Create Device Configuration Templates

A Device Configuration Template is a collection of configuration settings that multiple Fireboxes can use. When you manage your Fireboxes with the WatchGuard Management Server, you can create Device Configuration Templates that are stored on the Management Server. You can then use these templates with your managed Fireboxes.

You can apply a template to a single managed Firebox, to a device folder, or to a Management Group folder. If you apply a template to a folder, the template is only applied to the compatible devices in the folder (devices with the same Fireware OS version range as the template). For example, if you apply a Fireware v11.9.4 or later template to a folder that includes a Firebox that runs Fireware v11.1, a Firebox that runs Fireware v11.10, and a Firebox that runs Fireware XTM v11.4.x, the template is applied only to the Fireboxes that run Fireware v11.12 and v11.10.5.

For more information about Management Groups, go to Configure Management Groups.

The templates that you create on the Management Server are located in the Device Configuration Templates tree. You can use Device Configuration Templates to easily configure standard firewall filters, change the configuration of your licensed Subscription Services, configure logging settings, or apply other policy settings to one or more fully managed devices. There are two different scenarios for how to use templates:

  • Create complete Device Configuration Templates, which include all the settings for your Fireboxes.
  • Create multiple Device Configuration Templates, each with specific settings that you apply in layers to your Fireboxes, as appropriate for each Firebox.
    For example, you could create a template that includes only the SMTP proxy settings for a group of Fireboxes deployed in the northern region of your territory.

To help you easily identify the contents of each template you create, make sure to specify a unique, descriptive name for each template.

When you configure a template, you can also specify whether settings in the template take precedence over settings in an individual device configuration file. By default, template settings automatically override settings in an individual configuration file.

You can make changes to a Device Configuration Template at any time. When you make a change to a configuration template for a Firebox that runs Fireware v11.3.x or higher, the Management Server saves the change in the template configuration history, but the Fireboxes that use that template are not automatically updated. You must reapply the template to your Fireboxes for the template changes to appear in the configuration file for your Fireboxes.

After a Device Configuration Template is applied to a Firebox, you can open Policy Manager from the Management Server to connect directly to the Firebox and change the policies and settings in the device configuration file. The Management Server saves the changes you make in the configuration history for the Firebox.

For more information about the device configuration history, see About Configuration History and Template Application History.

Create a New Device Configuration Template

You can create a new Device Configuration template from the Management Sever in WatchGuard System Manager.

To create a new Device Configuration Template:

  1. Open WatchGuard System Manager and connect to your Management Server.
  2. Select the Device Management tab.
    The Management Server page appears.
  3. In the left navigation menu, select Device Configuration Templates.
    The Device Configuration Templates page appears with the list of currently available templates.

Screen shot of the WSM Device Configuration Templates page

  1. To see the available templates, expand the Device Configuration Templates list.
  2. Right-click Device Configuration Templates or any template folder, and select Insert Device Configuration Template.
    Or, click Add at the top right of the Device Configuration Templates page.
    The Product Version dialog box appears.
  3. Select the product line and version from the drop-down list. Click OK.
  4. Specify a name for the template. Click OK.
    The new template is added to the template subfolder. Policy Manager opens with a blank configuration file.
  5. Complete the procedures in the next sections to configure the template.

Configure a Template for a Device

To define settings in a device configuration template you use a streamlined version of Policy Manager.

Screen shot of the Fireware Policy Manager Configuration Template application

To configure global DNS, QoS, and the WebBlocker Warn action in Fireware v12.0-12.5.x configuration templates, you must use Policy Manager v12.4 or higher.

In a Device Configuration template, you can:

The template only contains a partial SD-WAN action definition because SD-WAN is configured on a Firebox for specific network interfaces. An SD-WAN action with the same name must already exist on the Firebox when you apply the template. If a matching SD-WAN action does not exist on the Firebox, the SD-WAN action is not applied from the template. If the template has a policy that uses an SD-WAN action that does not exist on the Firebox, the policy is applied without the SD-WAN action.

If a template includes a WebBlocker action that specifies the Warn action, you can apply the template only to Fireboxes that run Fireware v12.4 or higher.

