<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Firebox - Product Enhancements — WatchGuard Community</title>
        <link>https://community.watchguard.com/watchguard-community/</link>
        <pubDate>Mon, 20 Apr 2026 09:24:43 +0000</pubDate>
        <language>en</language>
            <description>Firebox - Product Enhancements — WatchGuard Community</description>
    <atom:link href="https://community.watchguard.com/watchguard-community/categories/firebox-product-enhancements/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Let&#39;s Encrypt / ACME Client</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3361/lets-encrypt-acme-client</link>
        <pubDate>Thu, 13 Jul 2023 14:35:12 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>aptica_hline</dc:creator>
        <guid isPermaLink="false">3361@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>With the push for shorter certificate expirations (<a href="https://www.digicert.com/blog/chromes-proposed-90-day-certificate-validity-period)" rel="nofollow">https://www.digicert.com/blog/chromes-proposed-90-day-certificate-validity-period)</a>, having an ACME client built into the Firebox that supports the ACME (Automatic Certificate Management Environment) protocol to update certificates used for HTTPS connections on the firebox automatically.</p>

<p>Adding this to Dimension and other WatchGuard management servers would also be very beneficial.</p>
]]>
        </description>
    </item>
    <item>
        <title>Automatic Certificate Renewal</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4027/automatic-certificate-renewal</link>
        <pubDate>Thu, 17 Oct 2024 00:07:45 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>Daycom</dc:creator>
        <guid isPermaLink="false">4027@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have a Watchguard working as an inbound HTTPS proxy server. As such I have to upload a valid SSL Certificate every year so that people on the Internet has a valid SSL Certificate when browsing the website.</p>

<p>Apple and Google plan to reduce SSL Certificate lifespans to 45 days by 2027.</p>

<p>As a feature request, I believe Watchguard should consider enabling automatic SSL Renewal (like Let's Encrypt or something similar). The current recommendation is that SSL Certificates should be renew automatically by the web server, so I believe Watchguard should consider adding a method for Automatic Renewals of SSL Certificates for use in proxy servers. Especially before they shorten the renewal time.</p>
]]>
        </description>
    </item>
    <item>
        <title>Application Control, need Grok/xAI, others?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4543/application-control-need-grok-xai-others</link>
        <pubDate>Mon, 02 Mar 2026 18:06:11 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>invisik</dc:creator>
        <guid isPermaLink="false">4543@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi all,</p>

<p>A client wants us to block all AI/AI chatbots, etc except Copilot.  Application Control can do this and includes ChatGPT, Claude, DeepSeek, MS Copilot, Perplexity, and POE (which is great!)</p>

<p>Freature request to please add Grok/xAI to this list and any others/smaller ones that might be out there.</p>

<p>Thanks much....</p>

<p>-m</p>
]]>
        </description>
    </item>
    <item>
        <title>Feature Request - Retrieval of ThreatSync Status of Devices</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4461/feature-request-retrieval-of-threatsync-status-of-devices</link>
        <pubDate>Fri, 21 Nov 2025 15:39:01 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>TJO</dc:creator>
        <guid isPermaLink="false">4461@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have gone through the API documentation and I could not find an endpoint that retrieves the current status of ThreatSync for each device. I was wondering if it will be possible to make the feature available for critical devices like firewalls. For example, a new field may be added to the Firebox API management that display a boolean value of the ThreatSync status to detect if ThreatSync has been enabled or disabled for the devices. This will help administrators to quickly detect when ThreatSync has been accidentally disabled or not enabled during device installation.</p>
]]>
        </description>
    </item>
    <item>
        <title>Feature request: Add SD-WAN Failover Thresholds to Global Multi-WAN Configuration</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4444/feature-request-add-sd-wan-failover-thresholds-to-global-multi-wan-configuration</link>
        <pubDate>Fri, 31 Oct 2025 12:42:07 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>Ward_Cauwelier</dc:creator>
        <guid isPermaLink="false">4444@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Currently, SD-WAN actions support measurement-based failover (packet loss %, latency, jitter), but the global Multi-WAN failover configuration only supports basic connectivity failover (connection fail). This means we must create individual SD-WAN actions for every policy on a firebox when we want that site to failover intelligently for every connection, which is time-consuming and difficult to maintain. This could be solved by adding the SD-WAN failover threshold options to the existing global Multi-WAN failover configuration. This would make WatchGuard's Multi-WAN more competitive with other enterprise firewall platforms while maintaining the flexibility of per-policy overrides when needed.</p>
]]>
        </description>
    </item>
    <item>
        <title>Product Request – Enhanced VLAN and Policy Templates in WatchGuard System Manager</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4409/product-request-enhanced-vlan-and-policy-templates-in-watchguard-system-manager</link>
        <pubDate>Thu, 18 Sep 2025 14:54:48 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>Daniel_Florean</dc:creator>
        <guid isPermaLink="false">4409@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Description:<br />
I extensively use WatchGuard System Manager templates to standardize customer deployments.<br />
One limitation I encounter is the inability to create a template that includes:</p>

