<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Firebox - Other — WatchGuard Community</title>
        <link>https://community.watchguard.com/watchguard-community/</link>
        <pubDate>Sun, 19 Apr 2026 08:56:30 +0000</pubDate>
        <language>en</language>
            <description>Firebox - Other — WatchGuard Community</description>
    <atom:link href="https://community.watchguard.com/watchguard-community/categories/firebox-other/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Google login issue</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4564/google-login-issue</link>
        <pubDate>Fri, 27 Mar 2026 15:39:21 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>MeOMy</dc:creator>
        <guid isPermaLink="false">4564@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We are having an issue where users cannot log into Google, both personal and Workspace accounts. If I bypass the firewall, a user can connect. If I restart the firewall, users can connect again but by the next day the issue is back. We first had an issue with downloads from Google on the 23rd. The problem cleared up on its own, while I was troubleshooting the issue. I went ahead and updated the firewall to 12.11.8 anyways. Yesterday the login issue appeared. It doesn't matter what computer or browser we use. I've tried having the NAT connection go out of different IP addresses, I've tried switching from a proxy rule to just a packet filter rule.</p>
]]>
        </description>
    </item>
    <item>
        <title>Netflix Extremely Slow, Other services just fine</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4556/netflix-extremely-slow-other-services-just-fine</link>
        <pubDate>Mon, 16 Mar 2026 13:20:42 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>forgottenKahz</dc:creator>
        <guid isPermaLink="false">4556@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I own a T25-W version 12.9.4.B682007 with Webblocker and AppControl and a few other active subscriptions. Recently, the Netflix speed on any app or device in the house absolutely tanked. I can log in but the videos only buffer. Fast.com (which test against Netflix servers) has my download speed at less than 1mbs. While a google speed test has my speed at about 150mbs. I've added *.netflix.com as exceptions in several places and I rebooted the firebox. When I connect directly to the web with my laptop my speed to Fast.com is about 600mbs. I have no issue streaming other services. Its almost like every electron is being inspected for anything associated with Netflix. Has anybody else experienced and solved this issue?</p>
]]>
        </description>
    </item>
    <item>
        <title>Firebox M690 Availble Storage</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4544/firebox-m690-availble-storage</link>
        <pubDate>Thu, 05 Mar 2026 18:51:08 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>masterofdebian</dc:creator>
        <guid isPermaLink="false">4544@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hallo,</p>

<p>Is it normal that the available storage on the Firebox M690 is so small? If not, is there any way to increase the capacity of the local storage?</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/bu/d2wfvn7pw0ic.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/bu/d2wfvn7pw0ic.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/bu/d2wfvn7pw0ic.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/bu/d2wfvn7pw0ic.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/bu/d2wfvn7pw0ic.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/bu/d2wfvn7pw0ic.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/bu/d2wfvn7pw0ic.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/bu/d2wfvn7pw0ic.png" sizes="100vw" /></p>

<p>Thanks a lot<br />
Regards</p>
]]>
        </description>
    </item>
    <item>
        <title>Why are my networks not segmented?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4538/why-are-my-networks-not-segmented</link>
        <pubDate>Sun, 22 Feb 2026 01:53:35 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>ToddAndMargo2</dc:creator>
        <guid isPermaLink="false">4538@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi All,</p>

<p>Model   T10-W<br />
Version 11.12.1.B522519</p>

<p>1 Trusted General Office 192.168.25.1/24 <br />
2 Trusted Point-Of-Sale 192.168.29.1/24</p>

<p>From a computer on 192./168.25.0/24:</p>

<p>zenmap: nmap -sn -T4 192.168.29.0/24<br />
Starting Nmap 7.98 ( <a href="https://nmap.org" rel="nofollow">https://nmap.org</a> ) at 2026-02-21 17:28 -0800<br />
Nmap scan report for 192.168.29.1<br />
Host is up (0.0010s latency).<br />
Nmap scan report for 192.168.29.100<br />
Host is up (0.0030s latency).<br />
Nmap done: 256 IP addresses (2 hosts up) scanned in 11.57 seconds</p>

<p>AAAHHHHH !!!!!   These are suppose to be segmented.  What am I doing wrong ?????</p>