You cannot use a Device Configuration template to modify default policies, such as the WatchGuard and WatchGuard Web UI Firebox management policies. Instead, you can add another policy of the same type as the default policy to the template.

After you apply a template to a Firebox, you can make changes to the aliases in your device configuration file to correctly define the value of the aliases for your Firebox.

If you apply a template to a Firebox, and the template includes an alias name that is already used by an interface on the Firebox, the alias name does not appear correctly in the Aliases list after the template is applied. This is because a configuration file cannot contain duplicate alias names.

Because you can apply a template to more than one fully managed device, it is helpful to be able to automatically delete certain settings from a device configuration file when the template is applied. You can configure the deletion settings when you set up your template configuration file. You can delete policies, services, aliases, proxy actions, WebBlocker actions, Application Control settings, and schedules. You cannot delete tunnels or license keys, which are stored on the Management Server.

To quickly determine if a template is restricted for use with only certain Fireware models, look at the template information that appears at the bottom of the template in Policy Manager. If (Model Restriction) appears, the template can only be applied to certain devices.

Screen shot of the template information section in Policy Manager

For more information about how to configure WebBlocker servers, go to Configure WebBlocker and Configure WebBlocker Servers.

Add Policies to a Template

You can add Firewall policies to a configuration template just as you would add them to the configuration of an individual Firebox.

To add policies to a configuration template:

  1. Select the Firewall tab.
  2. Click the Add Policy icon.
    Or, select Edit > Add Policy.
    The Add Policies dialog box appears.
  3. Expand the folder for the type of policy you want to add.
    A list of the selected policies appears.
  4. Select a policy.
  5. Click Add.
    The New Policy Properties dialog box appears.
  6. Configure the policy.
    For more information about how to configure a new policy, go to Add a Proxy Policy to Your Configuration.
  7. Repeat Steps 3–6 to add more policies to your configuration.

Configure Policy Precedence

After you add policies to a template, you can change to manual-order mode and set the policy precedence for your template. When you apply the template to a Firebox, the order you specify for the policies in the template is maintained only if the configuration file of the Firebox is also set to manual-order mode.

To configure policy precedence, from Policy Manager:

  1. Select View > Auto-Order Mode.
    The check mark disappears and a confirmation message appears.
  2. Click Yes to confirm that you want to switch to manual-order mode.
    When you switch to manual-order mode, the Policy Manager window changes to the Details view. You cannot change the order of policies if you are in Large Icons view.
  3. To change the order of a policy, select it and drag it to the new location.
  4. Click  the Save to Management Server icon.
  5. Open the device configuration file in Policy Manager.
  6. If the file is in auto-order mode, repeat Steps 1–4 to change the device to manual-order mode.
  7. Close Policy Manager for the device.
  8. Apply the Device Configuration Template to your device.
  9. Open the device configuration file in Policy Manager and review the policy order.
    The policies from the Device Configuration Template have the same order in the device configuration file that you specified in the template.

Specify Objects to Delete

When you apply a template to a device, you can specify some settings to be deleted in the device configuration file. This enables you to make sure that the device configuration does not contain duplicate items after the template is applied.

You can select to add items in these categories to the Objects To Be Deleted list:

  • Policies
  • Policy Types
  • Aliases
  • Proxy Actions
  • Content Actions
  • WebBlocker
  • Application Control
  • Geolocation Control
  • Data Loss Prevention
  • Traffic Management
  • Schedules
  • SNAT
  • Authentication Domains
  • Authorized Users / Groups
  • Quota Rule
  • Quota Action
  • TLS Profiles (Fireware v12.0 or higher)

Because Mobile VPN policies include two policies that appear as one policy (an .in policy and an .out policy), we recommend that you do not add Mobile VPN policies to this list. If you must specify in your template a Mobile VPN policy to be deleted, make sure to add both the .in policy and the .out policy. For example, for a Mobile VPN policy named MVPN-North, add the MVPN-North.in and MVPN-North.out policies to the Objects To Be Deleted list.

