What’s New in Fireware XTM v11.8 WatchGuard Training What’s New in XTM 11.8 Proxies and Services • • DLP (Data Loss Prevention) YouTube for Schools WatchGuard AP Enhancements Authentication • • • Indirect LDAP Query Support SSO with the new Exchange Monitor SSO Port Tester Enhanced Support for IPv6 Updated Web UI • • FireWatch Front Panel WatchGuard Training VPN • • • • Branch Office VPN Virtual Interface Management Tunnel over SSL SHA2 Support Mobile VPN with SSL VPN client password control Other • • Multiple PPPoE sessions per interface Global setting to clear connections that use an SNAT action you modify. 2 XTM Data Loss Prevention WatchGuard Training What is DLP? A service that prevents costly data breaches by scanning and detecting the transfer of sensitive information over email, web, and FTP. DLP detects information in categories such as: • • • Financial Data (Bank routing numbers) HIPAA (PHI, patient forms) PII (Personally Identifiable Information) WatchGuard Training Drivers’ licenses Ethnicity terms National ID/insurance Email addresses Postal addresses 4 DLP — How it Works DLP scans proxied SMTP, FTP, and HTTP connections. • HTTPS can be scanned if deep inspection is enabled in the HTTPS proxy action. DLP uses Sophos libraries for two purposes: • Text Extraction • Extracts plain text from over 30 file formats, including PDF, HTML, Microsoft Word, Excel, Visio, and Project. Content Analysis Detects over 200 different patterns, known as content control rules WatchGuard Training 5 DLP — How it Works The same process handles AV scanning and DLP scanning. • • • When a proxy sends a scan request, it can be for AV, DLP, or both. Each scan request includes a list of content control rules to use. AV scan result actions take precedence over DLP. WatchGuard Training 6 DLP — Content Control Rules Content control rules match a pattern multiple times. Rule Name Postal addresses [Global] Postal addresses [USA] Email addresses [Global] Ethnicity terms [UK] Ethnicity terms [USA] Ethnicity terms [Canada] Social security numbers [USA] Passport details [Global] Telephone numbers [USA] Credit or debit card numbers with qualifying terms [Global] Credit or debit card numbers [Global] Personal health card number, Ontario [Canada] Quantity 100 100 100 10 10 10 10 5 100 10 10 1 The quantity for each rule is a measure of the weighted number of matches the rule must find to identify content as a DLP violation. • • Because the DLP rules use multiple expressions to find matching text, and use weights to adjust the rule sensitivity, the quantity shown does not always correspond exactly to the number of text matches required to trigger the rule. To see DLP rules and quantities go to http://www.watchguard.com/SecurityPortal. WatchGuard Training 7 DLP – Support by Model This table shows you signature set and text extraction available for each model. Model Rule Set Text Extraction XTM 25/26 XTM 3 Series Standard (140 rules) No XTM 5 Series Standard (140 rules) 30 file types XTM 8 Series XTM 1520/1525 XTM 1050/2050 XTM 2520 XTMv Enterprise (210 rules) 30 file types WatchGuard Training 8 DLP — Scanning and Performance Available DLP rule sets vary by device • • XTM 2, XTM 3, and XTM 5 Series (Standard) XTMv, XTM 8 Series and higher (Enterprise) Just as with AV, DLP scanning consumes resources Performance impact can vary by configuration • • Performance varies by number and type of selected rules Avoid selecting unnecessary rules WatchGuard Training 9 DLP — Configuration Workflow Update feature key Enable Data Loss Prevention Add a DLP Sensor using the wizard • • • Apply sensor to proxy policies Select content control rules Select actions to take when content is detected in email and non-email traffic. WatchGuard Training 10 DLP - Configuration Workflow Edit Sensors • • • Enable/disable rules Configure sensor actions by source and destination Configure sensor settings Set actions for items that cannot be scanned due to: – Size exceeds scan limit – Scan error – File is password protected Set the file scan limit WatchGuard Training 11 DLP — Built-In Sensors DLP includes two built-in sensors • HIPAA Audit Sensor • Detects content related to compliance with HIPAA security standards PCI Audit Sensor Detects content related to compliance with PCI security standards WatchGuard Training 12 YouTube for Schools WatchGuard Training YouTube for Schools — Overview YouTube Education Filter • • Schools need YouTube, but want to be able to control access to specific content YouTube created to support EDU-only content, instead of having schools deny YouTube