<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Firebox - Proxies — WatchGuard Community</title>
        <link>https://community.watchguard.com/watchguard-community/</link>
        <pubDate>Sat, 11 Apr 2026 20:58:48 +0000</pubDate>
        <language>en</language>
            <description>Firebox - Proxies — WatchGuard Community</description>
    <atom:link href="https://community.watchguard.com/watchguard-community/categories/firebox-proxy-and-subscription-services/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Citrix Connection To State Gets Error</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4555/citrix-connection-to-state-gets-error</link>
        <pubDate>Sat, 14 Mar 2026 19:28:21 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>kellyw</dc:creator>
        <guid isPermaLink="false">4555@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello all,<br />
I am very confused on this.  Got a new M295 Firebox and advanced security.  Without the advanced secruity we are able to get to the Montana Website through their citrix connection.  Now that we put advanced security on the M295 firebox, when we try to connect to the Montana Website through their Citrix, we sign on and then get CANNOT COMPLETE YOUR REQUEST where it should test to see if we have Citrix on the computer or not.<br />
I have done everything that I can think of adding this to the web blocker, adding it to the proxies, ensuring port 443 is open then adding a policy of ports 1494 and 2598 coming from IP address of 161.7.8.91 - 161.7.8.94 (These are the external IP addresses of citrix.mt.gov and mfa.citrix.mt.gov).<br />
Everything I try i still get the error message above.  Please help as I have no idea what to do anymore.<br />
Thanks,<br />
Kelly W.</p>
]]>
        </description>
    </item>
    <item>
        <title>Website blocked, but can&#39;t figure out why</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4537/website-blocked-but-cant-figure-out-why</link>
        <pubDate>Fri, 20 Feb 2026 09:55:25 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>Chico008</dc:creator>
        <guid isPermaLink="false">4537@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi<br />
I have a little situation here.<br />
my teammate want to acces a website from a partner to byu hardware, it's a new partner, and thei website seems to be blocked by our proxy.</p>

<p>But i can't figure out why<br />
On traffic, here's what i get :</p>

<pre spellcheck="false" tabindex="0">2026-02-20 10:51:13 Member2 Allow 10.0.1.16 -removed- http/tcp 60783 80 Reseau local adsl_orange_secours HTTP request (HTTP-Web-General-DHCP-00) proc_id="http-proxy" rc="525" msg_id="1AFF-0024" app_name="Google Chrome" app_cat_name="Web services" app_id="8" app_cat_id="14" proxy_act="HTTP sites interdits.1" geo_dst="FRA" op="GET" dstname="www.salmson.com" arg="/" sent_bytes="605" rcvd_bytes="0" elapsed_time="0.000289 sec(s)" sig_vers="18.408"
2026-02-20 10:51:13 Member2 Allow 10.0.1.16 -removed- http/tcp 60783 80 Reseau local adsl_orange_secours Application identified 40 64 (HTTP-Web-General-DHCP-00) proc_id="firewall" rc="100" msg_id="3000-0149" src_ip_nat="82.127.114.224" tcp_info="offset 5 AF 110353771 win 58030" app_name="Google Chrome" app_cat_name="Web services" app_id="8" app_cat_id="14" app_beh_name="Access" app_beh_id="6" action="AC-Logging" geo_dst="FRA" sig_vers="18.408"
2026-02-20 10:51:14 Member2 Allow 10.0.1.16 -removed- http/tcp 60784 80 Reseau local adsl_orange_secours HTTP request (HTTP-Web-General-DHCP-00) proc_id="http-proxy" rc="525" msg_id="1AFF-0024" app_name="Google Chrome" app_cat_name="Web services" app_id="8" app_cat_id="14" proxy_act="HTTP sites interdits.1" geo_dst="FRA" op="GET" dstname="www.salmson.com" arg="/favicon.ico" sent_bytes="515" rcvd_bytes="0" elapsed_time="0.001081 sec(s)" sig_vers="18.408"
2026-02-20 10:51:14 Member2 Allow 10.0.1.16 -removed- http/tcp 60784 80 Reseau local adsl_orange_secours Application identified 40 64 (HTTP-Web-General-DHCP-00) proc_id="firewall" rc="100" msg_id="3000-0149" src_ip_nat="82.127.114.224" tcp_info="offset 5 AF 1639057394 win 51373" app_name="Google Chrome" app_cat_name="Web services" app_id="8" app_cat_id="14" app_beh_name="Access" app_beh_id="6" action="AC-Logging" geo_dst="FRA" sig_vers="18.408"
</pre>

