fireware v12.2 release notes - watchguard · 2018-10-02 ·...

28
Fireware v12.2 Release Notes Supported Devices Firebox T10, T15, T30, T35, T50, T55, T70, M200, M270, M300, M370, M400, M440, M470, M500, M570, M670, M4600, M5600 FireboxV, Firebox Cloud, WatchGuard AP Release Date: 30 July 2018 Release Notes Revision 1 October 2018 Fireware OS Build 568630 WatchGuard System Manager Build 568608 WatchGuard AP Device Firmware For AP100, AP102, AP200: Build 1.2.9.16 For AP300: Build 2.0.0.11 For AP120, AP320, AP322, AP325, AP420: Build 8.5.0-658

Upload: others

Post on 18-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Fireware v122 Release Notes

Supported Devices Firebox T10 T15 T30 T35 T50 T55 T70 M200M270 M300 M370 M400 M440 M470 M500M570 M670 M4600 M5600FireboxV Firebox Cloud WatchGuard AP

Release Date 30 July 2018

Release Notes Revision 1October 2018

Fireware OS Build 568630

WatchGuard SystemManager Build 568608

WatchGuard AP Device Firmware For AP100 AP102 AP200 Build 12916For AP300 Build 20011For AP120 AP320 AP322 AP325 AP420 Build850-658

Introduction

On 28 August we releasedWebBlocker Server v10 See Fireware Help orWhats New inFireware v122 for more information

On 3 August we released the FirewareM400M500 Fireware v122 exe file to fix a packagingissue The build number remains the same but package update generated a new SHA-1checksum for the file The Software Download Center has been updated with the newchecksum

Fireware v122 is a significant feature release for Firebox T Series Firebox M Series FireboxV and FireboxCloud appliances This release introduces the new IntelligentAV service as well as many new features andenhancements that make it easier than ever to set up firewall policies authenticate users and control networktraffic for your organization

This release does not support XTM appliances and has changes toWebBlocker functionalityfor some users Be sure to review the Upgrade Notes for more information

IntelligentAV

This exciting new service provides an additional advanced layer of antivirus security for our Total Securitysubscribers who use signature-basedGateway AV IntelligentAV adds innovativemalware detection with anew artificial intelligence solution for our rackmount Fireboxes IntelligentAV is available on Firebox M Seriesmodels (except M200 andM300) and FireboxV and Firebox Cloud instances with at least 4GB of RAM only Itis not available on Firebox T appliances Make sure to update your feature key so you can get started with thisnew service

Other new features and enhancements include

New Controls in Policies Proxies and Services

l Geolocation by Policyl TLS profiles for SMTP and POP3 proxiesl WebBlocker usability enhancementsl FQDN enhancementsl Ability to control Firebox-generated traffic

VPN Enhancements

l Secondary IP address support for BOVPN gatewaysl AES-GCM supportl Updates toMobile VPN with SSL and Access Portal settings

Certificate Management Enhancements

l Improved certificate managementl Improvements to the certificate import processl Ability to select and use separate certificates for content inspection for an inbound HTTPS proxy

Firebox Cloud Enhancements

Introduction

2 WatchGuard Technologies Inc

Introduction

Release Notes 3

l WSM supportl Support for spamBlocker andQuarantine Serverl Single Sign-On support

Other Enhancements

l Redundant SSOAgent supportl SSO Agent connection Status Tool in Firebox SystemManagerl Ability to restore a configuration from FirewareWebUIl Gateway Wireless Controller updates

For a full list of the enhancements in this release seeEnhancements and Resolved Issues in Fireware 122 orreview theWhats New in Fireware v122 PowerPoint or recording

Before You BeginBefore you install this release make sure that you have

l A supportedWatchGuard Firebox This device can be aWatchGuard Firebox T Series or Firebox MSeries device You can also use this version of Fireware on FireboxV and Firebox Cloud for AWS andAzureWedo not support Fireware v122x on XTM devices

l The required hardware and software components as shown below If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higher than the version of Fireware OSinstalled on your Firebox or XTM device and the version of WSM installed on your Management Server

l Feature key for your Firebox mdash If you upgrade your device from an earlier version of Fireware OS youcan use your existing feature key If you do not have a feature key for your device you can log in to theWatchGuard website to download it

l If you are upgrading to Fireware v12x from Fireware v1110x or earlier we strongly recommend youreview the Fireware v11124 release notes for important information about significant feature changesthat occurred in Fireware v1112x release cycle

Note that you can install and useWatchGuard SystemManager v12x and all WSM server components withdevices running earlier versions of Fireware In this case we recommend that you use the productdocumentation that matches your Fireware OS version

If you have a new Firebox make sure you use the instructions in theQuick Start Guide that shipped with yourdevice If this is a new FireboxV installation make sure you carefully review Fireware help in theWatchGuardHelp Center for important installation and setup instructions We also recommend that you review theHardware Guide for your Firebox model TheHardware Guide contains useful information about your deviceinterfaces as well as information on resetting your device to factory default settings if necessary

Product documentation for all WatchGuard products is available on theWatchGuard web site athttpswwwwatchguardcomwgrd-helpdocumentationoverview

Before You Begin

4 WatchGuard Technologies Inc

Localization

Release Notes 5

LocalizationThis release includes localization for themanagement user interfaces (WSM application suite andWebUI)current as of Fireware v120 UI changes introduced since v120may remain in English Supported languagesare

l French (France)l Japanesel Spanish (Latin American)

Note that most data input must still bemade using standard ASCII characters You can use non-ASCIIcharacters in some areas of the UI including

l Proxy deny messagel Wireless hotspot title terms and conditions andmessagel WatchGuard Server Center users groups and role names

Any data returned from the device operating system (eg log data) is displayed in English only Additionally allitems in theWebUI System Status menu and any software components provided by third-party companiesremain in English

Fireware Web UITheWebUI will launch in the language you have set in your web browser by default

WatchGuard System ManagerWhen you install WSM you can choose what language packs you want to install The language displayed inWSMwill match the language you select in your Microsoft Windows environment For example if you useWindows 10 and want to useWSM in Japanese go to Control Panel gt Language and select Japanese as yourDisplay Language

Dimension WebCenter Quarantine Web UI and Wireless HotspotThese web pages automatically display in whatever language preference you have set in your web browser

DocumentationThe latest version of localized Fireware Help is available on the Fireware documentation page

Important Information about Firebox CertificatesSHA-1 is being deprecated by many popular web browsers andWatchGuard recommends that you now useSHA-256 certificates Because of this we have upgraded our default Firebox certificates Starting withFireware v11104 all newly generated default Firebox certificates use a 2048-bit key length In addition newlygenerated default Proxy Server and Proxy Authority certificates use SHA-256 for their signature hashalgorithm Starting with Fireware v11105 all newly generated default Firebox certificates use SHA-256 fortheir signature hash algorithm New CSRs created from the Firebox also use SHA-256 for their signature hashalgorithm

Default certificates are not automatically upgraded after you install Fireware v11105 or later releases

To regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use the CLI commands described in the next sectionBefore you regenerate the Proxy Server or Proxy Authority certification there are some important things toknow

The Proxy Server certificate is used for inbound HTTPS with content inspection and SMTP with TLSinspection The Proxy Authority certificate is used for outbound HTTPS with content inspection The twocertificates are linked because the default Proxy Server certificate is signed by the default Proxy Authoritycertificate If you use the CLI to regenerate these certificates after you upgrade youmust redistribute the newProxy Authority certificate to your clients or users will receive web browser warnings when they browseHTTPS sites if content inspection is enabled