<p>Preconfigured VLANs already assigned to a physical interface (e.g., eth1).</p>

<p>Predefined intra-VLAN policies, so I don’t have to manually configure the From and To fields for each VLAN combination during every deployment.</p>

<p>Use Case:<br />
For customer standardization, I would like to:</p>

<p>Create a template with predefined VLANs (e.g., LAN, Guest, IoT, Server, etc.) already mapped to an interface.</p>

<p>Have all the required intra-VLAN policies already in place within the template (e.g., LAN ↔ Server, LAN ↔ IoT, etc.).</p>

<p>At deployment time, only adjust customer-specific parts (e.g., External interface, SSO, etc.), without having to manually rebuild all intra-VLAN policies.</p>

<p>Benefits:</p>

<p>Increased efficiency in deploying configurations.</p>

<p>Reduced risk of human error when recreating policies.</p>

<p>Stronger standardization across customer environments.</p>

<p>Request:<br />
Please add the ability to include in a template:</p>

<p>VLANs already preconfigured on an interface.</p>

<p>Predefined intra-VLAN policies that can be reused without manual reconfiguration of the From and To fields.</p>
]]>
        </description>
    </item>
    <item>
        <title>New way to submit product enhancement requests.</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4404/new-way-to-submit-product-enhancement-requests</link>
        <pubDate>Thu, 18 Sep 2025 00:53:16 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>james.carson</dc:creator>
        <guid isPermaLink="false">4404@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>WatchGuard community users and customers,</p>

<p>We've listened to your feedback about product enhancement requests and have been hard at work to provide you with a better system.  The WatchGuard Idea Portal allows you to submit ideas directly to our Product Management team and receive feedback on your requests.</p>

<p>You can navigate to the Idea Portal by logging into WatchGuard Cloud.  <a href="https://cloud.watchguard.com" rel="nofollow">https://cloud.watchguard.com</a></p>

<p>-Click the question mark at the top right of the page and select Give Feedback.<br />
-The idea portal will load and allow you to make submissions for new ideas or upvote existing requests.</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/ix/iy7h6gnvvgl3.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/ix/iy7h6gnvvgl3.png" sizes="100vw" /></p>