<p>website is -removed-</p>

<p>but i got a standard proxy message telling me the access was blocked.<br />
seems to bne blocked by the rule http sites interdits.1<br />
but i can't find what preciselly is making this site getting blocked by this rule.<br />
It a normal hardware provider, and i don't see any words in their meta explaining this.<br />
Is there anyther kind of log explaining preciselly why it's getting proxy blocked ?</p>
]]>
        </description>
    </item>
    <item>
        <title>Unable to block Facebook</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4525/unable-to-block-facebook</link>
        <pubDate>Thu, 05 Feb 2026 11:34:39 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>Lpassoni</dc:creator>
        <guid isPermaLink="false">4525@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello, I have configured SSO in Ad and I can correctly see the user connecting, but the proxy rule (and/or Application Block) to block Facebook is ignored. I have obviously moved the rule to the top, but nothing changes.<br />
M390 release 12.11.7<img src="https://us.v-cdn.net/6029905/uploads/editor/lp/tigyz9kqucf6.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/lp/tigyz9kqucf6.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/lp/tigyz9kqucf6.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/lp/tigyz9kqucf6.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/lp/tigyz9kqucf6.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/lp/tigyz9kqucf6.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/lp/tigyz9kqucf6.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/lp/tigyz9kqucf6.png" sizes="100vw" /><br /><img src="https://us.v-cdn.net/6029905/uploads/editor/7i/osbpre1nyln8.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/7i/osbpre1nyln8.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/7i/osbpre1nyln8.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/7i/osbpre1nyln8.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/7i/osbpre1nyln8.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/7i/osbpre1nyln8.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/7i/osbpre1nyln8.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/7i/osbpre1nyln8.png" sizes="100vw" /></p>
]]>
        </description>
    </item>
    <item>
        <title>Bestpractice for a RDGatway deployment</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4523/bestpractice-for-a-rdgatway-deployment</link>
        <pubDate>Wed, 04 Feb 2026 18:55:53 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>Hero</dc:creator>
        <guid isPermaLink="false">4523@/watchguard-community/discussions</guid>
        <description><![CDATA[Hi everyone,<br /><br /> I'd like to protect an RD Gateway server using an incoming HTTPS server content action to better defend against brute-force attacks, for example, with IPS.<br /><br /> Unfortunately, my current setup isn't working.<br /><br /> The certificate is imported into WatchGuard and assigned to the content action.<br /><br /> Is there anything I need to consider to make SSL inspection work on an RD Gateway server?]]>
        </description>
    </item>
    <item>
        <title>ChatGPT suddenly slow/can&#39;t connect</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4478/chatgpt-suddenly-slow-cant-connect</link>
        <pubDate>Wed, 10 Dec 2025 14:58:23 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>Chico008</dc:creator>
        <guid isPermaLink="false">4478@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>since a couple of week, some of our users, that used Chatgpt, can't. (chatgpt.com)</p>

<p>i don't remeber changing something in our proxy filtering (maybe our DSI, but he would advertise us in this case)</p>

<p>when i check the traffic logs, i get this deny:<br /><code spellcheck="false" tabindex="0">2025-12-10 15:44:23 Member2 Deny &lt;clientIP&gt; 172.64.155.209 https/tcp 53088 443 Reseau local FTTO-SFR Application identified 1500 128 (HTTPS-Web-General-DHCP-00) proc_id="firewall" rc="101" msg_id="3000-0149" route_type="SD-WAN" src_ip_nat="&lt;our_public_IP&gt;" tcp_info="offset 5 A 2580491961 win 61690" app_name="ChatGPT" app_cat_name="general" app_id="9" app_cat_id="29" app_beh_name="Access" app_beh_id="6" action="AC-Logging" geo_dst="USA" sig_vers="18.397"</code></p>

<p>I only get this is denyed by the firewall rule HTTPS-Web-General-DHCP, but can't find where inside.<br />
This rule is here to proxy/filter internet access, and deny some sensitives content using proxy.</p>

<p>in the proxy setting assigned to this rule, can't find the app_cat_name "general" nor app_beh_name "Access"</p>

<p>Any hints on where i could find this ?</p>
]]>
        </description>
    </item>
    <item>
        <title>question on proxy vs packet for smtp</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4477/question-on-proxy-vs-packet-for-smtp</link>
        <pubDate>Tue, 09 Dec 2025 11:46:47 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>carol_taylor</dc:creator>
        <guid isPermaLink="false">4477@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi All, <br />
We are currently in the process of setting up Proof Point for scanning mail for our on premise mail server<br />
I wanted to test one domain before I move all others over (have multiple domains on our mail server)<br />
I currently run smtp through a proxy rule, but for proof point setup, I am moving to a packet filter and using their IP's in the From section</p>

<p>For my test, if I move the packet filter in front of the proxy, will that screw up all my mail, as it will try that rule first?   I kind of think it may be an issue to test this as I wanted to<br />
Any suggestions on how to test this process rather than all at one time?<br />
Was hoping to be able to test with the one domain, if at all possible</p>

<p>Anyhow, thought I would put it out here and see what you all think <img src="https://community.watchguard.com/resources/emoji/smile.png" title=":)" alt=":)" height="20" /><br />
I can open a ticket, if needed, but lots of smart people out here may answer me faster!</p>

<p>Thanks for any thoughts on the matter!</p>
]]>
        </description>
    </item>
    <item>
        <title>Multiple reverse proxies</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3902/multiple-reverse-proxies</link>
        <pubDate>Thu, 18 Jul 2024 23:06:50 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>PJawjxD30</dc:creator>
        <guid isPermaLink="false">3902@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,<br />
I have a single external IP and 2 internal servers:<br />
one.mydomain.com<br />
two.mydomain.com</p>

<p>I'd like to restrict external access to each server:<br />
Any-External &gt; one.mydomain.com<br />
Single IP &gt; two.mydomain.com</p>

<p>I've looked at using a reverse proxy but I can't see a way to restirct the inbound traffic by domain and unless I'm mistaken I can't use 2 reverse proxies.</p>

<p>Is what I'm asking possible?</p>

<p>Thanks in advance for any help.</p>

<p>T40 v12.10.4</p>
]]>
        </description>
    </item>
    <item>
        <title>SMTP Proxy insert content warning on every email</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4457/smtp-proxy-insert-content-warning-on-every-email</link>
        <pubDate>Thu, 13 Nov 2025 18:47:18 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>offbyone</dc:creator>
        <guid isPermaLink="false">4457@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello.</p>

<p>By investigating a different issue we found, that on every incoming email the SMTP proxy inserts a warning message on every multipart email. The message has always the following format:</p>

<hr /><p>Content-Type: text/plain; name="message.txt"; charset="iso-8859-1"<br />
Content-Transfer-Encoding: quoted-printable<br />
Content-Disposition: inline</p>

