Watchguard Firebox X5500E Reference Manual

Watchguard Firebox X5500E Reference Manual

Vpn gateway
Hide thumbs Also See for Firebox X5500E:
Table of Contents

Advertisement

Reference Guide
Firebox X Core/Peak e-Series
with WatchGuard System Manager/Fireware v10.0
Firebox X Edge e-Series v10.0
Revised: 2/1/2008

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Firebox X5500E and is the answer not in the manual?

Questions and answers

Summary of Contents for Watchguard Firebox X5500E

  • Page 1 Reference Guide Firebox X Core/Peak e-Series with WatchGuard System Manager/Fireware v10.0 Firebox X Edge e-Series v10.0 Revised: 2/1/2008...
  • Page 2 WatchGuard Technologies, Inc. Copyright, Trademark, and Patent Information Copyright© 1998 - 2008 WatchGuard Technologies, Inc. All rights reserved. Complete copyright, trademark, patent, and licensing information can be found in Chapter 7 of this Reference Guide.
  • Page 3: Table Of Contents

    Contents CHAPTER 1 Internet Protocol Reference Internet Protocol Header ...2 IP header number list Internet Protocol Options ...6 Transfer Protocols ...6 ...6 ...7 ...7 ICMP Other protocols Standard Ports and Random Ports...8 CHAPTER 2 MIME Content Types CHAPTER 3 Services and Ports Ports Used by WSM and Fireware ...21 Ports Used by Microsoft Products ...22 Well-Known Services List ...23...
  • Page 4 ...47 Lotus Notes MS-SQL-Monitor MS-SQL-Server ...48 MS-Win-Media ...48 NetMeeting ...48 ...48 NNTP ...49 ...49 OSPF ...49 pcAnywhere ...49 Ping POP2 and POP3 ...50 PPTP RADIUS and RADIUS-RFC ...39 ...41 ...41 ...42 ...46 ...46 ...47 ...47 ...50 ...50 WatchGuard System Manager...
  • Page 5 RADIUS-Accounting and RADIUS-Acct-RFC ...51 ...51 ...51 ...52 RealPlayerG2 ...52 Rlogin ...52 SecurID SMB (Windows Networking) ...53 SMTP ...53 SNMP ...53 SNMP-Trap ...53 SQL*Net ...53 SQL-Server ...54 ...54 SSL-VPN ...54 SunRPC ...54 Syslog ...55 TACACS ...55 TACACS+ ...55 ...55 TCP-UDP ...55 Telnet ...56 Timbuktu...
  • Page 6 General IT and Security Web Sites ...67 White Hat Web Sites...69 Grey Hat Sites...70 Other Web Sites ...71 Dictionaries of Computer Terminology ...71 RSS Feeds...72 Security Feeds IT Related Feeds ...73 Fun Feeds Web Logs (Blogs) Web Logs (Blogs) ...72 ...72 ...73 ...74 WatchGuard System Manager...
  • Page 7 CHAPTER 7 Copyright, Patent, Trademark, and Licensing Information Copyright Information ...75 Patents ...75 Trademarks...75 Licensing...76 Apache License (1.1) Apache License (2.0) GNU General Public License (GPL) GNU Lesser General Public License (LGPL) GNU Library General Public License (Library GPL) Java Platform, Standard Edition License ...99 bzip2 ...100...
  • Page 8 ...128 OpenVPN ...129 ossp_mm ...130 PCRE ...130 PostgreSQL Database Management System ...136 py lib ...137 pysqlite ...137 Python ...138 redboot ...144 sasl ...145 tinyxpath ...145 traceroute ...145 uClibc ...146 wvstreams ...146 xpp3 ...147 zlib viii ...136 WatchGuard System Manager...
  • Page 9: Internet Protocol Reference

    Internet Protocol Reference Internet Protocol (IP) sets the format of packets and the address pattern for sending data through the Internet. It operates as a postal system, and allows you to address a package and drop it into the system. But, there is no direct link between you and the recipient. In other words, there is no package. Most networks mix IP with higher level protocols such as Transmission Control Protocol (TCP).
  • Page 10: Internet Protocol Header

    Time to live. It sets the maximum time the datagram remains alive in the system. IP protocol number. Indicates which of TCP, UDP, ICMP, IGMP, or other Transport protocol is inside. Checksum for the IP header Source IP address Destination IP address IP Options (Present if IHL is 6) WatchGuard System Manager...
  • Page 11: Ip Header Number List

    IP header number list The IP Protocol header contains an 8-bit field that identifies the protocol for the transport layer for the datagram. Keyword Number ICMP IGMP BBN-RCC-MON NVP-II ARGUS EMCON XNET CHAOS DCN-MEAS XNS-IDP TRUNK-1 TRUNK-2 LEAF-1 LEAF-2 IRTP ISO-TP4 NETBLT MFE-NSP...
  • Page 12 Internet Pluribus Packet Core Any distributed file system SATNET Monitoring VISA Protocol Internet Packet Core Utility Computer Protocol Network Executive Computer Protocol Heart Beat Wang Span Network Packet Video Protocol Backroom SATNET Monitoring SUN NDPROTOCOL-Temporary WIDEBAND Monitoring WIDEBAND EXPAK WatchGuard System Manager...
  • Page 13 Keyword Number ISO-IP VMTP SECURE-VMTP VINES NSFNET-IGP IGRP OSPFIGP SPRITE-RPC LARP AX.25 IPIP MICP SCC-SP ETHERIP ENCAP GMTP 101-254 Reference Guide Protocol ISO Internet Protocol VMTP SECURE-VMTP VINES NSFNET-IGP Dissimilar Gateway Protocol IGRP OSPFIGP Sprite RPC Protocol Locus Address Resolution Protocol Multicast Transport Protocol AX.25 Frames IP-within-IP Encapsulation Protocol...
  • Page 14: Internet Protocol Options