<p>Thank you,</p>
]]>
        </description>
    </item>
    <item>
        <title>Enhancement Request already submitted - DNS Query Type 65...</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4394/enhancement-request-already-submitted-dns-query-type-65</link>
        <pubDate>Tue, 09 Sep 2025 21:34:14 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>SP11</dc:creator>
        <guid isPermaLink="false">4394@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>...under...<br />
FBX-22215 FBX-27254<br />
Where can customers get more info about FBX-#####, or are customers allowed to track?</p>
]]>
        </description>
    </item>
    <item>
        <title>More Default Aliases</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4392/more-default-aliases</link>
        <pubDate>Thu, 04 Sep 2025 08:49:05 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>VickenP</dc:creator>
        <guid isPermaLink="false">4392@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>A while ago, there was a new default alias added for Microsoft 365. I'd like to add more like for example for Facebook, Google Services, etc.</p>
]]>
        </description>
    </item>
    <item>
        <title>External Dynamic Lists for Rules</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1680/external-dynamic-lists-for-rules</link>
        <pubDate>Fri, 12 Mar 2021 00:21:01 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>AschildmeyerSTR</dc:creator>
        <guid isPermaLink="false">1680@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have seen a few others on reddit and other public forums discussing this. I come from Palo Alto firewalls and I'm used to building policies for somethings using an EDL (External Dynamic List).</p>

<p>One primary use case for this is to specifically deny Tor exit nodes for all my inbound policies and including the block sites list. Which I can copy the Tor feed, but it updates and is dynamic. There is also many other EDL lists uses cases for hooking into for various kind of feeds. I do already have it set to temporarily block unhandled packets and that is good. But I want it where my webservers/ftp etc is blocked from these nodes as our business doesn't require any Tor based traffic.</p>

<p>Some examples of of what you can do -</p>

<p><a rel="nofollow" href="https://blog.boll.ch/paloalto-firewall-feature-block-tor-exit-nodes-with-an-external-dynamic-list-edl-ip-list/">Example 1 </a></p>

<p><a rel="nofollow" href="https://derrick-smith.com/using-python-to-generate-an-external-dynamic-list-for-palo-alto-firewalls/">Example 2</a></p>

<p><a rel="nofollow" href="https://www.reddit.com/r/WatchGuard/comments/lt1c4i/blocking_inbound_torexit_nodes_with_watchguard/">Similar request on Reddit</a></p>
]]>
        </description>
    </item>
    <item>
        <title>Unencrypted GRE Tunnels</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1628/unencrypted-gre-tunnels</link>
        <pubDate>Thu, 18 Feb 2021 10:24:23 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>RyanLeighton</dc:creator>
        <guid isPermaLink="false">1628@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Needs the ability to create unencrypted GRE tunnels.</p>

<p>DDoS is becoming more of an issue in todays world.  The larger cloud based DDoS mitigation providers (Akamai and Cloudflare to name a few) use GRE tunnels from their cloud to facilitate services.  Currently there is no way to implement these connections on a WatchGuard appliance.</p>

<p>This leaves 3 options, purchase expensive dedicated connections, find sub optimal DDoS providers or move away from Watchguard products to another Firewall vendor.  Replacing the WatchGuards is seen as the easiest and lowest friction option.</p>

<p>The ability to create a GRE tunnel exists already, just not without layering encryption over it.  This has to be a simple fix from a development perspective and has a strong business case to prevent users of enterprise appliances migrating away.</p>
]]>
        </description>
    </item>
    <item>
        <title>SAML login for VPN</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3245/saml-login-for-vpn</link>
        <pubDate>Thu, 04 May 2023 12:25:04 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>JohnathanT</dc:creator>
        <guid isPermaLink="false">3245@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello,</p>

<p>With the recent enhancements to Azure AD MFA implementing number matching, this would be a huge boost for security with the mobile workforce.</p>

<p>Currently, we can use RADIUS via approve/deny or purchase AuthPoint at an additional license fee and use tokens. For those of us already paying for Azure AD, it would be nice to tie it all in together without another purchase.</p>

<p>Unfortunately RADIUS does not support anything except for approve/deny and that is now being exploited through "MFA fatigue" attacks, where an attacker repeatedly sends MFA requests to your device until you approve. Number matching removes this problem.</p>