Also if you use a third-party Proxy Server or Proxy Authority certificate

l The CLI commandwill not work unless you first delete either the Proxy Server or Proxy Authoritycertificate The CLI commandwill regenerate both the Proxy Server and Proxy Authority defaultcertificates

l If you originally used a third-party tool to create the CSR you can simply re-import your existing third-party certificate and private key

l If you originally created your CSR from the Firebox youmust create a new CSR to be signed and thenimport a new third-party certificate

CLI Commands to Regenerate Default Firebox CertificatesTo regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use these CLI commands

l To upgrade the default Proxy Authority and Proxy Server certificates for use with HTTPS contentinspection you can use the CLI command upgrade certificate proxy

l To upgrade the Firebox web server certificate use the CLI command upgrade certificate webl To upgrade the SSLVPN certificate use the CLI command upgrade certificate sslvpnl To upgrade the 8021x certificate use the CLI command upgrade certificate 8021x

Formore information about the CLI see the Command Line Interface Reference

Important Information about Firebox Certificates

6 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 7

Fireware and WSM v122 Operating System CompatibilityLast revised 12 December 2017

WSMFirewareComponent

MicrosoftWindows788110

(32-bitamp64-bit)

MicrosoftWindowsServer2012amp2012R2(64-bit)

MicrosoftWindowsServer2016(64-bit)

MacOSXmacOSv1010

v1011v1012ampv1013

Android6x

7x amp8x

iOSv8 v9v10 ampv11

WatchGuard SystemManager

WatchGuard Servers

For information onWatchGuardDimension see the Dimension ReleaseNotes

Single Sign-On Agent(Includes Event LogMonitor)1

Single Sign-On Client

Single Sign-On ExchangeMonitor2

Terminal Services Agent3

Mobile VPN with IPSec 4 4

Mobile VPN with SSL

Notes about Microsoft Windows supportl Windows 8x support does not includeWindows RT

The following browsers are supported for both FirewareWebUI andWebCenter (Javascript required)l IE 11 and laterl Microsoft Edgel Firefox v55l Safari 10l Safari iOS 10l Chrome v60

1The Server Core installation option is supported forWindows Server 20162Microsoft Exchange Server 2007 and 2010 are supported Microsoft Exchange Server 2013 is supported if youinstall Windows Server 2012 or 2012 R2 and NET Framework 353Terminal Services support with manual or Single Sign-On authentication operates in aMicrosoft TerminalServices or Citrix XenApp 45 50 60 65 76 or 712 environment4Native (Cisco) IPSec client andOpenVPN are supported for all recent versions of Mac OS and iOS To useTheWatchGuardMobile VPN with IPSec client with OS 1013 youmust upgrade to the v300 client release

Authentication SupportThis table gives you a quick view of the types of authentication servers supported by key features of FirewareUsing an authentication server gives you the ability to configure user and group-based firewall and VPN policiesin your Firebox or XTM device configuration With each type of third-party authentication server supported youcan specify a backup server IP address for failover

Fully supported by WatchGuard Not yet supported but tested with success by WatchGuardcustomers

Fireware andWSM v122 Operating System Compatibility

8 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 9

ActiveDirectory

1 LDAPRADIUS

2SecurID

2

Firebox(Firebox-DB)

LocalAuthentication

Mobile VPN with IPSecShrew Soft 3 ndash

Mobile VPN withIPSecWatchGuard client (NCP)

Mobile VPN with IPSec for iOS andMacOS X native VPN client

Mobile VPN with IPSec for Androiddevices

ndash

Mobile VPN with SSL forWindows 4 4

Mobile VPN with SSL for Mac

Mobile VPN with SSL for iOS andAndroid devices

Mobile VPN with L2TP 6 ndash ndash

Built-in AuthenticationWeb Page onPort 4100

Single Sign-On Support (with or withoutclient software)

ndash ndash ndash

Terminal Services ManualAuthentication

Terminal Services Authentication withSingle Sign-On

5 ndash ndash ndash ndash

Citrix Manual Authentication

Citrix Manual Authentication with SingleSign-On

5 ndash ndash ndash ndash

1 Active Directory support includes both single domain and multi-domain support unless otherwise noted2 RADIUS and SecurID support includes support for both one-time passphrases and challengeresponse

authentication integrated with RADIUS In many cases SecurID can also be used with other RADIUSimplementations including Vasco

3 The Shrew Soft client does not support two-factor authentication4 Fireware supports RADIUS Filter ID 11 for group authentication5 Both single and multiple domain Active Directory configurations are supported For information about the

supported Operating System compatibility for the WatchGuard TO Agent and SSO Agent see the currentFireware and WSM Operating System Compatibility table

6 Active Directory authentication methods are supported only through a RADIUS server

System RequirementsIf you have WatchGuard SystemManager client software onlyinstalled

If you install WatchGuard SystemManager and WatchGuard Serversoftware

Minimum CPU Intel Core or Xeon

2GHz

Intel Core or Xeon

2GHz

MinimumMemory 1GB 2GB

Minimum AvailableDisk Space

250MB 1GB

MinimumRecommendedScreen Resolution

1024x768 1024x768

FireboxV System RequirementsWith support for installation in both a VMware and a Hyper-V environment aWatchGuard FireboxV virtualmachine can run on a VMware ESXi 55 60 or 65 host or onWindows Server 2012 R2 or 2016 or Hyper-VServer 2012 R2 or 2016

The hardware requirements for FireboxV are the same as for the hypervisor environment it runs in

Each FireboxV virtual machine requires 5 GB of disk space CPU andmemory requirements vary by model

FireboxV Model vCPUs (maximum) Memory (recommended)

Small 2 2048MB

Medium 4 4096MB

Large 8 4096MB

Extra Large 16 4096MB

Fireware andWSM v122 Operating System Compatibility

10 WatchGuard Technologies Inc

Downloading Software

Release Notes 11

Downloading SoftwareYou can download software from theWatchGuard Software Downloads Center

There are several software files available for download with this release See the descriptions below so youknow what software packages you will need for your upgrade

WatchGuard System ManagerWith this software package you can install WSM and theWatchGuard Server Center software

WSM12_2exemdashUse this file to install WSM v122 or to upgradeWatchGuard SystemManager from anearlier version toWSM v122

Fireware OSIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from the FirewareWebUI System gt Upgrade OS page

If you prefer to upgrade from Policy Manager or from an earlier version of Fireware you can use download theFireware OS image for your Firebox or XTM device Use the exe file if you want to install or upgrade theOSusingWSM Use the zip file if you want to install or upgrade theOS manually using FirewareWebUI Use theova or vhd file to deploy a new FireboxV device

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 2: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Introduction

On 28 August we releasedWebBlocker Server v10 See Fireware Help orWhats New inFireware v122 for more information

On 3 August we released the FirewareM400M500 Fireware v122 exe file to fix a packagingissue The build number remains the same but package update generated a new SHA-1checksum for the file The Software Download Center has been updated with the newchecksum

Fireware v122 is a significant feature release for Firebox T Series Firebox M Series FireboxV and FireboxCloud appliances This release introduces the new IntelligentAV service as well as many new features andenhancements that make it easier than ever to set up firewall policies authenticate users and control networktraffic for your organization