If you specify objects for deletion that are linked to items that remain in your configuration file after the template is applied, the link to the deleted items is removed from the items that remain. For example, if you specify an alias to be deleted and that alias is used in a policy that is not specified for deletion, when the template is applied to the device, the policy is not removed but the alias is removed from the policy. Make sure to verify that the items you specify for deletion do not create errors in your configuration files, such as a policy without a From or To address.

To specify objects to be deleted from the device configuration file when the template is applied:

  1. Select the Delete Objects tab.

Screen shot of the Policy Manager Configuration Template Deleted Objects tab

  1. From the Objects To Be Deleted tree, select the type of object to delete from the device configuration file.
  2. Right-click the object and select Add Object.
    The Add Object dialog box appears.

Screen shot of the Add Object dialog box

  1. In the Object Name text box, type the name of the object to delete.
    For example, to delete the FTP-Proxy policy, type FTP-proxy.
  2. Click OK.
    The object you specified appears in the list for the type of object you selected.

Specify an Object to Delete when you Delete or Rename an Object

When you remove or rename objects in a configuration template, Policy Manager asks whether you want to add the object or policy to the Objects to be Deleted list. This option appears when you delete an object, such as a proxy action or WebBlocker action, or when you rename an existing policy. If you add an object to the list, when you apply the template to a Firebox, the objects you specify are removed from the Firebox device configuration. If you add the name of a renamed policy to the list, the policy with the new name is added to the configuration file and the original policy is removed.

To delete an object from the template when you delete or rename an object:

  1. Delete an object from the template or change the name of a policy.
    The Delete Object(s) dialog box appears.

Screen shot of the Delete Object(s) dialog box

  1. To remove the object or policy name from the device configuration file when the configuration template is applied to the Firebox, select the Add this object to the "Objects to be Deleted" list check box.
    To delete the object from the template, but not add it to the Objects to be Deleted list, do not select the Add this object to the "Objects to be Deleted" list check box.
  2. Click OK.

Configure Network DNS and WINS Servers

You must configure network (global) DNS and WINS servers on the Firebox for some features to work. Network DNS and WINS servers are also known as global DNS and WINS servers.

DNS/WINS server configuration is supported in templates for Fireware v12.0 and higher.

  1. Open the configuration template in Policy Manager.
  2. Select Setup > DNS/WINS.
    The DNS/WINS dialog box appears.

Screenshot of the DNS/WINS dialog box.

  1. Configure the network DNS and WINS server settings. For more information about these settings, go to Configure Network DNS and WINS Servers.

Configure Global Settings

When you create a new configuration template, you can configure these global settings:

To configure the global settings in the template:

  1. Select Setup > Global Settings.
    The Global Settings dialog box appears.

Screen shot of the Global Settings dialog box

  1. To disable the Device Feedback feature, clear the Send device feedback to WatchGuard check box.
  2. To enable the Fault Reports feature, select the Send Fault Reports to WatchGuard daily check box.
  3. To enable the Traffic Management and QoS features, select the Enable all traffic management and QoS features check box.
  4. To enable more than one user with Device Administrator credentials to log in to the Firebox at the same time, select the Enable more than one Device Administrator to log in at the same time check box.
    This global setting is available only in templates for Fireware 11.9.4-11.12.x.
  5. To enable configuration of policies for traffic generated by the Firebox, select the Enable configuration of policies for traffic generated by the Firebox check box.
    This global setting is available only in templates for Fireware 12.0 or higher, and is supported only for devices that run Fireware OS v12.2 or higher.

Configure Inheritance Settings

If you apply a template to a Firebox with a configuration file that already includes the same policies and settings as the template, you can control if the template settings override the Firebox configuration settings, depending on the template's inheritance settings.

If you change the name of a policy or another object in the template, when you apply the template to your Firebox, the new policy or object is added to the Firebox configuration and does not replace the older policy or object that you renamed. If you do not want to keep the older policy or object in your configuration file, you must manually delete it.

For Inheritance Settings to work correctly, the policies and settings in the template must have exactly the same name and use the same configuration options as the policies and settings in the device configuration file. For example, in the Authorized Users and Groups settings, if you add an authorized user with the name Admin 1 to your template and apply the template to a Firebox with an authorized group named Admin 1, the Inheritance Settings do not apply because the template instance of Admin 1 is a group and the Firebox instance is a user.

