Quick Start — Set Up FireCloud

Applies To: FireCloud Internet Access, FireCloud Total Access

This quick start topic reviews the general steps to configure and test FireCloud. This guide introduces FireCloud, reviews the basic components of FireCloud, and helps you get set up.

FireCloud is a fully-managed, cloud-based firewall-as a-service that protects your remote users against Internet-based security threats and provides access to local resources on your company network without a VPN. You configure FireCloud in WatchGuard Cloud, and users connect to the service with the WatchGuard connection manager. While the users are connected to FireCloud, they are protected and can safely use their computer and browse the Internet.

Here is a high level overview of the steps in this quick start guide:

  1. Activate a FireCloud license or start a trial.
  2. Configure FireCloud authentication settings.
    1. Configure an Identity Provider
    2. (SAML Only) Provide FireCloud Information to Your Identity Provider (SAML Only)
    3. (WatchGuard Cloud Directory Only) Add a Zero Trust Policy for MFA (WatchGuard Cloud Directory Only)
    4. (Optional) Control Access to FireCloud
  3. Review the default settings.
  4. Download and install the connection manager.
  5. Connect to FireCloud with the connection manager.
  6. (Total Access Only) Give users access to resources on the company network.
    1. Configure and deploy a Virtual Gateway.
    2. Add private resources.
  7. (Optional - Service Providers Only) Create and deploy FireCloud templates.

Activate a FireCloud License or Start a Trial

Before you begin, you must purchase and activate a FireCloud license or start a FireCloud trial.

If you have not already purchased a FireCloud license, we recommend that you start a free FireCloud trial in WatchGuard Cloud. For detailed steps to start a trial, go to Manage Trials – Service Providers or Manage Trials – Subscribers. All trial licenses are valid for 30 days, and can be renewed for another 30 days to a maximum of 60 days.

Screenshot of the FireCloud trials list.

If you have purchased a FireCloud license, go to https://myproducts.watchguard.com/activate and complete the activation wizard. For more information, go to Activate a FireCloud License.

We recommend that you extend your trial now to get the full 60 days. You can only extend the trial once within 30 days of the trial start date, and only before the trial expires.

If you have a WatchGuard Cloud Service Provider account and want to use FireCloud for your own account, after you activate a FireCloud license you must allocate the users to your Subscriber account. For detailed steps, go to Allocate FireCloud Users.

Configure Authentication Settings

Before you can configure FireCloud, you must set up an identity provider. An identity provider is an external system that you use to manage and authenticate your FireCloud users and groups. This is how FireCloud knows what users and groups are authorized, and how the users are authenticated when they connect to FireCloud.

Configure an Identity Provider

To configure an identity provider for FireCloud:

  1. Log in to WatchGuard Cloud and select Configure > FireCloud.
  2. Select the type of identity provider to use and enter the required information:
  3. Click Save.

You only have to configure an identity provider the first time you set up FireCloud. To edit the settings for your identity provider, or change to a new identity provider, go to the Configure > FireCloud > Authentication.

Provide FireCloud Information to Your Identity Provider (SAML Only)

If you configure a SAML identity provider, FireCloud generates a certificate that you can provide to your identity provider. This certificate gives your identity provider the information to identify FireCloud and makes sure that your identity provider responds only to valid authentication requests sent by FireCloud. You can download this certificate from the FireCloud Authentication page.

Screenshot of the FireCloud authentication page with the FireCloud certificate.

We recommend that you import the FireCloud certificate to your identity provider and enable signature verification.

Your identity provider might have a different name for signature verification. For example, Okta calls this setting SAML Signed Request and Entra ID calls it Verification Certificates.

If you select to use AuthPoint as your identity provider, you must also create a SAML resource in AuthPoint for FireCloud, and you must add the SAML resource to your existing authentication policies or add new authentications policies for the SAML resource.

