Configure Network Access Enforcement for a Cloud-Managed Firebox

Applies To: Cloud-managed Fireboxes

You can enable network access enforcement for a VPN connection to a cloud-managed Firebox. You can configure network access enforcement for Mobile VPN with SSL and Mobile VPN with IKEv2 user groups.

With network access enforcement for cloud-managed Fireboxes, network administrators can verify the identity and security of a device that tries to connect to the corporate network.

Before an endpoint device can connect to the network, they must have these security settings:

  • Devices with WatchGuard Advanced EPDR, EPDR, EDR, or EPP installed must have Advanced Protection enabled in hardening or lock mode, or antivirus enabled and running.
  • Devices with WatchGuard EDR Core installed must have Advanced Protection enabled.

The WatchGuard Agent installed on the device collects and sends the information that the Firebox requires to verify that the device meets the necessary requirements. The WatchGuard Agent and Firebox verify that the device is associated with an account UUID specified in the Firebox network access enforcement settings and in the Network Services settings (Network Access Enforcement tab) of the Endpoint Security management UI. If the endpoint device does not meet the requirements, the Firebox rejects the connection.

To enable network access enforcement for a cloud-managed Firebox, the Firebox must run Fireware v12.9 or higher.

How it Works

  1. An endpoint device tries to connect to the mobile VPN on the cloud-managed Firebox.
  2. The cloud-managed Firebox allows the VPN connection, but initially allows only one-way VPN communication from the Firebox to the device.
  3. The Firebox connects to the device through the VPN over TCP port 33000.
  4. The cloud-managed Firebox checks the endpoint client to validate if the device has a Endpoint Security product installed.
  5. The cloud-managed Firebox verifies that the endpoint is associated with the account UUID specified in the Firebox network access enforcement settings and in the Network Services settings of the Endpoint Security management UI.
  6. If all these checks pass, the endpoint device connects to the network through the mobile VPN.

Before You Begin

Before you configure network access enforcement:

Network access enforcement requires a Firebox with a Total Security Suite license.

Enable Network Access Enforcement in Endpoint Security

Before you enable Network Access Enforcement for a cloud-managed Firebox mobile VPN, you must first enable and configure network access enforcement in WatchGuard Endpoint Security.

Enable Network Access Enforcement for a Mobile VPN Group

Next, enable network access enforcement for one or more mobile VPN groups in your cloud-managed Firebox configuration. You cannot enable network access enforcement for individual mobile VPN users.

If a group is a member of a mobile VPN type, and you enable network access enforcement for the group from another mobile VPN type that the group also belongs to, network access enforcement is enabled for the group in both mobile VPN types.

Related Topics

Video tutorial: Network Access Enforcement

Network Access Enforcement Overview

Configure Mobile VPN with SSL for a Cloud-Managed Firebox

Configure Mobile VPN with IKEv2 for a Cloud-Managed Firebox