This release does not support XTM appliances and has changes toWebBlocker functionalityfor some users Be sure to review the Upgrade Notes for more information

IntelligentAV

This exciting new service provides an additional advanced layer of antivirus security for our Total Securitysubscribers who use signature-basedGateway AV IntelligentAV adds innovativemalware detection with anew artificial intelligence solution for our rackmount Fireboxes IntelligentAV is available on Firebox M Seriesmodels (except M200 andM300) and FireboxV and Firebox Cloud instances with at least 4GB of RAM only Itis not available on Firebox T appliances Make sure to update your feature key so you can get started with thisnew service

Other new features and enhancements include

New Controls in Policies Proxies and Services

l Geolocation by Policyl TLS profiles for SMTP and POP3 proxiesl WebBlocker usability enhancementsl FQDN enhancementsl Ability to control Firebox-generated traffic

VPN Enhancements

l Secondary IP address support for BOVPN gatewaysl AES-GCM supportl Updates toMobile VPN with SSL and Access Portal settings

Certificate Management Enhancements

l Improved certificate managementl Improvements to the certificate import processl Ability to select and use separate certificates for content inspection for an inbound HTTPS proxy

Firebox Cloud Enhancements

Introduction

2 WatchGuard Technologies Inc

Introduction

Release Notes 3

l WSM supportl Support for spamBlocker andQuarantine Serverl Single Sign-On support

Other Enhancements

l Redundant SSOAgent supportl SSO Agent connection Status Tool in Firebox SystemManagerl Ability to restore a configuration from FirewareWebUIl Gateway Wireless Controller updates

For a full list of the enhancements in this release seeEnhancements and Resolved Issues in Fireware 122 orreview theWhats New in Fireware v122 PowerPoint or recording

Before You BeginBefore you install this release make sure that you have

l A supportedWatchGuard Firebox This device can be aWatchGuard Firebox T Series or Firebox MSeries device You can also use this version of Fireware on FireboxV and Firebox Cloud for AWS andAzureWedo not support Fireware v122x on XTM devices

l The required hardware and software components as shown below If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higher than the version of Fireware OSinstalled on your Firebox or XTM device and the version of WSM installed on your Management Server

l Feature key for your Firebox mdash If you upgrade your device from an earlier version of Fireware OS youcan use your existing feature key If you do not have a feature key for your device you can log in to theWatchGuard website to download it

l If you are upgrading to Fireware v12x from Fireware v1110x or earlier we strongly recommend youreview the Fireware v11124 release notes for important information about significant feature changesthat occurred in Fireware v1112x release cycle

Note that you can install and useWatchGuard SystemManager v12x and all WSM server components withdevices running earlier versions of Fireware In this case we recommend that you use the productdocumentation that matches your Fireware OS version

If you have a new Firebox make sure you use the instructions in theQuick Start Guide that shipped with yourdevice If this is a new FireboxV installation make sure you carefully review Fireware help in theWatchGuardHelp Center for important installation and setup instructions We also recommend that you review theHardware Guide for your Firebox model TheHardware Guide contains useful information about your deviceinterfaces as well as information on resetting your device to factory default settings if necessary

Product documentation for all WatchGuard products is available on theWatchGuard web site athttpswwwwatchguardcomwgrd-helpdocumentationoverview

Before You Begin

4 WatchGuard Technologies Inc

Localization

Release Notes 5

LocalizationThis release includes localization for themanagement user interfaces (WSM application suite andWebUI)current as of Fireware v120 UI changes introduced since v120may remain in English Supported languagesare

l French (France)l Japanesel Spanish (Latin American)

Note that most data input must still bemade using standard ASCII characters You can use non-ASCIIcharacters in some areas of the UI including

l Proxy deny messagel Wireless hotspot title terms and conditions andmessagel WatchGuard Server Center users groups and role names

Any data returned from the device operating system (eg log data) is displayed in English only Additionally allitems in theWebUI System Status menu and any software components provided by third-party companiesremain in English

Fireware Web UITheWebUI will launch in the language you have set in your web browser by default

WatchGuard System ManagerWhen you install WSM you can choose what language packs you want to install The language displayed inWSMwill match the language you select in your Microsoft Windows environment For example if you useWindows 10 and want to useWSM in Japanese go to Control Panel gt Language and select Japanese as yourDisplay Language

Dimension WebCenter Quarantine Web UI and Wireless HotspotThese web pages automatically display in whatever language preference you have set in your web browser

DocumentationThe latest version of localized Fireware Help is available on the Fireware documentation page

Important Information about Firebox CertificatesSHA-1 is being deprecated by many popular web browsers andWatchGuard recommends that you now useSHA-256 certificates Because of this we have upgraded our default Firebox certificates Starting withFireware v11104 all newly generated default Firebox certificates use a 2048-bit key length In addition newlygenerated default Proxy Server and Proxy Authority certificates use SHA-256 for their signature hashalgorithm Starting with Fireware v11105 all newly generated default Firebox certificates use SHA-256 fortheir signature hash algorithm New CSRs created from the Firebox also use SHA-256 for their signature hashalgorithm

Default certificates are not automatically upgraded after you install Fireware v11105 or later releases

To regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use the CLI commands described in the next sectionBefore you regenerate the Proxy Server or Proxy Authority certification there are some important things toknow

The Proxy Server certificate is used for inbound HTTPS with content inspection and SMTP with TLSinspection The Proxy Authority certificate is used for outbound HTTPS with content inspection The twocertificates are linked because the default Proxy Server certificate is signed by the default Proxy Authoritycertificate If you use the CLI to regenerate these certificates after you upgrade youmust redistribute the newProxy Authority certificate to your clients or users will receive web browser warnings when they browseHTTPS sites if content inspection is enabled

Also if you use a third-party Proxy Server or Proxy Authority certificate

l The CLI commandwill not work unless you first delete either the Proxy Server or Proxy Authoritycertificate The CLI commandwill regenerate both the Proxy Server and Proxy Authority defaultcertificates

l If you originally used a third-party tool to create the CSR you can simply re-import your existing third-party certificate and private key

l If you originally created your CSR from the Firebox youmust create a new CSR to be signed and thenimport a new third-party certificate

CLI Commands to Regenerate Default Firebox CertificatesTo regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use these CLI commands

l To upgrade the default Proxy Authority and Proxy Server certificates for use with HTTPS contentinspection you can use the CLI command upgrade certificate proxy

l To upgrade the Firebox web server certificate use the CLI command upgrade certificate webl To upgrade the SSLVPN certificate use the CLI command upgrade certificate sslvpnl To upgrade the 8021x certificate use the CLI command upgrade certificate 8021x

Formore information about the CLI see the Command Line Interface Reference

Important Information about Firebox Certificates

6 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 7

Fireware and WSM v122 Operating System CompatibilityLast revised 12 December 2017

WSMFirewareComponent

MicrosoftWindows788110

(32-bitamp64-bit)

MicrosoftWindowsServer2012amp2012R2(64-bit)

MicrosoftWindowsServer2016(64-bit)

MacOSXmacOSv1010

v1011v1012ampv1013

Android6x

7x amp8x

iOSv8 v9v10 ampv11

WatchGuard SystemManager

WatchGuard Servers

For information onWatchGuardDimension see the Dimension ReleaseNotes

Single Sign-On Agent(Includes Event LogMonitor)1

Single Sign-On Client

Single Sign-On ExchangeMonitor2

Terminal Services Agent3

Mobile VPN with IPSec 4 4

Mobile VPN with SSL

Notes about Microsoft Windows supportl Windows 8x support does not includeWindows RT