Add a Zero Trust Policy for MFA (WatchGuard Cloud Directory Only)

To require AuthPoint MFA for WatchGuard Cloud Directory users, after you set up your FireCloud identity provider you must add a Zero Trust policy that includes the default FireCloud resource from AuthPoint.

Skip this section if you do not have AuthPoint, or you do not want to require MFA for FireCloud.

Control Access to FireCloud

If you have connected FireCloud to an identity provider that has more users than will actually use FireCloud, you can control access to FireCloud so that only some users can connect to the service and consume a user license. To do this, you can disable the default FireCloud access rule and configure access rules for only the user groups that you want to have access to FireCloud. Users that do not have an access rule cannot connect to the FireCloud service and consume a license. For more information, go to FireCloud Access Rules.

You can also provide the FireCloud connection manager to only the end-users that you want to use the service.

Review the Default Settings

By default, FireCloud has all security services enabled with default configurations, and a default access rule is in place to specify which security services apply to user traffic. This means that you can deploy and use FireCloud immediately, but we recommend that you review the default settings.

Download and Install the WatchGuard Connection Manager

For FireCloud to protect your users, they must have the WatchGuard Connection Manager installed on their device and use it to connect to FireCloud.

If you want to install FireCloud on a computer that already has the WatchGuard Agent installed for another product, such as Endpoint Security, you can configure a WatchGuard Agent deployment to install FireCloud. For more information, go to Configure WatchGuard Agent Deployment in WatchGuard Cloud.

To download the WatchGuard Agent, used to install the WatchGuard Connection Manager:

  1. Log in to WatchGuard Cloud and go to Configure > FireCloud.
  2. Select Endpoint Installation.
    The Endpoint Installation page opens.
  3. Click Add Endpoint.
  4. Select the operating system for the endpoint where you want to install the agent.
  5. If you have Endpoint Security, select the group you want to add the computer to.
    For endpoints with an Endpoint Security license, the security policies assigned to a computer depend on the group it belongs to. For information about groups for endpoints with an Endpoint Security license, go to Manage Computers and Devices in Groups in Endpoint Security.
    • To add the computer to a group created in the Endpoint Security management UI, select Add Computers to this Group. From the drop-down list, select a folder.
    • To add the computer to an Active Directory group, select Add Computers to their Active Directory Path. Select the network proxy to assign to the computers.
  6. (Optional) For the Windows installer, to specify an expiration date for the installer, click in the box and select a date from the calendar.
    After the expiration date, if users try to run the installer, a message informs them that the installer is expired, and they must download a new one or contact their administrator.
  7. Click Download Installer.
    The WatchGuard Agent installer download begins.
  8. If you want to send the installer to your users so they can download and install the agent themselves, click Copy Installer URL. You can send this link to your users.
  9. Run the downloaded installer.
  10. Click Install. The installation of the WatchGuard Agent can take several minutes.
  11. When the installation is complete, click Finish.
  12. After the WatchGuard Agent is installed, the agent automatically downloads and installs the Connection Manager.
  13. On mac computers, you are prompted to enable the network extension for the Connection Manager. Open the system settings and go to General > Login Items and Extensions > Network Extensions and enable WatchGuardConnectionManager.
  14. When the installation is finished, the Connection Manager opens and you are prompted to enter your credentials to connect to FireCloud. You use the credentials for the user account in your identity provider.

Connect to FireCloud with the Connection Manager

While you are connected to FireCloud, you are protected and can safely use your computer and browse the Internet. After you connect to FireCloud for the first time, the agent keeps your session open and you remain connected even if you restart your computer.

If you disconnect from FireCloud, you must manually log in and connect again.

To connect to FireCloud:

  1. Open the WatchGuard Connection Manager.
  2. From the system tray, click the WatchGuard Connection Manager, then select Connect.

Screenshot of the login page for the WatchGuard Connection Manager.

  1. Enter your user name or email address, then click Next.

Screenshot of the login page for the WatchGuard Connection Manager.