    Network File System (NFS) services users. Network File System is a popular TCP/IP service for supplying shared file systems over a network. • Gives supports to broadcasts. dangerous. Hackers can use them to create routing that helps them get WatchGuard System Manager...
  • Page 15: Tcp

    Most traffic on the Internet uses TCP, UDP, or ICMP protocols. Some other protocols are as follows: IGMP (Internet Group Multicast Protocol) A protocol used by a host on multicast access networks to notify a locally attached router to which group the router belongs.
  • Page 16: Standard Ports And Random Ports

    2049, no connection can be made. This type of problem frequently occurs with the X Window and Archie services. Most operating systems assign port numbers between 1024 and 2100 so this problem does not occur frequently. WatchGuard System Manager...
  • Page 17: Mime Content Types

    MIME Content Types Software applications use content type headers to identify the type of data they receive. Content type headers tell the software application how to correctly identify and display video clips, images, sound, or other data. Usually, people are most familiar with the MIME content types used in email. Some of the available proxy policies in your Firebox configuration can use content type headers to determine whether to allow or deny traffic.
  • Page 18 RFC 2045, RFC 2046 RFC 3778 RFC 3156 RFC 3156 RFC 3156 RFC 2311 RFC 2311 RFC 2311 RFC 2045, RFC 2046 Alvestrand Rungchavalnont Doggett RFC 1486, Rose Smith Lindner Korver Korver Korver Korver RFC 1874 Grosso O’Brien Floersch WatchGuard System Manager...
  • Page 19 Type Subtype application vnd.acucobol application vnd.anser-web-certificate-issue-initiation application vnd.answer-web-funds-transfer-initiation application vnd.audiograph application vnd.businessobjects application vnd.claymore application vnd.commerce-battelle application vnd.commonspace application vnd.cosmocaller application vnd.cybank application vnd.dna application vnd.dxr application vnd.ecdis-update application vnd.ecowin.chart application vnd.ecowin.filerequest application vnd.ecowin.fileupdate application vnd.ecowin.series application vnd.ecowin.seriesrequest application vnd.ecowin.seriesupdate application vnd.enliven application...
  • Page 20 Scratchley Natarajan Fujii Yoshitake Fujii Yoshitake Fujii Yoshitake Yoshitake Fujii Cole Wattenberger Wattenberger Wattenberger Wattenberger Wattenberger Wattenberger Wedel Wexler Bartram Tanaka Slawson Fleischman Gill Gill Gill Gill Gill Butler Adams Mutz Solomon Solomon Solomon Swenson Swenson Swenson WatchGuard System Manager...
  • Page 21 Type Subtype application vnd.osa.netdeploy application vnd.powerbuilder6 application vnd.powerbuilder6-s application vnd.publishare-delta-tree application vnd.rapid application vnd.rn-realplayer application vnd.seemail application vnd.shana.informed.formdata application vnd.shana.informed.formtemplate application vnd.shana.informed.interchange application vnd.shana.informed.package application vnd.street-stream application vnd.svd application vnd.swiftview-ics application vnd.truedoc application vnd.uplanet.alert application vnd.uplanet.alert-wbxml application vnd.uplanet.bearer-choi-wbxml application vnd.uplanet.bearer-choice application vnd.uplanet.cacheop application...
  • Page 22 Reference (where available) WatchGuard System Manager...
  • Page 23 Type Subtype application x-tex application x-texinfo application x-troff application x-troff-man application x-troff-me application x-troff-ms application x-ustar application x-wais-source application x-watchguard-cloaked application x-webbasic application x-wintalk application x-wls application x-wms-LogStats application x400-bp application application audio audio 32kadpcm audio basic audio echospeech audio vnd.qcelp...
  • Page 24 Reference (where available) Francis RFC 2045, RFC 2046 RFC 1314 RFC 2045, RFC 2046 Ferber Randers-Pehrson Simon Moline Moline Becker Spencer Spencer Moline S. Martin WatchGuard System Manager...
  • Page 25 Type Subtype image x-cmx image x-dwg image x-dxf image x-mgx-dsf image x-ms-bmp image x-photo-cd image x-pict image x-png image x-portable-anymap image x-portable-bitmap image x-portable-graymap image x-portable-pixmap image x-rgb image x-svf image x-xbitmap image x-xwindowdump image message message delivery-status message disposition-notification message external-body message...
  • Page 26 RFC 2421, RFC 2423 RFC 2318 RFC 1896 RFC 2854 RFC 2046, RFC 3676 RFC 2045, RFC 2046 RFC 1874 Lindner RFC 2483 Allen Hurtta Powers Powers Lubos RFC 3023 RFC 2045, RFC 2046 Lindner Wolfe McGinty McGinty WatchGuard System Manager...
  • Page 27 Type Subtype video x-msvideo video x-sgi-movie workbook workbook formulaone x-conference x-cooltalk x-form x-openscape x-model x-mesh x-music x-midi x-script x-wfxclient x-world x-world x-3dmf x-world x-svr x-world x-vream x-world x-vrml x-world x-vrt x-world x-wvr Reference Guide Reference (where available)
  • Page 28 WatchGuard System Manager...
  • Page 29: Services And Ports