<p>more info:</p>

<p><a href="https://learn.microsoft.com/en-us/azure/active-directory/authentication/how-to-mfa-number-match" rel="nofollow">https://learn.microsoft.com/en-us/azure/active-directory/authentication/how-to-mfa-number-match</a></p>
]]>
        </description>
    </item>
    <item>
        <title>FEATURE REQUEST: SNMP V3 INCREASED OPTIONS FOR ENCRYPTION TYPE AND AUTHENTICATION</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4357/feature-request-snmp-v3-increased-options-for-encryption-type-and-authentication</link>
        <pubDate>Fri, 25 Jul 2025 18:12:51 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>Hunter_A</dc:creator>
        <guid isPermaLink="false">4357@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I would like to kindly request the addition of a feature request to update the encryption algorithms available for SNMPv3 on Watchguard devices, specifically to include modern standards such as SHA256, AES128, AES256, and similar options.</p>

<p>Background:<br />
Currently, on a Firebox running version 12.11.3, the available options for SNMPv3 encryption are limited to the following:</p>

<p>Authentication Protocol:</p>

<p>None<br />
MD5<br />
SHA<br />
Encryption Protocol:</p>

<p>None<br />
DES<br />
These protocols no longer align with current security standards and are widely considered insecure. Additionally, we use Domotz for SNMP communication and the article referenced here <a href="https://www.watchguard.com/help/docs/help-center/en-US/Content/Integration-Guides/General/Domotz%20RMM.html" rel="nofollow">https://www.watchguard.com/help/docs/help-center/en-US/Content/Integration-Guides/General/Domotz RMM.html</a> is incorrect.  Domotz uses SNMPv3 and we would like to use SNMPv3 for Domotz and Watchguard communication.</p>

<p>Thank you,</p>
]]>
        </description>
    </item>
    <item>
        <title>Access Portal visibility in System Manager</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4345/access-portal-visibility-in-system-manager</link>
        <pubDate>Fri, 11 Jul 2025 19:18:15 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>eichenadmin</dc:creator>
        <guid isPermaLink="false">4345@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>It would be nice to see connections to the Access Portal in the device status tree of System Manager just as we can see SSL VPN, IKEv2 connections &amp; others.</p>
]]>
        </description>
    </item>
    <item>
        <title>Access Portal - RDP Authenticaton</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2951/access-portal-rdp-authenticaton</link>
        <pubDate>Mon, 21 Nov 2022 11:49:03 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>EGlf</dc:creator>
        <guid isPermaLink="false">2951@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>RDP access through Access Portal using NLA security requires to hardcode user credentials on Firebox config.<br />
Suggested workaround is to lower overall RDP security by disabling NLA policy, not really a best practice for a security product.<br />
Since Access Portal caches credentials when enabling the Reverse Proxy option "Forward Access Portal Credentials", it would be great if you enable this feature for RDP too, or at least show some kind of intermediate login request that user can fill and pass to NLA</p>
]]>
        </description>
    </item>
    <item>
        <title>Feature Request: Update SNMPv3 Encryption Algorithms (SHA256, AES128, AES256, etc.)</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4228/feature-request-update-snmpv3-encryption-algorithms-sha256-aes128-aes256-etc</link>
        <pubDate>Fri, 14 Mar 2025 12:46:37 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>fabianoettl</dc:creator>
        <guid isPermaLink="false">4228@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Dear Watchguard Support Team,</p>

<p>I would like to kindly request the opening of a feature request to update the encryption algorithms available for SNMPv3 on Watchguard devices, specifically to include modern standards such as SHA256, AES128, AES256, and similar options.</p>

<p><strong>Background:</strong><br />
Currently, on a FireboxV running version 12.11.1 (Build B711554), the available options for SNMPv3 encryption are limited to the following:</p>

<ul><li><p><strong>Authentication Protocol:</strong></p>

<ul><li>None</li>
<li>MD5</li>
<li>SHA</li>
</ul></li>
<li><p><strong>Encryption Protocol:</strong></p>