<p>The WatchGuard Firebox that protects your network has detected a message =<br />
that may not be safe.</p>

<p>Cause : The message content may not be safe.<br />
Content type : (none)<br />
File name    : (none)<br />
Virus status : Content-Type violation<br />
Action       : The Firebox deleted (none).</p>

<p>Your network administrator can not restore this attachment.</p>

<hr /><p>This message cannot be recognized when the email is opened in the email client however it is visible when looking at the raw content of the email.</p>

<p>We seem to have this issue on every Firebox of every customer however we stopped investigatin this after we found the same issue on five client boxes in sequence. All boxes are on FW 12.11.4.</p>

<p>Is this a known issue?</p>

<p>THX and kind regards</p>
]]>
        </description>
    </item>
    <item>
        <title>smtp proxy inbound secured</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4391/smtp-proxy-inbound-secured</link>
        <pubDate>Thu, 04 Sep 2025 07:38:03 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>Edps</dc:creator>
        <guid isPermaLink="false">4391@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>To enable it on the watchguard, I found two sections (STARTTLS and TLS). I'm not entirely clear on the difference between the two sections (STARTTLS and TLS). Just enable the flag without touching anything else in STARTTLS. How does it interact with the TLS section with allow rather than inspect?</p>
]]>
        </description>
    </item>
    <item>
        <title>Content Inspection - Video- Radio-Streams, Speedtests-Problems</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4364/content-inspection-video-radio-streams-speedtests-problems</link>
        <pubDate>Thu, 31 Jul 2025 13:36:33 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>MoSeSe</dc:creator>
        <guid isPermaLink="false">4364@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>i did enable "Content Inspection" @ M370 (including Webblocker, AV and more). Websites are loading. Even for example youtube, but the videos dont run. Even radio-Streams or speedtest (like google speedtest) dont start. I disabled Webblocker, Antivirus, but it still doesnt work.</p>

<p>Do you have any idea?</p>

<p>Thanks</p>

<p>Mo</p>
]]>
        </description>
    </item>
    <item>
        <title>Different behaviour on 2 interfaces (related to https on port 80 possibly)</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4370/different-behaviour-on-2-interfaces-related-to-https-on-port-80-possibly</link>
        <pubDate>Tue, 05 Aug 2025 11:04:39 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>shaunos</dc:creator>
        <guid isPermaLink="false">4370@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>We have an M390 (12.11.2.B713726).</p>

<p>Our local LAN operates through Trusted2 interface.<br />
We have a guest Wifi network operating on GuestWeb Interface.</p>

<p>One of our suppliers has a bunch of routers and we need to access their web portals.<br />
These particular models appear to only listen for https on port 80 for some reason from what I can gather.</p>

<p>When I try to access one of these routers from Trusted2 LAN, it wont connect.</p>

<p>When I try to connect from the GuestWeb network then it will connect.</p>

<p>Trusted2 http proxy was using HTTP-Client.Standard.1</p>

<p>Guestweb proxy was using HTTP-Client.Standard.3</p>

<p>Comparing the 2 the only difference is that HTTP-Client.Standard.1 uses a Webblocker so I thought ok maybe the webblocker means it is inspecting the packets more and triggering the failure.</p>

<p>So I changed the config of the GuestWeb network http proxy to use the same HTTP-Client.Standard.1 as Trusted2 interface but it still works on the GuestWeb network.</p>

<p>On the Trusted2 network I then added a packet filter policy to blanket allow access from my PC to the remote IP address on port 80 and placed the policy above the default http-proxy policy and then the connection works for me.</p>

<p>This leads me to believe that it is the proxy that is causing the issue but it is confusing because the same policy causes no issues on the GuestWeb network.</p>

<p>I can see no other policies above the default http-proxy that should have an impact (there are less that a handful in total anyway)</p>

<p>Any suggestions appreciated...</p>

<p>Cheers,</p>

<p>~Shaun.</p>
]]>
        </description>
    </item>
    <item>
        <title>Yahoo Finance Headers Too Large</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4367/yahoo-finance-headers-too-large</link>
        <pubDate>Fri, 01 Aug 2025 16:46:19 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>morpheus27</dc:creator>
        <guid isPermaLink="false">4367@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Using the latest version 12.11.3.B719894 on my M270. I'm getting this error accessing <a href="https://finance.yahoo.com/" rel="nofollow">https://finance.yahoo.com/</a></p>

<p>I increased the following proxy action:</p>

<p>HTTP Response &gt; General Settings &gt; Set the maximum line length to: 16384 (max value) does not solve it.</p>

<p>How do I fix this without putting the site on Content Inspection exception list?</p>

<p>Response denied by WatchGuard HTTP Proxy.</p>

<p>Reason: header-line too large line='link: <a rel="nofollow" href="https://s.yimg.com/aaq/benji/benji-2.2.195.js">https://s.yimg.com/aaq/benji/benji-2.2.195.js</a>;rel="preload";as="script";nopush,<a rel="nofollow" href="https://s.yimg.com/du/ay/wnsrvbjmeprtfrnfx.js">https://s.yimg.com/du/ay/wnsrvbjmeprtfrnfx.js</a>;rel="preload";as="script";nopush,<a rel="nofollow" href="https://securepubads.g.doubleclick.net/tag/js/gpt.js">https://securepubads.g.doubleclick.net/tag/js/gpt.js</a>;rel="preload";as="script";nopush,<a rel="nofollow" href="https://s.yimg.com/aaq/prebid/prebid-2.0.js">https://s.yimg.com/aaq/prebid/prebid-2.0.js</a>;rel="preload";as="script";nopush,<a rel="nofollow" href="https://s.yimg.com/eh/prebid-config/finance-us-desktop.json">https://s.yimg.com/eh/prebid-config/finance-us-desktop.json</a>;rel="preload";as="fetch";crossorigin="anonymous";fetchpriority="high";nopush,<a rel="nofollow" href="https://s.yimg.com/eh/prebid-config/bp-finance.json">https://s.yimg.com/eh/prebid-config/bp-finance.json</a>;rel="preload";as="fetch";crossorigin="anonymous";fetchpriority="high";nopush,<a rel="nofollow" href="https://s.yimg.com/aaq/f10d509c/d3lm64ch1c76ug.js">https://s.yimg.com/aaq/f10d509c/d3lm64ch1c76ug.js</a>;rel="preload";as="script";nopush,&lt;./assets/_app/immutable/assets/2.CLM3Rb54.css&gt;; rel="preload";as="style"; nopush, '</p>

