID of the wireless computer
that you configured to access the SOHO 6 Wireless.
8Click OK to enable the wireless connections.
The wireless network connection should now show that your wireless
network is active.
9Set up the wireless computer to use DHCP. For information on
setting up DHCP, see Figure , “Enable your computer for
DHCP,” on page 17.
Your Windows operating system should automatically look for
the wireless connection, and if more than one wireless network
is found, a dialog box will appear listing all wireless devices in
the area. Select the wireless computer that you configured to
access the SOHO 6 Wireless device.
Your SOHO 6 Wireless is now protecting wired and wireless
computers from security hazards. To learn how to enhance your
security setting, see “Configure the Wireless Network” on page 49.
28WatchGuard Firebox SOHO 6 Wireless
Page 51
CHAPTER 3SOHO 6 Wireless
basics
The configuration of the SOHO 6 Wireless is made through Web
pages contained in the software of the SOHO 6 Wireless. You can
connect to these configuration page with your Web browser.
SOHO 6 Wireless System Status page
Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
The System Status page opens.
User Guide 29
Page 52
The System Status page is the main configuration page of the
SOHO 6 Wireless. A display of information about the SOHO 6
Wireless configuration is shown. This information includes the
following:
• The firmware version
• The serial number of the appliance
• The status of the following SOHO 6 Wireless features:
- WSEP Logging
- VPN Manager Access
-Syslog
- Pass Through
• The status of the upgrade options;
30WatchGuard Firebox SOHO 6 Wireless
Page 53
Factory default settings
• Configuration information for the trusted network and the
external network
• Configuration information for firewall settings (incoming
services and outgoing services)
• A reboot button to restart the SOHO 6 Wireless
NOTE
If the external network is configured to use the PPPoE protocol, the
System Status page displays a connect button or a disconnect button. Use
these buttons to start or terminate the PPPoE connection.
Factory default settings
The default network settings and configuration settings for the
SOHO 6 Wireless:
External network
The external network settings use DHCP.
Trusted network
The default IP address of the trusted interface is
192.168.111.1.
The IP addresses for the computers on the trusted network
are assigned through DHCP.
Firewall settings
All incoming services are blocked.
An outgoing service allows all outbound traffic.
All of the firewall options are disabled.
The DMZ pass-through is disabled.
User Guide31
Page 54
System Security
The System Security is disabled. The system administrator
name and system administrator passphrase are not set. All
computers on the trusted network can access the
configuration pages.
SOHO 6 Wireless Remote Management is disabled.
VPN Manager Access is disabled.
The remote logging is not configured.
WebBlocker
The WebBlocker is disabled and the settings are not
configured.
Upgrade Options
The upgrade options are disabled until the license keys are
entered into the configuration page.
Reset the SOHO 6 Wireless to the factory default
settings
Reset the SOHO 6 Wireless to the factory default settings if it is not
possible to correct a configuration problem. A reset to the factory
default settings is required if the system security passphrase is
unknown or the firmware of the SOHO 6 Wireless is damaged by a
power interruption. Follow these steps to reset the SOHO 6
Wireless to the factory default settings:
1Disconnect the power supply.
2Press and hold the reset button.
3Connect the power supply.
4Continue holding the button until the red LED on the front of
the SOHO 6 Wireless goes on and then off.
5Disconnect the power supply.
32WatchGuard Firebox SOHO 6 Wireless
Page 55
Register your SOHO 6 Wireless and activate the LiveSecurity Service
6Connect the power supply.
The PWR indicator is on and the reset is complete.
The base model SOHO 6 Wireless
The base model SOHO 6 Wireless includes a ten-seat license. This
license allows a maximum of ten computers on the trusted
network to connect to the Internet at the same time. There can be
more than ten computers on the trusted network, but the SOHO 6
Wireless will only allow ten Internet connections. See “Cabling the
SOHO 6 Wireless for more than four appliances” on page 23 for
additional information.
Register your SOHO 6 Wireless and activate
the LiveSecurity Service
After the SOHO 6 Wireless is installed and configured, register the
SOHO 6 Wireless and activate your LiveSecurity Service
subscription. LiveSecurity Service provides threat alert
notifications, security advice, free virus protection, software
updates, technical support by Web or telephone, and access to
online help resources and the WatchGuard user forum. A
subscription to the LiveSecurity Service is required to get the
license keys for the upgrades that you purchase.
You must have the serial number of your SOHO 6 Wireless to
register. The SOHO 6 Wireless serial number is located on the
bottom of the appliance. Record the serial number in the table
below:
Serial Number:
User Guide33
Page 56
Register you SOHO 6 Wireless with the LiveSecurity Service at the
WatchGuard Web site:
http://www.watchguard.com/activate
NOTE
To activate the LiveSecurity Service, your browser must have JavaScript
enabled.