    Well-known services are a mixture of port number and transport protocol for specified, standard software applications. This chapter contains tables that list service names, port number, protocol, and description. Ports Used by WSM and Fireware The WatchGuard Firebox, management station, and WatchGuard servers use specified ports during usual operations. Port # Protocol...
  • Page 30: Ports Used By Microsoft Products

    Logon Sequence NetLogon Pass Through Validation Performance Monitor PPTP Printing Registry Editor Server Manager Trusts User Manager WinNT Diagnostics WinNT Secure Channel WINS Replication WINS Manager WINS Registration Purpose Client/Server Communications Exchange Administrator IMAP IMAP (SSL) LDAP WatchGuard System Manager...
  • Page 31: Well-Known Services List

    TCP/UDP Well-Known Services List In addition to the ports used by services described above, WatchGuard supplies a list of well-known services. Because software companies regularly add new services, this is not a full list of all possible services. For more information, refer to: www.iana.org/assignments/port-numbers...
  • Page 32 Bootstrap Protocol Client TCP/UDP Trivial File Transfer TCP/UDP Gopher TCP/UDP Remote Job Service TCP/UDP Remote Job Service TCP/UDP Remote Job Service TCP/UDP Remote Job Service TCP/UDP Distributed External Object Store TCP/UDP vettcp TCP/UDP Finger TCP/UDP World Wide Web HTTP WatchGuard System Manager...
  • Page 33 Service Name Port # hosts2-ns xfer mit-ml-dev mit-ml-dev mfcobol kerberos sug-mit-tug dnsix mit-dov objcall supdup dixie swift-rvf tacnews metagram newacct hostname iso-tsap gppitnp acr-nema csnet-ns 3com-tsmux rtelnet snagas pop2 pop3 sunrpc mcidas auth(ident) audionews sftp ansanotify uucp-path sqlserv nntp Reference Guide Protocol Description TCP/UDP...
  • Page 34 Background File Transfer TCP/UDP SGMP TCP/UDP SQL Service TCP/UDP PCMail Server TCP/UDP SGMP-TRAPS TCP/UDP SNMP TCP/UDP SNMPTRAP TCP/UDP CMIP/TCP Manager CMIP/TCP Agent CMIP/TCP Agent TCP/UDP NAMP TCP/UDP RSVD TCP/UDP SEND TCP/UDP Xyplex MUX TCP/UDP X Display Manager Control Protocol WatchGuard System Manager...
  • Page 35 Reference Guide Protocol Description TCP/UDP NextStep Window Server TCP/UDP Border Gateway Protocol TCP/UDP Unify TCP/UDP...
  • Page 36 Web proxy/caching service -- frequently scanned for vulnerabilities TCP/UDP Cc:mail/lotus Used for chat FirstClass (ftp channel on 510 TCP) CompuServe Online TCP/UDP Radio free ethernet America Online TCP/UDP X Window System (through 6063) TCP/UDP X Font Service WatchGuard System Manager...
  • Page 37 Service Name Port # 8000 iphone 6670 iphone 22555 iphone 25793 iphone 1490 Reference Guide Protocol Description TCP/UDP NCD Network Audio Server for connecting to the phone server for audio for the address server, in 4.x and 5.0 for the conference engine in 4.x and 5.0 Well-Known Services List...
  • Page 38 Well-Known Services List WatchGuard System Manager...
  • Page 39: Chapter 4 Webblocker Content

    SurfControl. Searching for Blocked Sites To see whether WebBlocker is blocking a web site as part of a category block, go to WatchGuard Test-a-Site on the SurfControl web site. 1 Open a web browser and go to: http://mtas.surfcontrol.com/mtas/WatchGuardTest-a-Site.asp...
  • Page 40: Webblocker Categories

    • Discussion sites on how to talk to your partner about diseases, pregnancy, and respecting boundaries Note: Not included in this category are commercial sites that sell sexual paraphernalia. These sites are filtered through the Adult category. WatchGuard System Manager...
  • Page 41 Group Category Tasteless & Offensive Crime Criminal Activity Hacking Intolerance & Hate Violence Reference Guide Description of Content • Offensive or violent language, including through jokes, comics, or satire • Excessive use of profanity or obscene gesticulation Advocating, instructing, or giving advice on performing illegal acts, such as: •...
  • Page 42 • Tips or trends focused on a specific art, craft, or technique • Online publications on a specific pastime or recreational activity • Online clubs, associations, or forums dedicated to a hobby • Child-centered sites and sites published by children WatchGuard System Manager...
  • Page 43 Group Category Sports Streaming Media Travel Arts Personal Education Society & Culture Job Search & Career Development Personals & Dating Religion Philanthropic & Professional Orgs. Fashion & Beauty Shopping Advertisements Food & Drink Reference Guide Description of Content • Team or conference web sites •...
  • Page 44 • Personal storage or backup • Clip art, fonts, and animated gif pages • Providers of mobile phone downloads, including: - Ringtones, - Logos - Backgrounds - Screensavers - Games • Peer-to-peer file sharing clients • Peer-to-peer file sharing servers WatchGuard System Manager...
  • Page 45 Group Category Spam URLs Infrastructure News News Blogs & Forums Search Photo Searches Search Engines Research Finance & Investment Government Health & Medicine Reference Reference Guide Description of Content • URLs found in spam, including these topics: - Computing - Finance & Stocks - Entertainment - Games - Health &...
  • Page 46 • Business Associations • Basic business sites, such a s FedEx, that enable organizations to manage their necessary daily business tasks. • Sites that are not included in the defined categories • Sites that are not categorized WatchGuard System Manager...
  • Page 47: Types Of Policies In Fireware