<p>Please contact your administrator for assistance.</p>

<p>More Details:</p>

<p>Method: GET</p>

<p>Host: finance.yahoo.com</p>

<p>Path: /</p>
]]>
        </description>
    </item>
    <item>
        <title>MAC-IP Reservation CSV Import</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1563/mac-ip-reservation-csv-import</link>
        <pubDate>Tue, 19 Jan 2021 19:16:56 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>HG_ESP</dc:creator>
        <guid isPermaLink="false">1563@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello, I have 500+ list of IP-MAC Reservation in my college environment. I cannot do the same by adding single at a time. it is very time consuming. Please help with your assistance to conclude my test quickly.</p>
]]>
        </description>
    </item>
    <item>
        <title>Suppressing &quot;Unhandled Internal Packet&quot; and &quot;blocked sites&quot; errors from DNS</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4365/suppressing-unhandled-internal-packet-and-blocked-sites-errors-from-dns</link>
        <pubDate>Thu, 31 Jul 2025 15:07:11 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>ACO</dc:creator>
        <guid isPermaLink="false">4365@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have been trying (unsuccessfully, obviously) to suppress some clutter from the logs and now call upon the gurus here. The solutions must be without the aid of subscription licensing (such as DNSWatch). Why? My reasons.</p>

<p>The problem devices are all wireless.</p>

<p>I am using a DNS-Proxy to prevent a wireless device from accessing specific destinations via name. I also have one IP address in the Blocked Sites list.</p>

<p>In <strong>Interfaces &gt; DNS/WINS</strong>, the ISP's address is listed as the only <strong>DNS SERVER</strong>. The ISP takes care of autoconfiguring the modem with DNS server addresses and there are no DNS servers on the LAN side of this universe. <strong>DNS Forwarding</strong> is enabled for the hardwired devices but disabled for the wireless devices. Why? It seems that enabling <strong>DNS Forwarding</strong> for the wireless devices causes the <strong>DNS-Proxy</strong>'s <strong>Proxy Action</strong>'s <strong>Query Names</strong> to be useless even though the action to take is "Drop."</p>

<p>I've suppressed many of the log entries, but not quite all. Yes, I understand that "Unhandled Internal Packet" means the system ran through all the rules and found no final disposition for the packet. All the error messages are <code spellcheck="false" tabindex="0">msg_id="3000-0148"</code>.</p>

<pre spellcheck="false" tabindex="0">Deny  Wireless-1 Firebox 75 udp 20 64 [device] [firebox] 59511 53  (Unhandled Internal Packet-00)
Deny  Wireless-1 Firebox 75 udp 20 64 [device] [firebox] 35006 53  (Unhandled Internal Packet-00)
Deny  Wireless-1 Firebox 75 udp 20 63 [device] 8.8.8.8 60725 53 msg="blocked sites"  (DNS-proxy-00)
Deny  Wireless-1 Firebox 75 udp 20 64 [device] [firebox] 44401 53  (Unhandled Internal Packet-00)
Deny  Wireless-1 Firebox 75 udp 20 64 [device] [firebox] 49748 53  (Unhandled Internal Packet-00)
Deny  Wireless-1 Firebox 75 udp 20 64 [device] [firebox] 43824 53  (Unhandled Internal Packet-00)
</pre>

<p>Bonus Error</p>

<p><code spellcheck="false" tabindex="0">Deny External Firebox 36 igmp 24 1 [firebox] 224.0.0.1 (Unhandled External Packet-00)</code></p>

<p>That last one has been around for only about forever.</p>

<p>Any help here?</p>
]]>
        </description>
    </item>
    <item>
        <title>Clarification on Traffic Processing Order within HTTPS-Proxy (IPS, App Control, GAV, WebBlocker)</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4363/clarification-on-traffic-processing-order-within-https-proxy-ips-app-control-gav-webblocker</link>
        <pubDate>Tue, 29 Jul 2025 20:22:04 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>YELANKOUD</dc:creator>
        <guid isPermaLink="false">4363@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello WatchGuard Community,</p>

<p>I'm seeking some clarification on the exact order of operations when traffic passes through an HTTPS-Proxy policy on a WatchGuard Firebox, especially when multiple security services are enabled.</p>

<p>Specifically, if an HTTPS-Proxy policy has IPS (Intrusion Prevention System), Application Control, Gateway AntiVirus (GAV), and WebBlocker all enabled for content inspection (assuming SSL/TLS decryption is in place), what is the precise sequence in which these services inspect the traffic?</p>

<p>From my understanding, it generally follows a logical flow after decryption, but I'd appreciate confirmation on the exact processing order to better understand traffic flow and troubleshoot effectively.</p>

<p>Any insights or links to official documentation detailing this specific order would be greatly appreciated.</p>