overall How it works • • School administrator obtains ID from YouTube They must log in using their school’s Google account. https://www.youtube.com/schools X-YouTube-Edu-Filter header added to HTTP requests HTTPS with DPI WatchGuard Training 14 YouTube for Schools — Configuration Enable YouTube for Schools in the HTTP Proxy Action Type the School ID WatchGuard Training 15 YouTube for Schools — Example HTTP request • • Original request headers GET /feed/dK0sTdv5FonSsAOcx83YBw12947736341343 HTTP/1.1 Host: www.youtube.com New request headers GET /feed/dK0sTdv5FonSsAOcx83YBw12947736341343 HTTP/1.1 X-YouTube-Edu-Filter: P4SHoKOOZOJDQU8PRSCXtA Host: www.youtube.com By handling this on the XTM device, the school does not need to deal with configuration of various machines, including BYOD WatchGuard Training 16 AP Enhancements WatchGuard Training AP Enhancements — Overview Select radio channel (72135) Set maximum data rate Management VLAN tagging (71403) “Updating” Status (72628) New firmware WatchGuard Training 18 AP Enhancements — Radio Settings Preferred Channel • • Update the list of available AP channels. Select the preferred channel. Rate • Set the maximum speed at which wireless clients can send data. WatchGuard Training 19 AP Enhancements — Management VLAN Tagging Enable management VLAN tagging, and select a management VLAN ID. • • After the AP device is paired, management connections use the selected VLAN. An unpaired AP device cannot accept management connections on the VLAN. WatchGuard Training 20 “Updating” Status New AP status in the Firebox System Manager Gateway Wireless Controller tab. • • • When you save an access point configuration to the XTM device, the XTM device immediately sends the update to the affected AP devices. While the update is in progress, the AP device status changes to Updating. The update process can take up to a minute to complete. During this time wireless services might be interrupted on the AP device. WatchGuard Training 21 AP Firmware Update The XTM OS update includes updated firmware for WatchGuard AP devices, to enable the new AP features. Make sure that automatic updates are enabled in the Gateway Wireless Controller settings so the XTM device updates all paired AP devices. If you don’t want to enable automatic updates, you can manually upgrade each AP device. • • Download the AP device firmware from the Software Downloads site. Connect to the web UI on the AP device to upgrade the firmware. WatchGuard Training 22 LDAP Authentication Using Indirect Queries WatchGuard Training LDAP — Background LDAP Authentication using the “memberOf” group string, or other user attributes, queries the Directory Service for the user object, and identifies group membership based on this attribute of the user. This is considered a direct query. Some LDAP services, like Novell, use other attributes of the user object to identify group membership. Others, such as OpenLDAP, do not have such an attribute at all unless you enable a “memberOf overlay”. This requires detailed knowledge of the LDAP service being used, or extending the schema. An alternative to this is an indirect query, where the user is identified, and the entire directory is searched looking at attributes of all groups to find where the user is a member. WatchGuard Training 24 LDAP — How it Works We’ve added support for indirect queries using Object Classes defined in these two RFCs: • • RFC2256 — A summary of the X.500 User Schema for use with LDAPv3 defines Object Class “groupOfNames”. Users are identified in the “member” attribute of each group object. RFC2307 — An approach for using LDAP as a Network Information Service defines Object Classes “posixGroup” and “posixAccount”. The “gidNumber” attribute identifies each group object, and the “memberUid” attribute of each group identifies the users that are members of the group. There are no visible UI changes to add support for indirect queries in Fireware XTM v11.8. • Triggered by the entry in the “Group String” attribute WatchGuard Training 25 LDAP — Using RFC2256 “groupOfNames” Object Class “groupOfNames” is used to manage groups. Users are identified using the “member” attribute of each group object. Configure “member” as the Group String for LDAP. XTM performs two search queries to identify groups: • • First search — Identify the DN of this user. Second search — Identify all entries of groupOfNames where “member” attribute contains the user DN. Extract the name, “cn” attribute, of each group returned by server. WatchGuard Training 26 LDAP — RFC2256 “groupOfNames” Example Example: