
Blocking a site permanently
44
2
Modify the default packet-handling properties according to your security policy
preferences.
For a description of each control, right-click the control, and then click What’s This?
3
Click
OK
.
Blocking a site permanently
The WatchGuard auto-blocking and logging mechanisms help you decide which sites
to permanently block.
Use Policy Manager to block a site permanently. The default configuration blocks
three network addresses – 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. These are
the “unconnected” network addresses. Because they are for private use, backbone
routers should never pass traffic with these addresses in the source or destination
field of an IP packet. Traffic from one of these addresses is almost certainly a spoofed
or otherwise suspect address. RFCs 1918, 1627, and 1597 cover the use of these
addresses.
From the Policy Manager:
1
On the toolbar, click the Blocked Sites icon.
You can also select Setup
=>
Blocked Sites. The Blocked Sites dialog box appears.
2
Click
Add
.
3
Use the
Choose Type
drop list to select a member type.
4
Enter the member value.
Depending on the member type, the value can be an IP address, host name, or username.
5
Click
OK
.
The Blocked Sites dialog box appears, displaying the new member in the Blocked Sites list.
Removing a blocked site
From the
Blocked Sites
dialog box, select the site to remove, and then click
Remove
.
Changing the auto-block duration
From the
Blocked Sites
dialog box, either type or use the scroll control to change the
duration, in minutes, that the firewall automatically blocks suspect sites. Duration
can range from 1 to 32,767 minutes (about 22 days).
Logging and notification for blocked sites
From the
Blocked Sites
dialog box:
1
Click
Logging
.
The Logging and Notification dialog box appears.
The Blocked Sites list applies only to traffic on the External interface.
Connections between the Trusted and Optional interfaces are not subject to
the Blocked Sites list.
Содержание Firebox FireboxTM System 4.6
Страница 1: ...WatchGuard Firebox System User Guide Firebox System 4 6 ...
Страница 16: ...6 ...
Страница 20: ...LiveSecurity broadcasts 10 ...
Страница 44: ...LiveSecurity Event Processor 34 ...
Страница 52: ...Defining a Firebox as a DHCP server 42 ...
Страница 68: ...Service precedence 58 ...
Страница 78: ...Configuring a service for incoming static NAT 68 ...
Страница 92: ...Establishing an OOB connection 82 ...
Страница 94: ...84 ...
Страница 112: ...HostWatch 102 ...
Страница 118: ...Working with log files 108 ...
Страница 130: ...120 ...
Страница 158: ...Configuring debugging options 148 ...