<p>Thank you in advance for your help!</p>

<p>Best regards,</p>
]]>
        </description>
    </item>
    <item>
        <title>application control blocking youtube dns queries</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4347/application-control-blocking-youtube-dns-queries</link>
        <pubDate>Sat, 12 Jul 2025 15:00:34 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>Steve_E</dc:creator>
        <guid isPermaLink="false">4347@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello</p>

<p>M270 + fireware 12.11.2</p>

<p>I added a policy for dns queries out - tcp/upd 53 packet filter + application filter with network/dns allowed + proxy for op codes, query types, etc, from two bind9 server IPs, to any-external</p>

<p>Queries worked until I looked up youtube.com</p>

<p>It got blocked</p>

<p>Deny 192.168.10.111 192.43.172.30 dns/udp 60963 53 INT-PUBLIC-BRIDGE EXT-BUSINESS Application identified 80 63 (DNS OUT prefer NS1-00)  proc_id="firewall" rc="101" msg_id="3000-0149" src_ip_nat="m.y.i.p" app_id="112" app_name="Youtube" app_cat_id="5" app_cat_name="Media streaming services" app_beh_id="6" app_beh_name="Access" action="DNS Only" sig_vers="18.376" flags="SR" duration="0" sent_pkts="2" rcvd_pkts="0" sent_bytes="160" rcvd_bytes="0" route_type="SD-WAN" geo_dst="USA"</p>

<p>Per the log I modified app control "media streaming service &gt; youtube &gt; access" to "allow" and tried again</p>

<p>Allow 192.168.10.111 192.12.94.30 dns/udp 38196 53 INT-PUBLIC-BRIDGE EXT-BUSINESS Application identified 80 63 (DNS OUT prefer NS1-00)  proc_id="firewall" rc="100" msg_id="3000-0149" src_ip_nat="m.y.i.p" app_id="112" app_name="Youtube" app_cat_id="5" app_cat_name="Media streaming services" app_beh_id="6" app_beh_name="Access" action="DNS Only" sig_vers="18.376" route_type="SD-WAN" geo_dst="USA" record_type="DS" question="youtube.com"</p>

<p>Can you help me understand why that's needed for dns queries?</p>
]]>
        </description>
    </item>
    <item>
        <title>https-proxy-server: sni check results in broken tls</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4302/https-proxy-server-sni-check-results-in-broken-tls</link>
        <pubDate>Thu, 15 May 2025 18:44:39 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>vanessa</dc:creator>
        <guid isPermaLink="false">4302@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>hi  community,<br />
i'm using a simple https-proxy policy for inbound connections and only check for the correct sni. the firebox accepts the client hello with valid sni, routes it to the destination. so far so good. when the server response with a valid "server hello, change cipher spec and appdata" packet, then the firebox cuts it without any statement. sometimes in the beginning and sometimes at the end of the packet. the handshake fails and the server resets the connection. the clue is, that its only cutting the server hello packet when the client hello comes from remote site-to-site client (ikev2). when i try the exact same request, hitting the exact same rule from a sslvpn client, then the firebox doesn't touch the packet at all. <br />
what could cause this behavior? the logs all look valid, no errors, drops, blocks or whatever. when i build the policy as a filter then it works. so for sure its the https-proxy engine which intercepts the tls handshake. but why?! i'm not doing tls inspection, only sni check. <br />
what is going on here? i would expect the firebox to drop the packet, but cutting it? thats really strange.. any ideas? ^^<br />
kind regards,<br />
vanessa</p>
]]>
        </description>
    </item>
    <item>
        <title>FB not displaying or connecting correctly behind Firebox</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4306/fb-not-displaying-or-connecting-correctly-behind-firebox</link>
        <pubDate>Fri, 16 May 2025 17:27:19 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>WGM</dc:creator>
        <guid isPermaLink="false">4306@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi All,</p>

<p>We're having problem accessing facebook.com landing page. Please see attach picture. that's all it shows. We know that they're not having problems and outside of the firebox we're able to see the pages with no problems. We were on 12.11.2 then revert it back to 12.11.1 but still the same problem. No policy changes were made on both revisions.</p>

<p>Also, if we reboot the firebox, reaching and displaying facebook works fine, but after 20 or 30 minutes it goes back where we cannot access or see the white page with links and missing images.[Please see attached image] Please help! Thanks!</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/eu/vrnk67r3tvaj.jpg" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/eu/vrnk67r3tvaj.jpg 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/eu/vrnk67r3tvaj.jpg 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/eu/vrnk67r3tvaj.jpg 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/eu/vrnk67r3tvaj.jpg 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/eu/vrnk67r3tvaj.jpg 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/eu/vrnk67r3tvaj.jpg 2000w, https://us.v-cdn.net/6029905/uploads/editor/eu/vrnk67r3tvaj.jpg" sizes="100vw" /></p>
]]>
        </description>
    </item>
    <item>
        <title>Deny</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4301/deny</link>
        <pubDate>Thu, 15 May 2025 17:36:36 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>WGM</dc:creator>
        <guid isPermaLink="false">4301@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi, <br />
FB M400 12.11.2</p>

<p>Can anyone help why we get this deny error. We cannot have facebook to load all the images, we  only get links and sometimes it does not load. We checked the firebox and not blocking is set.  Users try using the desktop browser but only get links and not images and sometimes do not load.</p>

<p>2025-05-15 10:27:36 Deny XXX.XXX.XXX.XXX 35.190.80.1 https/udp 52868 443 Trusted INT XX.XX.XX Denied 1278 127 (Unhandled Internal Packet-00)  proc_id="firewall" rc="101" msg_id="3000-0148" flags="SR" duration="0" sent_pkts="1" rcvd_pkts="0" sent_bytes="1278" rcvd_bytes="0" geo_dst="USA"     Traffic</p>

