Chapter 8: Configuring Filtered Services
116
WatchGuard Firebox System
As another example, passwords used for some services
(FTP, telnet, POP) are sent in the clear. If the passwords are
the same as those used internally, a hacker can hijack that
password and use it to gain access to your network.
Adding and Configuring Services
You add and configure services using Policy Manager. The
Services Arena of Policy Manager contains icons that repre-
sent the services (filtered and proxied) currently config-
ured on the Firebox, as shown in the following figure. You
can choose from many filtered and proxied services. These
services are configurable for outgoing or incoming traffic,
and they can also be made active or inactive. When config-
uring a service, you set the allowable traffic sources and
destinations, as well as determine the filter rules and poli-
cies for the service. You can create services to customize
rule sets, destinations, protocols, ports used, and other
parameters.
You can also add unique or custom services. However, if
you do, take steps to permit only the traffic flow in that ser-
vice that is absolutely essential.
Normal View of the Services Arena
To display the detailed view of the Services Arena,
select the Details icon (shown at right) at the far
Summary of Contents for Firebox X1000
Page 1: ...WatchGuard Firebox System User Guide WatchGuard Firebox System...
Page 12: ...xii WatchGuard Firebox System...
Page 44: ...Chapter 2 Service and Support 22 WatchGuard Firebox System...
Page 61: ...Cabling the Firebox User Guide 39...
Page 68: ...Chapter 3 Getting Started 46 WatchGuard Firebox System...
Page 78: ...Chapter 4 Firebox Basics 56 WatchGuard Firebox System...
Page 156: ...Chapter 8 Configuring Filtered Services 134 WatchGuard Firebox System...
Page 182: ...Chapter 9 Configuring Proxied Services 160 WatchGuard Firebox System...
Page 220: ...Chapter 11 Intrusion Detection and Prevention 198 WatchGuard Firebox System...
Page 242: ...Chapter 12 Setting Up Logging and Notification 220 WatchGuard Firebox System...
Page 256: ...Chapter 13 Reviewing and Working with Log Files 234 WatchGuard Firebox System...
Page 274: ...Chapter 14 Generating Reports of Network Activity 252 WatchGuard Firebox System...