User guide
User Guideii
CHAPTER 3 Putting Fireware on the Firebox ...........................................23
Using the Quick Setup Wizard .............................................................23
Connecting to the Firebox ...................................................................31
Using fbxinstall.exe ............................................................................33
Restoring a Backup Image ..................................................................33
Upgrading to Fireware Pro ..................................................................33
CHAPTER 4 Making a Fireware Configuration .........................................35
Basic Configuration Properties ............................................................36
Connecting to a Firebox with Fireware Pro .............................................36
Working with Interfaces .....................................................................36
Configuring your Network ...................................................................38
DHCP Server ...................................................................................39
Intrusion Prevention/Default Packet Handling .....................................41
Blocked Sites ...................................................................................41
Network Address Translation (NAT) ......................................................43
Logging ..........................................................................................44
Firewall Authentication .......................................................................45
Virtual Private Networking ...................................................................46
Firebox Managed Clients ....................................................................46
Remote User ...................................................................................46
Mobile User VPN ...............................................................................46
Gateways ........................................................................................47
Tunnels ...........................................................................................48
IPSec Routing Policies .......................................................................48
Services ............................................................................................50
Service-based NAT ............................................................................50
CHAPTER 5 Working with Proxies ...........................................................53
Proxy Migration ..................................................................................53
Configuring the HTTP Proxy .................................................................55
Configuring the Incoming SMTP Proxy ..................................................61
Clone the SMTP-Incoming Proxy Action ..................................................62
Outoing SMTP ....................................................................................66
Clone the SMTP Outgoing proxy action ..................................................66
FTP Proxy ..........................................................................................70
Clone the FTP-Client or FTP-Server proxy action. ......................................70