The following browsers are supported for both FirewareWebUI andWebCenter (Javascript required)l IE 11 and laterl Microsoft Edgel Firefox v55l Safari 10l Safari iOS 10l Chrome v60

1The Server Core installation option is supported forWindows Server 20162Microsoft Exchange Server 2007 and 2010 are supported Microsoft Exchange Server 2013 is supported if youinstall Windows Server 2012 or 2012 R2 and NET Framework 353Terminal Services support with manual or Single Sign-On authentication operates in aMicrosoft TerminalServices or Citrix XenApp 45 50 60 65 76 or 712 environment4Native (Cisco) IPSec client andOpenVPN are supported for all recent versions of Mac OS and iOS To useTheWatchGuardMobile VPN with IPSec client with OS 1013 youmust upgrade to the v300 client release

Authentication SupportThis table gives you a quick view of the types of authentication servers supported by key features of FirewareUsing an authentication server gives you the ability to configure user and group-based firewall and VPN policiesin your Firebox or XTM device configuration With each type of third-party authentication server supported youcan specify a backup server IP address for failover

Fully supported by WatchGuard Not yet supported but tested with success by WatchGuardcustomers

Fireware andWSM v122 Operating System Compatibility

8 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 9

ActiveDirectory

1 LDAPRADIUS

2SecurID

2

Firebox(Firebox-DB)

LocalAuthentication

Mobile VPN with IPSecShrew Soft 3 ndash

Mobile VPN withIPSecWatchGuard client (NCP)

Mobile VPN with IPSec for iOS andMacOS X native VPN client

Mobile VPN with IPSec for Androiddevices

ndash

Mobile VPN with SSL forWindows 4 4

Mobile VPN with SSL for Mac

Mobile VPN with SSL for iOS andAndroid devices

Mobile VPN with L2TP 6 ndash ndash

Built-in AuthenticationWeb Page onPort 4100

Single Sign-On Support (with or withoutclient software)

ndash ndash ndash

Terminal Services ManualAuthentication

Terminal Services Authentication withSingle Sign-On

5 ndash ndash ndash ndash

Citrix Manual Authentication

Citrix Manual Authentication with SingleSign-On

5 ndash ndash ndash ndash

1 Active Directory support includes both single domain and multi-domain support unless otherwise noted2 RADIUS and SecurID support includes support for both one-time passphrases and challengeresponse

authentication integrated with RADIUS In many cases SecurID can also be used with other RADIUSimplementations including Vasco

3 The Shrew Soft client does not support two-factor authentication4 Fireware supports RADIUS Filter ID 11 for group authentication5 Both single and multiple domain Active Directory configurations are supported For information about the

supported Operating System compatibility for the WatchGuard TO Agent and SSO Agent see the currentFireware and WSM Operating System Compatibility table

6 Active Directory authentication methods are supported only through a RADIUS server

System RequirementsIf you have WatchGuard SystemManager client software onlyinstalled

If you install WatchGuard SystemManager and WatchGuard Serversoftware

Minimum CPU Intel Core or Xeon

2GHz

Intel Core or Xeon

2GHz

MinimumMemory 1GB 2GB

Minimum AvailableDisk Space

250MB 1GB

MinimumRecommendedScreen Resolution

1024x768 1024x768

FireboxV System RequirementsWith support for installation in both a VMware and a Hyper-V environment aWatchGuard FireboxV virtualmachine can run on a VMware ESXi 55 60 or 65 host or onWindows Server 2012 R2 or 2016 or Hyper-VServer 2012 R2 or 2016

The hardware requirements for FireboxV are the same as for the hypervisor environment it runs in

Each FireboxV virtual machine requires 5 GB of disk space CPU andmemory requirements vary by model

FireboxV Model vCPUs (maximum) Memory (recommended)

Small 2 2048MB

Medium 4 4096MB

Large 8 4096MB

Extra Large 16 4096MB

Fireware andWSM v122 Operating System Compatibility

10 WatchGuard Technologies Inc

Downloading Software

Release Notes 11

Downloading SoftwareYou can download software from theWatchGuard Software Downloads Center

There are several software files available for download with this release See the descriptions below so youknow what software packages you will need for your upgrade

WatchGuard System ManagerWith this software package you can install WSM and theWatchGuard Server Center software

WSM12_2exemdashUse this file to install WSM v122 or to upgradeWatchGuard SystemManager from anearlier version toWSM v122

Fireware OSIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from the FirewareWebUI System gt Upgrade OS page

If you prefer to upgrade from Policy Manager or from an earlier version of Fireware you can use download theFireware OS image for your Firebox or XTM device Use the exe file if you want to install or upgrade theOSusingWSM Use the zip file if you want to install or upgrade theOS manually using FirewareWebUI Use theova or vhd file to deploy a new FireboxV device

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 3: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Introduction

Release Notes 3

l WSM supportl Support for spamBlocker andQuarantine Serverl Single Sign-On support

Other Enhancements

l Redundant SSOAgent supportl SSO Agent connection Status Tool in Firebox SystemManagerl Ability to restore a configuration from FirewareWebUIl Gateway Wireless Controller updates

For a full list of the enhancements in this release seeEnhancements and Resolved Issues in Fireware 122 orreview theWhats New in Fireware v122 PowerPoint or recording

Before You BeginBefore you install this release make sure that you have

l A supportedWatchGuard Firebox This device can be aWatchGuard Firebox T Series or Firebox MSeries device You can also use this version of Fireware on FireboxV and Firebox Cloud for AWS andAzureWedo not support Fireware v122x on XTM devices

l The required hardware and software components as shown below If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higher than the version of Fireware OSinstalled on your Firebox or XTM device and the version of WSM installed on your Management Server

l Feature key for your Firebox mdash If you upgrade your device from an earlier version of Fireware OS youcan use your existing feature key If you do not have a feature key for your device you can log in to theWatchGuard website to download it

l If you are upgrading to Fireware v12x from Fireware v1110x or earlier we strongly recommend youreview the Fireware v11124 release notes for important information about significant feature changesthat occurred in Fireware v1112x release cycle

Note that you can install and useWatchGuard SystemManager v12x and all WSM server components withdevices running earlier versions of Fireware In this case we recommend that you use the productdocumentation that matches your Fireware OS version

If you have a new Firebox make sure you use the instructions in theQuick Start Guide that shipped with yourdevice If this is a new FireboxV installation make sure you carefully review Fireware help in theWatchGuardHelp Center for important installation and setup instructions We also recommend that you review theHardware Guide for your Firebox model TheHardware Guide contains useful information about your deviceinterfaces as well as information on resetting your device to factory default settings if necessary

Product documentation for all WatchGuard products is available on theWatchGuard web site athttpswwwwatchguardcomwgrd-helpdocumentationoverview

Before You Begin

4 WatchGuard Technologies Inc

Localization

Release Notes 5

LocalizationThis release includes localization for themanagement user interfaces (WSM application suite andWebUI)current as of Fireware v120 UI changes introduced since v120may remain in English Supported languagesare

l French (France)l Japanesel Spanish (Latin American)

Note that most data input must still bemade using standard ASCII characters You can use non-ASCIIcharacters in some areas of the UI including

l Proxy deny messagel Wireless hotspot title terms and conditions andmessagel WatchGuard Server Center users groups and role names