<p>Thanks!</p>
]]>
        </description>
    </item>
    <item>
        <title>Unable to remove IP after accessing a port on the default blocked ports list - Cloud Managed</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4237/unable-to-remove-ip-after-accessing-a-port-on-the-default-blocked-ports-list-cloud-managed</link>
        <pubDate>Thu, 20 Mar 2025 09:16:37 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>SamSpronk</dc:creator>
        <guid isPermaLink="false">4237@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We have a Watchguard T25 managed via Watchguard cloud and inadvertently, when performing a test, made an attempt to connect to the watchguard on Port 8000 - which is one of the default blocked ports. Doing this triggers our WAN IP to be blocked for a (random?) period of time I understand this is normally 20 minutes on a locally managed firebox but it looks like it might be closer to 4 hours on a cloud managed firebox.</p>

<p>Also on a locally managed firebox there is a method to remove the WAN IP from the ban, there doesn't appear to be anyway in a cloud managed firebox to remove the blocked IP.</p>

<p>Is there any reason the timing on this is different from a locally managed firebox?<br />
Is there any method to remove the IP immediately?</p>

<p>Any feedback is appreciated.</p>
]]>
        </description>
    </item>
    <item>
        <title>Smtp proxy Massage</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4226/smtp-proxy-massage</link>
        <pubDate>Thu, 13 Mar 2025 20:29:23 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>Hero</dc:creator>
        <guid isPermaLink="false">4226@/watchguard-community/discussions</guid>
        <description><![CDATA[Hello, I have set up a new watchguard. Using an outbound SMTP proxy over port 25. If we send an email through a client SW, not Outlook, the email cannot be sent through the proxy. I see a log message “SMTP command was denied”. The email can be sent without the proxy. Does anyone have an idea?]]>
        </description>
    </item>
    <item>
        <title>Firebox Denying Traffic: HTTPS Invalid Protocol</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2636/firebox-denying-traffic-https-invalid-protocol</link>
        <pubDate>Thu, 09 Jun 2022 13:11:54 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>Shellie</dc:creator>
        <guid isPermaLink="false">2636@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Firebox T40<br />
Version 12.7.1.B644848</p>

<p>We replaced a failed network device relating to Car Wash equipment. Device is same model # as previous. It's assigned IP: 10.11.17.129. We had no Firewall Policies in place for previous device. However, device is being blocked by Firewall communicating with external server. Receiving the following in Traffic Monitor:</p>

<p>2022-06-08 16:35:08 Deny 10.11.17.129 72.78.XXX.XXX https/tcp 1057 443 Trusted External ProxyDrop: HTTPS invalid protocol (HTTPS-proxy-00) proc_id="https-proxy" rc="594" msg_id="2CFF-0007" proxy_act="Default-HTTPS-Client" length="0"</p>

<p>2022-06-08 16:35:08 Deny 10.11.17.129 72.78.XXX.XXX https/tcp 1057 443 Trusted External HTTPS Request (HTTPS-proxy-00) proc_id="https-proxy" rc="548" msg_id="2CFF-0000" app_id="0" app_cat_id="0" proxy_act="Default-HTTPS-Client" action="drop" sent_bytes="64" rcvd_bytes="0" tls_version="SSL_0" tls_profile="TLS-Client-HTTPS.Standard" sig_vers="18.060"</p>

<p>Please let me know if additional information is needed. Any thoughts or suggestions would be much appreciated.<br />
Thank you!<br />
Shellie</p>
]]>
        </description>
    </item>
    <item>
        <title>Block Specific URL on internal Microsoft IIS web server</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4229/block-specific-url-on-internal-microsoft-iis-web-server</link>
        <pubDate>Fri, 14 Mar 2025 19:16:23 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>EAGSYN</dc:creator>
        <guid isPermaLink="false">4229@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have a single IIS web server that I want to increase the protection on. I can go one of two ways.</p>

<ol><li>Block all access the web server except for a specific URL, like <a href="HTTPS://name.domain.com/page" rel="nofollow">HTTPS://name.domain.com/page</a></li>
<li>Block other sites on this IIS server. Like, <a href="https://www.name.domain" rel="nofollow">https://www.name.domain</a> and crucially <a href="https://name.domain.com" rel="nofollow">https://name.domain.com</a></li>
</ol><p>Notice the site with "page" at the end in example one.</p>

<p>Any ideas?</p>
]]>
        </description>
    </item>
    <item>
        <title>IPv6 https-proxy issue</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3776/ipv6-https-proxy-issue</link>
        <pubDate>Mon, 22 Apr 2024 09:55:25 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>Alan_Plummer</dc:creator>
        <guid isPermaLink="false">3776@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi All,</p>

<p>I'm rolling out IPv6 internally through my M470, and I get these spurious logs.</p>

<p>2024-04-22 10:46:14 https-proxy 0x2c1f480-64896 681: 2a00:xxxx:yyyy::50:53741 -&gt; 2603:1020:705:8::400:443 [!B fc] {N}: Side channel SSL failed (Domain: N/A) - proceed with rule check      Debug</p>

<p>2024-04-22 10:46:14 pxy 0x2c1f480-64896 connect failed Connection timed out -1: :::0 -&gt; :::0 [!A] {N} | 681: 2a00:xxxx:yyyy::50:53741 -&gt; 2603:1020:705:8::400:443 [!B c] {N}[L!BPeo]    Debug</p>

<p>The 2a00:xxxx:yyyy::50 is the IPv6 on the WAN interface, not the IPv6 on the LAN interface.</p>

<p>I actually have OPNSense behind the Watchguard LAN  doing NPTv6 to translate ULA to GUA, but I do not think this is anything to do with the issue above.</p>