In the template inheritance settings, you can specify which settings in the device configuration file take precedence over the template settings. Each category of settings appears on a different page:

  • Policies
  • Policy Types
  • Schedules
  • Aliases
  • Proxy Actions
  • Content Actions
  • TLS Profiles
  • HTTPS Exception Overrides
  • Application Control
  • Geolocation Control
  • Data Loss Prevention
  • WebBlocker
  • Traffic Management
  • SNAT
  • Authentication Servers
  • Authorized Users / Groups
  • Quotas Rule
  • Quotas Action
  • Other

There are two exceptions to the default Inheritance settings behavior: most options on the Other page and specific aliases for wireless devices. By default, the Allow Override check box is selected for most of the options on the Other page (except for Policy Tags, Policy Filters), and for the specific wireless aliases. This is to make sure that the settings configured on the Firebox automatically override the settings in the template.

Options on the Other list include:

Settings Fireware Version Comment
Account settings for Firebox authentication v11.12.2 or higher  
APT Blocker settings This option controls inheritance only for APT Blocker settings. It does not affect inheritance of APT Blocker settings within a proxy action. Configure inheritance for proxy actions in Proxy Actions inheritance settings.
Automatic feature key synchronization setting
Autotask Settings v12.0.1 and higher  
Botnet Detection v11.11 and higher  
ConnectWise Settings v11.12 and higher
Control of Firebox Generated Traffic v12.2 and higher  
Device Administrator Connections setting v11.10.1 and higher  
Device Feedback setting
Diagnostic Log Level
DLP Global Settings
Enable automatic update of trusted CA certificates v11.10 and higher  
Enable feature keys expired notification v11.10.1 and higher  
Fault Report setting
File Exceptions v12.2 and higher  
Gateway AntiVirus decompression settings
Geolocation v11.12 and higher
Global Firewall Authentication settings
IntelligentAV settings v12.2 and higher  
Intrusion Prevention settings
Mobile Security v11.11 and higher
NTP Settings
Policy Filters Not selected by default
Policy Tags Not selected by default
Quarantine Server settings
Quotas Settings v11.10 and higher
Reputation Enabled Defense feedback settings    
Send log messages to Firebox internal storage  
Send log messages when the configuration for this device has changed  
Signature Update settings  
Single Sign-On settings  
SD-WAN Actions v12.8 and higher  
SNMP Settings  
spamBlocker settings  
Syslog Server  
System DNS/WINS settings v12.0 and higher  
Terminal Services settings  
Tigerpaw settings v12.3 and higher  
Traffic Management and QoS settings  
WatchGuard Log Server settings  
WebBlocker Settings v11.12 and higher  

When you configure the settings for options on the Other page, a message might appear that asks you if you want to change the Inheritance Settings selection for that option. If you click Yes, the Allow Override check box for that option is cleared. When the Allow Override option is not enabled, when you apply the template to your Fireboxes, the setting configured on each Firebox does not override the setting configured in the template.

The aliases for wireless devices that are overridden by default are:

  • WG-Wireless-Guest
  • WG-Wireless-Access-Point1
  • WG-Wireless-Access-Point2
  • WG-Wireless-Client

Because proxy actions and Subscription Services have some related settings, the Inheritance Settings for proxy actions and Subscription Services can affect each other and cause unexpected results when you apply a template to your Fireboxes. To avoid this problem, when you configure the Inheritance Settings for either proxy actions or a Subscription Service, check the Inheritance Settings for the related Subscription Service or proxy action and make sure there are no conflicts in the settings.

To configure Inheritance Settings for a Device Configuration Template:

  1. Select View > Inheritance Settings.
    The Inheritance Settings dialog box appears, with the Policies category selected by default.

Screen shot of the Inheritance Settings dialog box

  1. Select a category.
    The settings configured in the template for the selected category appear.
  2. To allow a Firebox setting to override a template setting, select the Allow Override check box for that setting.
    Most of the check boxes for settings in the Other category are selected by default.
  3. Repeat Steps 2–3 to specify additional override settings.
  4. Click OK.