Any data returned from the device operating system (eg log data) is displayed in English only Additionally allitems in theWebUI System Status menu and any software components provided by third-party companiesremain in English

Fireware Web UITheWebUI will launch in the language you have set in your web browser by default

WatchGuard System ManagerWhen you install WSM you can choose what language packs you want to install The language displayed inWSMwill match the language you select in your Microsoft Windows environment For example if you useWindows 10 and want to useWSM in Japanese go to Control Panel gt Language and select Japanese as yourDisplay Language

Dimension WebCenter Quarantine Web UI and Wireless HotspotThese web pages automatically display in whatever language preference you have set in your web browser

DocumentationThe latest version of localized Fireware Help is available on the Fireware documentation page

Important Information about Firebox CertificatesSHA-1 is being deprecated by many popular web browsers andWatchGuard recommends that you now useSHA-256 certificates Because of this we have upgraded our default Firebox certificates Starting withFireware v11104 all newly generated default Firebox certificates use a 2048-bit key length In addition newlygenerated default Proxy Server and Proxy Authority certificates use SHA-256 for their signature hashalgorithm Starting with Fireware v11105 all newly generated default Firebox certificates use SHA-256 fortheir signature hash algorithm New CSRs created from the Firebox also use SHA-256 for their signature hashalgorithm

Default certificates are not automatically upgraded after you install Fireware v11105 or later releases

To regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use the CLI commands described in the next sectionBefore you regenerate the Proxy Server or Proxy Authority certification there are some important things toknow

The Proxy Server certificate is used for inbound HTTPS with content inspection and SMTP with TLSinspection The Proxy Authority certificate is used for outbound HTTPS with content inspection The twocertificates are linked because the default Proxy Server certificate is signed by the default Proxy Authoritycertificate If you use the CLI to regenerate these certificates after you upgrade youmust redistribute the newProxy Authority certificate to your clients or users will receive web browser warnings when they browseHTTPS sites if content inspection is enabled

Also if you use a third-party Proxy Server or Proxy Authority certificate

l The CLI commandwill not work unless you first delete either the Proxy Server or Proxy Authoritycertificate The CLI commandwill regenerate both the Proxy Server and Proxy Authority defaultcertificates

l If you originally used a third-party tool to create the CSR you can simply re-import your existing third-party certificate and private key

l If you originally created your CSR from the Firebox youmust create a new CSR to be signed and thenimport a new third-party certificate

CLI Commands to Regenerate Default Firebox CertificatesTo regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use these CLI commands

l To upgrade the default Proxy Authority and Proxy Server certificates for use with HTTPS contentinspection you can use the CLI command upgrade certificate proxy

l To upgrade the Firebox web server certificate use the CLI command upgrade certificate webl To upgrade the SSLVPN certificate use the CLI command upgrade certificate sslvpnl To upgrade the 8021x certificate use the CLI command upgrade certificate 8021x

Formore information about the CLI see the Command Line Interface Reference

Important Information about Firebox Certificates

6 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 7

Fireware and WSM v122 Operating System CompatibilityLast revised 12 December 2017

WSMFirewareComponent

MicrosoftWindows788110

(32-bitamp64-bit)

MicrosoftWindowsServer2012amp2012R2(64-bit)

MicrosoftWindowsServer2016(64-bit)

MacOSXmacOSv1010

v1011v1012ampv1013

Android6x

7x amp8x

iOSv8 v9v10 ampv11

WatchGuard SystemManager

WatchGuard Servers

For information onWatchGuardDimension see the Dimension ReleaseNotes

Single Sign-On Agent(Includes Event LogMonitor)1

Single Sign-On Client

Single Sign-On ExchangeMonitor2

Terminal Services Agent3

Mobile VPN with IPSec 4 4

Mobile VPN with SSL

Notes about Microsoft Windows supportl Windows 8x support does not includeWindows RT

The following browsers are supported for both FirewareWebUI andWebCenter (Javascript required)l IE 11 and laterl Microsoft Edgel Firefox v55l Safari 10l Safari iOS 10l Chrome v60

1The Server Core installation option is supported forWindows Server 20162Microsoft Exchange Server 2007 and 2010 are supported Microsoft Exchange Server 2013 is supported if youinstall Windows Server 2012 or 2012 R2 and NET Framework 353Terminal Services support with manual or Single Sign-On authentication operates in aMicrosoft TerminalServices or Citrix XenApp 45 50 60 65 76 or 712 environment4Native (Cisco) IPSec client andOpenVPN are supported for all recent versions of Mac OS and iOS To useTheWatchGuardMobile VPN with IPSec client with OS 1013 youmust upgrade to the v300 client release

Authentication SupportThis table gives you a quick view of the types of authentication servers supported by key features of FirewareUsing an authentication server gives you the ability to configure user and group-based firewall and VPN policiesin your Firebox or XTM device configuration With each type of third-party authentication server supported youcan specify a backup server IP address for failover

Fully supported by WatchGuard Not yet supported but tested with success by WatchGuardcustomers

Fireware andWSM v122 Operating System Compatibility

8 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 9

ActiveDirectory

1 LDAPRADIUS

2SecurID

2

Firebox(Firebox-DB)

LocalAuthentication

Mobile VPN with IPSecShrew Soft 3 ndash

Mobile VPN withIPSecWatchGuard client (NCP)

Mobile VPN with IPSec for iOS andMacOS X native VPN client

Mobile VPN with IPSec for Androiddevices

ndash

Mobile VPN with SSL forWindows 4 4

Mobile VPN with SSL for Mac

Mobile VPN with SSL for iOS andAndroid devices

Mobile VPN with L2TP 6 ndash ndash

Built-in AuthenticationWeb Page onPort 4100

Single Sign-On Support (with or withoutclient software)

ndash ndash ndash

Terminal Services ManualAuthentication

Terminal Services Authentication withSingle Sign-On

5 ndash ndash ndash ndash

Citrix Manual Authentication

Citrix Manual Authentication with SingleSign-On

5 ndash ndash ndash ndash

1 Active Directory support includes both single domain and multi-domain support unless otherwise noted2 RADIUS and SecurID support includes support for both one-time passphrases and challengeresponse

authentication integrated with RADIUS In many cases SecurID can also be used with other RADIUSimplementations including Vasco

3 The Shrew Soft client does not support two-factor authentication4 Fireware supports RADIUS Filter ID 11 for group authentication5 Both single and multiple domain Active Directory configurations are supported For information about the

supported Operating System compatibility for the WatchGuard TO Agent and SSO Agent see the currentFireware and WSM Operating System Compatibility table

6 Active Directory authentication methods are supported only through a RADIUS server

System RequirementsIf you have WatchGuard SystemManager client software onlyinstalled

If you install WatchGuard SystemManager and WatchGuard Serversoftware

Minimum CPU Intel Core or Xeon

2GHz

Intel Core or Xeon

2GHz

MinimumMemory 1GB 2GB

Minimum AvailableDisk Space

250MB 1GB

MinimumRecommendedScreen Resolution

1024x768 1024x768

FireboxV System RequirementsWith support for installation in both a VMware and a Hyper-V environment aWatchGuard FireboxV virtualmachine can run on a VMware ESXi 55 60 or 65 host or onWindows Server 2012 R2 or 2016 or Hyper-VServer 2012 R2 or 2016

The hardware requirements for FireboxV are the same as for the hypervisor environment it runs in