    Types of Policies in Fireware This chapter gives a list of the pre-defined policies included with your Firebox management software, their protocols, and their ports. It also gives special information about circumstances that could have an effect on the security of some policies. In this chapter, policies are divided into two groups—policies that are controlled by a packet filter and policies that are controlled by a proxy.
  • Page 48: Archie

    We recommend that you use VPN options to give more security for ICA connections. You can use all of the usual log options with WinFrame. Characteristics • Internet Protocol(s): TCP • Port Number(s): 1494 The Firebox cannot make sure that these packets were sent from the WatchGuard System Manager...
  • Page 49: Clarent-Command

    Clarent-Command Clarent Corporation supplies IP telephone technology to mainstream carriers and service providers. Clarent products allow voice-over-IP between Clarent gateways across the Internet. This policy gives support to the Clarent v3.0 product and later. Clarent products use two sets of ports, one for gateway-to-gateway communications (UDP ports 4040, 4045, and 5010) and one for gateway-to-command center communications (UDP ports 5001 and 5002).
  • Page 50: Cu-Seeme

    Internet Protocol(s): TCP (for server-server zone transfers), UDP (for client-server lookups) • Port Number(s): TCP 53, UDP 53 Entrust The Entrust Authority Public Key distribution application protocol passes public keys to a trusted third-party organization for verification. Characteristics • Internet Protocol(s): TCP • Port Number(s): 709, 710 WatchGuard System Manager...
  • Page 51: Finger

    FTP be allowed only to public FTP servers located behind the Firebox. External hosts can be spoofed. WatchGuard cannot verify that these packets were actually sent from the correct location. You can configure the Firebox to add the source IP address to the Blocked Sites list whenever an FTP connection to a computer protected by the Firebox is denied.
  • Page 52: Hbci

    HTTP proxy policy. We recommend that HTTP be allowed only to public HTTP servers located behind the Firebox. External hosts can be spoofed. WatchGuard cannot verify that these packets were actually sent from the correct location. You can configure the Firebox to add the source IP address to the Blocked Sites list whenever an HTTP connection to a computer protected by the Firebox is denied.
  • Page 53: Ident

    IDENT The Identification Protocol (IDENT) is a protocol used to match TCP connections to a user name. It is used most frequently by large public SMTP and FTP servers. It is used for logs, but you cannot trust the information it gives, as attackers can change their servers to have them send back incorrect information.
  • Page 54: Irc

    Kerberos v 5 Port Number(s): TCP 88, UDP 88 L2TP Layer 2 Tunneling Protocol (L2TP) is an extension to the PPP protocol that enables ISPs to operate virtual private networks. Characteristics • Internet Protocol(s): UDP • Port Number(s): 1701 WatchGuard System Manager...
  • Page 55: Ldap

    LDAP Lightweight Directory Access Protocol (LDAP) is an open-standard protocol for using online directory services. The protocol operates with Internet transport protocols, such as TCP. You can use LDAP to access stand-alone directory servers or X.500 directories. Characteristics • Internet Protocol(s): TCP •...
  • Page 56: Ms-Win-Media

    In most conditions, NNTP must be enabled in two directions. If you operate a public newsfeed, you must allow NNTP connections from all external hosts. WatchGuard cannot make sure that these packets were sent from the correct location.
  • Page 57: Ntp

    Network Time Protocol (NTP) is a protocol built on TCP/IP that controls local timekeeping. It synchronizes computer clocks with other clocks located on the Internet. Characteristics • Internet Protocol(s): TCP, UDP • Port Number(s): TCP 123 , UDP 123 OSPF Open Shortest Path First (OSPF) is a routing protocol developed for IP networks based on the link-state algorithm.
  • Page 58: Pop2 And Pop3

    In RFC 2865, the server port used by RADIUS changed from port 1645 to 1812. Make sure you select the policy that matches your implementation. Characteristics • Internet Protocol(s): UDP RADIUS policy Port Number(s): UDP 1645 • • RADIUS-RFC policy Port Number(s): UDP 1812 WatchGuard System Manager...
  • Page 59: Radius-Accounting And Radius-Acct-Rfc

    RADIUS-Accounting and RADIUS-Acct-RFC The Remote Authentication Dial-In User Service (RADIUS) Accounting policy supplies accounting information to administrators of networks that use RADIUS authentication. RADIUS is a client-server system that keeps authentication information for users, remote access servers, and VPN gateways in a central user database that is available to all servers.
  • Page 60: Realplayerg2

