Configure a Firebox as a Managed Device
If your Firebox has a dynamic IP address, or if your WSM Management Server cannot connect to it for another reason, you can manually configure the Firebox as a managed device before you add it to the Management Server.
If your Management Server is not behind a gateway Firebox, you must configure the firewall that is between the Management Server and the Internet to allow connections to the Management Server public IP address over TCP ports 4112 and 4113.
To connect to a managed Firebox, you must be able to reach the managed Firebox from your local computer on TCP ports 4105, 4117, and 4118.
For more information about the gateway Firebox, go to About the Gateway Firebox.
Edit the WatchGuard Policy
- Select Firewall > Firewall Policies.
The Firewall policies page appears. - Double-click the WatchGuard policy to open it.
The Policy Configuration page for the WatchGuard policy appears.
- In the Connections are drop-down list, make sure Allowed is selected.
- In the From section, click Add.
The Add Member dialog box appears. - In the Member Type drop-down list, select Host IP.
- In the Member type text box, type the IP address of the external interface of the gateway Firebox.
If you do not have a gateway Firebox that protects the Management Server from the Internet, type the static IP address of your Management Server. - Click OK to close the Add Member dialog box.
- Make sure the To section includes an entry of either Firebox or Any.
- Click Save.
- Open Policy Manager for the Firebox to enable as a managed device.
- Double-click the WatchGuard policy to open it.
The Edit Policy Properties dialog box for the WatchGuard policy appears.
- In the WG-Firebox-Mgmt connections are drop-down list, make sure Allowed is selected.
- In the From section, click Add.
The Add Member dialog box appears. - Click Add Other.
The Add Member dialog box appears. - In the Choose Type drop-down list, select Host IP.
- In the Value text box, type the IP address of an external interface of the gateway Firebox.
If you do not have a gateway Firebox that protects the Management Server from the Internet, type the static public IP address for outbound traffic from your Management Server. If the Management Server is behind a third-party gateway, type the public IP address for outbound traffic through that gateway. Tip! - Click OK to close the Add Member dialog box.
- Click OK to close the Add Address dialog box.
- Make sure the To section includes an entry of either Firebox or Any.
- Save the Configuration File.
You can now add the device to your Management Server configuration
Set Up the Managed Device
If your Firebox has a dynamic IP address, or if the Management Server cannot find the IP address of the Firebox for any reason, you can use this procedure to prepare your Firebox to be managed by the Management Server.
To manage your Firebox with WatchGuard Dimension, you must complete this procedure to specify your instance of Dimension to manage the Firebox, instead of the WSM Management Server, and then import the management settings file (.WGD file). For more information about the .WGD file, go to Add a Firebox to Dimension for Management.
Configure the Gateway Firebox
The Firebox that protects your Management Server (the gateway Firebox) automatically monitors all ports used by the Management Server and forwards any connection on these ports to the configured Management Server. When you use the WatchGuard Server Center Setup Wizard to set up the Management Server, the wizard adds a WG-Mgmt-Server policy to your configuration to handle these connections. If you did not use the setup wizard, or if you skipped the Gateway Firebox step in the wizard, you must manually add the WG-Mgmt-Server policy to the configuration of your gateway Firebox. Configure the policy to allow inbound traffic from the external interface to a static NAT action that translates the public IP address of the external interface to the IP address of the Management Server. This policy on the gateway Firebox allows inbound connections to the Management Server over TCP ports 4112 and 4113. For more information, go to About the Gateway Firebox.
If your Management Server is not behind a gateway Firebox, make sure to configure the firewall that is between the Management Server and the Internet to allow connections to the Management Server public IP address over TCP ports 4112 and 4113.
Get the Management Server CA Certificate
When you configure a Firebox as a managed device, you must include the contents of the Management Server CA certificate in the Managed Device settings. The Management Server CA certificate is available through CA Manager. If you use Fireware Web UI to configure the Managed Device settings, you can copy and paste the contents of the CA certificate from CA Manager when you configure the Firebox. If you use Policy Manager to configure the Managed Device settings, you must import the Management Server CA Certificate from the CA-Admin.pem file when you configure the Firebox. When you connect to the Management Server in WSM, the CA-Admin.pem file is saved to your computer in this directory: C:\Users\<your user name>\Documents\My WatchGuard\certs\<Management Server IP address>.
For more information about how to find the Management Server CA Certificate, go to Manage Certificates on the Management Server.
Configure Your Firebox for Management by a WSM Management Server
You can configure the Managed Device settings for your Firebox from Fireware Web UI or Policy Manager.
- Select System > Managed Device.
The Managed Device page appears.
- Select the Enable Centralized Management check box.
- From the Manage Device With drop-down list, select Management Server.
- In the Managed Device Name text box, type the name you want to give the Firebox when you add it to the Management Server configuration.
This name is case-sensitive and must match the name you use when you add the Firebox to the Management Server configuration. This can also be the IP address of the Firebox. - In the Management Server IP Address(es) list, select the public IP address of the Management Server.