If you have a user profile on the WatchGuard Web site, enter your
user name and password. If you do not have a user profile on the
WatchGuard Web site, create a new account. Select your product
and follow the instructions for product activation.
Record your LiveSecurity Service user profile information in the
table below:
User name:
Password:
Keep this information confidential.
Reboot the SOHO 6 Wireless
To reboot a SOHO 6 Wireless located on the local network, use one
of these methods:
34WatchGuard Firebox SOHO 6 Wireless
Page 57
Reboot the SOHO 6 Wireless
NOTE
The SOHO 6 Wireless requires 30 seconds to reboot. The Mode indicator
on the front of the SOHO 6 Wireless will go off and then come on.
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
2Click Reboot.
or
2Disconnect and reconnect the power supply.
To reboot a SOHO 6 Wireless located on a remote system, use one
of these methods:
NOTE
The remote SOHO 6 Wireless must be configured to allow incoming
HTTP (Web) or FTP traffic from the Internet. See “Configure incoming
and outgoing services” on page 71 for information about how to
configure a SOHO 6 Wireless to receive incoming traffic.
3Type the external network IP address of the remote SOHO 6
Wireless in your browser window to connect to the System
Status page of the remote SOHO 6 Wireless.
4Click Reboot.
or
4Send an FTP command to the remote SOHO 6 Wireless. Use an
FTP program to connect to the remote SOHO 6 Wireless, and
enter the command:
quote rebt
User Guide35
Page 58
36WatchGuard Firebox SOHO 6 Wireless
Page 59
CHAPTER 4Configure the
Network Interfaces
External Network Configuration
When you configure the external network, you select the method
of communication between the SOHO 6 Wireless and the ISP.
Make this selection based on the method of network address
distribution in use by your ISP. The possible methods are static
addressing, DHCP, or PPPoE.
Network addressing
To connect to a TCP/IP network, each computer must have an IP
address. The assignment of IP addresses is dynamic or static.
• If the assignment is dynamic, the ISP assigns a different IP
address to a computer each time the computer connects to
the network. When the computer disconnects, the IP address
is made available to a different computer.
User Guide 37
Page 60
• If the assignment is static, all computers on the network have
a permanently assigned IP address. There are no computers
that have the same IP address.
Most ISPs make dynamic IP address assignments through DHCP
(Dynamic Host Configuration Protocol). When a computer
connects to the network, a DHCP server at the ISP assigns that
computer an IP address. The manual assignment of IP addresses is
not necessary with this system.
Some ISPs assign the IP addresses through PPPoE (Point-to-Point
Protocol over Ethernet). PPPoE emulates a standard dial-up
connection to provide some of the features of Ethernet and PPP.
This system allows the ISP to use the billing, authentication, and
security systems designed for dial-up, DSL modem and cable
modem service. When the SOHO 6 Wireless is configured to use
PPPoE, a button on the System Status page controls the connection
to the external network.
Your ISP can tell you how their system assigns the IP addresses.
Configure the SOHO 6 Wireless external network
for dynamic addressing
The default configuration sets the SOHO 6 Wireless to get the
external address information through DHCP. If your ISP supports
this method, the SOHO 6 Wireless gets IP address information
from the ISP when the SOHO 6 Wireless reboots and connects to
the Internet. The SOHO 6 Wireless does not require any additional
configuration.
Configure the SOHO 6 Wireless external network
for static addressing
If your ISP assigns static IP address, you must move the IP address
data from your computer to the SOHO 6 Wireless. This
38WatchGuard Firebox SOHO 6 Wireless
Page 61
External Network Configuration
configuration causes the ISP to communicate with the SOHO 6
Wireless and not your computer.
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
2From the navigation bar on the left side, select
Network => External.
The External Network configuration page opens.
3From the Configuration Mode drop-down list, select
Manual Configuration.
The page refreshes.
4Type the TCP/IP settings you recorded from your computer
during the installation process. Refer to the table, “Examine
and record the current TCP/IP settings” on page 15.
User Guide39
Page 62
5Click Submit.
The configuration change is saved to the SOHO 6 Wireless.
Configure the SOHO 6 Wireless external network
for PPPoE
If your ISP assigns IP addresses through PPPoE, your PPPoE login
name and password are required to configure the SOHO 6
Wireless.
To configure the SOHO 6 Wireless for PPPoE:
1Open your Web browser and click Stop.