    These configuration settings are to be used only if there is no other alternative, and policy settings must specify Characteristics Internet Protocol(s): TCP, UDP • • Port Number(s): TCP 139, TCP 445, UDP 137, UDP 138, UDP 445 internal and external hosts. WatchGuard System Manager...
  • Page 61: Smtp

    Port Number(s): 161 SNMP-Trap Simple Network Management Protocol (SNMP) traps are notification messages that an SNMP agent (for example, a router) sends to a network management station. These messages usually report an important event that must be examined. Characteristics •...
  • Page 62: Ssh

    Remove port 514 from the Blocked Ports list • Add the WatchGuard® Logging policy to Policy Manager It is usually not secure to allow syslog traffic through the Firebox. It is possible for hackers to fill syslogs with log entries. If the syslog is full, it is more difficult to see an attack. Also, the disk frequently fills up and the attack is not recorded.
  • Page 63: Tacacs

    TACACS TACACS user authentication is a system that uses user accounts to authenticate users into a dial-up modem pool. This removes the need to keep copies of accounts on a UNIX system. TACACS does not support TACACS+ or RADIUS. Characteristics •...
  • Page 64: Timbuktu

    Internet service provider of a site. The WatchGuard Traceroute policy controls UNIX-based, UDP-style Traceroute only. For a DOS-based or Windows-based Traceroute packet filter, use the Ping policy. For more information about the Ping policy, see “Ping”...
  • Page 65: Uucp

    WinFrame. Characteristics • Internet Protocol(s): TCP • Port Number(s): 1494 WG-Auth The WatchGuard Authentication policy allows users to authenticate to the Firebox. Characteristics • Internet Protocol(s): TCP • Port Number(s): 4100 User Guide Packet Filter Policies...
  • Page 66: Wg-Firebox-Mgmt

    Port Number(s): 4103, 4105, 4117, 4118 WG-Logging The WatchGuard Logging policy is necessary only if a second Firebox must access a Log Server on the trusted interface of a Firebox. If there is only one Firebox, this policy is not necessary.
  • Page 67: Whois

    WHOIS The WHOIS protocol gives information about the administrator of web sites and networks. It is frequently used to find the administrator of a different web site. To filter WHOIS traffic, add a WHOIS policy that allows connections to the WHOIS server (such as rs.internic.net).
  • Page 68: Proxy Policies

    Packet Filter Policies Proxy Policies This section reviews the proxy policies supplied by the WatchGuard® System Manager. A proxy policy opens packets, strips out forbidden data types in the packet content, and assembles the packets again using the source and destination headers of the proxy.
  • Page 69: Http-Proxy

    The WatchGuard policy “HTTP Proxy” is not the same as an HTTP caching proxy. An HTTP caching proxy controls the caching of Web data. If you use an external caching proxy, you must enable (by adding policies) any outgoing policies that are necessary for your organization.
  • Page 70: Sip-Proxy

    For these protocols, the TCP-UDP proxy relays the traffic to the correct proxies for the protocols or allows you to allow or deny traffic. For other protocols, you can select to allow or deny traffic. Characteristics • Internet Protocol(s): TCP, UDP • Port Number(s): TCP 0 (Any), UDP 0 (Any) WatchGuard System Manager...
  • Page 71: Tftp-Proxy

    TFTP-proxy Trivial File Transfer Protocol (TFTP) is a simple form of FTP that uses very small amounts of memory. It is used to transfer small files between hosts on the same network. Some manufacturers use the TFTP protocol to send periodic updates to VoIP equipment under management. If your equipment requires TFTP for updates, make sure you add a TFTP policy to your Firebox configuration to allow these connections.
  • Page 72 Packet Filter Policies WatchGuard System Manager...
  • Page 73: Chapter 6 Resources

    WatchGuard to learn more about network security. The editorial comments included in this chapter are supplied to help you decide which resources are most helpful to you. These comments are from the LiveSecurity editorial team.
  • Page 74: Publishers

    Russell, Ryan and Dubrawksky, Ido, et al. Stealing the Network: How to Own the Box. Cambridge, MA: Elsevier/Syngress, 2005. ISBN 1931836876. Levy, Johnny and Russell, Ryan, et al. Stealing the Network: How to Own a Shadow. Cambridge, MA: Elsevier/Syngress, 2007. ISBN 1597490814. Stephenson, Neal. Cryptonomicon. New York, NY: HarperCollins Publishers, 1999. ISBN 0060512806. WatchGuard System Manager...
  • Page 75: Mailing Lists

    Mailing Lists wg-users@watchguard.com WatchGuard sponsors a listserv for our customers. For more information, see the Technical Support chapter in the User Guide. firewall-wizards@nfr.net Firewall gurus from around the world discuss and answer all types of questions. Full Disclosure When Symantec bought Security Focus and its lists, suspicious security experts and network administrators fled.
  • Page 76 Pro: Comprehensive, up-to-the-minute survey of worldwide Internet security. Con: The same information repeats countless times as various online sources report it. Net: A great glimpse of security issues worldwide. WatchGuard System Manager...
  • Page 77: White Hat Web Sites