  1. Enter your password.

    You see a success message when you are connected to FireCloud.
  2. Click Log In.

Give Users Access to Resources on the Company Network (Total Access Only)

With FireCloud Total Access, you can give FireCloud users access to local resources on the company network without a VPN.

To do this, you must:

  • Install a FireCloud Gateway on your network (the Gateway establishes a connection between FireCloud and your network)
  • Configure a private resource for each resource that you want to allow remote FireCloud users to have access to, such as a printer or an SMB share
  • You add your private resources to access rules to give users access to those resources

With this setup, remote users that are connected to FireCloud can connect to resources on the company network. Your access rules determine which resources users can connect to. Users that do not have an access rule that includes a private resource cannot connect to that resource.

Configure and Deploy a Virtual Gateway

To configure a FireCloud Virtual Gateway

  1. From the navigation menu, select Configure > FireCloud. If you have a Service Provider account, you must select an account from Account Manager.
  2. On the Configuration page, click the Private Resources widget.
  3. Click Add FireCloud Gateway.
  4. Select Virtual Gateway.
  5. Click Next.
  6. Enter a Name for your Gateway.
  7. For IP Address Configuration, select whether you want to give the Gateway a static or DHCP IP address.
  8. If you use a static IP address:
    1. Enter the Network IP Address and the Network Gateway IP address.
    2. Enter a DNS server, such as the public Google DNS server 8.8.8.8.
  9. Click Next.
  10. Select the environment that you are going to deploy the FireCloud Gateway on, either Hyper-V or VMWare ESXi.

    FireCloud only supports Hyper-V generation one.

    If you want to use Proxmox, you can choose ESXi and import the virtual machine.

  11. Click Next.
  12. Click Download Gateway Files. When the download is complete, extract the files in the downloaded .zip folder. You will have a .iso file and either an .ova file (ESXi) or a .vhdx file (Hyper-V).
  13. Complete the steps to deploy the FireCloud Gateway in your chosen environment. Leave the WatchGuard Cloud tab open so that you can test the connection to the Gateway after you have set it up.

Add Private Resources

  1. In WatchGuard Cloud, select Configure > FireCloud. If you have a Service Provider account, you must select an account from Account Manager.
  2. On the Configuration page, click Private Resources.
  3. Select a Gateway to show the list of resources associated with that Gateway, then click Add Resource.
  4. Enter a name for your resource.
  5. In the FQDN text box, specify an FQDN that will be used to connect to this resource. FireCloud uses this FQDN to resolve connections to private resources while users are connected to FireCloud. This is typically a private FQDN, such as internal.company.com.

    You cannot use FQDNs that have capital letters.

  6. In the IP Address text box, enter the internal IP address of the resource.
  7. In the Protocol drop-down list, select a protocol that is used to connect to this resource.

    The Port text box appears.
  8. In the Port text box, enter the port used to connect to this resource with the previously selected protocol. For example, if you want to give RDP access you could select TCP port 3389.
  9. Click Save.
  10. To allow users to connect to your private resources, add the private resource to your existing access rules, or add new access rules for this private resource. Access rules specify which private resources users have access to.

    When you configure access rules, we recommend that you only add each group to a single access rule. If a group belongs to multiple access rules with different parameters, FireCloud only applies the access rule with the highest priority. This can prevent access to private resources if the access rule with the private resources has a low priority.

Create and Deploy FireCloud Templates (Optional — Service Providers Only)

For Service Providers, FireCloud templates provide a way to manage shared configuration settings for multiple accounts. In a FireCloud template, you can configure FireCloud access rules and services just as you would for your FireCloud account. You can then subscribe your managed accounts to the template so that those accounts inherit configuration settings from the template.

To learn more about FireCloud templates, go to About FireCloud Templates and Manage FireCloud Templates.

Related Topics

About FireCloud

About the FireCloud Usage Report

See and Manage Licensed FireCloud Users