<p>Setting up the following firewall rule fixed it, but why was it necessary?</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/tx/600jk1bbxz83.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/tx/600jk1bbxz83.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/tx/600jk1bbxz83.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/tx/600jk1bbxz83.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/tx/600jk1bbxz83.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/tx/600jk1bbxz83.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/tx/600jk1bbxz83.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/tx/600jk1bbxz83.png" sizes="100vw" /></p>

<p>Yours in confusion,<br />
-T</p>
]]>
        </description>
    </item>
    <item>
        <title>Firewall Policy - To Block all but VPN - Should a Cyber incident occurr</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4510/firewall-policy-to-block-all-but-vpn-should-a-cyber-incident-occurr</link>
        <pubDate>Thu, 29 Jan 2026 12:11:48 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>Ryan_Cosgrove</dc:creator>
        <guid isPermaLink="false">4510@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,<br />
I am wondering if there is any built in Policy within the Watchguards, that deny all but Watchguard VPN.  I am trying to get my head around, if we had a cyber incident, how we would be able to let the cyber experts in whilst blocking out the possible hackers.</p>

<p>If it happened, what I wouldn't want to have to be doing, is wasting time configuring policies.  I would much rather have a policy sitting disabled, that all I would have to do is enable - which would block all internet traffic apart from Watchguard VPN</p>

<p>Hope I am making sense?</p>

<p>Thanks<br />
Ryan</p>
]]>
        </description>
    </item>
    <item>
        <title>block rule not working as expected</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4490/block-rule-not-working-as-expected</link>
        <pubDate>Sun, 04 Jan 2026 02:19:33 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>Steve_E</dc:creator>
        <guid isPermaLink="false">4490@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>m270 + fw 12.11.5</p>

<p>wg advisory says this version clears the recent iked problem</p>

<p><a href="https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00015" rel="nofollow">https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00015</a></p>

<p>"account lockout" and "block failed logins" are enabled in pm &gt; setup &gt; authentication</p>

<p>deny rules including 147.185.132.0/24 are on top in policy manager and work as expected most of the time</p>

<p>eg</p>

<p>2026-01-03 19:06:09 FWDeny, Denied, pri=4, disp=Deny, policy=EXCEPTION-TOP-Drop-block-paloaltonetworks-00, protocol=webcache/tcp, src_ip=147.185.132.4, src_port=50279, dst_ip=m.y.i.p, dst_port=8080, src_intf=EXT-BUSINESS, dst_intf=Firebox, rc=101, pckt_len=44, ttl=250, pr_info=offset 6 S 2232048525 win 65535, duration=0; sent_bytes=44; rcvd_bytes=0, 3000-0148, geo_src=USA; geo_dst=USA</p>

<p>this concerns me</p>

<p>i think its saying 147.185.132.4 got past the block rule then hit a l2tp rule?</p>

<p>2026-01-03 19:10:29 iked (m.y.i.p&lt;-&gt;147.185.132.4)******** RECV an IKE packet at m.y.i.p:500(socket=14 ifIndex=6) from Peer 147.185.132.4:64440 ********</p>

<p>2026-01-03 19:10:29 iked (m.y.i.p&lt;-&gt;147.185.132.4)Phase 1 started by peer with policy [L2TP-IPSec_l2] from 147.185.132.4:64440 main mode</p>

<p>no block action after was logged, and im not ready to disable l2tp</p>
]]>
        </description>
    </item>
    <item>
        <title>Built-in Speed Test</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4486/built-in-speed-test</link>
        <pubDate>Tue, 23 Dec 2025 17:03:10 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>MrJ</dc:creator>
        <guid isPermaLink="false">4486@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I wish WatchGuard would include a built-in speed test to the internet and between fireboxes and add the ability to schedule automatic tests.</p>
]]>
        </description>
    </item>
    <item>
        <title>How do I bridge without losing configuration?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4479/how-do-i-bridge-without-losing-configuration</link>
        <pubDate>Sat, 13 Dec 2025 03:35:58 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>ToddAndMargo2</dc:creator>
        <guid isPermaLink="false">4479@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi All</p>

<p>Firebox T10-W</p>

<p>I have done several bridges on Fireboxs before with the WebUI, so I know how to do it.</p>

<p>This time I need to bridge Port 1 to Wireless 1.  But I need to keep all the configuration that port 1 had.  Replacing port 1's rules and configuration would take days.</p>

<p>How do I just add the wireless to port 1 and keep all of port 1's configuration?</p>