User “user2” belongs to group called “market”. A “member” of groupOfNames object “market” includes the DN for user2. WatchGuard Training 27 LDAP — Using RFC2307 “posixGroup” Object class posixAccount and posixGroup are used to manage groups. Groups are identified by gidNumber and users by memberUid. Configure “memberUid” or “gidNumber” as the group string for LDAP. WatchGuard Training 28 LDAP — Using RFC2307 “posixGroup” Fireware XTM uses three search queries to retrieve group information. • • • First search: Identify DN, “uid”, “gidNumber” of the user. Second search: Get all entries of posixGroup from server with the filter “memberUid=<uid>”. Extract the name, “cn” attriburte, of each group returned by the server. Third search: Get one entry of posixGroup from server with the filter “gidNumber=<gid_number>”. Extract the name, “cn” attribute, of the posix primary group. This third search is required as LDAP servers will not return the posix primary group, the group that matches the “gidNumber” seen for the user, in the second search. Combine the groups from the second and third search. WatchGuard Training 29 LDAP — Case 3 Solution (continued, XTM Search) Example: User “pos_group1_user1” belongs to group “pos_group1” and “pos_group3”; its uid is “pos_group1_user1”, its gidNumber is 203. WatchGuard Training 30 LDAP — Case 3 Solution (continued, XTM Search) memberUid of posixGroup “pos_group1” include user “pos_group1_user1”. WatchGuard Training 31 LDAP — Case 3 Solution (continued, XTM Search) “gidNumber” of “pos_group3” is 203. WatchGuard Training 32 SSO Authentication Support for Mac OS X WatchGuard Training Enhanced SSO Support — Overview In Fireware XTM v11.8, Single Sign-On (SSO) support has been enhanced: • • • SSO now supports Mac OS X (RFE64443) SSO now supports iOS and Android The SSO Agent can now be used independently with greater accuracy To provide SSO functionality for these new use cases, the SSO authentication solution includes two new components: • • EM (Exchange Monitor) SSO Client for Mac OS X WatchGuard Training 34 Enhanced SSO Support — Overview Single Sign-On options, at a glance: SSO Component Windows SSO Agent SSO Client (Both a Windows and Mac OS X Client are available) Event Log Monitor Exchange Monitor WatchGuard Training Mac OS X iOS Android 35 Enhanced SSO Support — Exchange Monitor (EM) EM takes advantage of the close relationship between Microsoft Exchange server and Active Directory server. • For example: An organization uses Microsoft Exchange Server and Active Directory domain server. Everyday the first thing each employee does is to use their office equipment, including PC, laptop, iPhone, iPad and so on, to deal with emails. Afterwards, they access the internet. Users cannot log in their mailboxes until their domain accounts are authenticated by Exchange Server. Exchange Monitor (EM) • • • Does not remove or replace the functionality of existing SSO components. Instead, it extends SSO support of logon/logoff functionality to Mac OS X, IOS, Android, and Windows OS New component in XTM SSO software set Must be installed on the same server as Microsoft Exchange WatchGuard Training 36 Enhanced SSO Support — Exchange Monitor (EM) What is EM? • • • • EM tightly integrates with Microsoft Exchange Works only in the environment in which Microsoft Exchange Server is deployed EM is similar to ELM, running as a Windows service process EM is responsible for: Monitoring the logon/logoff action for domain accounts Notifying the SSO Agent real-time Responding to the command request( “get user”) sent by the SSO Agent. WatchGuard Training 37 Enhanced SSO Support — SSO Client for Mac OS X What is the SSO Client for Mac OS X? • • • • Works in an environment without Microsoft Exchange Server Similar to the SSO Client for Windows Install the client software on workstations in the domain that run Mac OS X Support Mac OS X 10.6+ Supports the use case in which a user logs on from his MacBook with his Active Directory domain account. WatchGuard Training 38 Enhanced SSO Support — Other Changes Different SSO Contacts in UI Different way to get groups New Session check interval • Applies only to Exchange Monitor and OS X/Android/iOS users WatchGuard Training 39 Enhanced SSO Support — Agent Contact Settings In Fireware XTM v11.8, Agent Contacts include: • • • SSO client Event Log Monitor Exchange Monitor WatchGuard Training 40 Enhanced SSO Support — Group Retrieval Before XTM v11.8, ELM/SSO clients returned group information to the SSO Agent. With XTM v11.8, ELM/EM/SSO clients return user/domain/IP address