Because the Internet connection is not configured, the browser can not
load your home page from the Internet. The browser can open the
configuration pages in the SOHO 6 Wireless.
2Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
3From the navigation bar on the left side, select
Network => External.
The External Network configuration page opens.
4From the Configuration Mode drop-down list, select PPPoE
Client.
The page refreshes.
40WatchGuard Firebox SOHO 6 Wireless
Page 63
External Network Configuration
5Type the PPPoE login name and domain supplied by your ISP.
6Type the PPPoE password supplied by your ISP.
7Type the time delay before inactive TCP connections are
disconnected.
8Click Automatically restore lost connections.
This option keeps a constant flow of traffic between the SOHO 6 Wireless
and the PPPoE server. This option allows the SOHO 6 Wireless to keep the
PPPoE connection open during a period of frequent packet loss. If the flow
of traffic stops, the SOHO 6 Wireless reboots. A reboot frequently restores
the connection. The ISP sees this constant flow of traffic as a continuous
connection. The regulations and billing policy of the ISP determine if you
can use this option. Watchguard Technical Support uses this feature as a
solution to some problems.
9Click Enable PPPoE debug trace to activate PPPoE debug
trace.
10 Click Submit.
The configuration change is saved to the SOHO 6 Wireless.
User Guide41
Page 64
Configure the Trusted Network
The DHCP Server option sets the SOHO 6 Wireless to assign IP
addresses to the computers on the trusted network. The SOHO 6
Wireless uses DHCP to make the assignments. When the SOHO 6
Wireless receives a request from a new computer on the trusted
network, the SOHO 6 Wireless assigns the computer an IP address.
If you use a DHCP server to assign IP addresses, enable the DHCP
Relay option. This option causes the SOHO 6 Wireless to forward
the DHCP request to the specified DHCP server.
Configure DHCP server and DHCP relay
To configure DHCP server:
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
2From the navigation bar on the left side, select
Network => Trusted.
The Trusted Network configuration page opens.
42WatchGuard Firebox SOHO 6 Wireless
Page 65
Configure the Trusted Network
3Type the IP address and the subnet mask in the applicable
fields.
4Click to select the Enable DHCP Server on the Trusted
Network check box.
5Type the first IP address that is available for the computers that
connect to the trusted network.
6Type the WINS Server address, DNS Server primary address,
DNS Server secondary address, and DNS Domain server
suffix.
7Click Submit.
8Reboot the SOHO 6 Wireless if necessary.
User Guide43
Page 66
To configure the DHCP relay server:
1From the Trusted Network configuration page, click the
Enable DHCP Relay checkbox.
2Type the IP address of the DHCP relay server.
3Click Submit.
4Reboot the SOHO 6 Wireless.
The SOHO 6 Wireless receives a DHCP request from a computer on
the trusted network . The reques t is se nt from th e SOHO 6 Wireless to
the remote DHCP server. The SOHO 6 Wireless receives the IP
address sent from the DHCP server. The IP address is sent from the
SOHO 6 Wireless to the computer that made the request. If the
SOHO 6 Wireless can not contact the remote DHCP server in less
than 30 seconds, the SOHO 6 Wireless uses its internal DHCP server
to respond to the computer on the trusted network.
Configure additional computers on the trusted
network
The SOHO 6 Wireless accepts the direct connection of a maximum
of four computers, printers, scanners, or other network
peripherals. The use of one or more 10BaseT Ethernet hubs with
RJ-45 connectors allows the connection of additional appliances.
Follow these steps to add a computer to the trusted network:
1Make sure that the computer has an Ethernet card installed.
2Shut down the computer.
3Connect the computer to the network as shown in section
“Cabling the SOHO 6 Wireless for more than four appliances”
on page 23.
4Restart the computer.
5Set the computer to get its address through DHCP as shown in
section “Enable your computer for DHCP” on page 17.
44WatchGuard Firebox SOHO 6 Wireless
Page 67
Configure the Trusted Network
6Shut down and restart the computer.
Configure the trusted network with static
addresses
To disable the SOHO 6 Wireless DHCP server and make static
address assignments, follow these steps:
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
2From the navigation bar on the left side, select
Network => Trusted.
The Trusted Network configuration page opens.
User Guide45
Page 68
3Type the IP address and the subnet mask in the applicable
fields.
4Reset the Enable DHCP Server on the Trusted Network check
box.
5Click Submit
6Reboot the SOHO 6 Wireless as necessary.
7Configure the appliances on the trusted network with static
addresses.
Configure the Optional Network for Wireless
Networking
To turn on the wireless network, you must enable the optional
network.