<p>Yours in Confusion,<br />
-T</p>
]]>
        </description>
    </item>
    <item>
        <title>NVR access behind firewall</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4473/nvr-access-behind-firewall</link>
        <pubDate>Mon, 08 Dec 2025 15:50:09 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>MontourIT_Daniel</dc:creator>
        <guid isPermaLink="false">4473@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Good day,</p>

<p>I replaced a Sonicwall device by a WatchGuard this weekend and now I cannot access the NVR behind the firewall with the cell app on a 5G network.</p>

<p>I'm seeing in FSM that the port i'm trying to communicate is blocked but I created a rule that I use Any-External to SNAT (External IP --&gt; Internal IP) with the port that needs to communicate with. To be sure it's not a rule blocking it, I set it 2nd in the list.</p>

<p>Here's what i'm getting as an error<br />
Deny Source_IP Static_IP_External 8000/tcp 56190 8000 External Trusted blocked ports 64 52 (Internal Policy)  proc_id="firewall" rc="101" msg_id="3000-0148" dst_ip_nat="Internal IP" tcp_info="offset 11 S 3585033702 win 65535" flags="SR" duration="0" sent_pkts="1" rcvd_pkts="0" sent_bytes="64" rcvd_bytes="0" geo_src="CAN" geo_dst="CAN"    Traffic</p>

<p>I'm feeling kinda dumb as it's not my first WatchGuard but this one is bugging me</p>

<p>Thanks for the help</p>
]]>
        </description>
    </item>
    <item>
        <title>Traffic Log</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4453/traffic-log</link>
        <pubDate>Wed, 12 Nov 2025 18:10:14 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>Hero</dc:creator>
        <guid isPermaLink="false">4453@/watchguard-community/discussions</guid>
        <description><![CDATA[Hello everyone. Can anyone tell me where these messages in the traffic log might be coming from?]]>
        </description>
    </item>
    <item>
        <title>WatchGuard Mobile VPN with SSL on W 2025 DC</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4281/watchguard-mobile-vpn-with-ssl-on-w-2025-dc</link>
        <pubDate>Wed, 23 Apr 2025 13:28:13 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>AndreaB</dc:creator>
        <guid isPermaLink="false">4281@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi<br />
I upgraded the DC of my company on W 2025 server.<br />
After that, collegue that use WatchGuard Mobile VPN with SSL can't connect using AD.</p>

<p>I create Firebox users as workaround but I prefer to use AD</p>

<p>We use Mobile VPN with SSL 12.11.2 for Windows</p>
]]>
        </description>
    </item>
    <item>
        <title>Blocked Websites Still Accessible</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4431/blocked-websites-still-accessible</link>
        <pubDate>Tue, 14 Oct 2025 09:25:50 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>HELPDESKNJ</dc:creator>
        <guid isPermaLink="false">4431@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>As the title states, i have added a list of websites to our Firewalls Blocked Sites list.<br />
Some of the websites are now stopped from accessing but some you can still get to?</p>

<p>They've been added by the FDQN.<br />
One site example is temu.com which users can still get on.</p>
]]>
        </description>
    </item>
    <item>
        <title>Find a device that consumes bandwidth in Firebox WebUI</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4424/find-a-device-that-consumes-bandwidth-in-firebox-webui</link>
        <pubDate>Tue, 07 Oct 2025 01:26:44 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>Alexander_Kim</dc:creator>
        <guid isPermaLink="false">4424@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi all,</p>

<p>Under DASHBOARD - Interfaces - Bandwidth I see this.</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/yp/kn0wr1rg4le6.jpg" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/yp/kn0wr1rg4le6.jpg 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/yp/kn0wr1rg4le6.jpg 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/yp/kn0wr1rg4le6.jpg 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/yp/kn0wr1rg4le6.jpg 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/yp/kn0wr1rg4le6.jpg 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/yp/kn0wr1rg4le6.jpg 2000w, https://us.v-cdn.net/6029905/uploads/editor/yp/kn0wr1rg4le6.jpg" sizes="100vw" /></p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/ko/mefqyik4wc0n.jpg" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/ko/mefqyik4wc0n.jpg 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/ko/mefqyik4wc0n.jpg 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/ko/mefqyik4wc0n.jpg 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/ko/mefqyik4wc0n.jpg 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/ko/mefqyik4wc0n.jpg 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/ko/mefqyik4wc0n.jpg 2000w, https://us.v-cdn.net/6029905/uploads/editor/ko/mefqyik4wc0n.jpg" sizes="100vw" /></p>

