User Guide
xix
Detecting Man-in-the-Middle Attacks
............................183
Blocking Sites
..............................................................184
Blocking a site permanently
.........................................185
Creating exceptions to the Blocked Sites list
...................187
Changing the auto-block duration
................................187
Logging and notification for blocked sites
......................188
Blocking Ports
..............................................................188
Avoiding problems with legitimate users
........................191
Blocking a port permanently
........................................191
Auto-blocking sites that try to use blocked ports
.............192
Setting logging and notification for blocked ports
...........192
Blocking Sites Temporarily with Service Settings
.............192
Configuring a service to temporarily block sites
...............193
Viewing the Blocked Sites list
.......................................193
Integrating Intrusion Detection
......................................193
Using the fbidsmate command-line utility
.......................195
CHAPTER 12
Setting Up Logging and Notification
...199
Developing Logging and Notification Policies
................200
Logging policy
..........................................................200
Notification policy
.....................................................201
Failover Logging
..........................................................202
WatchGuard Logging Architecture
................................203
Designating Log Hosts for a Firebox
..............................203
Adding a log host
......................................................204
Enabling Syslog logging
.............................................205
Changing the log encryption key
..................................205
Removing a log host
..................................................206
Reordering log hosts
..................................................206
Synchronizing log hosts
..............................................206
Setting up the WatchGuard Security Event Processor
......207
Running the WSEP application on Windows NT,
Windows 2000, or Windows XP
............................207
Viewing the WSEP application
.....................................210
Starting and stopping the WSEP
...................................210
Содержание Firebox X1000
Страница 1: ...WatchGuard Firebox System User Guide WatchGuard Firebox System...
Страница 12: ...xii WatchGuard Firebox System...
Страница 44: ...Chapter 2 Service and Support 22 WatchGuard Firebox System...
Страница 61: ...Cabling the Firebox User Guide 39...
Страница 68: ...Chapter 3 Getting Started 46 WatchGuard Firebox System...
Страница 78: ...Chapter 4 Firebox Basics 56 WatchGuard Firebox System...
Страница 156: ...Chapter 8 Configuring Filtered Services 134 WatchGuard Firebox System...
Страница 182: ...Chapter 9 Configuring Proxied Services 160 WatchGuard Firebox System...
Страница 220: ...Chapter 11 Intrusion Detection and Prevention 198 WatchGuard Firebox System...
Страница 242: ...Chapter 12 Setting Up Logging and Notification 220 WatchGuard Firebox System...
Страница 255: ...Working with Log Files User Guide 233 appear until the remote office Firebox has been properly configured...
Страница 256: ...Chapter 13 Reviewing and Working with Log Files 234 WatchGuard Firebox System...
Страница 274: ...Chapter 14 Generating Reports of Network Activity 252 WatchGuard Firebox System...