information to the SSO Agent. The SSO Agent queries the AD server to get all groups. Compatibility • • XTM v11.8 SSO Agent works with pre-v11.8 SSO Client/ELM XTM v11.8 ELM/SSO Client/EM does NOT work with pre-v11.8 SSO Agent WatchGuard Training 41 Enhanced SSO Support — Session Check Interval The new Session Check Interval is used for non-Windows clients only. For non-Windows clients, logoff events are detected using Microsoft Exchange internal tables. For any active client, Exchange Monitor saves the time of last activity. Exchange Monitor sends logoff event information for any active nonWindows client to the SSO Agent if it cannot detect any activity in the time span specified in the Session Check Interval setting. The default Session Check Interval is 40 minutes. WatchGuard Training 42 Enhanced SSO Support — Session Check Interval Why is the default Session Check Interval set to 40 minutes? • • On Mac OS X mail clients, the default setting for Check for New Messages setting is 30 minutes. Therefore, the Session Check Interval has to be more than 30 minutes. In general, we recommend: Session Check Interval = Max(Check for Message) + 2 • Where Max(Check for Message) is the maximum value of all non-Windows devices running a mail client. 2 minutes is the amount of time that EM requires to detect changes in the IIS log. WatchGuard Training 43 Enhanced SSO Support — Test SSO Port To verify that the SSO Agent can contact the Event Log Monitor and the Exchange Monitor, you can use the SSO Port Tester tool. • • In the Clientless SSO Settings, select Test SSO Port. In the SSO Port Tester, you can test IP addresses and ports for SSO. WatchGuard Training 44 IPv6 Support WatchGuard Training IPv6 Support XTM v11.7.4 supported: • • • • • • IPv6 addresses in packet filter policies MAC access control for both IPv6 and IPv4 traffic Inspection of IPv6 traffic received and sent by the same interface IPv6 addresses in blocked sites and exceptions Blocked ports configuration applies to IPv6 traffic TCP SYN checking setting applies to IPv6 traffic WatchGuard Training XTM v11.8 adds: • • • • • Authentication on https://<IPv6 firebox>:4100 page is now possible DHCPv6 options available on interfaces that use IPv6 IPv6 FireCluster Management addresses IPS and Application Control now apply to IPv6 networks Default Packet Handling options to block IPSec, IKE, ICMP, SYN, and UDP flood attacks now apply to IPv6 networks 46 IPv6 Support — Authentication You can now authenticate to an XTM device configured with an IPv6 address (https://<IPv6 firebox>:4100) • Example: https://[2001::254]:4100 WatchGuard Training 47 IPv6 Support — Authentication With Fireware XTM v11.8, users can now connect from an IPv6 address to the IPv6 address of XTM. But XTM still connects to its configured 3rd party authentication server by its IPv4 address. Some authentication functions are NOT supported in this release: • • • • • Single Sign-On Terminal Services VPN Support FQDN for RADIUS and SecurID Automatic redirect of users to the authentication page WatchGuard Training 48 IPv6 Support — DHCPv6 Use DHCPv6 to request an IPv6 address for an external interface. • • Select Enable DHCPv6 Client. Enable the Rapid Commit option if you want to use a rapid two-message exchange to get an IPv6 address. WatchGuard Training 49 IPv6 Support — DHCPv6 Configure a DHCPv6 Server for a trusted or optional interface. WatchGuard Training 50 IPv6 Support — DHCPv6 When you enable IPv6 for a trusted or optional interface, you can enable the DHCPv6 server on the interface, to assign IPv6 addresses to clients that connect. Limitations for this release: • • • DHCPv6 is supported only on physical interfaces. DHCPv6 Server is not supported in Drop-in and Bridge mode. You cannot configure DHCPv6 for any external interface that uses PPPoE. WatchGuard Training 51 IPv6 Support — Flood Attack Prevention Default Packet Handling flood attack prevention now applies to IPv6 traffic (ICMPv6, UDP, IKE, SYN, IPSec) WatchGuard Training 52 IPv6 Support — IPS and Application Control Intrusion Prevention Service and Application Control now apply to IPv6 traffic. WatchGuard Training 53 IPv6 Support — FireCluster The FireCluster now includes an option to configure an IPv6 management IP address. • This option is available only when the FireCluster management interface has IPv6 enabled You can use the IPv6 management address to connect directly to a cluster member for management. WatchGuard Training 54 IPv6 Support — FireCluster Supported • • • Active/Active Active/Passive Cluster management interface IP