<ul><li>None</li>
<li>DES</li>
</ul></li>
</ul><p>These protocols no longer align with current security standards and are widely considered insecure. Additionally, the upcoming Zabbix cluster, based on AlmaLinux 9, no longer supports the DES protocol at all. According to the Red Hat Enterprise Linux 9 documentation (see: <a rel="nofollow" href="https://docs.redhat.com">https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/considerations_in_adopting_rhel_9/assembly_shells-and-command-line-tools_considerations-in-adopting-rhel-9#ref_changes-to-system-management_assembly_shells-and-command-line-tools</a>), the DES algorithm has been removed from net-snmp communication in RHEL 9 due to its insecurity and lack of support in the OpenSSL library.</p>

<p><strong>Impact:</strong><br />
Without updated encryption options, encrypted SNMPv3 monitoring will not be possible with the new Zabbix system unless the firewall is monitored via a proxy running AlmaLinux 8. This limitation could significantly affect secure network management moving forward.</p>

<p><strong>Request:</strong><br />
Please consider adding support for modern encryption algorithms (e.g., SHA256, AES128, AES256) to SNMPv3 in future Watchguard firmware updates to ensure compatibility with current and future systems and to meet modern security standards.</p>

<p>Thank you for your attention to this matter. Please let me know if you need any further details to process this request.</p>

<p>Best regards,<br />
Fabian Öttl</p>
]]>
        </description>
    </item>
    <item>
        <title>Web UI - Unhandled internal packet</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4310/web-ui-unhandled-internal-packet</link>
        <pubDate>Thu, 22 May 2025 15:49:08 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>dtran</dc:creator>
        <guid isPermaLink="false">4310@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>This feature is available on policy manager.  However, there is no option to turn on/off the "unhandled internal packet" feature using Web UI.</p>
]]>
        </description>
    </item>
    <item>
        <title>Allow Minutes rather than Hours in Authentication / Settings / Block IP addresses...</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4269/allow-minutes-rather-than-hours-in-authentication-settings-block-ip-addresses</link>
        <pubDate>Thu, 10 Apr 2025 19:05:26 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>SteveV</dc:creator>
        <guid isPermaLink="false">4269@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>In Authentication / Settings / Block IP addresses with consecutive failed logins, we are only allowed to enter number of hours in Block duration field. Would be nice to be able to enter number of minutes instead, this would significantly reduce support calls.</p>
]]>
        </description>
    </item>
    <item>
        <title>WireGuard vpn</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/951/wireguard-vpn</link>
        <pubDate>Fri, 24 Apr 2020 09:09:33 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>Thibaud</dc:creator>
        <guid isPermaLink="false">951@/watchguard-community/discussions</guid>
        <description><![CDATA[Hello,<br /><br /> I've been reading about this new WireGuard vpn, which seems to be quite performante compared to other vpn types and will also be integrated in the linux kernel (if it isn't already).<br /> Does WatchGuard have plans to integrate this new VPN type?<br /><br /> Thanks!<br /><br /> Greetings,<br /><br /> Thibaud]]>
        </description>
    </item>
    <item>
        <title>Feature Request: Schedule Reoccurring Reboots</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1963/feature-request-schedule-reoccurring-reboots</link>
        <pubDate>Tue, 27 Jul 2021 04:39:45 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>ThomasT</dc:creator>
        <guid isPermaLink="false">1963@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>It would be nice to have the ability to schedule reoccurring reboots (weekly/monthly etc) either from the Firebox itself or managed via the cloud.</p>

<p>We've found that our vFirewall needs to be rebooted every few weeks so this type of feature would be handy.</p>