<p>As far as I understand it is a continuous bandwidth utilization. <br />
How do I find a device that utilizes bandwidth in WebUI?</p>
]]>
        </description>
    </item>
    <item>
        <title>CVE-2025-9242 update for unmanaged devices?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4414/cve-2025-9242-update-for-unmanaged-devices</link>
        <pubDate>Fri, 19 Sep 2025 17:51:55 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>ITPartners</dc:creator>
        <guid isPermaLink="false">4414@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We've all gotten the emails about this CVE and the need to update our devices to remediate the issue, but in the email it makes reference to "unmanaged" devices out of subscription, and it says WatchGuard would contact us with information about updating those devices separately. Okay, HOW?</p>

<p>I just spoke with someone at support who told me that they are not providing any fixes for boxes out of support contracts, even though this is a critical CVE. This seems contrary to what most providers have been doing. As a reseller, we have numerous devices that are not EOL, and often just out of LS, or NFRs - all that we are still using for internal testing/training, and still have use to us. I understand nobody wants to support devices forever, but many of these devices are not that old, and as a reseller who has been selling your products for more than a decade, I am somewhat disappointed in this response.</p>

<p>Can we get some clarification on what the critical CVE patching availability policy is with WatchGuard, and what those of us with these unmanaged devices are supposed to do about these critical issues?</p>
]]>
        </description>
    </item>
    <item>
        <title>Firebox sending data to WatchGuard</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4413/firebox-sending-data-to-watchguard</link>
        <pubDate>Fri, 19 Sep 2025 16:12:23 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>offbyone</dc:creator>
        <guid isPermaLink="false">4413@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>From the revision history of FW 12.11.3 we can read the following:</p>

<p>"Basic Device Feedback now sends Trusted Platform Module (TPM) public key data to WatchGuard each time the device reboots."</p>

<p><a href="https://community.watchguard.com/watchguard-community/profile/WatchGuard" rel="nofollow">@WatchGuard</a>: Can you please give back control of the devices back to your customers they own. From a security device which can be managed on prem we expect that sending telemetry data to whoever can be switched off completely!</p>

<p>Can you give us a hint which FW release exactly started to send data to WG and what data exactly is sent to WG.</p>

<p>Thanks.</p>
]]>
        </description>
    </item>
    <item>
        <title>Fireware CLI Upgrade Command</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4408/fireware-cli-upgrade-command</link>
        <pubDate>Thu, 18 Sep 2025 08:51:37 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>vbuk</dc:creator>
        <guid isPermaLink="false">4408@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi, in the Watchguard Web GUI there is an option to download and deploy the latest Fireware version direct from the WG website (FTP site I guess). If I do the upgrade using the local CLI I have to specify a source location:</p>

<p>upgrade system from (location) [yes|no]</p>

<p>upgrade system from <a href="ftp://test:testing@1.2.3.4/xtm5_b0.sysa-dl" rel="nofollow">ftp://test:testing@1.2.3.4/xtm5_b0.sysa-dl</a> yes</p>

<p>Is there a way to use the CLI to auto-upgrade in the same manner as the Web GUI? Or is there a public FTP/TFTP server that WG provides for these upgrades that I can utilise? Trying to avoid having to manually download the upgrade to my own FTP server first. I do appreciate this problem goes away if the box is cloud managed rather than local managed, but for whatever reason that's not possible (not a technical restriction, just a management one).</p>

<p>Thanks.</p>
]]>
        </description>
    </item>
    <item>
        <title>SNMP issues after upgrading firmware</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4353/snmp-issues-after-upgrading-firmware</link>
        <pubDate>Wed, 23 Jul 2025 13:19:09 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>AP_ILS</dc:creator>
        <guid isPermaLink="false">4353@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have a M4800 that was upgraded over the weekend to 12.11.3.B719894 and we monitor our interfaces with PRTG using SNMP v3. The logs in PRTG are reporting SNMP "No response" errors and our charts have gaps in them. We use netflow as well and it is not having this issue. The interfaces themselves are clean, no errors, packet drops etc. Anyone else seeing SNMP issues?</p>
]]>
        </description>
    </item>
    <item>
        <title>SSHD- Session</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4380/sshd-session</link>
        <pubDate>Wed, 20 Aug 2025 02:09:43 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>MikeVerin</dc:creator>
        <guid isPermaLink="false">4380@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I need help on stopping these unauthorized sessions<br />
what can I do about this?</p>