Or, if the Management Server is behind a gateway Firebox, select the public IP address of the gateway Firebox for the Management Server. - To add a Management Server IP address, type the IP address in the text box and click Add.
- In the Shared Secret and Confirm text boxes, type the shared secret.
The shared secret you type here must match the shared secret you type when you add the Firebox to the Management Server configuration. - Copy the text of your Management Server CA certificate and paste it in the Management Server CA Certificate text box.
- Click Save.
- Select Setup > Managed Device Settings.
The Managed Device Settings dialog box appears with the Management Server tab selected. - Select the Enable Centralized Management check box.
- From the Manage Device With drop-down list, select Management Server.
- In the Device Name text box, type the name to give the Firebox when you add it to the Management Server configuration.
This name is case-sensitive and must match the name you use when you add the device to the Management Server configuration. This can also be the IP address of the Firebox. - In the Shared Secret and Confirm text boxes, type the shared secret.
The shared secret you type here must match the shared secret you type when you add the Firebox to the Management Server configuration. - Adjacent to the Server IP Address(es) list, click Add and specify the public IP address of the Management Serve.
Or, if the Management Server is behind a gateway Firebox, specify the public IP address of the gateway Firebox for the Management Server. - Click Import and select the CA-Admin.pem file with the text of your Management Server CA Certificate.
- Click OK.
When you save the configuration to the Firebox, the Firebox is enabled as a managed device. The managed device tries to connect to the IP address of Dimension or the Management Server. Management connections are allowed from the Management Server to this managed device.
You can now add the Firebox to your Management Server configuration
You can also use WSM to configure the management mode for your Firebox
After you have configured your Firebox as a managed device, if your Firebox is in a remote location behind a third-party NAT gateway, you can configure a Management Tunnel to enable contact with the Firebox.
Configure Your Firebox for Management by Dimension
Before you enable your Firebox to be managed by your instance of Dimension, you must download the .WGD file for your Firebox from your instance of Dimension. To configure your Firebox to be managed by Dimension, you import the .WGD file to your Firebox.
For instructions to generate and download the .WGD file for your Firebox, go to Add a Firebox to Dimension for Management.
- Select System > Managed Device.
The Managed Device page appears. - Select the Enable Centralized Management check box.
- From the Manage Device With drop-down list, select Dimension Command.
- Browse to locate the management settings file (.WGD file) you downloaded for this Firebox from Dimension. Click Import.
The IP address for your instance of Dimension is automatically added to the Dimension Command Address(es) list. - (Optional) To add another IP address for your instance of Dimension, in the Dimension Command Address(es) text box, type the public IP address of Dimension. Click Add.
If Dimension is behind a gateway Firebox or other firewall NAT device, add the public IP address of the gateway Firebox or firewall device. - (Optional) If you must import a new certificate for Dimension, browse to locate the certificate file. Click Import.
- Click Save.
- Select Setup > Managed Device Settings.
The Managed Device Settings dialog box appears with the Management Server tab selected. - To set up a Firebox as a managed device, select the Enable Centralized Management check box.
- From the Manage Device With drop-down list, select Dimension Command.
The Managed Device settings for Dimension Command appear.
- To locate the management settings file (.WGD file) you downloaded for this Firebox from Dimension, click Import and browse to select the file.
The IP address for your instance of Dimension is automatically added to the Dimension Command Address(es) list. - (Optional) To add another IP address for your instance of Dimension:
- Click Add.
The Dimension Server dialog box appears. - In the Server text box, type the public IP address of Dimension.
If Dimension is behind a gateway Firebox or other firewall NAT device, add the public IP address of the gateway Firebox or firewall device. - Click OK.
- Click Add.
- (Optional) If you must import a new certificate for Dimension, click Browse and locate the certificate file.
- Click OK.
Configure a Deployed Remote Device for a Management Tunnel over SSL
To enable a Management Tunnel over SSL for a remote Firebox that is already deployed to a remote location behind a third-party NAT device, you can connect directly to the remote device to manually configure the Managed Device Settings for the remote device. This option is useful when the remote Firebox cannot contact the Management Server through the Management Tunnel over SSL because the connection is blocked by the third-party NAT device.
Before you complete the steps in this procedure to configure your remote device for a Management Tunnel over SSL, you must add your device to the Management Server. For more information, go to Configure Management Tunnels.
- Select System > Managed Device Settings.
- Make sure the Enable Centralized Management check box is selected.
- Select the Management Tunnel tab.
- Select the Use an SSL tunnel for remote management check box.
- In the SSL Server text box, type the IP address of the OpenVPN server.
This is the IP address of your Management Tunnel gateway Firebox hub device. - In the SSL Tunnel ID text box, type the Device Name for the device, or another unique name for the Management Tunnel over SSL.
- In the SSL Tunnel Password text box, type the password to use for the Management Tunnel over SSL.
- Click Save.
You can also use Policy Manager or the WatchGuard Command Line Interface to configure the remote device for a Management Tunnel over SSL. For more information, see:
- Policy Manager — Configure Management Tunnels
- WatchGuard Command Line Interface — Command Line Interface Reference
Set Device Management Properties
About the Device Management Page