Each FireboxV virtual machine requires 5 GB of disk space CPU andmemory requirements vary by model

FireboxV Model vCPUs (maximum) Memory (recommended)

Small 2 2048MB

Medium 4 4096MB

Large 8 4096MB

Extra Large 16 4096MB

Fireware andWSM v122 Operating System Compatibility

10 WatchGuard Technologies Inc

Downloading Software

Release Notes 11

Downloading SoftwareYou can download software from theWatchGuard Software Downloads Center

There are several software files available for download with this release See the descriptions below so youknow what software packages you will need for your upgrade

WatchGuard System ManagerWith this software package you can install WSM and theWatchGuard Server Center software

WSM12_2exemdashUse this file to install WSM v122 or to upgradeWatchGuard SystemManager from anearlier version toWSM v122

Fireware OSIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from the FirewareWebUI System gt Upgrade OS page

If you prefer to upgrade from Policy Manager or from an earlier version of Fireware you can use download theFireware OS image for your Firebox or XTM device Use the exe file if you want to install or upgrade theOSusingWSM Use the zip file if you want to install or upgrade theOS manually using FirewareWebUI Use theova or vhd file to deploy a new FireboxV device

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 4: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Before You BeginBefore you install this release make sure that you have

l A supportedWatchGuard Firebox This device can be aWatchGuard Firebox T Series or Firebox MSeries device You can also use this version of Fireware on FireboxV and Firebox Cloud for AWS andAzureWedo not support Fireware v122x on XTM devices

l The required hardware and software components as shown below If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higher than the version of Fireware OSinstalled on your Firebox or XTM device and the version of WSM installed on your Management Server

l Feature key for your Firebox mdash If you upgrade your device from an earlier version of Fireware OS youcan use your existing feature key If you do not have a feature key for your device you can log in to theWatchGuard website to download it

l If you are upgrading to Fireware v12x from Fireware v1110x or earlier we strongly recommend youreview the Fireware v11124 release notes for important information about significant feature changesthat occurred in Fireware v1112x release cycle

Note that you can install and useWatchGuard SystemManager v12x and all WSM server components withdevices running earlier versions of Fireware In this case we recommend that you use the productdocumentation that matches your Fireware OS version

If you have a new Firebox make sure you use the instructions in theQuick Start Guide that shipped with yourdevice If this is a new FireboxV installation make sure you carefully review Fireware help in theWatchGuardHelp Center for important installation and setup instructions We also recommend that you review theHardware Guide for your Firebox model TheHardware Guide contains useful information about your deviceinterfaces as well as information on resetting your device to factory default settings if necessary

Product documentation for all WatchGuard products is available on theWatchGuard web site athttpswwwwatchguardcomwgrd-helpdocumentationoverview

Before You Begin

4 WatchGuard Technologies Inc

Localization

Release Notes 5

LocalizationThis release includes localization for themanagement user interfaces (WSM application suite andWebUI)current as of Fireware v120 UI changes introduced since v120may remain in English Supported languagesare

l French (France)l Japanesel Spanish (Latin American)

Note that most data input must still bemade using standard ASCII characters You can use non-ASCIIcharacters in some areas of the UI including

l Proxy deny messagel Wireless hotspot title terms and conditions andmessagel WatchGuard Server Center users groups and role names

Any data returned from the device operating system (eg log data) is displayed in English only Additionally allitems in theWebUI System Status menu and any software components provided by third-party companiesremain in English

Fireware Web UITheWebUI will launch in the language you have set in your web browser by default

WatchGuard System ManagerWhen you install WSM you can choose what language packs you want to install The language displayed inWSMwill match the language you select in your Microsoft Windows environment For example if you useWindows 10 and want to useWSM in Japanese go to Control Panel gt Language and select Japanese as yourDisplay Language

Dimension WebCenter Quarantine Web UI and Wireless HotspotThese web pages automatically display in whatever language preference you have set in your web browser

DocumentationThe latest version of localized Fireware Help is available on the Fireware documentation page

Important Information about Firebox CertificatesSHA-1 is being deprecated by many popular web browsers andWatchGuard recommends that you now useSHA-256 certificates Because of this we have upgraded our default Firebox certificates Starting withFireware v11104 all newly generated default Firebox certificates use a 2048-bit key length In addition newlygenerated default Proxy Server and Proxy Authority certificates use SHA-256 for their signature hashalgorithm Starting with Fireware v11105 all newly generated default Firebox certificates use SHA-256 fortheir signature hash algorithm New CSRs created from the Firebox also use SHA-256 for their signature hashalgorithm

Default certificates are not automatically upgraded after you install Fireware v11105 or later releases

To regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use the CLI commands described in the next sectionBefore you regenerate the Proxy Server or Proxy Authority certification there are some important things toknow

The Proxy Server certificate is used for inbound HTTPS with content inspection and SMTP with TLSinspection The Proxy Authority certificate is used for outbound HTTPS with content inspection The twocertificates are linked because the default Proxy Server certificate is signed by the default Proxy Authoritycertificate If you use the CLI to regenerate these certificates after you upgrade youmust redistribute the newProxy Authority certificate to your clients or users will receive web browser warnings when they browseHTTPS sites if content inspection is enabled

Also if you use a third-party Proxy Server or Proxy Authority certificate

l The CLI commandwill not work unless you first delete either the Proxy Server or Proxy Authoritycertificate The CLI commandwill regenerate both the Proxy Server and Proxy Authority defaultcertificates

l If you originally used a third-party tool to create the CSR you can simply re-import your existing third-party certificate and private key

l If you originally created your CSR from the Firebox youmust create a new CSR to be signed and thenimport a new third-party certificate

CLI Commands to Regenerate Default Firebox CertificatesTo regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use these CLI commands

l To upgrade the default Proxy Authority and Proxy Server certificates for use with HTTPS contentinspection you can use the CLI command upgrade certificate proxy

l To upgrade the Firebox web server certificate use the CLI command upgrade certificate webl To upgrade the SSLVPN certificate use the CLI command upgrade certificate sslvpnl To upgrade the 8021x certificate use the CLI command upgrade certificate 8021x

Formore information about the CLI see the Command Line Interface Reference

Important Information about Firebox Certificates

6 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 7

Fireware and WSM v122 Operating System CompatibilityLast revised 12 December 2017

WSMFirewareComponent

MicrosoftWindows788110

(32-bitamp64-bit)

MicrosoftWindowsServer2012amp2012R2(64-bit)

MicrosoftWindowsServer2016(64-bit)

MacOSXmacOSv1010

v1011v1012ampv1013

Android6x

7x amp8x

iOSv8 v9v10 ampv11

WatchGuard SystemManager

WatchGuard Servers

For information onWatchGuardDimension see the Dimension ReleaseNotes

Single Sign-On Agent(Includes Event LogMonitor)1

Single Sign-On Client

Single Sign-On ExchangeMonitor2

Terminal Services Agent3

Mobile VPN with IPSec 4 4

Mobile VPN with SSL

Notes about Microsoft Windows supportl Windows 8x support does not includeWindows RT

The following browsers are supported for both FirewareWebUI andWebCenter (Javascript required)l IE 11 and laterl Microsoft Edgel Firefox v55l Safari 10l Safari iOS 10l Chrome v60

