Network Blocking on Cloud-Managed Fireboxes

Applies To: Cloud-managed Fireboxes

The firewall policies you create give you strict control over access to your network. A strict access policy helps keep hackers out of your network, but there are other types of attacks that a strict policy cannot defeat. The default threat protection on a cloud-managed Firebox can stop threats such as SYN flood attacks, spoofing attacks, and port or address space probes.

With default threat protection, the Firebox examines the source and destination of each packet it receives. It looks at the IP address and port number and monitors the packets to look for patterns that show your network is at risk. If a risk exists, the Firebox can automatically block a possible attack. This proactive method of intrusion detection and prevention keeps attackers out of your network.

You can configure the Firebox to monitor and block common security threats, such as botnets, spyware, SQL injections, cross-site scripting, and buffer overflows. WatchGuard network blocking security services, such as Botnet Detection, Tor Exit Node Blocking, and Intrusion Prevention Services, are enabled by default on cloud-managed Fireboxes, with recommended settings.

From the Network Blocking page, you can configure security service settings for cloud-managed Fireboxes. You can also manually block ports and sites and configure default packet handling settings. For more information, go to:

Related Topics

Add a Cloud-Managed Firebox to WatchGuard Cloud

About Blocked Sites on Cloud-Managed Fireboxes

About Blocked Ports on Cloud-Managed Fireboxes

About Default Packet Handling on Cloud-Managed Fireboxes

About Botnet Detection (Fireware Help)

About Intrusion Prevention Service (Fireware Help)

About Tor Exit Node Blocking (Fireware Help)