WatchGuard Training
Network Security Essentials for Locally-Managed Fireboxes

Educational goals:

  • • Set up the network configurations adapted to his company
  • • Understand and modify the most common rules and parameters
  • • Check that the firewall is working properly through logs and real-time tracking
  • • Set up and manage authentications
  • • Choose and implement the optional security features (WebBlocker, SpamBlocker, Application Control, RED, IPS, Anti-Virus, DLP, ...)
  • • Set up a Simple Site-To-Site VPN (BOVPN) in IPSEC
  • • Set up a remote Mobile VPN (MUVPN) in IPsec and SSL

Target population:

  • • System Administrator, Network Administrator

Prerequisites:

  • • Basic knowledge of networks and TCP / IP

Duration:

  • • 4 days

Dates:

  • Contact us to receive our training schedule

Program:

  • • Firebox Setup and Management
  • - Set Up a New Firebox
  • - Firebox Management Tools
  • - Configuration Files and Backup Images
  • - Role-based Administration
  • - Feature Keys
  • - Upgrade a Firebox
  • - Default Threat Protection
  • - Global Settings and NTP
  • - Policies Introduction
  • • Logging and Monitoring
  • - Logging and Notification
  • - Types of Log Messages
  • - Firebox Visibility with WatchGuard Cloud
  • - Set Up Dimension for Firebox Logging
  • - Configure Firebox Logging to Dimension
  • - Monitoring with Firebox System Manager
  • - Monitoring with Fireware Web UI
  • - Read Traffic Log Messages in Traffic Monitor
  • • Network Settings
  • - Network Routing Modes
  • - Interfaces
  • - WINS/DNS in Mixed Routing Mode
  • - Network Bridges
  • - Secondary Networks
  • - VLANS
  • - Static Routing
  • - Multi-WAN
  • - Multi-WAN Failover
  • - Multi-WAN Interface Overflow
  • - Multi-WAN Round Robin
  • - Multi-WAN Routing Table
  • - Link Monitor
  • - Routing Decisions Logic
  • - Software-Defined WAN (SD-WAN)
  • - Dynamic NAT
  • - Static NAT (SNAT)
  • - 1-to-1 NAT
  • - NAT Loopback
  • - Traffic Management
  • - Quality of Service (QoS)
  • • Firewall Policies
  • - Policy Source and Destination
  • - Management Policies
  • - Limit Policy Scope
  • - Policy Precedence
  • - Hidden Policies
  • - Policy Logging and Notification
  • - Policy Schedules
  • - Packet Filters and Proxy Policies
  • • Security Services
  • - Security Services Overview
  • - Globally Configured Security Services
  • - Intrusion Prevention Service
  • - Application Control
  • - Geolocation
  • - Tor Exit Node Blocking
  • • Proxies and Proxy-Based Services
  • - Proxies and Proxy Actions
  • - AntiVirus Scanning and Proxies
  • - APT Blocker
  • - SMTP-proxy Policies
  • - spamBlocker
  • - HTTP-proxy Policies and Proxy Actions
  • - WebBlocker and the HTTP and HTTPS Proxies
  • - HTTPS-proxy Policies
  • - Content Actions and Routing Actions
  • • Authentication
  • - Authentication Servers
  • - Firebox Authentication
  • - AuthPoint Authentication Server
  • - Third-Party Authentication Servers
  • - LDAP Authentication Servers
  • - Active Directory Authentication Servers
  • - RADIUS Authentication Servers
  • - SecurID Authentication Servers
  • - Users and Groups in Policies
  • • Mobile VPN
  • - Mobile VPN Introduction
  • - Select a Mobile VPN Type
  • - Mobile VPN with IKEv2
  • - Mobile VPN with L2TP
  • - Mobile VPN with SSL
  • - Setup Overview
  • - Client Configuration Files
  • - Mobile VPN Routing Options
  • • Branch Office VPN
  • - BOVPN Introduction
  • - Topology
  • - Fireware BOVPN Types
  • - IPSec VPN Algorithms and Protocols
  • - Policies and VPN Traffic
  • - VPN Negotiations
  • - BOVPN Configuration
  • - BOVPN Virtual Interface Configuration
  • - BOVPN and NAT
  • - BOVPN and Dynamic Public IP Addresses
  • - BOVPN over TLS
  • - BOVPN Topologies
  • - Troubleshoot BOVPN Tunnels