1The Server Core installation option is supported forWindows Server 20162Microsoft Exchange Server 2007 and 2010 are supported Microsoft Exchange Server 2013 is supported if youinstall Windows Server 2012 or 2012 R2 and NET Framework 353Terminal Services support with manual or Single Sign-On authentication operates in aMicrosoft TerminalServices or Citrix XenApp 45 50 60 65 76 or 712 environment4Native (Cisco) IPSec client andOpenVPN are supported for all recent versions of Mac OS and iOS To useTheWatchGuardMobile VPN with IPSec client with OS 1013 youmust upgrade to the v300 client release

Authentication SupportThis table gives you a quick view of the types of authentication servers supported by key features of FirewareUsing an authentication server gives you the ability to configure user and group-based firewall and VPN policiesin your Firebox or XTM device configuration With each type of third-party authentication server supported youcan specify a backup server IP address for failover

Fully supported by WatchGuard Not yet supported but tested with success by WatchGuardcustomers

Fireware andWSM v122 Operating System Compatibility

8 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 9

ActiveDirectory

1 LDAPRADIUS

2SecurID

2

Firebox(Firebox-DB)

LocalAuthentication

Mobile VPN with IPSecShrew Soft 3 ndash

Mobile VPN withIPSecWatchGuard client (NCP)

Mobile VPN with IPSec for iOS andMacOS X native VPN client

Mobile VPN with IPSec for Androiddevices

ndash

Mobile VPN with SSL forWindows 4 4

Mobile VPN with SSL for Mac

Mobile VPN with SSL for iOS andAndroid devices

Mobile VPN with L2TP 6 ndash ndash

Built-in AuthenticationWeb Page onPort 4100

Single Sign-On Support (with or withoutclient software)

ndash ndash ndash

Terminal Services ManualAuthentication

Terminal Services Authentication withSingle Sign-On

5 ndash ndash ndash ndash

Citrix Manual Authentication

Citrix Manual Authentication with SingleSign-On

5 ndash ndash ndash ndash

1 Active Directory support includes both single domain and multi-domain support unless otherwise noted2 RADIUS and SecurID support includes support for both one-time passphrases and challengeresponse

authentication integrated with RADIUS In many cases SecurID can also be used with other RADIUSimplementations including Vasco

3 The Shrew Soft client does not support two-factor authentication4 Fireware supports RADIUS Filter ID 11 for group authentication5 Both single and multiple domain Active Directory configurations are supported For information about the

supported Operating System compatibility for the WatchGuard TO Agent and SSO Agent see the currentFireware and WSM Operating System Compatibility table

6 Active Directory authentication methods are supported only through a RADIUS server

System RequirementsIf you have WatchGuard SystemManager client software onlyinstalled

If you install WatchGuard SystemManager and WatchGuard Serversoftware

Minimum CPU Intel Core or Xeon

2GHz

Intel Core or Xeon

2GHz

MinimumMemory 1GB 2GB

Minimum AvailableDisk Space

250MB 1GB

MinimumRecommendedScreen Resolution

1024x768 1024x768

FireboxV System RequirementsWith support for installation in both a VMware and a Hyper-V environment aWatchGuard FireboxV virtualmachine can run on a VMware ESXi 55 60 or 65 host or onWindows Server 2012 R2 or 2016 or Hyper-VServer 2012 R2 or 2016

The hardware requirements for FireboxV are the same as for the hypervisor environment it runs in

Each FireboxV virtual machine requires 5 GB of disk space CPU andmemory requirements vary by model

FireboxV Model vCPUs (maximum) Memory (recommended)

Small 2 2048MB

Medium 4 4096MB

Large 8 4096MB

Extra Large 16 4096MB

Fireware andWSM v122 Operating System Compatibility

10 WatchGuard Technologies Inc

Downloading Software

Release Notes 11

Downloading SoftwareYou can download software from theWatchGuard Software Downloads Center

There are several software files available for download with this release See the descriptions below so youknow what software packages you will need for your upgrade

WatchGuard System ManagerWith this software package you can install WSM and theWatchGuard Server Center software

WSM12_2exemdashUse this file to install WSM v122 or to upgradeWatchGuard SystemManager from anearlier version toWSM v122

Fireware OSIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from the FirewareWebUI System gt Upgrade OS page

If you prefer to upgrade from Policy Manager or from an earlier version of Fireware you can use download theFireware OS image for your Firebox or XTM device Use the exe file if you want to install or upgrade theOSusingWSM Use the zip file if you want to install or upgrade theOS manually using FirewareWebUI Use theova or vhd file to deploy a new FireboxV device

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 5: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Localization

Release Notes 5

LocalizationThis release includes localization for themanagement user interfaces (WSM application suite andWebUI)current as of Fireware v120 UI changes introduced since v120may remain in English Supported languagesare

l French (France)l Japanesel Spanish (Latin American)

Note that most data input must still bemade using standard ASCII characters You can use non-ASCIIcharacters in some areas of the UI including

l Proxy deny messagel Wireless hotspot title terms and conditions andmessagel WatchGuard Server Center users groups and role names

Any data returned from the device operating system (eg log data) is displayed in English only Additionally allitems in theWebUI System Status menu and any software components provided by third-party companiesremain in English

Fireware Web UITheWebUI will launch in the language you have set in your web browser by default

WatchGuard System ManagerWhen you install WSM you can choose what language packs you want to install The language displayed inWSMwill match the language you select in your Microsoft Windows environment For example if you useWindows 10 and want to useWSM in Japanese go to Control Panel gt Language and select Japanese as yourDisplay Language

Dimension WebCenter Quarantine Web UI and Wireless HotspotThese web pages automatically display in whatever language preference you have set in your web browser

DocumentationThe latest version of localized Fireware Help is available on the Fireware documentation page

Important Information about Firebox CertificatesSHA-1 is being deprecated by many popular web browsers andWatchGuard recommends that you now useSHA-256 certificates Because of this we have upgraded our default Firebox certificates Starting withFireware v11104 all newly generated default Firebox certificates use a 2048-bit key length In addition newlygenerated default Proxy Server and Proxy Authority certificates use SHA-256 for their signature hashalgorithm Starting with Fireware v11105 all newly generated default Firebox certificates use SHA-256 fortheir signature hash algorithm New CSRs created from the Firebox also use SHA-256 for their signature hashalgorithm

Default certificates are not automatically upgraded after you install Fireware v11105 or later releases

To regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use the CLI commands described in the next sectionBefore you regenerate the Proxy Server or Proxy Authority certification there are some important things toknow

The Proxy Server certificate is used for inbound HTTPS with content inspection and SMTP with TLSinspection The Proxy Authority certificate is used for outbound HTTPS with content inspection The twocertificates are linked because the default Proxy Server certificate is signed by the default Proxy Authoritycertificate If you use the CLI to regenerate these certificates after you upgrade youmust redistribute the newProxy Authority certificate to your clients or users will receive web browser warnings when they browseHTTPS sites if content inspection is enabled

Also if you use a third-party Proxy Server or Proxy Authority certificate

l The CLI commandwill not work unless you first delete either the Proxy Server or Proxy Authoritycertificate The CLI commandwill regenerate both the Proxy Server and Proxy Authority defaultcertificates

l If you originally used a third-party tool to create the CSR you can simply re-import your existing third-party certificate and private key

l If you originally created your CSR from the Firebox youmust create a new CSR to be signed and thenimport a new third-party certificate