Save the Template

  1. Click  the Save to Management Server icon.
    Or, select File > Save > To Management Server.
    The Schedule Template Update Wizard appears.
  2. Click Next to start the wizard.
    The Select the Time and Date page appears.
  3. Select an option: Update the template immediately or Schedule template update.
  4. If you selected Schedule template update, select the Date and Time that you want the update to occur.
  5. Click Next.
    The Schedule Template Update Wizard is complete page appears.
  6. Click Finish to exit the wizard.
    If your Management Server configuration requires that you add a comment when you save your configuration, the Save Comment dialog box appears.
  7. If the Save Comment dialog box appears, type a comment about your configuration changes.
  8. Click OK.
    The new template appears in the Device Configuration Templates list.

Review Template Settings

After you have configured all the settings for your Device Configuration Template, select the template in the Device Configuration Templates list. The Template Settings page for the template appears with all the settings you configured.

Screen shot of the Template Settings page

From this page, you can review the template settings, apply the template to a Firebox, and view the configuration history of the template.

The available template settings include:

Inheritance Settings

In the Inheritance Settings section, select a tab to review the settings for these options:

  • Policies
  • Policy Types
  • Aliases
  • Proxy Actions
  • Content Actions
  • TLS Profiles
  • HTTPS Exception Overrides
  • WebBlocker
  • Application Control
  • Geolocation Control
  • Traffic Management
  • Data Loss Prevention
  • Schedules
  • SNAT
  • Authentication Servers
  • Authorized Users / Groups
  • Quota Rules
  • Quota Actions
  • Delete Objects

Subscription Services

The Subscription Services section includes the status and general configuration details for each available service.

System Settings

The System Settings section includes the current settings in the template for:

  • WatchGuard Logging — The IP address of the Dimension instance or WSM Log Server, or Disabled.
  • Automatic feature key synchronizationEnabled or Disabled
  • Global Login Limits — Maximum number of firewall authentication logins from the same account
  • Advanced Persistent ThreatEnabled or Disabled

About

The About section includes Firebox compatibility information for this template.

Configuration History

The Configuration History section includes details about when the template was last updated, how many revisions the Management Server currently has saved for the template, and the amount of space the revisions have used on the Management Server.

To see more details in the configuration history for a template, click View History.

Devices

The Devices section includes the time the template was most recently applied to a device, and a list of Fireboxes that the template was applied to.

To see more information about the template application history, click Detail.

You cannot make changes to the settings on the Template Settings page, but you can open Policy Manager from this page to change a Device Configuration Template. For more information, go to the Create a New Device Configuration Template section.

To apply the template to a Firebox, run the Apply Template Wizard. For more information, go to the Apply a Template to a Firebox section.

To view the configuration history of the template, open the Configuration History dialog box. For more information, go to About Configuration History and Template Application History.

Apply a Template to a Firebox

After you have completed the configuration for your Device Configuration Template, you can apply it to your fully managed devices of the same OS version range. For more information about how to apply a template to a Firebox, go to Apply Device Configuration Templates to Managed Devices.

Change a Configuration Template

To modify a setting in a Device Configuration Template:

  1. From the left navigation menu, select the template.
    The Template settings page appears.
  2. In the Inheritance Settings section, click Configure.
    The selected template configuration file opens in Policy Manager.
  3. To modify a policy, select the policy and click Policy Manager — Modify Policy icon.
    Or, select Edit > Modify Policy.
    The Edit Policy Properties dialog box appears.
  4. Configure the policy.
    For more information about how to modify a policy, go to About Policy Properties or Add a Proxy Policy to Your Configuration.
  5. Make any other changes to settings in the template.
  6. Click Policy Manager — Save to Management Server icon.
    Or, select File > Save > To Management Server.
    The template changes are saved to the Management Server.

For your changes to take effect in your individual device configuration files, you must apply your template changes to your Fireboxes with the Apply Template Wizard.

Related Topics

About Centralized Management Modes

Clone a Device Configuration Template

Apply Device Configuration Templates to Managed Devices

About Policies

About Policy Manager

About Policy Tags and Filters