<p>I am routing a /60 down from an upstream OPNSense router to the Watchguard appliance.</p>

<p>Anyone any ideas what this might be? It doesnt appear to be affecting anything, but is annoying me.</p>

<p>Thanks</p>

<p>Alan</p>
]]>
        </description>
    </item>
    <item>
        <title>Conflicting results on web service test requiring TLS 1.2</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4150/conflicting-results-on-web-service-test-requiring-tls-1-2</link>
        <pubDate>Tue, 21 Jan 2025 19:35:04 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>Gallus</dc:creator>
        <guid isPermaLink="false">4150@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We have a need to connect to a service that requires TLS1.2 on the connection.<br />
When I run the test client on our DC it will connect with no issues.<br />
When I run it on a Windows 10 machine I get the error "The underlying connection was closed: An unexpected error occurred on a send".</p>

<p>I can see the following differences in the traffic logs.<br />
192.168.15.49 is the Win 10 workstation traffic.<br />
192.168.15.8 is the Server 2019 traffic.</p>

<p>Both going out the same WAN network - Corp<br />
Both using Outbound HTTPS proxy policy<br />
SourcePublicIP.Redacted shows as our Static WAN. Details pulled for security reasons.<br />
Redacted.gov is a site the TLS Test client is looking at for a certificate.<br />
The only places I see a difference is the <strong>tls_version="SSL_0"</strong> showing on the workstation traffic. The server side showing <strong>tls_version="TLS_V12"</strong><br />
And the App Names, workstation showing SSL/TLS but Server showing HTTP Protocol over TLS SSL</p>

<p>So my understanding here is that when running the client on the server, it sends on TLS1.2 (a changeable option in the client to 1.1 or 1.0, must be 1.2 though) and the site responds with the certificate.<br />
When running the exact same client on the workstation it is somehow switched to SSL and the response fails.</p>

<p>I have verified that the source devices are TLS1.2 only. All lower versions and SSL are disabled.<br />
The server traffic can see the Domain Match from the HTTPS policy exception; <strong>ProxyAllow: HTTPS domain name match</strong><br />
The workstation traffic does not see that the site is listed in exceptions.<br />
I have tested multiple different TLS Profiles but it all comes back to this. So now I am here looking for smarter folk than me that will hopefully have an answer.</p>

<p>2025-01-15 22:51:27 FW1 Allow 192.168.15.49 DestinationIP.Redacted https/tcp 54818 443 Corp External Application identified 40 64 (Outbound HTTPS-proxy-00)  proc_id="firewall" rc="100" msg_id="3000-0149" src_ip_nat="SourcePublicIP.Redacted" tcp_info="offset 5 AF 3035482593 win 24065" app_id="697" app_name="SSL/TLS" app_cat_id="19" app_cat_name="Network protocols" app_beh_id="6" app_beh_name="Access" action="Global" sig_vers="18.350" src_user="SSOuser@Redacted.local" geo_dst="USA"    Traffic</p>

<p>2025-01-15 22:51:27 FW1 Allow 192.168.15.49 DestinationIP.Redacted https/tcp 54818 443 Corp External HTTPS Request   (Outbound HTTPS-proxy-00) HTTPS-Client.Standard.Main proc_id="https-proxy" rc="548" msg_id="2CFF-0000" proxy_act="HTTPS-Client.Standard.Main" <strong>tls_profile="TLS-Client-HTTPS.Standard.1" tls_version="SSL_0"</strong> sni="redacted.gov" cn="" cert_issuer="" cert_subject="" action="allow" app_id="697" app_cat_id="19" <strong>app_name="SSL/TLS"</strong> app_cat_name="Network protocols" sig_vers="18.350" sent_bytes="163" rcvd_bytes="7" src_user="SSOuser@Redacted.local" geo_dst="USA"  Traffic</p>

<p>2025-01-15 22:51:27 FW1 Allow 192.168.15.49 DestinationIP.Redacted https/tcp 54819 443 Corp External HTTPS Request   (Outbound HTTPS-proxy-00) HTTPS-Client.Standard.Main proc_id="https-proxy" rc="548" msg_id="2CFF-0000" proxy_act="HTTPS-Client.Standard.Main" <strong>tls_profile="TLS-Client-HTTPS.Standard.1" tls_version="SSL_0"</strong> sni="redacted.gov" cn="" cert_issuer="" cert_subject="" action="allow" app_id="697" app_cat_id="19" <strong>app_name="SSL/TLS"</strong> app_cat_name="Network protocols" sig_vers="18.350" sent_bytes="163" rcvd_bytes="7" src_user="SSOuser@Redacted.local" geo_dst="USA"  Traffic</p>

<p>2025-01-15 22:51:28 FW1 Allow 192.168.15.49 DestinationIP.Redacted https/tcp 54819 443 Corp External Application identified 40 64 (Outbound HTTPS-proxy-00)  proc_id="firewall" rc="100" msg_id="3000-0149" src_ip_nat="SourcePublicIP.Redacted" tcp_info="offset 5 AF 1493665836 win 24065" app_id="697" <strong>app_name="SSL/TLS"</strong> app_cat_id="19" app_cat_name="Network protocols" app_beh_id="6" app_beh_name="Access" action="Global" sig_vers="18.350" src_user="SSOuser@Redacted.local" geo_dst="USA"    Traffic</p>