<p>sshd-session Connection closed by authenticating user fanbohao 198.55.98.49 port 53538 [preauth] <br />
sshd-session Failed password for taco from 198.55.98.55 port 12342 ssh2<br />
sshd-session Connection closed by authenticating user john 198.55.98.53 port 4650 [preauth]<br />
sshd-session Failed password for fanbohao from 198.55.98.49 port 18836 ssh2<br />
sshd-session Connection closed by authenticating user john 198.55.98.53 port 62744 [preauth]<br />
sshd-session Connection closed by authenticating user john 198.55.98.53 port 16914 [preauth]</p>
]]>
        </description>
    </item>
    <item>
        <title>SSLVPN Firebox Webserver Ciphers - PCI Compliance</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2653/sslvpn-firebox-webserver-ciphers-pci-compliance</link>
        <pubDate>Mon, 20 Jun 2022 16:28:30 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>cdubyamn</dc:creator>
        <guid isPermaLink="false">2653@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>IN the recent months, while performing PCI DSS scans against the public addresses hosted by our Firebox, it has now been determined that the ciphers used on the Firebox Webserver are unsecure and weak, causing failed reports for PCI.</p>

<p>Anyone else having this issue? After working through multiple tech support engineers at WG, they have told me that the ability to change ciphers in in a future release, and then the next tech told me that there are NO plans for this and basically I am SOL if I am using SSLVNP as they have no plans to update it.</p>

<p>How is this possible coming from a company that has a product designed around security?</p>

<p>Is anyone else using WG and have PCI DSS compliance?</p>

<p>Has anyone else done their quarterly scans and found this issue?</p>

<p>I feel that support at WG is slowly going downhill. Which is very unfortunate as we were planning to role out some larger Firebox appliances, however this might put a halt on that...</p>
]]>
        </description>
    </item>
    <item>
        <title>SMTP mail from scanner stopped working after upgrade to 12.11.3</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4374/smtp-mail-from-scanner-stopped-working-after-upgrade-to-12-11-3</link>
        <pubDate>Thu, 14 Aug 2025 16:21:29 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>Chaospinhead</dc:creator>
        <guid isPermaLink="false">4374@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Firebox T25<br />
12.11.3</p>

<p>I have a client who was on 12.11.2.  They have had scan to email setup for awhile now.  After the upgrade to 12.11.3 it stopped working.  I checked all the settings and everything looks good in the scanner.  I see traffic on port 587 green when I try to do a test scan, but it just isn't working.  The only thing that makes me think it's the WG is because it stopped the exact day I did the FW upgrade.</p>

<p>What could it be?  Something with TLS?  I tried creating an any policy for the printer to get to the net on but that did not seem to help either.  Its a pain to troubleshoot as I have to be on site since the printer doesn't have a test button for Scan to email.  <img src="https://community.watchguard.com/resources/emoji/frowning.png" title=":(" alt=":(" height="20" /></p>
]]>
        </description>
    </item>
    <item>
        <title>How do I enforce safesearch?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2948/how-do-i-enforce-safesearch</link>
        <pubDate>Sun, 20 Nov 2022 04:28:55 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>davidortenn79</dc:creator>
        <guid isPermaLink="false">2948@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Ok, a few months ago, I had tech support remotted in and they were helping me figure out an issue.  I asked him about setting up safesearch and he just did it for me.  Took him not long.</p>

<p>A few days ago, I did something stupid.  I recently updated my password for watchguard and I had the old password in the password field and the new password just as a note.</p>

<p>Well, I saw that and I'm thinking I need to just move that password to the password field.  So, I did that.  I overwrote the old password.  (All my passwords are auto generated.)</p>

<p>Well, a little later, I made a change to the firebox that messed it all up.  I decided, I'll roll back to my old backup.  That's where I went wrong.  As soon as I did that, it restored my old password.  Now I was locked out of the watchguard.  I couldn't get back in.</p>