Follow these instructions to complete the configuration:
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
46WatchGuard Firebox SOHO 6 Wireless
Page 69
Configure the Optional Network for Wireless Networking
2From the navigation bar on the left side, select
Network => Optional (802.11b).
The Optional Network Configuration page opens.
3Click the Enable Optional Network checkbox.
To turn on the wireless network, you need to enable the optional network.
4Type the IP address and subnet mask of the optional network.
The default IP Address is 192.168.112.1. The default Subnet Mask is
255.255.255.0.
User Guide47
Page 70
5Select Enable DHCP Server on the Optional Network
checkbox.
6Type the First address for DHCP server.
The default is 192.168.112.2.
7Type the WINS Server address, DNS Server primary address,
DNS Server secondary address, and DNS Domain server
suffix.
8To enable the DHCP Relay on the optional network, click
Enable DHCP Relay checkbox and enter the IP address of the
DHCP relay server in the text box.
9To allow traffic between the optional network and trusted
network, click the Allow traffic between Optional Network and Trusted Network checkbox.
If you select this checkbox, all wireless devices that are connected to the
optional network can access the computers on your trusted network.
10 To require encrypted MUVPN connections through the
wireless interface, click to select the Requires Encrypted MUVPN connections on this interface checkbox.
You may want to enable this feature after the initial connection between
your wireless computers and the SOHO 6 Wireless. This feature secures
your network from unauthorized users using your wireless network. If this
checkbox is enabled, only computer with the MUVPN software can access
your SOHO 6 Wireless network. You need to configure the MUVPN
software on the SOHO 6 Wireless device and wireless computer. For more
information on configuring MUVPN, see Chapter 11 “MUVPN Clients”
on page 119.
11 Click Submit.
48WatchGuard Firebox SOHO 6 Wireless
Page 71
Configure the Wireless Network
Configure the Wireless Network
Once you turned on the wireless network by enabling the optional
network, you can set up the security setting for your wireless
connection.
Configure Security
The SOHO 6 Wireless uses the industry standard security protocol,
Wired Equivalent Privacy (WEP), specified by the IEEE standard
802.11b. WEP is designed to provide a wireless local area network
(WLAN) with a level of security and privacy comparable to that
usually expected of a wired local area network (LAN). A wired
LAN is generally protected by physical security, such as login
credentials, that are only effective for a controlled physical
environment, because the radio transmissions of a WLAN are not
bound by the walls containing the network. WEP achieves security
by encrypting the data transmitted over the WLAN. Data
encryption protects the vulnerable wireless connection between
computers and access points; once this measure has been taken,
other typical LAN security mechanisms such as password
protection, virtual private networks (VPNs), and authentication
can be used to ensure privacy.
Follow these instructions to set up wireless security:
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
User Guide49
Page 72
2From the navigation bar on the left side, select Network =>
Wireless Configuration.
The Wireless Network Configuration page appears.
3From the Encryption drop-down list, select the level of
encryption you want applied to your wireless connections.
The options are Disabled, 40/64 bit WEP, and 128 bit WEP.
50WatchGuard Firebox SOHO 6 Wireless
Page 73
Configure the Wireless Network
Disabled
The default is Disabled, and you should use this option for
the initial connection. Your wireless connection is not using
WEP when Disabled is selected.
40/64 bit WEP or128 bit WEP
Once you complete the initial connection between your
wireless computer and SOHO 6 Wireless, you can change
this option to add WEP. Select either 40/64 bit or128 bit
based on what the wireless card in your computer
supports.
4If you are using WEP encryption, type a hexadecimal number
in the Key text boxes.
You can type up to four keys that the wireless network will use to connect.
If you have 40/64 bit WEP, the key can be up to 10 characters. If you have
128 bit WEP, the key can be up to 26 characters.
5If you typed more than one key, select which key you want to
use as the default key from the Default Key drop-down list.
6Select the Authentication mode you want to use for your
wireless network connection.
The options are Open System, Shared Key, and Both.
Open System
This option does not support shared keys. If you disable
encryption, this is the only option.
Shared Key
This option supports shared keys. If you enabled WEP, this
option is enabled.
Change the Basic Settings
The SSID is the SOHO 6 Wireless identification number, and it is
used to create the wireless connection with the wireless computers.
User Guide51
Page 74
To change the SSID of the SOHO 6 Wireless:
• In the Basic Settings section, type a new identification in
SSID text box.
The default SSID is the 5 digit serial number for your SOHO 6 Wireless
device. The first four digits of the serial number are the product code and
are not part of the SSID. The next five digits after the product code are
the serial number. The remaining characters are an encoded hash for
security uses. The maximum identification length is 20 characters.
