Fireware XTM v11.7.3 Update 1 Release Notes

Add to my manuals
28 Pages

advertisement

Fireware XTM v11.7.3 Update 1 Release Notes | Manualzz

Fireware XTM v11.7.3 Update 1 Release Notes

Supported Devices

Fireware XTM OS Build

WatchGuard System

Manager Build

Revision Date

Introduction

XTM 3, 5, 8, 800, 1500, and 2500 Series

XTM 25, XTM 26, XTM 1050, XTM 2050

XTMv, WatchGuard AP

421558

420506

10 June 2013

On 10 June, WatchGuard released Fireware XTM v11.7.3 Update 1 and WSM v11.7.3 Update

1, replacing the original v11.7.3 installation files. With Update 1, we're pleased to release the installation files for XTMv for Hyper-V, support for the updated Shrew Soft v2.2 Mobile VPN with IPSec client, as well as fixes for several bugs reported in the original v11.7.3 release. See the

Resolved Issues

section for information on issues resolved in Update 1.

WatchGuard is pleased to announce the release of Fireware XTM v11.7.3 and WatchGuard System Manager v11.7.3. With this release, we are pleased to release a large number of bug fixes and small enhancements. For more information about the bug fixes included in this release, see the

Resolved Issues

section. New or enhanced features for our WatchGuard XTM devices include: l l l l l l l

XTMv support for the Microsoft Hyper-V hypervisor

Ability to set the source IP address in Static NAT and server load balancing actions

Modem support for some 3G/4G modems on XTM 25, 26, and 33 devices

New WebBlocker security categories for Websense users o Compromised web sites o Newly registered web sites

Improvements to the Quarantine Server end user web UI

Ability to change the port used for connections to a syslog server

Enhancements to our hotspot feature o New option to disconnect hotspot user sessions when you use an external guest authentication o server

Auto-generated policies make hotspot configuration easier

Before You Begin

Also new to XTM v11.7.3 is a new feature that enables XTM devices to send certain information to

WatchGuard to give us feedback about how XTM devices are being used. This feature, called Device

Feedback, is enabled by default when you upgrade to XTM v11.7.3. The information an XTM device sends to

WatchGuard does not include information about your company, or company data. Device Feedback helps

WatchGuard enhance the stability and functionality of our hardware and software. For more information, see

WatchGuard Knowledge Base article 7247.

Finally, WatchGuard has worked with our spamBlocker partner, Mailshell, to further improve spam detection rates in this release. We've tested these improvements in a CSP (customer-specific patch) environment and several customers have reported satisfaction with the improvements. It is important for all spamBlocker customers to understand that the “Suspect” spam category may include legitimate emails. By default, mail that receives a spam score between 60 and 90 is marked as suspect. These scores indicate that there are some characteristics of the mail that are typical of spam. It is possible to change the detection thresholds using WSM v11.7.3. Some customers have preferred to set the suspect spam threshold to 80 to reduce the incidence of legitimate email that is detected as suspect. WatchGuard recommends that “Suspect” mail should be Allowed and tagged to indicate that it is possible spam.

For detailed information about the feature enhancements included in Fireware XTM v11.7.3, see the product documentation or review What's New in Fireware XTM v11.7.3

.

Updates for WatchGuard AP Devices

When you upgrade your XTM device to Fireware XTM v11.7.3, the XTM Gateway Wireless Controller is updated to add the following enhancements specific to WatchGuard AP devices: l l l l l l

MAC access control whitelist

AP device monitoring enhancements

Station isolation

No automatic AP device reboot after AP configuration change

Ability to see the AP device radio used by each wireless client

Option to set the diagnostic log level for the Gateway Wireless Controller

Before You Begin

Before you install this release, make sure that you have: l l l

A supported WatchGuard XTM device. This device can be a WatchGuard XTM 2 Series (models 25 and

26 only), 3 Series, 5 Series, 8 Series, 800 Series, XTM 1050, XTM 1500 Series, XTM 2050 device, XTM

2500 Series, or XTMv (any edition).

The required hardware and software components as shown below. If you use WatchGuard System

Manager (WSM), make sure your WSM version is equal to or higher than the version of Fireware XTM

OS installed on your XTM device and the version of WSM installed on your Management Server.

Feature key for your XTM device — If you upgrade your XTM device from an earlier version of Fireware

XTM OS, you can use your existing feature key. If you use XTMv, your feature key must be generated with the serial number you received when you purchased XTMv.

2 WatchGuard Technologies, Inc.

Before You Begin

Note that you can install and use WatchGuard System Manager v11.7.x and all WSM server components with devices running earlier versions of Fireware XTM v11. In this case, we recommend that you use the product documentation that matches your Fireware XTM OS version.

If you have a new XTM physical device, make sure you use the instructions in the XTM Quick Start Guide that shipped with your device. If this is a new XTMv installation, make sure you carefully review the XTMv Setup

Guide for important installation and setup instructions.

Product documentation for this product is available on the WatchGuard web site at www.watchguard.com/help/documentation .

Release Notes 3

Localization

Localization

This release includes localized management user interfaces (WSM application suite and Web UI) and product help, but the localization has not yet been updated for features new to Fireware XTM v11.7.x. Supported languages are: l l l l

Chinese (Simplified, PRC)

French (France)

Japanese

Spanish (Latin American)

In addition to these languages, we offer localized Web UI support for Korean and Traditional

Chinese. Only the Web UI itself has been localized. WSM, and all help files and user documentation, remain in English for these two languages.

Note that most data input must still be made using standard ASCII characters. You can use non-ASCII characters in some areas of the UI, including: l l l

Proxy deny message

Wireless hotspot title, terms and conditions, and message

WatchGuard Server Center users, groups, and role names

Any data returned from the device operating system (e.g. log data) is displayed in English only. Additionally, all items in the Web UI System Status menu and any software components provided by third-party companies remain in English.

Fireware XTM Web UI

The Web UI will launch in the language you have set in your web browser by default. The name of the currently selected language is shown at the top of each page. To change to a different language, click the language name that appears. A drop-down list of languages appears and you can select the language you want to use.

WatchGuard System Manager

When you install WSM, you can choose what language packs you want to install. The language displayed in

WSM will match the language you select in your Microsoft Windows environment. For example, if you use

Windows 7 and want to use WSM in Japanese, go to Control Panel > Regions and Languages and select

Japanese on the Keyboards and Languages tab as your Display Language.

WebCenter, Quarantine Web UI, and Wireless Hotspot

These web pages automatically display in whatever language preference you have set in your web browser.