    The Register This is not the first place you'll learn of emerging threats, but when you hear of one, depend on The Reg for the most honest, no-hype summary of the issue. Pro: Plain-English writing style is great for IT beginners. Check out their "BOFH" series for hilariously bleak parodies of a network administrator's life.
  • Page 78: Grey Hat Sites

    But our favorite feature is the moderated security forums, where you can discuss relevant topics (ranging from general network security, to how to compile and run specific exploits) with other network administrators. WatchGuard System Manager...
  • Page 79: Other Web Sites

    Online gnu zebra configuration document for Firebox users using dynamic routing protocols. www.watchguard.com/support/advancedfaqs/log_sniffing.asp Check here for information on a useful Network Packet Analyzer. www.iana.org Look here for lists of protocol number assignments and TCP and UDP port numbers.
  • Page 80: Rss Feeds

    An RSS reader can provide you with a convenient, one-stop shop consolidating news from all your favorite sources. Try out RSS and WatchGuard Wire. They are free, and keep you informed while saving you time.
  • Page 81: Fun Feeds

    news.com.com/2547-1001_3-0-5.xml CNET News Enterprise Hardware Feed news.com.com/2547-1009_3-0-5.xml CNET News Security Feed news.com.com/2547-1035_3-0-5.xml CNET News Networking Feed Fun Feeds www.wired.com/news/feeds/rss2/0,2610,,00.xml Wired top stories www.wired.com/news/feeds/rss2/0,2610,3,00.xml Wired technology stories www.wired.com/news/feeds/rss2/0,2610,2,00.xml Wired culture stories www.wired.com/news/feeds/rss2/0,2610,4,00.xml Wired political stories dwlt.net/tapestry/dilbert.rdf Daily Dilbert dwlt.net/tapestry/pa.rdf Penny Arcade Web Logs (Blogs) F-Secure This blog covers any kind of malware that spreads, and often has useful screen shots so you...
  • Page 82: Web Logs (Blogs)

    Web Logs (Blogs) Radio Free Security WatchGuard’s podcast covers network secuirty issues of interest to small- to medium-sized businesses. Learn how to prioritze threats by hearing the LiveSecurity reporters pick the “Security Story of the Month”; then keep it on play to hear the renowned industry experts assess the latest threats and give practical tips and insights.
  • Page 83: Copyright, Patent, Trademark, And Licensing Information

    WatchGuard, the WatchGuard logo, Firebox, LiveSecurity, and any other mark listed as a trademark in the “Terms of Use” portion of the WatchGuard Web site that is used herein are either registered trademarks or trademarks of WatchGuard Technologies, Inc. and/or its subsidiaries in the United States and/or other countries.
  • Page 84: Licensing

    WatchGuard, the WatchGuard logo, Firebox, LiveSecurity, and any other mark listed as a trademark in the “Terms of Use” portion of the WatchGuard Web site that is used herein are either registered trademarks or trademarks of WatchGuard Technologies, Inc. and/or its subsidiaries in the United States and/or other countries.
  • Page 85: Apache License (2.0)

    THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CON- TRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUEN- TIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 86 License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. WatchGuard System Manager...
  • Page 87 You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.
  • Page 88: Gnu General Public License (Gpl)

    To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. WatchGuard System Manager...
  • Page 89 Terms and Conditions for Copying, Distribution, and Modification 1 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program"...
  • Page 90 Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. WatchGuard System Manager...
  • Page 91 If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims;...
  • Page 92: Gnu Lesser General Public License (Lgpl)

    Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. WatchGuard System Manager...
  • Page 93 Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.
  • Page 94 In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. WatchGuard System Manager...
  • Page 95 4 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License.
  • Page 96 Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. WatchGuard System Manager...
  • Page 97 11 Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.
  • Page 98: Gnu Library General Public License (Library Gpl)

    WatchGuard System Manager...
  • Page 99 Licensing To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library, or if you modify it. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you.
  • Page 100 But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this WatchGuard System Manager...
  • Page 101 License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you;...
  • Page 102 Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. WatchGuard System Manager...
  • Page 103 10 You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.
  • Page 104: Java Platform, Standard Edition License

    Specification, and (ii) discussing the Specification with any third party; and (iii) excerpting brief portions of the Specification in oral or written communications which discuss the Specification provided that such excerpts do not in the aggregate constitute a significant portion of the Specification. WatchGuard System Manager...
  • Page 105 2 License for the Distribution of Compliant Implementations. Sun also grants you a perpetual, non-exclusive, non-transferable, worldwide, fully paid-up, royalty free, limited license (without the right to sublicense) under any applicable copyrights or, subject to the provisions of subsection 4 below, patent rights it may have covering the Specification to create and/or distribute an Independent Implementation of the Specification that: (a) fully implements the Specification including all its required interfaces and functionality;...
  • Page 106 (i) agree that such Feedback is provided on a non-proprietary and non-confidential basis, and (ii) grant Sun a perpetual, non-exclusive, worldwide, fully paid-up, irrevocable license, with the right to sublicense through multiple levels of sublicensees, to incorporate, disclose, and use without limitation the Feedback for any purpose. WatchGuard System Manager...
  • Page 107: Bzip2