To change the Channel:
•From the Channel drop-down list, select the channel you
want to use in your wireless connection.
Restrict Access by Hardware Address
You can change the settings of how the SOHO 6 Wireless
communicates with your wireless computer and other settings.
1If you want to restrict access to the SOHO 6 Wireless by the
computer hardware address, select Enabled in the Restrict Access by Hardware Address drop-down list.
2Click Edit
The Allowed Hardware Addresses page appears.
3Type the MAC Address of the computer you want to connect
to the SOHO 6 Wireless.
4Click Submit.
OR
1If you do not want to restrict access to the SOHO 6 Wireless by
the computer hardware address, select Disabled.
52WatchGuard Firebox SOHO 6 Wireless
Page 75
Configure the Wireless Network
Configure the Beacon Rate
1In the AP Beacon Rate text box, type the beacon rate in
milliseconds (100 through 10,000) that you want the SOHO 6
Wireless to use.
The beacon rate is the rate the SOHO 6 Wireless sends out broadcasts so
that the wireless computers can find it.
2If you want the SOHO 6 Wireless to broadcast a beacon rate,
select Enabled from the Broadcast SSID in AP Beacon Frames.
If you do not want to broadcast the beacon rate, select
Disabled.
3If you want the SOHO 6 Wireless to respond to request from
the wireless computers, select Enabled in the Respond to SSID Query Requests. If you do not want the SOHO 6 Wireless to
respond, select Disabled.
The wireless computers send out query requests to find if there are any
wireless access points that it can connect to.
Log Authentication Events
If you want the SOHO 6 Wireless to log when a wireless computer
tries to access it, select Enabled. If you do not want to log
authentication events, select disabled.
Set Advanced Settings
‘You can change Maximum Transmit Rate and Fragmentation
Threshold.
• To change the Maximum Transmit Rate, select the rate per
Mbits per second from the Maximum Transmit Rate dropdown list.
• To change the Fragmentation Threshold, type a value of 256
to 4096 in the Fragmentation Threshold text box.
User Guide53
Page 76
Configure static routes
To send the specified packets to different segments of the trusted
network connected through a router or switch, configure static
routes.
Follow these instructions to configure static routes:
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
2From the navigation bar on the left side, select
Network => Routes.
The Routes page opens.
3Click Add.
The Add Route page opens.
54WatchGuard Firebox SOHO 6 Wireless
Page 77
View network statistics
4From the Type drop-down list, select either Host or Network.
5Type the IP address and the gateway of the route in the
applicable fields.
The gateway of the route is the local interface of the router.
6Click Submit.
To remove a route, select the route and click Remove.
View network statistics
The Network Statistics page gives information about network
performance. This page is useful during troubleshooting.
Follow these instructions to access the Network Statistics page:
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
User Guide55
Page 78
2From the navigation bar on the left side, select
Network => Network Statistics.
The Network Statistics page opens.
Configure the dynamic DNS Service
This feature allows you to register the external IP address of the
SOHO 6 Wireless with the dynamic DNS (Domain Name Server)
service DynDNS.org. A dynamic DNS service makes sure that the
IP address attached to your domain name is changed when your
ISP assigns you a new IP address.
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
56WatchGuard Firebox SOHO 6 Wireless
Page 79
Configure the dynamic DNS Service
NOTE
WatchGuard is not affiliated with dyndns.org.
2From the navigation bar on the left side, select
Network => DynamicDNS.
The Dynamic DNS client page opens.
3Select the Enable Dynamic DNS client checkbox.
4Type the domain, name, and password in the applicable fields.
5Click Submit.
User Guide57
Page 80
58WatchGuard Firebox SOHO 6 Wireless
Page 81
CHAPTER 5Administrative
options
Use the SOHO 6 Wireless Administration page to configure access
to the SOHO 6 Wireless. The System Security, SOHO 6 Wireless
Remote Management
configured from the Administration page. The firmware updates,
upgrade activation, and display of the SOHO 6 Wireless
configuration file in a text format are done from the
Administration page.
TM
feature, and VPN Manager Access are
The System Security page
The System Security page contains the settings that control access
to the configuration of the SOHO 6 Wireless. Set a system
administrator name and passphrase to limit access to the
configuration pages. Enable remote management to allow the
configuration of the SOHO 6 Wireless from the external network.
User Guide 59
Page 82
System security
A passphrase prevents access to the configuration of the SOHO 6
Wireless by an unauthorized user on the trusted network. The use
of a passphrase is important to the security of your network.
NOTE
Record the system administrator name and passphrase in a safe location.