4 WatchGuard Technologies, Inc.

Fireware XTM and WSM v11.7.3 Operating System Compatibility

Fireware XTM and WSM v11.7.3 Operating System

Compatibility

Revised May 2013

WSM/

FirewareXTMComponent

Microsoft

Windows

XPSP2

(32-bit)&

Vista(32

&64-bit)

Microsoft

Windows

7and8

(32-bit&

64-bit)

Microsoft

Windows

Server

2003SP2

(32-bit)

Microsoft

Windows

Server

2008&

2008R2

Microsoft

Windows

Server

2012(64bit)

Mac

OSX v10.5, v10.6,

& v10.7, v10.8

Mobile

Devices:

Android 4.x

& higher, iOS

WatchGuard System

Manager Application

Fireware XTM Web UI

Supported Browsers: IE 7, 8, 9,

Firefox 3.x & above

WebCenter Web UI

Supported browsers: Firefox 3.5 & above, IE8 & above, Safari 5.0

& above, Chrome 10 & above.

Javascript required.

WatchGuard Servers

Single Sign-On Agent

Software

(Includes Event Log

Monitor)

Single Sign-On Client

Software

Terminal Services Agent

Software*

Mobile VPN with IPSec

Client Software

Mobile VPN with SSL

Client Software

** **

Notes about Microsoft Windows support: l

For Microsoft Windows Server 2008, we support both 32-bit and 64-bit support. For Windows Server l

2008 R2, we support 64-bit only.

Windows 8 support does not include Windows RT.

Release Notes 5

Fireware XTM and WSM v11.7.3 Operating System Compatibility

Browser compatibility: l

Fireware XTM Web UI is supported on IE 7, 8, and 9, and Firefox 3.x and above.

l

WebCenter Web UI is supported on IE 8 and above, Firefox 3.5 and above, Safari 5.0 and above, and

Chrome 10 and above. Javascript is required.

* Terminal Services support with manual or Single Sign-On authentication operates in a Microsoft Terminal

Services or Citrix XenApp 4.5, 5.0, 6.0 and 6.5 environment.

** Native (Cisco) IPSec client is supported for Mac OS and iOS.

6 WatchGuard Technologies, Inc.

Fireware XTM and WSM v11.7.3 Operating System Compatibility

Authentication Support

This table gives you a quick view of the types of authentication servers supported by key features of Fireware

XTM. Using an authentication server gives you the ability to configure user and group-based firewall and VPN policies in your XTM device configuration. With each type of third-party authentication server supported, you can specify a backup server IP address for failover.

Fully supported by WatchGuard

Mobile VPN with IPSec/Shrew Soft

Mobile VPN with IPSec for iPhone/iPad iOS and Mac OS X

Mobile VPN with IPSec for Android devices

Not yet supported, but tested with success by WatchGuard customers

Active

Directory

1

LDAP

RADIUS

2

SecurID

2

Firebox

(Firebox-DB)

Local

Authentication

3 –

Mobile VPN with SSL for Windows

Mobile VPN with SSL for Mac

4 4

6 –

N/A

Mobile VPN with L2TP

Mobile VPN with PPTP

Built-in Authentication Web Page on Port

4100

Windows Single Sign-On Support (with or without client software)

Terminal Services Manual Authentication

– – – –

5 – – – – Terminal Services Authentication with Single

Sign-On

Citrix Manual Authentication

Citrix Manual Authentication with Single

Sign-On

5 – – – –

Release Notes 7

Fireware XTM and WSM v11.7.3 Operating System Compatibility

1.

Active Directory support includes both single domain and multi-domain support, unless otherwise noted.

2.

RADIUS and SecurID support includes support for both one-time passphrases and challenge/response authentication integrated with RADIUS. In many cases, SecurID can also be used with other RADIUS implementations, including Vasco.

3.

The Shrew Soft client does not support two-factor authentication.

4.

Fireware XTM supports RADIUS Filter ID 11 for group authentication.

5.

Both single and multiple domain Active Directory configurations are supported.For information about the supported Operating System compatibility for the WatchGuard TO Agent and SSO Agent, see the current

Fireware XTM and WSM Operating System Compatibility table.

6.

Active Directory authentication methods are supported only through a RADIUS server.

System Requirements

Minimum CPU

Minimum Memory

Minimum Available

Disk Space

Minimum

Recommended

Screen Resolution

If you have WatchGuard System

Manager client software only installed

Intel Pentium IV

1GHz

1 GB

250 MB

1024x768

If you install WatchGuard System

Manager and WatchGuard Server software

Intel Pentium IV

2GHz

2 GB

1 GB

1024x768

XTMv System Requirements

With support for installation in both a VMware and a Hyper-V environment, a WatchGuard XTMv virtual machine can run on a VMware ESXi 4.1 or 5.0 host, or on Windows Server 2008 R2, Windows Server 2012,

Hyper-V Server 2008 R2, or Hyper-V Server 2012.

The hardware requirements for XTMv are the same as for the hypervisor environment it runs in.

Each XTMv virtual machine requires 3 GB of disk space.

Recommended Resource Allocation Settings

Small Office Medium Office Large Office Datacenter

Virtual CPUs 1 2 4 8 or more

Memory 1 GB 2 GB

4 GB 4 GB or more

8 WatchGuard Technologies, Inc.

Downloading Software

Downloading Software

1. Log in to the WatchGuard Portal and select the Articles & Software tab.

2. From the Search section, clear the Articles and Known Issues check boxes and search for available

Software Downloads. Select the XTM device for which you want to download software.

There are several software files available for download. See the descriptions below so you know what software packages you will need for your upgrade.

WatchGuard System Manager

All users can now download the WatchGuard System Manager software. With this software package you can install WSM and the WatchGuard Server Center software:

WSM11_7_3_u1s.exe

— Use this file to upgrade WatchGuard System Manager from v11.x to WSM v11.7.3.

Release Notes 9

Downloading Software

Fireware XTM OS

Select the correct Fireware XTM OS image for your XTM device. Use the .exe file if you want to install or upgrade the OS using WSM. Use the .zip file if you want to install or upgrade the OS using the Fireware XTM

Web UI. Use the .ova file to deploy a new XTMv device.

If you have….

XTM 2500 Series

XTM 2050

XTM 1500 Series

XTM 1050

XTM 800 Series

XTM 8 Series

XTM 5 Series

XTM 330

XTM 33

XTM 2 Series

Models 25, 26

XTMv

All editions for VMware

Select from these Fireware XTM OS packages

XTM_OS_XTM800_1500_2500_11_7_3_u1.exe

xtm_xtm800_1500_2500_11_7_3_u1.zip

XTM_OS_XTM2050_11_7_3_u1.exe

xtm_xtm2050_11_7_3_u1.zip

XTM_OS_XTM800_1500_2500_11_7_3_u1.exe

xtm_xtm800_1500_2500_11_7_3_u1.zip

XTM_OS_XTM1050_11_7_3_u1.exe

xtm_xtm1050_11_7_3_u1.zip

XTM_OS_XTM800_1500_2500_11_7_3_u1.exe

xtm_xtm800_1500_2500_11_7_3_u1.zip

XTM_OS_XTM8_11_7_3_u1.exe

xtm_xtm8_11_7_3_u1.zip

XTM_OS_XTM5_11_7_3_u1.exe

xtm_xtm5_11_7_3_u1.zip

XTM_OS_XTM330_11_7_3_u1.exe

xtm_xtm330_11_7_3_u1.zip

XTM_OS_XTM33_11_7_3_u1.exe

xtm_xtm33_11_7_3_u1.zip

XTM_OS_XTM2A6_11_7_3_u1.exe

xtm_xtm2a6_11_7_3_u1.zip

xtmv_11_7_3_u1.ova

xtmv_11_7_3_u1.exe

xtmv_11_7_3_u1.zip

XTMv

All editions for Hyper-V xtmv_11_7_3_U1_vhd.zip

10 WatchGuard Technologies, Inc.

Upgrade from Fireware XTM v11.x to v11.7.x

Single Sign-On Software

There are two files available for download if you use Single Sign-On. These files have not been updated for this release.

l l

WG-Authentication-Gateway_11_7.exe

(SSO Agent software - required for Single Sign-On and includes optional Event Log Monitor for clientless SSO)

WG-Authentication-Client_11_7.ms

i (SSO Client software - optional)

For information about how to install and set up Single Sign-On, see the product documentation.