<p>So, I started over with a brand new config.  I cannot figure out how to enforce safe search.  I've followed a few different tutorials.  I remember him saying that you can't see inside of https so I had to set it to inspect and inspect it with http.  I set the http to use safe search and then told https to point to that policy.  But, once I did that, I started getting errors with certs.  I watched a youtube video and they explained the cert error.</p>

<p>But, basically the video said I need to install the cert on all of my PCs to get rid of that error.  I did not have to do that the last time.  However support configured it, I didn't need to do anything to my clients.</p>
]]>
        </description>
    </item>
    <item>
        <title>Schedule rules for specific interface</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4356/schedule-rules-for-specific-interface</link>
        <pubDate>Thu, 24 Jul 2025 12:45:21 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>forgottenKahz</dc:creator>
        <guid isPermaLink="false">4356@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have a T25-W. I would like to disable port 2 between specific hours. I created a firewall schedule and disabled the outgoing between midnight and 5am. I would like the firewall rule to only apply to either a specific set of MAC addresses or to a specific interface.</p>
]]>
        </description>
    </item>
    <item>
        <title>Firebox API</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4352/firebox-api</link>
        <pubDate>Sun, 20 Jul 2025 13:18:53 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>Jgih</dc:creator>
        <guid isPermaLink="false">4352@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi</p>

<p>Is it possible to add an object to a Firebox group via API? Basically, I need to keep adding different IP addresses to a group from a Python script.</p>

<p>Thanks in advance!</p>
]]>
        </description>
    </item>
    <item>
        <title>FWDeny Internal-Policy</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4336/fwdeny-internal-policy</link>
        <pubDate>Tue, 24 Jun 2025 08:54:44 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>Steave_Papadakis</dc:creator>
        <guid isPermaLink="false">4336@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>What is the meaning of this? What policy is this ? How can I Allow ?<br />
FWDeny, tcp invalid connection state, pri=4, disp=Deny, policy=Internal-Policy, protocol=8443/tcp, src_ip=192.168.1.67, src_port=51238, dst_ip=80.245.163.164, dst_port=8443, src_intf=WiFi_Public, dst_intf=Firebox, rc=101, pckt_len=40, ttl=64, pr_info=offset 5 R 2531139571 win 0, 3000-0148</p>

<p>FWDeny, tcp invalid connection state, pri=4, disp=Deny, policy=Internal-Policy, protocol=8443/tcp, src_ip=192.168.1.67, src_port=51255, dst_ip=80.245.163.164, dst_port=8443, src_intf=WiFi_Public, dst_intf=Firebox, rc=101, pckt_len=40, ttl=64, pr_info=offset 5 R 854996990 win 0, 3000-0148</p>

<p>FWDeny, tcp invalid connection state, pri=4, disp=Deny, policy=Internal-Policy, protocol=xmpp-client/tcp, src_ip=192.168.1.58, src_port=60108, dst_ip=80.245.163.164, dst_port=5222, src_intf=WiFi_Public, dst_intf=Firebox, rc=101, pckt_len=40, ttl=64, pr_info=offset 5 R 778427042 win 0, 3000-0148</p>

<p>FWDeny, tcp invalid connection state, pri=4, disp=Deny, policy=Internal-Policy, protocol=8443/tcp, src_ip=192.168.1.58, src_port=60212, dst_ip=80.245.163.164, dst_port=8443, src_intf=WiFi_Public, dst_intf=Firebox, rc=101, pckt_len=40, ttl=64, pr_info=offset 5 R 3802968821 win 0, 3000-0148</p>
]]>
        </description>
    </item>
    <item>
        <title>No Dashboard display</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4329/no-dashboard-display</link>
        <pubDate>Fri, 13 Jun 2025 02:45:55 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>mykelm03</dc:creator>
        <guid isPermaLink="false">4329@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>no display output when accessing Fireware Web UI &gt; Dashboard &gt; Front Panel and Interfaces.</p>

<p>Is there any other way to bring it up without rebooting the firewall box?</p>

<p>Thank you.</p>
]]>
        </description>
    </item>
    <item>
        <title>Same port redirection to two different servers</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4312/same-port-redirection-to-two-different-servers</link>
        <pubDate>Thu, 22 May 2025 22:27:09 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>spoonermullet</dc:creator>
        <guid isPermaLink="false">4312@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi All,</p>