When system security is enabled, the system administrator name and
passphrase are required to access the configuration pages. If the system
administrator name and passphrase are unknown, you must reset the
SOHO 6 Wireless to the factory default settings. See “Factory default
settings” on page 31 for additional information.
Change the System Administrator passphrase every month. Select
a combination of eight letters, numbers, and symbols. Do not use a
word. Use at least one special symbol, a number, and a mixture of
upper-case and lower-case letters for increased security.
Follow these instructions to enable system security:
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
2From the navigation bar on the left side, select
Administration => System Security.
The System Security page opens.
60WatchGuard Firebox SOHO 6 Wireless
Page 83
The System Security page
3Verify that the HTTP Server Port is set to 80.
4Click to select the Enable System Security check box.
5Type a System Administrator Passphrase and then type it
again to confirm.
6Click Submit.
SOHO 6 Wireless Remote Management
Both the SOHO 6 Wireless and SOHO 6tc Wireless come equipped
with the SOHO 6 Wireless Remote Management feature. This
feature uses the MUVPN client or Pocket PC to establish a secure
User Guide61
Page 84
connection, using Internet Protocol Security (IPSec), over an
unsecured network from your remote computer in order to
remotely manage your SOHO 6 Wireless.
For example, the MUVPN client is installed and configured on
your computer. You then establish a standard Internet connection
and activate the MUVPN client. The MUVPN client creates an
encrypted tunnel to your SOHO 6 Wireless. You can now access
the SOHO 6 Wireless configuration pages without compromising
security. Another way to remotely manage your SOHO 6 Wireless,
is using a Pocket PC. First you establish a standard Internet
connection using your Pocket PC, and then you can access the
SOHO 6 Wireless configuration page.
1First, follow the steps above to configure System Security.
2Enable the checkbox labeled Enable SOHO 6 Wireless
Wireless Remote Management.
3Type the Virtual IP address which will be used by the remote
management computer when connecting to the SOHO 6
Wireless in the appropriate field.
4In the Authentication Algorithm drop list, specify the
authentication: MD5-HMAC (128-bit authentication) or SHA1HMCA (160-bit authentication).
5In the Encryption Algorithm drop list, specify the type of
encryption: DES-CBC or 3DES-CBC.
6In the VPN Client Type drop list, specify the type of VPN
client: Mobile User (MUVPN) or Pocket PC.
7Click Submit.
8Next, you must install and configure the MUVPN client on
your remote computer.
For this information, see Chapter 10, “MUVPN Clients” on page 119.
9Once you have installed and configured the MUVPN client,
establish an Internet connection through either Dial-Up
62WatchGuard Firebox SOHO 6 Wireless
Page 85
Set up VPN manager access
Networking or directly through a local area network (LAN) or
wide area network (WAN).
From the Windows desktop system tray:
10 Verify the MUVPN client status–it must be activated. If it is
not, right-click the icon and select Activate Security Policy.
For information on how to determine the status of the MUVPN icon, see
Chapter 11, “The Mobile User VPN client icon” on page 148.
Then, from the Windows desktop system tray:
11 Right-click the icon and select Connect.
The WatchGuard Mobile User Connect widow appears.
12 Click the Yes button.
13 Finally, enter the IP address of the external network in your
browser window to connect to the System Status page of the
SOHO 6 Wireless.
Set up VPN manager access
The VPN Manager Access page configures the SOHO 6 Wireless to
allow remote configuration of the SOHO 6 Wireless by the
WatchGuard VPN Manager software. The WatchGuard VPN
Manager software configures and manages VPN tunnels.
The VPN Manager software is a separate product and must run on
a WatchGuard Firebox II/III. Additional information about the
VPN Manager product is available on the WatchGuard Web site:
Follow these instructions to configure VPN Manager access:
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
User Guide63
Page 86
2From the navigation bar on the left side, select
Administration => VPN Manager Access.
The VPN Manager Access page opens.
3Select Enable VPN Manager Access.
4Type the Status Passphrase.
5Type the Status Passphrase again to confirm.
6Type the Configuration Passphrase.
7Type the Configuration Passphrase again to confirm.
NOTE
These passphrases must match the passphrases used in the VPN Manager
software or the connection will fail.
8Click Submit.
64WatchGuard Firebox SOHO 6 Wireless
Page 87
Update the firmware
Update the firmware
Check regularly for SOHO 6 Wireless firmware updates on the
WatchGuard Web site:
http://support.watchguard.com/sohoresources/
Download the .exe or .wgd files that contain the firmware update.
The .exe file is an installer and the .wgd file is a binary file. The
.wgd file is an advanced installation method.