Terminal Services Authentication Software

l

TO_AGENT_SETUP_11_7_3.exe

(This installer includes both 32-bit and 64-bit file support and has been updated for the XTM v11.7.3 release.)

Mobile VPN with SSL Client for Windows and Mac

There are two files available for download if you use Mobile VPN with SSL. These files have been updated for this release.

l l

WG-MVPN-SSL_11_7_3.exe

(Client software for Windows)

WG-MVPN-SSL_11_7_3.dmg

(Client software for Mac)

Mobile VPN with IPSec client for Windows

With this release, we now support the Shrew Soft VPN client for Windows v2.2, which you can download from our web site. Shrew Soft has recently released a v2.2.1 client, available on their web site, which introduces a new "Pro" version available at an extra cost with additional features. WatchGuard recommends you use the nocost Standard version of the client as it includes all functionality supported in the v2.2 VPN client. If you want to use the v2.2.1 client, we recommend you read this Knowledge Base article first.

Upgrade from Fireware XTM v11.x to v11.7.x

Before you upgrade from Fireware XTM v11.x to Fireware XTM v11.7.x, download and save the Fireware XTM

OS file that matches the WatchGuard device you want to upgrade. You can use Policy Manager or the Web UI to complete the upgrade procedure. We strongly recommend that you back up your device configuration and your WatchGuard Management Server configuration before you upgrade. It is not possible to downgrade without these backup files.

If you use WatchGuard System Manager (WSM), make sure your WSM version is equal to or higher than the version of Fireware XTM OS installed on your XTM device and the version of WSM installed on your

Management Server.

Because this is an update to previously released v11.7.3 software:

- If you have installed Fireware XTM OS v11.7.3 on your management computer, you must run the Update 1 installer twice (once to remove v11.7.3 and once to install v11.7.3 Update 1).

- You must uninstall WSM v11.7.3 before you upgrade to v11.7.3 Update 1. Be sure to uninstall any v11.7.3 server software during the uninstall process, but make sure to keep all server data.

Release Notes 11

Upgrade from Fireware XTM v11.x to v11.7.x

Back up your WatchGuard Management Server Configuration

From the computer where you installed the Management Server:

1. From WatchGuard Server Center, select Backup/Restore Management Server.

The WatchGuard Server Center Backup/Restore Wizard starts .

2. Click Next.

The Select an action screen appears.

3. Select Back up settings.

4. Click Next.

The Specify a backup file screen appears.

5. Click Browse to select a location for the backup file. Make sure you save the configuration file to a location you can access later to restore the configuration.

6. Click Next.

The WatchGuard Server Center Backup/Restore Wizard is complete screen appears.

7. Click Finish to exit the wizard.

General Information for WatchGuard Server Software Upgrades

It is not usually necessary to uninstall your previous v11.x server or client software when you update to WSM v11.7.x. You can install the v11.7.x server and client software on top of your existing installation to upgrade your WatchGuard software components. If you upgrade from WSM v11.7.3 to v11.7.3 Update 1, you must uninstall v11.7.3 before you can install v11.7.3 Update 1. Make sure you keep your server data when you uninstall the server software.

If you use a Management Server, you must upgrade it from WSM v6.x or previous to WSM v11.7.x before you upgrade your XTM device.

Upgrade to Fireware XTM v11.7.x from Web UI

1. Go to System > Backup Image or use the USB Backup feature to back up your current configuration file.

2. On your management computer, launch the OS software file you downloaded from the WatchGuard

Software Downloads Center.

If you use the Windows-based installer, this installation extracts an upgrade file called [xtm series]_

[product code].sysa-dl l to the default location of C:\Program Files(x86)\Common files\WatchGuard\resources\FirewareXTM\11.7.3\[model] or [model][product_code].

3. Connect to your XTM device with the Web UI and select System > Upgrade OS.

4. Browse to the location of the [xtm series]_[product code].sysa-dl from Step 2 and click Upgrade.

Upgrade to Fireware XTM v11.7.x from WSM/Policy Manager v11.x

1. Select File > Backup or use the USB Backup feature to back up your current configuration file.

2. On your management computer, launch the OS executable file you downloaded from the WatchGuard

Portal. This installation extracts an upgrade file called [xtm series]_[product code].sysa-dl l to the default location of C:\Program Files(x86)\Common files\WatchGuard\resources\FirewareXTM\11.7.3\

[model] or [model][product_code].

3. Install and open WatchGuard System Manager v11.7.3. Connect to your XTM device and launch Policy

Manager.

4. From Policy Manager, select File > Upgrade. When prompted, browse to and select the [xtm series]_

[product code].sysa-dl file from Step 2.

12 WatchGuard Technologies, Inc.

Upgrade your FireCluster to Fireware XTM v11.7.x

Upgrade your FireCluster to Fireware XTM v11.7.x

There are two methods to upgrade Fireware XTM OS on your FireCluster. The method you use depends on the version of Fireware XTM you currently use.

Upgrade a FireCluster from Fireware XTM v11.4.x–v11.6.x to v11.7.x

Use these steps to upgrade a FireCluster from Fireware XTM v11.4.x, v11.5.x, or v11.6.x to Fireware

XTM v11.7.x:

1. Open the cluster configuration file in Policy Manager

2. Select File > Upgrade.

3. Type the configuration passphrase.

4. Type or select the location of the upgrade file.

5. To create a backup image, select Yes.

A list of the cluster members appears.

6. Select the check box for each device you want to upgrade.

A message appears when the upgrade for each device is complete.

When the upgrade is complete, each cluster member reboots and rejoins the cluster. If you upgrade both devices in the cluster at the same time, the devices are upgraded one at a time. This is to make sure there is not an interruption in network access at the time of the upgrade.

Policy Manager upgrades the backup member first and then waits for it to reboot and rejoin the cluster as a backup. Then Policy Manager upgrades the master. Note that the master’s role will not change until it reboots to complete the upgrade process. At that time the backup takes over as the master.

To perform the upgrade from a remote location, make sure the FireCluster interface for management IP address is configured on the external interface, and that the management IP addresses are public and routable. For more information, see About the Interface for Management IP Address .

