User's Manual
Table Of Contents
- WatchGuard® Firebox® X Edge User Guide
- Certifications and Notices
- Declaration of Conformity
- Notice to Users
- WatchGuard Firebox Software
- End-User License Agreement
- Copyright, Trademark, and Patent Information
- Limited Hardware Warranty
- Abbreviations Used in this Guide
- CHAPTER 1 Introduction to Network Security
- CHAPTER 2 Installing the Firebox® X Edge
- CHAPTER 3 Configuration and Management Basics
- CHAPTER 4 Changing Your Network Settings
- Using the Network Setup Wizard
- Configuring the External Network
- Configuring the Trusted Network
- Configuring the Optional Network
- Enabling the optional network
- Changing the IP address of the optional network
- Using DHCP on the optional network
- Setting optional network DHCP address reservations
- Configuring the optional network for DHCP relay
- Using static IP addresses for optional computers
- Adding computers to the optional network
- Requiring encrypted connections
- Making Static Routes
- Viewing Network Statistics
- Registering with the Dynamic DNS Service
- Enabling the WAN Failover Option
- Enabling External Modem Failover
- CHAPTER 5 Setting up the Firebox X Edge Wireless
- CHAPTER 6 Configuring Firewall Settings
- CHAPTER 7 Configuring Logging
- CHAPTER 8 Configuring WebBlocker
- CHAPTER 9 Configuring Virtual Private Networks
- CHAPTER 10 Configuring the MUVPN Client
- CHAPTER 11 Managing the Firebox® X Edge
- Viewing Current Sessions and Users
- About User Authentication
- Adding or Editing a User Account
- About Seat Licenses
- Selecting HTTP or HTTPS for Firebox Management
- Changing the HTTP Server Port
- Setting up VPN Manager Access
- Updating the Firmware
- Activating Upgrade Options
- Enabling the Model Upgrade Option
- Configuring Additional Options
- Viewing the Configuration File
- APPENDIX A Firebox®X Edge Hardware
- Index
Ports
User Guide 7
Although some services are essential, they can also be a security risk.
To send and receive data, you must “open a door” in your computer,
which makes your network vulnerable. One of the most common
ways networks are broken into is by intruders exploiting services.
Ports
On computers and other telecommunication devices, a port is a spe-
cific place for physically connecting another device, usually with a
socket and plug. A computer usually has one or more serial ports
and one parallel port. The serial port supports sequential, one bit-
at-a-time transmission to devices such as scanners, and the parallel
port supports multiple-bit-at-a-time transmission to devices such as
printers.
Computers also have ports that are not physical locations. These
ports are “logical connection places” for programs or applications on
a computer in a network. Some applications, such as HTTP, have
ports with preassigned numbers. These are known as “well-known
ports.” Other application processes are assigned port numbers
dynamically for each connection. When a service is initially started,
it is said to “bind” to its designated port number.
Every Internet service using TCP is identified by a unique port num-
ber. When a client initiates a connection to a server, it chooses to
connect to, say, port 25 on the remote machine. Port 25 is assigned
to the SMTP protocol which is the service of delivering electronic
mail.
Most services are assigned a port number in the range from 0 to
1024, but the valid port numbers range from 0 to 65535.