Configure Network Access Enforcement for a Locally-Managed Firebox

Applies To: Locally-managed Fireboxes

You can enable network access enforcement for a mobile VPN connection to a locally-managed Firebox. Network access enforcement adds integrity checks that limit mobile VPN connections to devices that follow corporate policy.

When you enable network access enforcement, endpoint devices that try to connect to a Firebox mobile VPN must have WatchGuard Advanced EPDR, EPDR, EDR, EDR Core, or EPP installed.

Before an endpoint device can connect to the network, they must have these security settings:

  • Devices with WatchGuard Advanced EPDR, EPDR, EDR, or EPP installed must have Advanced Protection enabled in hardening or lock mode, or antivirus enabled and running.
  • Devices with WatchGuard EDR Core installed must have Advanced Protection enabled.

The WatchGuard Endpoint Agent installed on the device collects and sends the information that the Firebox requires to verify that the device meets the necessary requirements. The endpoint agent and Firebox verify that the device is associated with an account UUID specified in the Firebox network access enforcement settings and in the Network Services settings (Network Access Enforcement tab) of the WatchGuard Endpoint Security management UI. If the endpoint device does not meet these requirements, the Firebox rejects the connection.

How it Works

  1. An endpoint device tries to connect to the mobile VPN on the locally-managed Firebox.
  2. The Firebox allows the VPN connection, but initially allows only one-way VPN communication from the Firebox to the device.
  3. The Firebox connects to the device through the VPN over TCP port 33000.
  4. The Firebox verifies that the endpoint is associated with the account UUID specified in the Firebox network access enforcement settings and in the Network Services settings of the Endpoint Security management UI.
  5. The Firebox verifies that the endpoint device meets the operating system requirement (if specified).

Before You Begin

Before you configure network access enforcement:

  • Verify operating system compatibility — Network access enforcement supports Windows and macOS operating systems. For information about mobile VPN operating system compatibility, go to the Operating System Compatibility Matrix section of the Fireware Release Notes. For information about WatchGuard Endpoint Security operating system compatibility, got to the Installation Requirements section of the WatchGuard Endpoint Security Release Notes.
  • Configure at least one mobile VPN — The Firebox supports network access enforcement for all mobile VPN types. For more information, go to Select a Mobile VPN Type.
  • Configure mobile VPN user groups — To enable network access enforcement, create mobile VPN user groups.

Network access enforcement requires a Firebox with a Total Security Suite license.

Configure Network Access Enforcement on the Locally-Managed Firebox

This step to configure network access enforcement on Fireboxes that run Fireware v12.9 and higher is required for the WatchGuard Endpoint Agent to access the network.

In Fireware v12.5.4 to v12.8.2, Network Access Enforcement is called Endpoint Enforcement in the user interface.

Configure Network Access Enforcement for a Mobile VPN Group

You must now enable network access enforcement for a mobile VPN group. Users that are members of the mobile VPN group must meet the requirements from Before You Begin in this section.

For a user who belongs to multiple mobile VPN groups, enforcement applies to that user if:

  • The mobile VPN groups are all part of the same mobile VPN configuration, and
  • You enable network access enforcement for only some of those groups.

For example, if a user belongs to two mobile VPN with IKEv2 groups, but you enable enforcement for only one of those groups, enforcement applies to that user.

For a user who belongs to multiple groups that are part of different mobile VPN configurations, if network access enforcement is enabled for only some of the groups, enforcement applies to that user for only some types of mobile VPN connections. For example:

  • If a user is part of the IKEv2-Users and SSLVPN-Users groups, and you enable enforcement only for IKEv2-Users, enforcement applies to that user only for mobile VPN with IKEv2 connections.
  • Enforcement does not apply to that user for mobile VPN with SSL connections.

You cannot enable network access enforcement for individual mobile VPN users.

Mobile VPN with IKEv2

Mobile VPN with L2TP

Mobile VPN with SSL:

Mobile VPN with IPSec:

Enable Network Access Enforcement in Endpoint Security

After you enable and configure network access enforcement on the Firebox, you must configure network access enforcement settings in WatchGuard Endpoint Security.

Related Topics

Network Access Enforcement Overview

Configure Network Access Enforcement in Fireware