Upgrade a FireCluster from Fireware XTM v11.3.x

To upgrade a FireCluster from Fireware XTM v11.3.x to Fireware XTM v11.7.x, you must perform a manual upgrade. For manual upgrade steps, see the Knowledge Base article Upgrade Fireware XTM OS for a

FireCluster .

Release Notes 13

Downgrade Instructions

Downgrade Instructions

Downgrade from WSM v11.7.x to WSM v11.x

If you want to revert from v11.7.x to an earlier version of WSM, you must uninstall WSM v11.7.x. When you uninstall, choose Yes when the uninstaller asks if you want to delete server configuration and data files. After the server configuration and data files are deleted, you must restore the data and server configuration files you backed up before you upgraded to WSM v11.7.x.

Next, install the same version of WSM that you used before you upgraded to WSM v11.7.x. The installer should detect your existing server configuration and try to restart your servers from the Finish dialog box. If you use a WatchGuard Management Server, use WatchGuard Server Center to restore the backup Management

Server configuration you created before you first upgraded to WSM v11.7.x. Verify that all WatchGuard servers are running.

Downgrade from Fireware XTM v11.7.x to Fireware XTM v11.x

If you use the Fireware XTM Web UI or CLI to downgrade from Fireware XTM v11.7.x.x to an earlier version, the downgrade process resets the network and security settings on your XTM device to their factory-default settings. The downgrade process does not change the device passphrases and does not remove the feature keys and certificates.

If you want to downgrade from Fireware XTM v11.7.x to an earlier version of Fireware XTM, the recommended method is to use a backup image that you created before the upgrade to Fireware XTM v11.7.x. With a backup image, you can either: l l

Restore the full backup image you created when you upgraded to Fireware XTM v11.7.x to complete the downgrade; or

Use the USB backup file you created before the upgrade as your auto-restore image, and then boot into recovery mode with the USB drive plugged in to your device. This is not an option for XTMv users.

See the WatchGuard System Manager Help or the Fireware XTM Web UI Help for more information about these downgrade procedures, and information about how to downgrade if you do not have a backup image.

Some downgrade restrictions apply:

- You cannot downgrade an XTM 2050 or an XTM 330 to a version of Fireware XTM OS lower than v11.5.1.

- You cannot downgrade an XTM 25, 26, or 33 device to a version of Fireware XTM OS lower than v11.5.2.

- You cannot downgrade an XTM 5 Series model 515, 525, 535 or 545 to a version of Fireware

XTM OS lower than v11.6.1.

- You cannot downgrade XTMv in a VMware environment to a version of Fireware XTM OS lower than v11.5.4.

- You cannot downgrade XTMv in a Hyper-V environment to a version of Fireware XTM OS lower than v11.7.3.

14 WatchGuard Technologies, Inc.

Resolved Issues

Resolved Issues

Issues Resolved in v11.7.3 Update 1

l l l l

This release resolves an issue that caused the Gateway AV scanning process to fail and restart.

[72788,

62451, 69866, 67509]

This release adds support for four new WebBlocker Websense Social Networking categories: [72973,

72985] o Social Web - Facebook o o

Social Web - LinkedIn

Social Web - Twitter o Social Web - YouTube

This release resolves the issue where the two new security categories first released in Fireware XTM v11.7.3 did not show up immediately after you updated to v11.7.3.

This release resolves an issue that prevented the XTM 800,1500, and 2500 Series devices from correctly using the IPSec encryption chipset under certain conditions.

[72870]

Issues Resolved in v11.7.3

General

l l l l l

An issue has been resolved that caused this error message when NTP is enabled: "Could not open input file, /etc/wg/alarm-action.xml." [70768]

An issue has been resolved that caused Web Services for WatchGuard System Manager to fail to start.

[71554]

XTM 8 Series devices now correctly record high voltage numbers.

[70376]

A memory leak has been resolved that occurred when IPS or Application Control status was continuously monitored.

[72028]

WatchGuard System Manager no longer becomes unstable if you try to change the password of a local user with the File > Manage Users dialog box.

[71945]

Proxies and Subscription Services

l l l l l l l l l

This release improves the spam detection rate of spamBlocker. See the Introduction section in these

Release Notes for more information.

When you enable Application Control, IPS is no longer enabled automatically.

[71491]

The HTTPS proxy now correctly handles Multiple-Domain Certificates.

[70903]

Certificates no longer fail when an HTTPS proxy server includes an intermediate CA certificate.

[70775]

This release resolves an issue that caused web pages to time out when WebBlocker was enabled.

[72065]

This release resolves several issues that caused process crashes or web browsing failure when

WebBlocker with Websense was enabled.

[71100, 72495]

You can now save changes to WebBlocker categories from the French and Spanish language versions of WatchGuard System Manager.

[71881, 71975]

This release resolves an issue that caused the XTM device to reboot unexpectedly.

[64465]

The Quarantine Server no longer shows a 500 Internal Server error when a spam email is forwarded.

[70846]

Release Notes 15

Resolved Issues l

There is a new Delete All button in the Quarantine Server Web UI. Also, the button "Not Spam" has been renamed to "Send to Mailbox." [72050]

Logging and Reporting

l l l l l

Application ID and Category values now appear correctly when you view log messages in Log Manager.

[72152]

This release resolves an issue that caused reports generated by time range to stall.

[70957]

The Top Users by Application and Top Users Blocked reports now correctly show user login names.

[71250]

Special characters in the Log Server and Report Server encryption key no longer causes server setup to fail.

[71687]

You can now change the syslog server port.

[43346]

Centralized Management and the Management Server

l l l l

A static route to a single host is now added automatically to VPN resources when you create a VPN tunnel in the Management Server.

[71242]

When you create a second tunnel between two gateway devices in the Management Server, the first tunnel is no longer disabled.

[72261]

When you use the Reset Server Configuration option on one managed device through the

Management Server, the status of other devices is no longer changed to Pending.

[71389]

The stability of the Management Server has been improved when Health Monitoring is enabled.

[70951]

WatchGuard AP

l l

Connected wireless users that have certain special characters in their user names (" ' $ \) now show correctly as connected users in Firebox System Manager or Web UI System Status > Gateway

Wireless Controller.

[71892]

The Gateway Wireless Controller no longer generates the false error message "command fail to kick off

the user".

[71821]

Networking

l

You can now connect some 3G/4G modems directly to an XTM 25, 26, or 33 device USB port.

[68084,

72067]

Supported 3G/4G modems: l l l l l l l l l

ZTE MF683 (T-Mobile Rocket 3.0 4G)

Franklin U602 (Sprint 3G/4G Plug-in-Connect USB)

Sierra Wireless AirCard 250U (Sprint 3G/4G USB 250U)

An issue has been resolved which caused some XTM devices to crash when IPS or Application Control was configured.

[67217]

This release resolves several issues that could cause a network interface to hang or a network connectivity outage.

[69493, 65892]

You can now set the source IP address for traffic in a policy configured to use Static NAT.