NOTE
The .exe file is not available for firmware previous to the 6.0 release.
To install the .exe file:
1Save the .exe file to your computer.
2Double-click the .exe file.
The installer will install the updated firmware.
To install the .wgd file:
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
2Click Update.
NOTE
If you configure your SOHO 6 Wireless from a computer that does not use
the Windows operating system, for example Macintosh or Linux, you
must update your firmware with this procedure.
3Read the End-User License Agreement. Then set the I accept
the above license agreement check box at the bottom of the
page.
User Guide65
Page 88
4Type the location of the .wgd firmware files on your computer.
OR
4Click Browse and locate the .wgd firmware files on your
computer.
NOTE
Check your SOHO 6 Wireless firewall settings to make sure that your
firewall allows .wgd files.
5Click Update.
Follow the instructions provided by the update wizard.
NOTE
The update wizard requests a user name and password. Type the system
administrator name and passphrase configured on the System Security
page. The default values are “user” and “pass”.
Activate the SOHO 6 Wireless upgrade
options
Every SOHO 6 Wireless includes the software for all upgrade
options. To activate an upgrade option, you must enter a license
key in the configuration of the SOHO 6 Wireless. To receive a
license key, purchase and activate an upgrade option at the
66WatchGuard Firebox SOHO 6 Wireless
Page 89
Activate the SOHO 6 Wireless upgrade options
LiveSecurity Service Web site. See “Register your SOHO 6 Wireless
and activate the LiveSecurity Service” on page 33 for more
information.
Follow these steps to activate an upgrade option:
1Go to the upgrade page of the WatchGuard Web site:
http://www.watchguard.com/upgrade
2Type your User Name and Password.
3Click Log In.
4Follow the instructions provided on the Web site to activate
your license key.
5Copy the license key from the LiveSecurity Service Web site.
6Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
7From the navigation bar on the left side, select
Administration => Upgrade.
The Upgrade page opens.
8Paste the license key in the applicable field.
9Click Submit.
User Guide67
Page 90
Upgrade options
Seat licenses
A seat license upgrade allows more connections between
the trusted or optional network and the external network.
A wired connection goes to the trusted and the wireless
connection goes to the optional. For example, a 25-seat
license allows 25 wired or wireless connections instead of
the standard 10 connections.
IPSec Virtual Private Networking (VPN)
The VPN upgrade is necessary to configure virtual private
networking. The SOHO 6tc Wireless includes a VPN
upgrade license key. The SOHO 6 Wireless does not
include a VPN upgrade license key.
WebBlocker
The WebBlocker upgrade enables the Web filtering option.
MUVPN Client
The MUVPN Client upgrade allows remote users to
connect to the SOHO 6 Wireless through a secure (IPSec)
VPN tunnel. The MUVPN client creates an encrypted
tunnel to your trusted or optional network depending on if
it is a wired or wireless connection. A wired connection
goes to the trusted and the wireless connection goes to the
optional. If you have a wireless network, you can configure
the wireless network to require wireless computers to have
an encrypted MUVPN connection to access the SOHO 6
Wireless. The SOHO 6 Wireless includes several MUVPN
client licenses. You can add more MUVPN connections
with the MUVPN Client upgrade. For more information on
configuring a wireless network to require MUVPN
connections, see “Configure the Optional Network for
Wireless Networking” on page 46.
68WatchGuard Firebox SOHO 6 Wireless
Page 91
View the configuration file
LiveSecurity Service subscription renewals
Purchase a LiveSecurity subscription renewal for a period
of one or two years from your reseller or the WatchGuard
online store. Go to the renew page of the WatchGuard Web
site to purchase or activate a subscription renewal:
http://www.watchguard.com/renew/
Follow the instructions on the Web site.
View the configuration file
The contents of the SOHO 6 Wireless configuration file is available
in text format from the View Configuration File page.
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
2From the navigation bar on the left side, select
Administration => View Configuration File.
The View Configuration File page opens.
User Guide69
Page 92
70WatchGuard Firebox SOHO 6 Wireless
Page 93
CHAPTER 6Configure the
Firewall Settings
Firewall settings
The configuration settings of the SOHO 6 Wireless control the flow
of traffic between the trusted network and the external network.
The configuration you select depends on the types of risks that are
acceptable for the trusted network.
The SOHO 6 Wireless lists many standard services on the
configuration page. A service is the combination of protocol and
port numbers for a type of application or type of communication.
Configure incoming and outgoing services
The default configuration of the SOHO 6 Wireless prevents the
transmission of all packets from the external network to the trusted
network. Change the configuration to select the types of traffic that
User Guide 71
Page 94
are permitted. For example, to operate a Web server behind the
SOHO 6 Wireless, add an incoming Web service.