    GENERAL TERMS Any action related to this Agreement will be governed by California law and controlling U.S. federal law. The U.N. Convention for the International Sale of Goods and the choice of law rules of any jurisdiction will not apply. The Specification is subject to U.S.
  • Page 108: Busybox

    Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder. WatchGuard System Manager...
  • Page 109: Dhcp

    dhcp Copyright © 1995, 1996, 1997, 1998, 1999 The Internet Software Consortium. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 110: Elementtree

    PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. WatchGuard System Manager...
  • Page 111: Free-Extractor

    free-extractor This software is provided 'as-is', without any express or implied warranty. In no event will the author(s) be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1 The origin of this software must not be misrepresented;...
  • Page 112 WatchGuard System Manager...
  • Page 113: Iputils

    Licensing THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE REGENTS OF THE UNIVERSITY OF MICHIGAN AND MERIT NETWORK, INC. DO NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET LICENSEE'S REQUIREMENTS OR THAT OPERATION WILL BE UNINTERRUPTED OR ERROR FREE.
  • Page 114: Itext

    LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, AND THE AUTHORS AND DISTRIBUTORS HAVE NO OBLIGATION TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS. WatchGuard System Manager...
  • Page 115: Java 2D Api Samples

    Java 2D API Samples READ THE FOLLOWING AGREEMENT BEFORE INSTALLING OR USING THE SAMPLE SOFTWARE. BY DOWNLOADING THIS SAMPLE SOFTWARE, YOU ACCEPT AND AGREE TO THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT AGREE, DO NOT DOWNLOAD OR USE THE SAMPLE SOFTWARE. Sun Microsystems grants you ("Licensee") a non-exclusive, royalty free, license to use, modify and redistribute this software in source and binary code form, provided that i) this copyright notice and license appear on all copies of the software;...
  • Page 116 (1) Modifications made by that Contributor (or portions thereof ); and (2) the combination of Modifications made by that Contributor with its Contributor Version (or portions of such combination). WatchGuard System Manager...
  • Page 117 c The licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first distributes or otherwise makes the Modifications available to a third party. d Notwithstanding Section 2.2(b) above, no patent license is granted: (1) for any code that Contributor has deleted from the Contributor Version;...
  • Page 118 (meaning the Contributor Version where the Participant is a Contributor or the Original Software where the Participant is the Initial Developer) directly or indirectly infringes any patent, then any and all rights granted directly or indirectly to You by such Participant, the WatchGuard System Manager...
  • Page 119 Initial Developer (if the Initial Developer is not the Participant) and all Contributors under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively and automatically at the expiration of such 60 day notice period, unless if within such 60 day period You withdraw Your claim with respect to the Participant Software against such Participant either unilaterally or pursuant to a written agreement with Participant.
  • Page 120: Jdom

    Program by such Contributor itself or anyone acting on such Contributor's behalf. Contributions do not include additions to the Program which: (i) are separate modules of software distributed in conjunction with the Program under their own license agreement, and (ii) are not derivative works of the Program. WatchGuard System Manager...
  • Page 121 "Contributor" means any person or entity that distributes the Program. "Licensed Patents " mean patent claims licensable by a Contributor which are necessarily infringed by the use or sale of its Contribution alone or when combined with the Program. "Program" means the Contributions distributed in accordance with this Agreement. "Recipient"...
  • Page 122 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. WatchGuard System Manager...
  • Page 123: Jython

    7 GENERAL If any provision of this Agreement is invalid or unenforceable under applicable law, it shall not affect the validity or enforceability of the remainder of the terms of this Agreement, and without further action by the parties hereto, such provision shall be reformed to the minimum extent necessary to make such provision valid and enforceable.
  • Page 124 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. WatchGuard System Manager...
  • Page 125: Kazlib

    kazlib Copyright © 1999 Kaz Kylheku <kaz@ashi.footprints.net> Free Software License: All rights are reserved by the author, with the following exceptions: Permission is granted to freely reproduce and distribute this software, possibly in exchange for a fee, provided that this copyright notice appears intact.
  • Page 126: Libpcap

    HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFT- WARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. WatchGuard System Manager...
  • Page 127: Linux

    Linux Copyright 1993 United States Government as represented by the Director, National Security Agency. This software may be used and distributed according to the terms of the GNU General Public License, incorporated herein by reference. In addition to the disclaimers in the GPL, SRC expressly disclaims any and all warranties, expressed or implied, concerning the enclosed software.
  • Page 128: Lua

    1 The materials contained herein are unmodified and are used unmodified. 2 Redistributions of source code must retain the above copyright notice, this list of conditions and the following NO ''WARRANTY'' disclaimer below (''Disclaimer''), without modification. WatchGuard System Manager...
  • Page 129: Net-Snmp

    3 Redistributions in binary form must reproduce at minimum a disclaimer similar to the Disclaimer below and any redistribution must be conditioned upon including a substantially similar Disclaimer requirement for further binary redistribution. 4 Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse or promote product derived from this software without specific prior written permission.
  • Page 130 • Neither the name of the Sun Microsystems, Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. WatchGuard System Manager...
  • Page 131 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPE- CIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 132: Numpy

    INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. WatchGuard System Manager...
  • Page 133: Openldap