address WatchGuard Training Not Supported • • IPv6 cluster interface IP address Failover for features that do not support IPv6, including: Branch Office VPN Proxy Mobile VPN with IPSec Mobile VPN with SSL Mobile VPN with L2TP Mobile VPN with PPTP Dynamic Routing Multi-WAN 55 Branch Office VPN Virtual Interface WatchGuard Training Branch Office VPN Virtual Interface Support (BOVPN VIF) To provide more flexibility and capabilities, Fireware XTM now supports the option to configure a Branch Office VPN as a virtual interface. Fireware XTM uses GRE (Generic Routing Encapsulation) to create the VPN virtual interface. When you configure a BOVPN virtual interface, the BOVPN virtual interface is included in the routes table. • • • You can add static routes for a BOVPN virtual interface The BOVPN virtual interface can participate in dynamic routing. The XTM device uses the routes table to determine whether to route a packet through the BOVPN virtual interface or through another interface. Fireware XTM continues to support the existing branch office VPN functionality. You can simultaneously configure both types of branch office VPN. BOVPN VIF helps customers meet the needs of three particular configuration scenarios, described next. WatchGuard Training 57 BOVPN VIF — Metric-based VPN Failover and Failback Objective: • For two sites that are connected with an MPLS link, enable traffic to automatically failover and failback to a secondary branch office VPN connection over an IP network. Configuration Summary: • • • Configure the external interfaces for the primary connection between the two sites over the MPLS network Configure a BOVPN virtual interface for the secondary link between the two sites. Add a BOVPN virtual interface static route, and set a high metric (such as 200) for the route. How it works: • Because the BOVPN VIF route has a high metric, the XTM device uses the MPLS route, when it is available. If the MPLS link is not available, the XTM device uses the BOVPN VIF route. When the MPLS route becomes available again, the XTM device automatically fails back to use that route, because it has a lower metric. WatchGuard Training 58 BOVPN VIF — Dynamic Routing Objective: • Enable two sites to dynamically exchange information about routes to multiple local networks through a VPN tunnel. This avoids the need to manually configure those routes. Configuration Summary: • • • Configure a BOVPN VIF, add local and peer IP addresses. In the dynamic routing configuration, use the peer IP address from the BOVPN VIF configuration, with a /32 netmask. • • OSPF example: network <peer_virtual_ip>/32 area 0.0.0.0 BGP example: neighbor <peer_virtual_ip> remote-as 65535 Use dynamic routing commands to configure which local networks each device propagates routes for. How it Works: • The dynamic routing protocol enables each gateway to automatically learn the routes to local networks propagated by the peer gateway through the BOVPN virtual interface. WatchGuard Training 59 BOVPN VIF — Policy-based BOVPN Objective: • At a site with two branch office gateways, send latencysensitive traffic, such as VoIP through the tunnel over the network with the lowest latency, and send all other traffic, such as FTP, through the other tunnel route. Configuration Summary: • • • Configure two BOVPN virtual interfaces between the sites. Do not add routes. In the SIP policy that handles VoIP traffic, enable policybased routing to the BOVPN VIF with the lowest latency. For all other traffic, define routes (static or dynamic) and use the other BOVPN virtual interface. How it Works: • The policy determines the source and destination addresses. Although routes are not defined in the BOVPN virtual interface settings, the SIP policy uses policy-based routing to redirect traffic through the lower-latency tunnel. WatchGuard Training 60 BOVPN VIF — Configuration New BOVPN Virtual Interfaces option, shown here in Policy Manager: New UI in VPN Settings: WatchGuard Training 61 BOVPN VIF — Add a New BOVPN Virtual Interface Device Name is assigned by the system. Select “Start Phase1 tunnel…” when no VPN Routes are defined and the BOVPN virtual interface is used with either Policy-Based Routing or Dynamic Routing. WatchGuard Training 62 BOVPN VIF — Add a New BOVPN Virtual Interface Virtual Interface IP addresses are required when used with Dynamic Routing. Add a static route in the VPN Routes tab of a BOVPN VIF, or select Network > Routes. A BOVPN VIF is equivalent to one Security Association (SA). WatchGuard Training 63 BOVPN VIF — Add Tunnel Routes Using VPN Routes: Using Network > Routes: WatchGuard Training IPv4 Host or Network Routes can be added to the BOVPN. Or, you can add the route in Network > Routes. Route Type must be BOVPN Virtual Interface Route. The correct BOVPN Virtual Interface must be selected for the Route. Metric can be configured for multipath routes. 