[71880]

You can now specify a default gateway in the configuration settings for a new external VLAN.

[72130]

WG-Wireless-Access-Point2 interface status now displays correctly in the Status Report.

[71077]

Policy Manager can save wireless hotspot configuration to 11.6.3 correctly now, without an error that suggests upgrade.

[72587]

16 WatchGuard Technologies, Inc.

Known Issues and Limitations l l l l

Stability of some wireless connections to XTM 2 devices has been improved.

[67767]

Network service on fully managed XTM devices configured with a PPPoE internet connection no longer crashes after you upgrade from Fireware XTM v11.6.5 or earlier.

[71131]

When you use the Web UI to configure an interface to use a DHCP server, the DHCP lease time is now set to 8 hours by default.

[57146]

An apostrophe in a DHCP reservation name no longer causes the DHCP reservation to fail.

[65529]

FireCluster

l l l

The passive member of an Active/Passive FireCluster no longer responds to ARP requests.

[71802]

The backup master in a FireCluster no longer reboots continually after a FireCluster upgrade to XTM v11.7.x from XTM v11.5.x.

[72157

An issue has been resolved that could cause a member of an Active/Passive FireCluster to fail every two hours when spamBlocker is enabled.

[72186]

Authentication

l l l l l

You can now set timeout values for hotspot user sessions that connect to an external directory service.

[71798]

This release resolves an issue that caused Authentication Redirect to "loop". Users are no longer required to authenticate repeatedly.

[68971]

An issue has been resolved that caused Terminal Server Authentication and policies to fail when the TO

Exception List contains a host range.

[71965]

This release resolves an issue with the TO Agent for Citrix Server, which would sometimes prevent user network access.

[71619]

This release improves the SSL VPN authentication page error handling to prevent cross-site scripting attacks.

[72048]

VPN

l l l l l

The Mobile VPN with SSL client for Mac now removes DNS entries after every disconnect.

[72085]

When a Mobile VPN client connection times out and is forced to reconnect, the old authentication entry is now removed.

[72078]

This release resolves an issue that caused Mobile VPN with SSL connections to fail.

[71708]

We have confirmed methods to create a Mobile VPN with SSL profile for VPN connections from the

OpenVPN Connect client on Android and iOS platforms to an XTM device that uses Fireware XTM v11.7.3 or higher. See WatchGuard Knowledge Base article 7252 for complete instructions.

[43913,

60686]

When the name of a Branch Office VPN tunnel exceeds 28 characters in length, the BOVPN tunnel is now built correctly.

[71448]

Known Issues and Limitations

These are known issues for Fireware XTM v11.7.3 and all management applications. Where available, we include a way to work around the issue.

General

l

If you rename a policy tag from the policy settings configuration, the tag is removed instead of renamed.

[70481]

Release Notes 17

Known Issues and Limitations

Workaround

You can rename a tag without this issue if you:

1. Right-click the policy table and select Policy Tags > Manage > Rename; or

2. Use View > Policy Tags > Manage > Rename.

l l l l l l l l

The "Sysb" version displayed in the Firebox System Manager Status Report will show blank for XTM 2

,5, 8, and 1050 devices that were manufactured prior to the XTM v11.5.1 release.

When the level of free memory on your XTM device is lower than 20M, saving your XTM device configuration to the device can cause network disruption.

[64474]

To power off an XTM 5 Series device, you must press and hold the rear power switch for 4–5 seconds.

[42459]

For XTM 5 Series devices, Interface 0 does not support Auto-MDIX and does not automatically sense cable polarity.

When you use the Policy Manager > File > Backup or Restore features, the process can take a long time but does complete successfully.

[35450]

Fireware XTM does not support BGP connections through an IPSec VPN tunnel to Amazon Web

Services. VPN tunnels that do not use BGP are supported.

[41534]

The XTM Configuration Report does not contain all settings. Settings not included are: o o o o

Secondary interface IP address [66990]

Configured QoS settings [66992]

Static MAC bindings [66993]

IPv6 configuration [66994]

The ETH1 interface on the XTM 830F is a fiber-optic port, so you cannot use the WSM Quick Setup

Wizard from a computer with an Ethernet interface. Use a computer with a Fiber NIC, or connect using a switch with both Fiber and Ethernet interfaces.

[59742]

WatchGuard AP and Gateway Wireless Controller

l l l l l l l l l l

In an active/passive FireCluster, the WatchGuard AP reboots each time there is a change in the cluster master.

[71859]

If you use an SSID name of "any", you are not able to get a correct list of connected users in Firebox

System Manager or Web UI System Status > Gateway Wireless Controller.

[71614]

If you use an SSID name of "any", "on", or "off", the AP device does not broadcast the SSID.

[72965]

You cannot use the back tick character ' in the SSID name.

[71904]

If you try to set the password for the WatchGuard AP device with the AP device web ui, you cannot use any non-alphanumeric characters in the password.

[71718]

It is not possible to change the diagnostic logging level for the Gateway Wireless Controller.

[71836]

The Gateway Wireless Controller does not support individual RADIUS shared secrets per AP device in this release. All AP devices must use the same RADIUS shared secret in this release.

[71723]

Managed device templates on a WatchGuard Management Server do not support configuration of the

Gateway Wireless Controller in this release.

You cannot pair a WatchGuard AP device to more than one Gateway Wireless Controller/XTM device. If you do, the AP device will fail.

[71920]

Occasionally, the Site Survey operation fails to complete until the AP device is first rebooted.

[71944]

XTMv

l

XTMv does not automatically change the self-signed certificate when its serial number changes.

[66668]

18 WatchGuard Technologies, Inc.

Known Issues and Limitations

Workaround

A new self-signed certificate with the correct serial number is generated if you manually delete the certificate from Firebox System Manager > View > Certificates and then reboot the XTMv device.

l

If you import the OVA file in VMware Player (which is not officially supported in this release), you must use the "Enter" key on your keyboard to accept the XTMv End User License Agreement (EULA). The

OK and Cancel buttons at the conclusion of the EULA do not appear in VMware Player.

WatchGuard System Manager

l l l

If you use Firebox System Manager to ping across a VPN tunnel, you get a message that reads “No

Buffer Space Available.” This is not a memory problem. You see this message if the VPN tunnel is not established. Make sure the VPN tunnel is up and try again.

[59399]

WatchGuard System Manager does not display the correct IP address for the default gateway of an

XTM device that has no External interface.

[56385]

If you install WatchGuard System Manager on a Windows 7 computer and enable XP Compatibility mode during the installation process, any WSM server component you install will not operate correctly.

[56355]

Workaround

Do not enable compatibility mode during the WatchGuard System Manager install. If it has already been installed, locate the file C:\Program Files\WatchGuard\wsm11\UninsHs.exe. Right-click on that file, click the Compatibility tab, and clear the option for compatibility mode.

l

If you restore a backup image to a managed client device managed by a Management Server, it is possible that the shared secret becomes out of sync.