<p>What are others opinion?</p>
]]>
        </description>
    </item>
    <item>
        <title>Current Cloud Management Roadmap</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4198/current-cloud-management-roadmap</link>
        <pubDate>Tue, 18 Feb 2025 21:47:30 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>AllanLanier87</dc:creator>
        <guid isPermaLink="false">4198@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Is there a public roadmap of coming features and possible dates for the WatchGuard cloud managed devices?</p>
]]>
        </description>
    </item>
    <item>
        <title>Policy To/From DHCP Reservation Lookup</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4182/policy-to-from-dhcp-reservation-lookup</link>
        <pubDate>Mon, 10 Feb 2025 19:34:08 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>dtssteve</dc:creator>
        <guid isPermaLink="false">4182@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have found that on several occasions that I create a DHCP Reservation only so I can then create a policy around that reservations IP Address. It would be nice if the To and From fields on a policy could do a lookup to the DHCP Reservation Table so the 2 are linked making the to and from say reservation name rather than ip address.</p>
]]>
        </description>
    </item>
    <item>
        <title>Configure Access Portal RDP on Cloud Managed Firebox</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4176/configure-access-portal-rdp-on-cloud-managed-firebox</link>
        <pubDate>Wed, 05 Feb 2025 14:23:25 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>Bakhit_Kourman</dc:creator>
        <guid isPermaLink="false">4176@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I can not figure out how to configure Access Portal (Application Portal RDP) on Cloud Managed Firebox. It would be nice if we could push config from Watchguard System manager to Cloud Management, I like the granularity of Watchguard System Manager compared to Cloud Manager.</p>
]]>
        </description>
    </item>
    <item>
        <title>Multiple SSL VPN&#39;s</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3296/multiple-ssl-vpns</link>
        <pubDate>Wed, 07 Jun 2023 19:53:14 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>HRoberts</dc:creator>
        <guid isPermaLink="false">3296@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I would like the ability to either create multiple SSL VPN configurations, or allow the advanced settings to be modified per SSL Group.</p>

<p>My issue is I have several users that need to use the VPN to login and clock in and out each day. I can make this work by forcing all traffic thru the VPN.</p>

<p>However IT does not need to have this ability forced on them, or they need access to different network resources than a regular user does,</p>

<p>I hope this makes sense.</p>
]]>
        </description>
    </item>
    <item>
        <title>Dynamic DNS Provider Updates</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4101/dynamic-dns-provider-updates</link>
        <pubDate>Mon, 09 Dec 2024 16:21:07 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>phanaaekIT</dc:creator>
        <guid isPermaLink="false">4101@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>These changes need to be made to the Dynamic DNS providers available on the firebox:</p>

<ol><li>Remove dnsdynamic.org - The service was discontinued and is no longer operational as of Oct 2023.</li>
<li>Cloudflare - It should not require the Global API key.  We should be able to use regular restricted API tokens.</li>
<li>Digicert DNS Made Easy - Please add this service to the list of options <a href="https://dnsmadeeasy.com/technology/dynamic-dns" rel="nofollow">https://dnsmadeeasy.com/technology/dynamic-dns</a></li>
</ol><p>Thanks</p>
]]>
        </description>
    </item>
    <item>
        <title>Cloudflare API Token Support for Dynamic DNS</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2247/cloudflare-api-token-support-for-dynamic-dns</link>
        <pubDate>Sat, 11 Dec 2021 19:24:55 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>Nik</dc:creator>
        <guid isPermaLink="false">2247@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>It would be really nice to be able to use a Cloudflare API Token (Domain specific for example) instead of the Global API Key for a Dynamic DNS configuration.</p>
]]>
        </description>
    </item>
    <item>
        <title>Need IPv6 addresses on multiple external interfaces</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/198/need-ipv6-addresses-on-multiple-external-interfaces</link>
        <pubDate>Mon, 20 May 2019 18:11:09 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>keithwhare</dc:creator>
        <guid isPermaLink="false">198@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We are multi-homed on IPv4 with two separate ISPs using an active/passive fire-cluster of M200s as our gateway and to do BGP announcements. At the moment, Fireware only supports a single external interface with an IPv6 addresses. We would like to be multi-homed on IPv6 but need additional IPv6 support from Fireware.</p>