<p>2025-01-15 22:51:26 FW1 Allow 192.168.15.8 DestinationIP.Redacted https/tcp 65205 443 Corp External <strong>ProxyAllow: HTTPS domain name match</strong>   (Outbound HTTPS-proxy-00) HTTPS-Client.Standard.Main proc_id="https-proxy" rc="590" msg_id="2CFF-0003" proxy_act="HTTPS-Client.Standard.Main" rule_name="Report" sni="redacted.gov" cn="" ipaddress="" src_user="SSOuser@Redacted.local" geo_dst="USA"    Traffic</p>

<p>2025-01-15 22:51:27 FW1 Allow 192.168.15.8 DestinationIP.Redacted https/tcp 65205 443 Corp External Application identified 572 128 (Outbound HTTPS-proxy-00)  proc_id="firewall" rc="100" msg_id="3000-0149" src_ip_nat="SourcePublicIP.Redacted" tcp_info="offset 5 A 866324252 win 4896" app_id="350" <strong>app_name="HTTP Protocol over TLS SSL"</strong> app_cat_id="19" app_cat_name="Network protocols" app_beh_id="6" app_beh_name="Access" action="Global" sig_vers="18.350" src_user="SSOuser@Redacted.local" geo_dst="USA"   Traffic</p>

<p>2025-01-15 22:51:27 FW1 Allow 192.168.15.8 DestinationIP.Redacted https/tcp 65205 443 Corp External HTTPS Request   (Outbound HTTPS-proxy-00) HTTPS-Client.Standard.Main proc_id="https-proxy" rc="548" msg_id="2CFF-0000" proxy_act="HTTPS-Client.Standard.Main" <strong>tls_profile="TLS-Client-HTTPS.Standard.1" tls_version="TLS_V12"</strong> sni="redacted.gov" cn="redacted.gov" cert_issuer="CN=DigiCert EV RSA CA G2,O=DigiCert Inc,C=US" cert_subject="CN=redacted.gov,O=Federal Deposit Insurance Corporation,L=Arlington,ST=Virginia,C=US,serialNumber=Government Entity,businessCategory=Government Entity,jurisdictionC=US" action="allow" app_id="350" app_cat_id="19" app_name="HTTP Protocol over TLS SSL" app_cat_name="Network protocols" sig_vers="18.350" sent_bytes="1186" rcvd_bytes="6317" src_user="SSOuser@Redacted.local" geo_dst="USA"   Traffic</p>
]]>
        </description>
    </item>
    <item>
        <title>Block download .ps1 files</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4126/block-download-ps1-files</link>
        <pubDate>Thu, 02 Jan 2025 17:59:25 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>Igor</dc:creator>
        <guid isPermaLink="false">4126@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,<br />
has anyone managed to block the download of .ps1 files using “pattern match” ?<br />
With .exe I have succeeded using the string “%0x4d5a%*” but I can't find anything about how to find the relevant string for .ps1 files.</p>

<p>Thanks</p>
]]>
        </description>
    </item>
    <item>
        <title>WatchGuard Cloud Bypass Decryption</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4122/watchguard-cloud-bypass-decryption</link>
        <pubDate>Mon, 23 Dec 2024 20:30:08 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>robt7676</dc:creator>
        <guid isPermaLink="false">4122@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Happy holidays all!  I've been testing out WG Cloud and can't figure out how to replicate what I had configured on a locally-managed Firebox.  Here's how WebBlocker worked locally:</p>

<p>-Client accesses an allowed site: Firebox passes the connection without decryption<br />
-Client accesses a denied site: Firebox inspects, denies, and throws up block page</p>

<p>Here's how it seems to work with the cloud:</p>

<p>-Client accesses an allowed site: Firebox decrypts traffic, re-encrypts and passes traffic<br />
-Client accesses a denied site: Firebox descrypts traffic, denies, and throws up block page</p>

<p>Given this, what's the point of "Bypass Decryption" in the WebBlocker?  I've tried selecting it in several categories, but the Firebox still decrypts the traffic which can be confirmed by looking at the certificate when the page in question loads.  What am I missing?  Thanks!</p>
]]>
        </description>
    </item>
    <item>
        <title>Webblocker Passphrass over BOVPN not working</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4094/webblocker-passphrass-over-bovpn-not-working</link>
        <pubDate>Wed, 04 Dec 2024 20:46:45 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>kcarpenter</dc:creator>
        <guid isPermaLink="false">4094@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have multiple sites that connect to our main office M370. All traffic is sent over the BOVPN. On the M370 I have Webblocker enabled and is working fine. But when anyone at the sites tries to use the passphrass to bypass the block it does not work. Its working fine at the main office. The sites all have a T55 with basic security.</p>
]]>
        </description>
    </item>
    <item>
        <title>Editing proxy action domain names</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4081/editing-proxy-action-domain-names</link>
        <pubDate>Mon, 25 Nov 2024 18:56:08 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>javipcn</dc:creator>
        <guid isPermaLink="false">4081@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi guys!<br />
I need to edit a Proxy Action rule in order to get an app running properly.<br />
Would it be possible to edit the current table outside Firebox, to make it easier to add new domain names?<br />
It would be nice to edit it over CLI or to load the updated table as csv file.<br />
Thanks in advance!</p>
]]>
        </description>
    </item>
    <item>
        <title>Let’s Encrypt IP Addresses Used for Validation</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4068/let-s-encrypt-ip-addresses-used-for-validation</link>
        <pubDate>Sun, 17 Nov 2024 01:26:51 +0000</pubDate>
        <category>Firebox - Proxies</category>
        <dc:creator>NetworkWise</dc:creator>
        <guid isPermaLink="false">4068@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have servers that use Let's Encrypt certs. I would like to create a proxy policy that will handle only challenge type requests as needed and forward all other HTTP requests to HTTPS.</p>

<p>Is this possible and if so what would the configuration look like?</p>
]]>
        </description>
    </item>
   </channel>
</rss>