Workaround

Connect to the Management Server from WSM. Select the managed device and select Update

Device. Select the radio button Reset server configuration (IP address/ Hostname, shared

secret).

l

When you run the WSM v11.3.x or higher installer (either the WSM client component only or any selected WSM server components) on Microsoft SBS (Small Business Server) 2008 and 2011 on a computer installed with a 64-bit operating system, you see a Microsoft Windows error " IssProc.x64 has stopped working ". When you close the error dialog box, the installation completes.

[57133]

Web UI

l

The Fireware XTM Web UI does not support the configuration of some features. These features include: o o

FireCluster

Certificate export o o o

You cannot turn on or off notification of BOVPN events

You cannot add or remove static ARP entries to the device ARP table

You cannot get the encrypted Mobile VPN with IPSec end-user configuration profile, known as the

.wgx file. The Web UI generates only a plain-text version of the end-user configuration profile, with file extension .ini.

Release Notes 19

Known Issues and Limitations l l l o You cannot edit the name of a policy, use a custom address in a policy, or use Host Name (DNS lookup) to add an IP address to a policy.

You cannot change the order of policies with drag-and-drop from the Fireware XTM Web UI. You must use the Move Up and Move Down buttons.

[70587]

If you configure a policy in the Web UI with a status of Disabled, then open Policy Manager and make a change to the same policy, the action assigned to the policy when it denies packets is changed to Send

TCP RST.

[34118]

You cannot create read-only Mobile VPN with IPSec configuration files with the Web UI.

[39176]

Command Line Interface (CLI)

l l l

The CLI does not support the configuration of some features: o You cannot add or edit a proxy action.

o You cannot get the encrypted Mobile VPN with IPSec end-user configuration profile, known as the

.wgx file. The CLI generates only a plain-text version of the end-user configuration profile, with file extension .ini.

The CLI performs minimal input validation for many commands.

For the XTM 2050, the output of the CLI command “show interface” does not clearly indicate the interface number you use in the CLI to configure an interface. The “show interface” CLI command shows the interface number as the interface label on the front of the device (A0, A2 … A7; B0, B1 … B7; C0,

C1) followed by a dash, and then the consecutive interface number (0 – 17), for all interfaces.

[64147]

Workaround

Use the consecutive interface number that appears after the dash as the interface number to configure the interface. For the B1-9 interfaces, the interface number in the CLI command should be in the range 8-15. For the C0-1 interfaces, the interface number in the CLI command should be

16-17.

Proxies

l l l l

No log message displays in Firebox System Manager Traffic Monitor when the SMTP proxy processes an email with UTF-8 encoding in the message body.

[70927]

Google Maps and Gmail may fail to load if you use the HTTPS proxy with deep packet inspection enabled.

[68267]

The Policy Manager and Web UI do not provide any warning that the WebBlocker Override may not work for HTTPS.

[67208]

HTTPS DPI (Deep Packet Inspection) does not work for users who use IE 9.0 with TLS 1.1 and 1.2

enabled, but TLS 1.0 and SSL 3.0 not enabled.

[65707]

Workaround

Use a different browser, or enable TLS 1.0 and SSL 3.0 in your IE 9.0 configuration.

l l l

The XTM device can store only one HTTPS Proxy Server certificate and can protect only one HTTPS web site at a time.

[41131]

The ability to use an HTTP caching proxy server is not available in conjunction with the TCP-UDP

Proxy.

[44260]

When you try to stream YouTube videos from an Apple device running iOS, you may see this error message: "The server is not correctly configured."

20 WatchGuard Technologies, Inc.

Known Issues and Limitations

Workaround

1. Edit your HTTP proxy policy.

2. Click View/Edit proxy.

3. Select the Allow range requests through unmodified check box.

4. Save this change to your XTM device.

l

The SIP-ALG does not send the Contact header correctly when the Contact header contains a domain name. It only sends an empty string of: Contact: < >. If the Contact header contains an IP address, the

SIP-ALG sends the Contact header correctly: Contact: <sip:10.1.1.2:5060>.

[59622]

Workaround

Configure the PBX to send the Contact header with an IP address, not a domain name.

Security Subscriptions

l

When you launch Policy Manager from French-language WatchGuard System Manager, changes made to allow or deny SurfControl categories are lost when the configuration file is saved. This does not occur if you use WebBlocker with Websense.

[71881]

Workaround

Use Fireware XTM Web UI, or WatchGuard System Manager in English, to change the

WebBlocker configuration if you use WebBlocker with SurfControl.

l l l l l

If you change the DNS configuration on your XTM device, you must restart the XTM device or re-save your configuration to your XTM device for spamBlocker to work correctly.

[71532]

The Trusted Email Forwarders feature does not work wihen you use spamBlocker with Mailshell.

[71489]

Some IPS signature information, such as the CVE number, is not available in Firebox System Manager.

We provide search capabilities and CVE information for IPS signatures on a web security portal for IPS on the WatchGuard web site, which you can access at http://www.watchguard.com/SecurityPortal/ThreatDB.aspx

Skype detection blocks only new Skype sessions. If a user is already logged in to Skype and a Skype session is already started when Application Control is enabled, Application Control may not detect the activity.

You cannot use a WebBlocker Server through a branch office VPN tunnel.

[56319]

Networking

l l

A user-defined alias cannot have the same name an XTM device interface.

[73198]

XTM devices can send and respond to IPv6 ping requests, however, the -6 flag is not supported by

Firebox System Manager > Diagnostic Tasks.

[71631]

Workaround

Connect to the XTM device with the CLI to use IPv6 ping.

l

When you configure a 1-to-1 NAT rule, you cannot use an IP address that is already configured as a secondary network IP address. If you try to do this, incoming policies that handle IPSec traffic will not correctly pass the IPSec traffic.

[66806]

Release Notes 21

Known Issues and Limitations l l l l l l l

Although you can configure the XTM device to override the MAC address for an interface from the UI, this option does not work for XTM devices configured in Bridge or Drop-in mode.

[70721]

When you add or remove an Link Aggregation member, traffic through the LA interface stops for 20-34 seconds.

[69568]

To change an interface used in a branch office VPN configuration from a physical interface to a link aggregation interface, you must first remove the physical interface from the branch office VPN configuration, then configure the link aggregation interface, and then edit the branch office VPN configuration again to use the link aggregation interface. [ 70133]

Policy Checker does not work when your XTM device is configured in Bridge mode.

[66855]

You cannot configure traffic management actions or use QoS marking on VLANs.

[56971, 42093]

You cannot bridge a wireless interface to a VLAN interface.

[41977]

The Web Setup Wizard can fail if your computer is directly connected to an XTM 2 Series device as a

DHCP client when you start the Web Setup Wizard. This can occur because the computer cannot get an IP address quickly enough after the device reboots during the wizard.

[42550]

Workaround

1. If your computer is directly connected to the XTM 2 Series device during the Web Setup

Wizard, use a static IP address on your computer.

2. Use a switch or hub between your computer and the XTM 2 Series device when you run the

Web Setup Wizard.

l l l

Any network interfaces that are part of a bridge configuration disconnect and re-connect automatically when you save a configuration from a computer on the bridge network that includes configuration changes to a network interface.