<p>There are two servers in the local network called Prod (10.0.0.15) and Test that are running some software.<br />
The vendor need inbound access to both servers from outside.<br />
Conditions as below.<br />
This following will point to the Test server<br />
https:// test.company.com:6544/Test<br />
The following will point to the Production server<br />
https:// production.company.com:6544/Production</p>

<p>I know I need to create a SNAT for that.<br />
The question is since the port number is the same how to make WatchGuard redirect https:// test.company.com:6544/Test to 10.0.0.16 and https:// production.company.com:6544/Production to 10.0.0.15?</p>
]]>
        </description>
    </item>
    <item>
        <title>SSO Authentication Gateway - Error UPN not valid</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4193/sso-authentication-gateway-error-upn-not-valid</link>
        <pubDate>Fri, 14 Feb 2025 21:37:16 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>PosTerrieur</dc:creator>
        <guid isPermaLink="false">4193@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi everyone,</p>

<p>I'm facing an issue with the SSO Authentication Gateway on my WatchGuard setup. When I try to install and configure the SSO agent on my Active Directory Domain Controller (DC), I get an error when adding the domain—it says the UPN is not valid, and no account works (not even the administrator account).</p>

<p>However, if I install and configure the SSO agent on another AD member machine, everything works perfectly.</p>

<p>Here’s what I’ve checked so<br />
1. The necessary services are running on the DC.<br />
2. The account permissions should be correct.<br />
3. DNS resolution and network communication between the DC and the Firebox seem fine.<br />
4. Logs don’t provide much useful information.</p>

<p>Has anyone encountered this issue before or has any idea what could be causing this?</p>

<p>Thanks in advance for your help!</p>
]]>
        </description>
    </item>
    <item>
        <title>Umbrella Virtual Appliances and UDP Flood Attacks</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4304/umbrella-virtual-appliances-and-udp-flood-attacks</link>
        <pubDate>Fri, 16 May 2025 01:54:28 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>JohnS</dc:creator>
        <guid isPermaLink="false">4304@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Looking to see if there's a solution to this:  We are provided with DNS filtering for on-site and off-site web access through Umbrella.  To do this, on-site, we have Umbrella's Virtual Appliances.  We have to go through the appliances to filter by local IP or AD Users).  We've got about 12 appliances spread out across our network.  Originally, we had two, and we were getting UDP flood attacks on the servers, I assumed because we didn't have enough.  We upped the limit to 7000, spread it out to 12 servers instead of 2, and the problems dissipated, mostly.  We would still have some random issues, but now, it was the Virtual Appliances flooding out our internet connection back to Umbrella's servers (4 server IPs).  We've turned off the UDP flood attack prevention, and in our environment, I'm not too concerned about it... Still, is there a proper way to handle local DNS servers that do a large amount of UDP traffic?  Or is disabling the Flood Protection the normal response?  Still learning the system, and this is the biggest hiccup we've had so far.  Thanks!</p>
]]>
        </description>
    </item>
    <item>
        <title>how to configure router to support tailscale</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4305/how-to-configure-router-to-support-tailscale</link>
        <pubDate>Fri, 16 May 2025 13:01:27 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>asdffdsa</dc:creator>
        <guid isPermaLink="false">4305@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>hello, thanks, first time posting,<br />
i am looking for documentation on how to configure the router, T70 ?</p>

<p>i check the website documentation, searched the forum, searched the internet.<br />
could not find a single FAQ, KB or anything.</p>

<p>so, please, point me to the watchguard docs for tailscale?<br />
thanks much, david</p>
]]>
        </description>
    </item>
    <item>
        <title>Anyone seeing a lot of dropped connection from Amazon?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4276/anyone-seeing-a-lot-of-dropped-connection-from-amazon</link>
        <pubDate>Mon, 21 Apr 2025 08:59:03 +0000</pubDate>
        <category>Firebox - Other</category>
        <dc:creator>Juuso</dc:creator>
        <guid isPermaLink="false">4276@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>It has been couple of days I've seen a lot of inbound connection attempts from Amazon addresses. Mainly AMAZON-IAD, AMAZON-GRU, AMAZON-BRA.</p>

<p>I cannot figure out why. They look like port scanning. I cannot find any outbound traffic to these addresses. All connections are of course dropped but they fill up my logfiles. I found out from AbuseIPDB site that others are seeing this also.</p>

<p>Anyone to shed some light on this?</p>
]]>
        </description>
    </item>
   </channel>
</rss>