64 Management Tunnel over SSL WatchGuard Training Management Tunnel over SSL Challenge • • An administrator at the corporate headquarters of a distributed organization wants to centrally manage multiple XTM devices from the corporate trusted network. They do not necessarily have control of the upstream routers and may or may not have a public IP address. While Fireware XTM already supported the creation of a special management tunnel for this situation using IPSec, many third party devices allow only ports 80, 443, and 53 by default, and IPSec was not an effective solution. Solution • Fireware XTM v11.8 adds support for an SSL-based management tunnel so you can use either IPSec or SSL. WatchGuard Training 66 Management Tunnel over SSL If you use an SSL-based management method, consider: • • • General limitations of OpenSSL. There can be conflicts between the SSL Management Tunnel and the use of Mobile VPN with SSL. You can use both at the same time, but the XTM device must be able to differentiate between the management session and a Mobile VPN with SSL session. SSL builds virtual networks between devices, which means routes must be correctly configured. WatchGuard Training 67 Management Tunnel over SSL — Configuration From the Management Server, configure the Management Tunnel gateway Firebox. • • • The gateway Firebox must have a static external IP address. In the Management Tunnel Settings, set the Tunnel Type to: SSL or IPSec SSL Only IPSec Only For an SSL tunnel, you must configure the SSL Server IP Address/Name. WatchGuard Training 68 Management Tunnel over SSL — Configuration From the Management Server, configure the remote XTM devices. • • • • Each remote XTM device must have a dynamic external IP address. In the Management Tunnel Settings, set the Tunnel Type to SSL. For an SSL tunnel, you must also specify these authentication settings: SSL Tunnel ID — the Device Name of the hub device SSL Tunnel Password The Management Server also updates these authentication settings on the gateway Firebox. WatchGuard Training 69 Management Tunnel over SSL First, the SSL client device contacts the SSL server on port 443. After the tunnel is established, the remote client can successfully contact the Management Server. • • The new interface for this tunnel now available on the SSL client firewall is called tun_mgmt_0. The Source IP will be the assigned virtual IP address. WatchGuard Training 70 Management Tunnel over SSL Authentication process: • For SSL server: 1. 2. 3. • A new local user group SSLVPN-Mgmt-Clients is created to ensure the remote SSL users using Mobile VPN client software do not overlap with the centralized management session. In the SSL management tunnel, the Tunnel ID is the equivalent of the mobile VPN client username. You cannot have the same username in both the SSLVPN-Mgmt-Clients group and in the SSLVPN-Users group. For SSL client: WatchGuard Training You only need to specify the Tunnel ID, SSL password, and the management encryption and certificate details. 71 SHA2 Support WatchGuard Training SHA2 Support Fireware XTM v11.8 adds support for SHA2 for branch office VPN, Mobile VPN with IPSec, and Mobile VPN with L2TP. SHA2 is stronger than either SHA1 or MD5. Fireware XTM supports three variants of SHA2. • • • SHA2-256 — produces a 265 bit (32 byte) message digest. SHA2-384 — produces a 384 bit (48 byte) message digest. SHA2-512 — produces a 512 bit (64 byte) message digest SHA2 is supported only on XTM devices with hardware cryptographic acceleration for SHA2. • • SHA2 is not supported on XTM 21, 22, 23, 5 Series, 810, 820, 830, 1050, and 2050 devices. SHA2 appears as an option in the configuration only if it is supported on the hardware. WatchGuard Training 73 SHA2 Support SHA2 is supported for • • • Branch Office VPN Mobile VPN with IPSec Mobile VPN with L2TP For Mobile VPN with IPSec, SHA2 is supported for VPN connections from: • • • Shrew Soft VPN client v2.2.1 or higher WatchGuard IPSec Mobile VPN client v11.32 or higher. SHA2 is not supported for VPN connections from Android or iOS devices, and is not supported by older versions of the Shrew Soft or WatchGuard IPSec VPN clients. WatchGuard Training 74 Mobile VPN with SSL Password Control WatchGuard Training Mobile VPN with SSL Password