Select carefully the number and the types of services that you add.
The added services decrease the security of your network.
Compare the value of access to each service against the security
risk caused by that service.
Common services
Follow these steps to change the configuration of the incoming
filters for common services:
1From the navigation bar on the left side, select
Firewall => Incoming or Outgoing.
The Filter Incoming Traffic page opens.
72WatchGuard Firebox SOHO 6 Wireless
Page 95
Configure incoming and outgoing services
2Locate a pre-configured service, such as FTP, Web, or Telnet,
then select either Allow or Deny from the drop-down list.
The illustration shows the HTTP service configured to allow incoming
traffic.
3Type the trusted network IP address of the computer to which
this rule applies.
The illustration shows the HTTP service configured to allow incoming
traffic to the computer with IP address 192.168.111.2.
4Click Submit.
Create a custom service
If you need to allow a service that is not listed in the common
services, configure a custom service based on a TCP port, a UDP
port, or a protocol.
Follow these steps to configure a custom service:
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
2From the navigation bar on the left side, select
Firewall => Custom Service.
The Custom Service page opens.
User Guide73
Page 96
3Type a name for the service in the Service name field.
4Select TCP Port, UDP Port, or Protocol from the drop-down list
below the Protocol Settings.
The Custom Service page refreshes.
5In the fields separated by the word To, enter the port number
or the range of port numbers, or enter the protocol number.
NOTE
For a TCP port or a UDP port, specify a port number. For a protocol,
specify a protocol number. You cannot specify a port number for a
protocol.
74WatchGuard Firebox SOHO 6 Wireless
Page 97
Block external sites
6Click Add.
The following steps determine how the service is filtered.
7Select Allow or Deny from the Incoming Filter and Outgoing
Filter drop-down lists.
8Select Host IP Address, Network IP Address, or Host Range
from the drop-down list at the bottom of the page.
The Custom Service page refreshes.
9Type a single host IP address, a network IP address, or the start
and end of a range of host IP addresses in the address field.
10 Click Add.
Repeat the previous three steps until all of the address information for this
custom service is set.
11 Click Submit.
Block external sites
The default configuration of the SOHO 6 Wireless:
• allows the transmission of all packets from the trusted
network to the external network;
• prevents the transmission of all packets from the external
network to the trusted network.
You can change the configuration to prevent access to specified
Internet sites. Follow these steps to configure the blocked sites:
1From the navigation bar on the left side, select
Firewall => Blocked Sites.
The Blocked Sites page opens.
User Guide75
Page 98
2Select either Host IP Address, Network IP Address, or Host
Range from the drop-down list.
The Blocked Sites page refreshes.
3Type a single host IP address, a network IP address, or the start
and end of a range of host IP addresses in the address field.
The illustration shows the selection Host IP Address and the IP address
207.68.172.246.
4Click Add.
The address information appears in the Blocked Sites field.
5Click Submit.
76WatchGuard Firebox SOHO 6 Wireless
Page 99
Firewall options
Firewall options
The previous sections described how to allow or deny complete
classes of services. The Firewall Options page allows the
configuration of general security policies.
1Type the IP address of the trusted network in your browser
window to connect to the System Status page of the SOHO 6
Wireless:
The default IP address is: http://192.168.111.1
2From the navigation bar on the left side, select
Firewall => Firewall Options.
The Firewall Options page opens.
User Guide77
Page 100
Ping requests received from the external network
You can configure the SOHO 6 Wireless to deny all ping packets
received on the external interface.
1Set the Do not respond to PING requests received on External
Network check box.
2Click Submit.
Denying FTP access to the trusted network
interface
You can configure the SOHO 6 Wireless to prevent FTP access to
the computers on the trusted network by the computers on the
external network.
1Set Do not allow FTP access to Trusted Network check box.
2Click Submit.
SOCKS implementation for the SOHO 6 Wireless
The SOHO 6 Wireless functions as a SOCKS network proxy server.
An application that uses more than one socket connection and
implements the SOCKS version 5 protocol can communicate
through the SOHO 6 Wireless. SOCKS supplies a secure, two-way
communication channel between a computer on the external
network and a computer on the trusted network. To use a SOCKScompatible application, configure the application with the
necessary information about the SOHO 6 Wireless.
The SOHO 6 Wireless supports SOCKS version 5 only. The
SOHO 6 Wireless does not support authentication or DNS
(Domain Name System) resolution.
78WatchGuard Firebox SOHO 6 Wireless
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.