[39474]

When you configure your XTM device with a Mixed Routing Mode configuration, any bridged interfaces show their interface and default gateway IP address as 0.0.0.0 in the Web UI.

[39389]

The dynamic routing of RIPv1 does not work.

[40880]

Multi-WAN

l l

If you select the gradual failback as the multi-WAN failback for active connection settings, failback continues to occur immediately.

[63932]

The multi-WAN sticky connection does not work if your device is configured to use the multi-WAN

Routing Table mode.

[62950]

XTM Wireless

l

When you open a configuration in which the Hotspot feature is enabled for a wireless interface, the configuration could become corrupt. When this occurs, you cannot save the configuration to an XTM device running v11.7.2 or higher.

[72831]

Workaround

Go to Setup > Authentication > Hotspot and select the wireless interface. Save the configuration to the XTM device.

l

The XTM device may redirect the client browser to the authentication page of the external web server again instead of to the page that they originally requested even though they have successfully authenticated.

[64760]

22 WatchGuard Technologies, Inc.

Known Issues and Limitations l

When you configure the wireless guest network on your XTM device, or bridge a wireless interface to any trusted or optional network, these networks cannot be used in a policy in a Management Server template.

[62455]

Workaround

In your template, create an alias that has the same name as the wireless alias created when you enabled your wireless interface.

Authentication

l

Citrix 4.5/5.0 servers installed in VMware do not work with Terminal Server Single Sign-On.

[66156]

Workaround

This feature works with Citrix 6.0 and 6.5 servers installed in VMware.

l l l l l l

Clientless SSO is not supported on a TLS-Enabled Active Directory environment.

If you use Terminal Services authentication, no authentication verification is done against traffic of any protocol that is not TCP or UDP. This includes DNS, NetBIOS, and ICMP traffic.

Terminal Services authentication is not supported in an active/active FireCluster environment.

[70099]

It is not possible to use the Automatically redirect users to the authentication page authentication option together with Terminal Services authentication.

To enable your XTM device to correctly process system-related traffic from your Terminal or Citrix server, the Terminal Services Agent uses a special user account named Backend-Service. Because of this, you may need to add policies to allow traffic from this user account through your XTM device. You can learn more about how Backend-Service operates in the product help system.

For the Authentication Redirect feature to operate correctly, HTTP or HTTPS traffic cannot be allowed through an outgoing policy based on IP addresses or aliases that contain IP addresses. The

Authentication Redirect feature operates only when policies for port 80 and 443 are configured for user or user group authentication.

[37241]

Centralized Management

l l l l

Each time you make a change to the hotspot configuration of a fully managed device, you see an unnecessary warning that you can safely ignore.

[71938]

Link aggregation interfaces are not correctly added as VPN resources for managed VPN tunnels when you add an XTM device configured to use Link aggregation to your Management Server.

[70672]

There is no option to set up a Traffic Management action in an XTM v11.x Device Configuration

Template.

[55732]

If you used Centralized Management with devices subscribed to templates in earlier versions of WSM, when you upgrade from WSM 11.x to v11.4 or higher, these templates are updated and the devices are no longer subscribed. Each device retains its template configuration. Existing templates are updated to use “T_” in their object names (to match the object names in the devices that used to subscribe to them).

After you upgrade, you’ll see the template upgrade that occurs during upgrade in your revision history.

FireCluster

l

If you use the Firebox System Manager Tools > Cluster > Leave command to make a device leave a

FireCluster, and then start the device in safe mode, the device cannot be discovered by the cluster master as a cluster member.

[72165]

Release Notes 23

Known Issues and Limitations

Workaround

Use the FireCluster management IP address to connect directly to the device and use the Firebox

System Manager Tools > Cluster > Join command to rejoin the device to the cluster.

l l

You are not warned if you try to create a FireCluster with two wireless devices and you have not yet enabled the DHCP server on the bridge interface.

[69483]

You cannot use the secondary IP address of an XTM device interface to manage a FireCluster configured in active/active mode.

[64184]

Workaround

Use the primary IP address of an XTM device for all management connections to an active/active

FireCluster.

l

If the Log Server cannot be reached from the management IP addresses, only the current FireCluster master will be able to connect. This can occur if the Log Server is connected through an External network, but the management IP addresses are on a Trusted or Optional network.

[64482] l l

If a monitored link fails on both FireCluster members, the non-master member is switched into passive mode and consequently does not process any traffic. A multi-WAN failover caused by a failed connection to a link monitor host does not trigger FireCluster failover. FireCluster failover occurs only when the physical interface is down or does not respond. 

Each XTM device has a set of default IP addresses assigned to the device interfaces in a range starting with 10.0.0.1. The highest default IP address depends on the number of interfaces. If you set the IP address of the Primary or Backup cluster interface to one of the default IP addresses, both devices restart, and the backup master becomes inactive.

[57663]

Workaround

Do not use any of the default IP addresses as the Primary or Backup cluster interface IP address.

l l l l l l

When you have an active/active FireCluster and use the WebBlocker Override feature, you may be prompted to enter your override password twice.

[39263]

Every network interface enabled in a FireCluster is automatically monitored by FireCluster. You must make sure that all enabled interfaces are physically connected to a network device.

If you use the Mobile VPN with IPSec client from the same network as the external network address configured on your FireCluster, some traffic may not go through the VPN tunnel.

[38672]

Mobile VPN with PPTP users do not appear in Firebox System Manager when you are connected to a passive FireCluster member. PPTP is only connected to the active Firebox when using an active/passive FireCluster.

[36467]

It is not possible to use a VLAN interface IP address for a FireCluster management IP address.

[45159]

To perform a manual upgrade of a FireCluster from v11.3.x to a later version of Fireware XTM OS, the management computer must be on the same network as the FireCluster management IP addresses.

[63278]

Logging and Reporting

l

When you change the log level for your WatchGuard Log Server and click Apply, the change does not take effect.

[60088]

24 WatchGuard Technologies, Inc.

Known Issues and Limitations

Workaround

1. In WatchGuard Server Center, on the Log Server Logging tab, change the log level for log messages from the Log Server and click Apply.

2. In the Servers tree, right-click Log Server and select Stop Server. In the confirmation message, select Yes.

3. Right-click Log Server again and select Start Server.

l l l l

The Denied Packets Summary report is not yet available in Report Manager.

[63192]

The PDF output of the Web Activity Trend report does not include time labels on the x-axis when viewed in Report Manager. Date and time information is included in the table below the report.

[64162]

When you upgrade from Fireware XTM v11.4.x, reports generated near the time of the upgrade may not show up in Report Manager.

[64325]

If a daily report schedule name includes a colon or certain other characters (for example: "1:35"), the system returns an error.

[63427]

Workaround

Make sure that your report schedule names use only characters that are valid in Windows file names. You can find valid characters in articles such as http://msdn.microsoft.com/enus/library/windows/desktop/aa365247%28v=vs.85%29.aspx

.

l l

There are two sorting issues in Report Manager. When you sort by Destination, the field sorts by

IP address and not the destination host name (if available). When you sort by Disposition, some items in the "deny" state do not sort accurately within groups.

