User guide
viii Firebox X Edge e-Series
About blocked ports........................................................................................................................................ 153
Default blocked ports ............................................................................................................................ 153
Block a port .................................................................................................................................................... 154
Drop DoS flood attacks .............................................................................................................................. 155
Distributed denial-of-service prevention............................................................................................ 156
Configure firewall options............................................................................................................................. 157
Chapter 10 Traffic Management .............................................................................................................. 159
About Traffic Management........................................................................................................................... 159
About network traffic ................................................................................................................................. 159
Causes for slow network traffic............................................................................................................... 159
Traffic Categories .............................................................................................................................................. 160
Interactive traffic ..................................................................................................................................... 160
High priority .............................................................................................................................................. 160
Medium priority....................................................................................................................................... 160
Low priority ............................................................................................................................................... 160
Traffic Marking ................................................................................................................................................... 161
About Traffic Control Options...................................................................................................................... 162
Enable Traffic Control ................................................................................................................................. 163
Related Questions................................................................................................................................... 164
Types of NAT.................................................................................................................................................. 165
NAT behavior............................................................................................................................................ 165
Secondary IP addresses ........................................................................................................................ 165
About dynamic NAT.................................................................................................................................... 166
About static NAT .......................................................................................................................................... 166
About 1-to-1 NAT......................................................................................................................................... 166
About 1-to-1 NAT and VPNs................................................................................................................ 167
Enable 1-to-1-NAT .................................................................................................................................. 167
Three steps are necessary to enable 1-to-1 NAT: ........................................................................ 167
Add a secondary external IP address for 1-to1 NAT mapping................................................ 168
Add or edit a policy for 1-to-1 NAT................................................................................................... 168
Enable secondary addresses............................................................................................................... 168
Add or edit a policy for 1-to-1 NAT................................................................................................... 168
Chapter 11 Logging ..................................................................................................................................169
About logging and log files .......................................................................................................................... 169
Log Servers ................................................................................................................................................ 169
Event Log and System Status Syslog ............................................................................................... 170
Logging and notification in applications and servers ............................................................... 170
About log messages............................................................................................................................... 170
See the event log file ....................................................................................................................................... 170
To see the event log file............................................................................................................................. 170
Send your event logs to the Log Server............................................................................................... 171
Send logs to a Syslog host ........................................................................................................................ 173
Chapter 12 Certificates .............................................................................................................................175
About certificates.............................................................................................................................................. 175
Certificate authorities and signing requests ................................................................................. 175
About certificates and the Firebox X Edge .................................................................................... 175
Create a certificate............................................................................................................................................ 176
Use OpenSSL to generate a CSR ............................................................................................................. 176