    OpenLDAP The OpenLDAP Public License Version 2.8, 17 August 2003 Redistribution and use of this software and associated documentation ("Software"), with or without modification, are permitted provided that the following conditions are met: 1 Redistributions in source form must retain copyright statements and notices, 2 Redistributions in binary form must reproduce applicable copyright statements and notices, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution, and...
  • Page 134 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. WatchGuard System Manager...
  • Page 135: Openssl

    OpenSSL OpenSSL License Copyright © 1998-2007 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 136: Openvpn

    Public License in all respects for all of the code used other than OpenSSL. If you modify this file, you may extend this exception to your version of the file, but you are not obligated to do so. If you do not wish to do so, delete this exception statement from your version. WatchGuard System Manager...
  • Page 137: Ossp_Mm

    Special exception for linking OpenVPN with both OpenSSL and LZO: Hereby I grant a special exception to the OpenVPN project (http://openvpn.net/) to link the LZO library with the OpenSSL library (http://www.openssl.org). —Markus F.X.J. Oberhumer The TAP-Win32/TAP-Win64 Driver was inspired by the CIPE-Win32 driver by Damion K. Wilson. The source and object code of the TAP-Win32/TAP-Win64 driver is Copyright ©...
  • Page 138: Pcre

    It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. WatchGuard System Manager...
  • Page 139 Licensing Copyright © 2001 by Sun Microsystems, Inc. All rights reserved. Non-exclusive rights to redistribute, modify, translate, and use this software in source and binary forms, in whole or in part, is hereby granted, provided that the above copyright notice is duplicated in any source form, and that neither the name of the copyright holder nor the author is used to endorse or promote products derived from this software.
  • Page 140 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. Van Jacobson (van@helios.ee.lbl.gov), Dec 31, 1989: Initial distribution. Copyright © 1995 Jean-loup Gailly and Mark Adler WatchGuard System Manager...
  • Page 141 This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1 The origin of this software must not be misrepresented;...
  • Page 142 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. WatchGuard System Manager...
  • Page 143 3 The names of the authors of this software must not be used to endorse or promote products derived from this software without prior written permission. 4 Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by Pedro Roque Marques <pedro_m@yahoo.com>" THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES...
  • Page 144: Postgresql Database Management System

    PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. WatchGuard System Manager...
  • Page 145: Pysqlite

    pysqlite Copyright © 2004 Gerhard Häring This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1 The origin of this software must not be misrepresented;...
  • Page 146: Redboot

    License is not already Covered Code governed by this License. 1.11 "Source Code" means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts WatchGuard System Manager...
  • Page 147 used to control compilation and installation of an Executable, or a list of source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge.
  • Page 148 However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. You must make it absolutely clear that any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify WatchGuard System Manager...
  • Page 149 the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer. 3.6 Distribution of Executable Versions. You may distribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 have been met for that Covered Code, and if You include a notice stating that the Source Code version of the Covered Code is available under the terms of this License, including a description of how and where You have fulfilled the obligations of Section 3.2...
  • Page 150 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire Covered Code with only those rights set forth herein. WatchGuard System Manager...
  • Page 151 11 MISCELLANEOUS This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by California law provisions (except to the extent applicable law, if any, provides otherwise), excluding its conflict- of-law provisions.
  • Page 152: Sasl

    ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC- TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. WatchGuard System Manager...
  • Page 153: Tinyxpath

    tinyxpath Copyright © 2002-2004 Yves Berquin (yvesb@users.sourceforge.net) This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1 The origin of this software must not be misrepresented;...
  • Page 154: Wvstreams

    3 The end-user documentation included with the redistribution, if any, must include the following acknowledgment: "This product includes software developed by the Indiana University Extreme! Lab (http:// www.extreme.indiana.edu/)." Alternately, this acknowledgment may appear in the software itself, if and wherever such third- party acknowledgments normally appear. WatchGuard System Manager...
  • Page 155: Zlib

    4 The names "Indiana Univeristy" and "Indiana Univeristy Extreme! Lab" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact http://www.extreme.indiana.edu/. 5 Products derived from this software may not use "Indiana Univeristy" name nor may "Indiana Univeristy"...
  • Page 156 Licensing WatchGuard System Manager...
  • Page 157 Index ANSI Z39.50 Any policy described Archie policy auth (ident) policy authentication and ssh blocked sites, searching for Border Gateway Protocol (BGP) described Citrix ICA policy Clarent-command policy Clarent-gateway policy CU-SeeMe policy DHCP-Server policy policy for DNS proxy described Reference Guide e-mail messages and the SMTP proxy Entrust policy...
  • Page 158 OSPF policy PCAnywhere policy ping policy policies types of well-known POP2 policy POP3 policy ports random standard used by Microsoft products used by WatchGuard products PPTP policy for protocols ICMP IGMP Internet IPIP RADIUS policy RADIUS-Accounting policy random ports RDP policy...
  • Page 159 SecurID policy services well-known 21, 23 Simple Mail Transfer Protocol Simple Network Management Protocol. See SNMP SMB policy SMTP packet filter policy SMTP proxy described SNMP described policy for SNMP-Trap policy SQL*Net policy SQL-Server policy ssh policy standard ports static NAT. See NAT, static Sun RPC policy SurfControl syslog...
  • Page 160 WatchGuard System Manager...

Table of Contents