<p>IPv6 seems to have a problem where vendors are not completely supporting IPv6 because users are not demanding IPv6 support because the vendors are not providing full IPv6 support.</p>
]]>
        </description>
    </item>
    <item>
        <title>MTU settings in WebUI or initial deployment.</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4055/mtu-settings-in-webui-or-initial-deployment</link>
        <pubDate>Tue, 05 Nov 2024 17:10:08 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>Devlin_R</dc:creator>
        <guid isPermaLink="false">4055@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Weird one, all related to the circumstances of the environment rather than the Firewall itself. Cloud Managed must initially deploy WAN on ETH0, but if your environment requires an MTU under 1500 then cloud managed lacks options to resolve this.</p>

<ol><li>Add Device as Cloud Managed &gt; Set IP addressing (No MTU options present at this stage)</li>
<li>Device deploys as cloud managed, all interfaces set at 1500, device password hits, Cloud Managed WebUI takes over, i.e. some of that initial config has taken place.</li>
</ol><p>If ETH0 requires an MTU under 1500 am finding the firewall remains in a “never connected” state, never connected means no configuration is possible in WGC i.e whatever you do here isn’t deployable if its in the never connected state. In addition, the CLI prompt changes to Cloud Managed meaning no config options from CLI either. So am left with a cloud managed firewall that believes its cloud managed but never connects into WGC so I can’t fix it.</p>

<p>Am sure this is a rare circumstance and am also not yet 100% sure its MTU but I have repeated it a few times and end up with a device that I can’t configure from WGC, CLI or any other method to repair it.</p>
]]>
        </description>
    </item>
    <item>
        <title>Feature Request - Web Setup Wizard - VLAN</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1906/feature-request-web-setup-wizard-vlan</link>
        <pubDate>Thu, 24 Jun 2021 06:50:53 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>WellConnectedIT</dc:creator>
        <guid isPermaLink="false">1906@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi Guys,</p>

<p>What are the chances of getting VLAN's added to the external interface part of the setup wizard?<br />
In Australia a lot of our ISP's are using VLAN's when providing network connections, I'm watching all of the setup videos for the Watchguard devices and it's all either DHCP/PPPoE/Static IP options, but it'd be great to be able to setup a VLAN with the static IP so that we can get the benefit of the automatic setup of the subscription services also.</p>

<p>Hopefully it's not too difficult to implement because it'd definitely be useful for our business connections.</p>

<p>Thanks !</p>
]]>
        </description>
    </item>
    <item>
        <title>Block source IPs for brute-force login attacks</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3747/block-source-ips-for-brute-force-login-attacks</link>
        <pubDate>Wed, 03 Apr 2024 13:13:19 +0000</pubDate>
        <category>Firebox - Product Enhancements</category>
        <dc:creator>ovwg</dc:creator>
        <guid isPermaLink="false">3747@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello, since a couple of monthy I regularly see brute-force attacks on our SSLVPN port. While this cannot work (we have 2FA in place and no indicator of password compromise), it generates a lot of alerts and in practice this can be continued endlessly, so there is a small risk that easy-to-guess usernames and passwords could be compromised by brute-force.</p>

<p>Many devices that I know have a possibility to block a source IP after a certain number of wrong password requests for some minutes, e.g. 10 minutes after 3 wrong passwords. As far as I see, the WG Firboxes do not have such a feature, which would make brute-force attacks much harder. And blocking the source IPs by hand is a tedious job as they change all the time.<br />
What das WG support say?</p>

<p>I know and read the KB article 000024807 "Unknown authentication attempts against Mobile VPN with SSL from a user named "test" or other random users", but the actions described there are limited to detecting such attacks and applying geolocation. In our cose this does not help as the attacks come from countries we cannot easily block. The suggested connection rate limits would not help either as these attempts are 1 every 5 minutes or so. And we have AuthPoint 2FA, but this does not prevent the login <em>attempt</em>. So a feature to block such requests after some false logins would improve security a lot.</p>
]]>
        </description>
    </item>
   </channel>
</rss>
