User Guide
xix
Detecting Man-in-the-Middle Attacks
............................183
Blocking Sites
..............................................................184
Blocking a site permanently
.........................................185
Creating exceptions to the Blocked Sites list
...................187
Changing the auto-block duration
................................187
Logging and notification for blocked sites
......................188
Blocking Ports
..............................................................188
Avoiding problems with legitimate users
........................191
Blocking a port permanently
........................................191
Auto-blocking sites that try to use blocked ports
.............192
Setting logging and notification for blocked ports
...........192
Blocking Sites Temporarily with Service Settings
.............192
Configuring a service to temporarily block sites
...............193
Viewing the Blocked Sites list
.......................................193
Integrating Intrusion Detection
......................................193
Using the fbidsmate command-line utility
.......................195
CHAPTER 12
Setting Up Logging and Notification
...199
Developing Logging and Notification Policies
................200
Logging policy
..........................................................200
Notification policy
.....................................................201
Failover Logging
..........................................................202
WatchGuard Logging Architecture
................................203
Designating Log Hosts for a Firebox
..............................203
Adding a log host
......................................................204
Enabling Syslog logging
.............................................205
Changing the log encryption key
..................................205
Removing a log host
..................................................206
Reordering log hosts
..................................................206
Synchronizing log hosts
..............................................206
Setting up the WatchGuard Security Event Processor
......207
Running the WSEP application on Windows NT,
Windows 2000, or Windows XP
............................207
Viewing the WSEP application
.....................................210
Starting and stopping the WSEP
...................................210
Summary of Contents for Firebox X10E
Page 1: ...WatchGuard Firebox System User Guide WatchGuard Firebox System ...
Page 12: ...xii WatchGuard Firebox System ...
Page 44: ...Chapter 2 Service and Support 22 WatchGuard Firebox System ...
Page 61: ...Cabling the Firebox User Guide 39 ...
Page 68: ...Chapter 3 Getting Started 46 WatchGuard Firebox System ...
Page 78: ...Chapter 4 Firebox Basics 56 WatchGuard Firebox System ...
Page 156: ...Chapter 8 Configuring Filtered Services 134 WatchGuard Firebox System ...
Page 182: ...Chapter 9 Configuring Proxied Services 160 WatchGuard Firebox System ...
Page 220: ...Chapter 11 Intrusion Detection and Prevention 198 WatchGuard Firebox System ...
Page 242: ...Chapter 12 Setting Up Logging and Notification 220 WatchGuard Firebox System ...
Page 256: ...Chapter 13 Reviewing and Working with Log Files 234 WatchGuard Firebox System ...
Page 274: ...Chapter 14 Generating Reports of Network Activity 252 WatchGuard Firebox System ...