Network Blocking on Cloud-Managed Fireboxes
Applies To: Cloud-managed Fireboxes
The firewall policies you create give you strict control over access to your network. A strict access policy helps keep hackers out of your network, but there are other types of attacks that a strict policy cannot defeat. The default threat protection on a cloud-managed Firebox can stop threats such as SYN flood attacks, spoofing attacks, and port or address space probes.
With default threat protection, the Firebox examines the source and destination of each packet it receives. It looks at the IP address and port number and monitors the packets to look for patterns that show your network is at risk. If a risk exists, the Firebox can automatically block a possible attack. This proactive method of intrusion detection and prevention keeps attackers out of your network.
You can configure the Firebox to monitor and block common security threats, such as botnets, spyware, SQL injections, cross-site scripting, and buffer overflows. WatchGuard network blocking security services, such as Botnet Detection, Tor Exit Node Blocking, and Intrusion Prevention Services, are enabled by default on cloud-managed Fireboxes, with recommended settings.
From the Network Blocking page, you can configure security service settings for cloud-managed Fireboxes. You can also manually block ports and sites and configure default packet handling settings. For more information, go to:
- Configure Network Blocking in WatchGuard Cloud
- Add Blocked Sites and Blocked Ports on a Cloud-Managed Firebox
- Configure Default Packet Handling on a Cloud-Managed Firebox
Add a Cloud-Managed Firebox to WatchGuard Cloud
About Blocked Sites on Cloud-Managed Fireboxes
About Blocked Ports on Cloud-Managed Fireboxes
About Default Packet Handling on Cloud-Managed Fireboxes
About Botnet Detection (Fireware Help)
About Intrusion Prevention Service (Fireware Help)
About Tor Exit Node Blocking (Fireware Help)