[62879]

Any configured daily or weekly “Archived Reports” you have in your v11.3 configuration are automatically converted to scheduled reports after you upgrade to WSM v11.4 or higher.

Mobile VPN

l l

You can configure LDAP, Active Directory, and SecurID authentication methods for Mobile VPN with

L2TP from the Web UI, but these authentication methods are not supported for L2TP.

[70818]

If a BOVPN is configured to use Main Mode for Phase 1, and has a dynamic remote gateway IP address, Mobile VPN with L2TP may not work correctly. Policy Manager prevents this configuration, but

Web UI and CLI do not. WebUI and CLI also do not display an error message when you try to configure

L2TP if a BOVPN is already configured in that way.

[70588]

Workaround

Use Aggressive Mode for any BOVPN with a dynamic gateway IP address.

l l l l l

You cannot use an encryption password of "password" in the WatchGuard Mobile VPN app for iOS.

[70510]

Mobile VPN with L2TP clients cannot connect using x509 certification as their authentication method.

[70642]

You must restart your XTM device after you change the DNS server settings configured on the XTM device before Mobile VPN with L2TP clients can use the new DNS server settings.

[70571]

Mobile VPN with SSL does not work when bridged to a wireless interface.

[70267]

You cannot make an L2TP connection with an IPSec pre-shared key when the L2TP tunnel passes through a device configured for static NAT.

[69350]

Release Notes 25

Known Issues and Limitations l l l l l l l l l l l l l

The L2TP configuration does not sync correctly from a master XTM device to a backup XTM device in an active/passive FireCluster.

[69776]

If you use the Mobile VPN app for iOS, your web browser opens after you install the profile. You can close the web browser to continue.

Occasional issues have been reported with the Mobile VPN app for Android on Samsung Galaxy

II phones over 3G connections.

You cannot generate a Mobile VPN with IPSec configuration file when the group name contains the characters the asterisk or period characters(*, .).

[66815]

When you use the built in IPSec client from an iPhone or iPad, the client connection will disconnect when the connection duration reaches 1 hour and 45 minutes. This is caused by a limitation in the Cisco client used by iPhone/iPad. You must reconnect the IPSec client to reestablish the VPN tunnel.

[63147]

Mobile VPN with PPTP connections from Android mobile devices do not work consistently on 3G mobile networks.

[63451]

Connections from the Mobile VPN with IPSec client can route through the wrong external interface when the XTM device is configured for multi-WAN in round-robin mode.

[64386]

You cannot configure Mobile VPN with SSL to bridge network traffic to a bridged interface.

[61844]

Mobile VPN with SSL users cannot connect to some network resources through a branch office VPN tunnel that terminates on an active/active FireCluster.

[61549]

You cannot ping the IP address of the XTM device interface to which a Shrew Soft VPN client established a VPN tunnel. You can ping computers on that network, but not the interface IP address itself.

[60988]

Shrew Soft VPN client connections can drop if there are multiple clients connected to an XTM device at the same time issuing Phase 2 rekeys.

[60261 ]

Phase 1 rekeys initiated by the Shrew Soft VPN client cause the client to be disconnected, if connected more than 24 hours. In this case, we recommend that you set the rekey on your XTM device to 23 hours

-- one hour shorter than the rekey hard-coded in the Shrew Soft client configuration. This forces the XTM device to initiate the rekey, and gives the client a notification that the tunnel must be re-established.

[60260, 60259]

The Mobile VPN for SSL Mac client may not be able to connect to an XTM device when the authentication algorithm is set to SHA 256.

[35724]

Branch Office VPN

l l l l

To change an interface used in a branch office VPN configuration from a physical interface to a link aggregation interface, you must first remove the physical interface from the branch office VPN configuration, then configure the link aggregation interface, and then edit the branch office VPN configuration again to use the link aggregation interface. [ 70133]

Manual branch office VPN fails when the pre-shared key exceeds 50 characters.

[65215]

Do not use the same name for both a VPN Gateway and a VPN Tunnel.

[66412]

When you configure your XTM device in multi-WAN mode, you must select which interfaces to include in your multi-WAN configuration. If there are any interfaces that you choose not to include in your multi-

WAN configuration (i.e. you clear the check box for that interface), the system does not create a route for that network. This can cause a problem if you have a branch office VPN configured to include that same interface. In this case, the VPN tunnel can fail to negotiate with its remote peer.

[57153]

26 WatchGuard Technologies, Inc.

Using the CLI

Workaround

If you use multi-WAN and have problems with your branch office VPN tunnels failing to negotiate with their remote peers, you must open your multi-WAN configuration and select Configure adjacent to your chosen multi-WAN configuration mode. Make sure that the appropriate interfaces are included in your multi-WAN configuration.

l l l

A branch office VPN tunnel does not pass traffic if an inbound static NAT policy that includes IP 50 and

IP 51 protocols exists for the external IP address of the XTM device. [ 41822]

Managed branch office VPN tunnels cannot be established if the CRL distribution point (for example, the

WatchGuard Management Server or a third-party CRL distribution site you use) is offline.

[55946]

The use of Any in a BOVPN tunnel route is changed in Fireware XTM. If a branch office VPN tunnel uses Any for the Local part of a tunnel route, Fireware XTM interprets this to mean network 0.0.0.0 and subnet mask 0.0.0.0 (in slash notation, 0.0.0.0/0). If the remote IPSec peer does not send 0.0.0.0/0 as its Phase 2 ID, Phase 2 negotiations fail.

[40098]

Workaround

Do not use Any for the Local or the Remote part of the tunnel route. Change the Local part of your tunnel route. Type the IP addresses of computers behind the XTM device that actually participate in the tunnel routing. Contact the administrator of the remote IPSec peer to determine what that device uses for the Remote part of its tunnel route (or the Remote part of its Phase 2 ID).

l

If you have a large number of branch office VPN tunnels in your configuration, the tunnels may take a long time to appear in Policy Manager.

[35919]

Workaround

From Policy Manager, select View > Policy Highlighting. Clear the Highlight Firewall

policies based on traffic type check box.

Using the CLI

The Fireware XTM CLI (Command Line Interface) is fully supported for v11.x releases. For information on how to start and use the CLI, see the CLI Command Reference Guide. You can download the latest CLI guide from the documentation web site at http://www.watchguard.com/help/documentation/xtm.asp

.

Technical Assistance

For technical assistance, contact WatchGuard Technical Support by telephone or log in to the WatchGuard

Portal on the Web at http://www.watchguard.com/support . When you contact Technical Support, you must supply your registered Product Serial Number or Partner ID.

Phone Number

U.S. End Users

International End Users

877.232.3531

+1 206.613.0456

Authorized WatchGuard Resellers 206.521.8375

Release Notes 27

Technical Assistance

Release Notes 28

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Download PDF

advertisement