Control A new check box in the Mobile VPN with SSL configuration controls whether the Mobile VPN with SSL client remembers the password. The Remember connection details option is removed from the client. • • The client always remembers the Server and Username. The client remembers the Password only if you allow it in the Mobile VPN with SSL configuration. WatchGuard Training 76 Updated Web UI WatchGuard Training Updated Web UI No longer dependent on Adobe Flash Player. Adobe Flex is replaced by HTML and JavaScript. Mobile Ready — Responsive web interface is designed to provide optimal viewing experience for users on all types of devices such as desktop browsers, tablets and smart phones. Improved Monitoring Capability — Dashboard and System Status sections now offer functionality similar to Firebox System Manager. WatchGuard Training 78 Web UI — Responsive Design The new Web UI is responsive to the size of the viewport it is being displayed in. The layout of the user interface changes depending on the size of the browser window. The lowest resolution is 320x768 in either portrait or landscape mode. When a viewport drops below a width of 768 pixels (the width of a landscape phone or portrait mode on a tablet) the left navigation menu moves to the top provide space on the screen for the rest of the content. WatchGuard Training 79 Web UI — Responsive Design (continued) The form elements in pages respond to the width of the viewport. Example page on a desktop viewport WatchGuard Training Equivalent page on a smaller viewport 80 Web UI — Session Expiration If your login session expires (usually this is caused by the session timeout setting being triggered), you are immediately notified by an alert at the top of the screen. This alert includes a login link to redirect you to the login page. After successful login, the browser displays the page you were on before session expiration. WatchGuard Training 81 Web UI — Success Message and Redirection During configuration changes, a successful save displays a success message at the top of the current parent page. WatchGuard Training 82 Web UI — Firewall Policies Actions • • You can now clone actions directly from a policy. You can edit a non-default action or apply existing actions within the policy. WatchGuard Training 83 Web UI — Firewall Policies (continued) Actions can now be created within the policy for: • • • • Application Control Schedule Traffic Management Proxy WatchGuard Training 84 Web UI — System Status Many System Status features have moved into the Dashboards. The table shows where features from the previous Web UI have moved to in the new Web UI. WatchGuard Training 85 Web UI — System Status (continued) WatchGuard Training 86 Web UI — System Status Copy Copy buttons have been removed from the UI. You can now select and copy text in the browser just as you would on any other web page. WatchGuard Training 87 Web UI — Refresh Buttons and Timers The Refresh button and timer controls have been removed from the System Status pages. Pages with information that need to be actively refreshed are all in the Dashboard section. The Dashboard pages all refresh every 30 seconds automatically with the exception of the Traffic Monitor, which refreshes every 5 seconds. WatchGuard Training 88 Web UI — Traffic Monitor Refreshes every 5 seconds WatchGuard Training 89 Web UI — FireWatch FireWatch is a real-time, interactive report tool, that groups, aggregates, and filters statistics about the traffic through your XTM device in an easy-tounderstand form. FireWatch includes options to pivot, refine, and filter information about your firewall traffic. WatchGuard Training 90 Web UI — FireWatch Some of the information you can see at a glance includes: • • • • • • • Top Users Top Domains Application Usage Bandwidth Usage Firewall Traffic Security Service Activity Device State WatchGuard Training 91 Secondary PPPoE Interfaces WatchGuard Training Secondary PPPoE Interfaces Secondary PPPoE interfaces enable a single external interface to support multiple simultaneous PPPoE connections. • • • Enable PPPoE on an external interface. Add up to 25 secondary PPPoE interfaces. Associate each secondary with a primary external interface that has PPPoE enabled. WatchGuard Training 93 Global Setting to Clear Active Connections By default, the XTM device does not clear active connections when you modify a static NAT action. You can change the global SNAT setting so that the XTM device clears active connections that use an SNAT action you modify. WatchGuard Training 94 Thank You! WatchGuard Training 95