User guide

Deploying the Firebox into Your Network
User Guide 39
Deploying the Firebox into Your Network
Congratulations! You have completed the installation of your Firebox. The
Firebox can now be used as a basic firewall with the following properties:
All outgoing traffic is allowed.
All incoming traffic is blocked except
ping on the External interface.
Logs are sent to the WatchGuard Security Event Processor on the
Management Station.
Complete the following steps to deploy the Firebox into your network:
Place the Firebox in its permanent physical location.
Connect the Firebox to your network.
If using a routed configuration, change the default gateway setting on
all desktops to the Firebox Trusted IP address.
What’s Next
You have successfully installed, configured, and deployed your new
Firebox System on your network. Here are some things to remember as a
new customer.
Customizing your security policy
Your organization’s security policy defines who can get into your
network, where they can go, and who can get out. The security policy is
enacted by your Firebox’s configuration file.
The configuration file you created using the QuickSetup Wizard is only a
basic configuration. You should now create a configuration file that meets
the requirements of your security policy. You do this by adding filtered
and proxied services, in addition to the basic ones described in the
previous section, that expand what you allow in and out of your firewall.
Every service brings trade-offs between network security and
accessibility. When selecting services, balance the needs of your
organization with the requirement that computer assets be protected from
attack. Some common services that organizations typically add, in