CLI Commands to Regenerate Default Firebox CertificatesTo regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use these CLI commands

l To upgrade the default Proxy Authority and Proxy Server certificates for use with HTTPS contentinspection you can use the CLI command upgrade certificate proxy

l To upgrade the Firebox web server certificate use the CLI command upgrade certificate webl To upgrade the SSLVPN certificate use the CLI command upgrade certificate sslvpnl To upgrade the 8021x certificate use the CLI command upgrade certificate 8021x

Formore information about the CLI see the Command Line Interface Reference

Important Information about Firebox Certificates

6 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 7

Fireware and WSM v122 Operating System CompatibilityLast revised 12 December 2017

WSMFirewareComponent

MicrosoftWindows788110

(32-bitamp64-bit)

MicrosoftWindowsServer2012amp2012R2(64-bit)

MicrosoftWindowsServer2016(64-bit)

MacOSXmacOSv1010

v1011v1012ampv1013

Android6x

7x amp8x

iOSv8 v9v10 ampv11

WatchGuard SystemManager

WatchGuard Servers

For information onWatchGuardDimension see the Dimension ReleaseNotes

Single Sign-On Agent(Includes Event LogMonitor)1

Single Sign-On Client

Single Sign-On ExchangeMonitor2

Terminal Services Agent3

Mobile VPN with IPSec 4 4

Mobile VPN with SSL

Notes about Microsoft Windows supportl Windows 8x support does not includeWindows RT

The following browsers are supported for both FirewareWebUI andWebCenter (Javascript required)l IE 11 and laterl Microsoft Edgel Firefox v55l Safari 10l Safari iOS 10l Chrome v60

1The Server Core installation option is supported forWindows Server 20162Microsoft Exchange Server 2007 and 2010 are supported Microsoft Exchange Server 2013 is supported if youinstall Windows Server 2012 or 2012 R2 and NET Framework 353Terminal Services support with manual or Single Sign-On authentication operates in aMicrosoft TerminalServices or Citrix XenApp 45 50 60 65 76 or 712 environment4Native (Cisco) IPSec client andOpenVPN are supported for all recent versions of Mac OS and iOS To useTheWatchGuardMobile VPN with IPSec client with OS 1013 youmust upgrade to the v300 client release

Authentication SupportThis table gives you a quick view of the types of authentication servers supported by key features of FirewareUsing an authentication server gives you the ability to configure user and group-based firewall and VPN policiesin your Firebox or XTM device configuration With each type of third-party authentication server supported youcan specify a backup server IP address for failover

Fully supported by WatchGuard Not yet supported but tested with success by WatchGuardcustomers

Fireware andWSM v122 Operating System Compatibility

8 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 9

ActiveDirectory

1 LDAPRADIUS

2SecurID

2

Firebox(Firebox-DB)

LocalAuthentication

Mobile VPN with IPSecShrew Soft 3 ndash

Mobile VPN withIPSecWatchGuard client (NCP)

Mobile VPN with IPSec for iOS andMacOS X native VPN client

Mobile VPN with IPSec for Androiddevices

ndash

Mobile VPN with SSL forWindows 4 4

Mobile VPN with SSL for Mac

Mobile VPN with SSL for iOS andAndroid devices

Mobile VPN with L2TP 6 ndash ndash

Built-in AuthenticationWeb Page onPort 4100

Single Sign-On Support (with or withoutclient software)

ndash ndash ndash

Terminal Services ManualAuthentication

Terminal Services Authentication withSingle Sign-On

5 ndash ndash ndash ndash

Citrix Manual Authentication

Citrix Manual Authentication with SingleSign-On

5 ndash ndash ndash ndash

1 Active Directory support includes both single domain and multi-domain support unless otherwise noted2 RADIUS and SecurID support includes support for both one-time passphrases and challengeresponse

authentication integrated with RADIUS In many cases SecurID can also be used with other RADIUSimplementations including Vasco

3 The Shrew Soft client does not support two-factor authentication4 Fireware supports RADIUS Filter ID 11 for group authentication5 Both single and multiple domain Active Directory configurations are supported For information about the

supported Operating System compatibility for the WatchGuard TO Agent and SSO Agent see the currentFireware and WSM Operating System Compatibility table

6 Active Directory authentication methods are supported only through a RADIUS server

System RequirementsIf you have WatchGuard SystemManager client software onlyinstalled

If you install WatchGuard SystemManager and WatchGuard Serversoftware

Minimum CPU Intel Core or Xeon

2GHz

Intel Core or Xeon

2GHz

MinimumMemory 1GB 2GB

Minimum AvailableDisk Space

250MB 1GB

MinimumRecommendedScreen Resolution

1024x768 1024x768

FireboxV System RequirementsWith support for installation in both a VMware and a Hyper-V environment aWatchGuard FireboxV virtualmachine can run on a VMware ESXi 55 60 or 65 host or onWindows Server 2012 R2 or 2016 or Hyper-VServer 2012 R2 or 2016

The hardware requirements for FireboxV are the same as for the hypervisor environment it runs in

Each FireboxV virtual machine requires 5 GB of disk space CPU andmemory requirements vary by model

FireboxV Model vCPUs (maximum) Memory (recommended)

Small 2 2048MB

Medium 4 4096MB

Large 8 4096MB

Extra Large 16 4096MB

Fireware andWSM v122 Operating System Compatibility

10 WatchGuard Technologies Inc

Downloading Software

Release Notes 11

Downloading SoftwareYou can download software from theWatchGuard Software Downloads Center

There are several software files available for download with this release See the descriptions below so youknow what software packages you will need for your upgrade

WatchGuard System ManagerWith this software package you can install WSM and theWatchGuard Server Center software

WSM12_2exemdashUse this file to install WSM v122 or to upgradeWatchGuard SystemManager from anearlier version toWSM v122

Fireware OSIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from the FirewareWebUI System gt Upgrade OS page

If you prefer to upgrade from Policy Manager or from an earlier version of Fireware you can use download theFireware OS image for your Firebox or XTM device Use the exe file if you want to install or upgrade theOSusingWSM Use the zip file if you want to install or upgrade theOS manually using FirewareWebUI Use theova or vhd file to deploy a new FireboxV device

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 6: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Important Information about Firebox CertificatesSHA-1 is being deprecated by many popular web browsers andWatchGuard recommends that you now useSHA-256 certificates Because of this we have upgraded our default Firebox certificates Starting withFireware v11104 all newly generated default Firebox certificates use a 2048-bit key length In addition newlygenerated default Proxy Server and Proxy Authority certificates use SHA-256 for their signature hashalgorithm Starting with Fireware v11105 all newly generated default Firebox certificates use SHA-256 fortheir signature hash algorithm New CSRs created from the Firebox also use SHA-256 for their signature hashalgorithm

Default certificates are not automatically upgraded after you install Fireware v11105 or later releases

To regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use the CLI commands described in the next sectionBefore you regenerate the Proxy Server or Proxy Authority certification there are some important things toknow

The Proxy Server certificate is used for inbound HTTPS with content inspection and SMTP with TLSinspection The Proxy Authority certificate is used for outbound HTTPS with content inspection The twocertificates are linked because the default Proxy Server certificate is signed by the default Proxy Authoritycertificate If you use the CLI to regenerate these certificates after you upgrade youmust redistribute the newProxy Authority certificate to your clients or users will receive web browser warnings when they browseHTTPS sites if content inspection is enabled

Also if you use a third-party Proxy Server or Proxy Authority certificate

l The CLI commandwill not work unless you first delete either the Proxy Server or Proxy Authoritycertificate The CLI commandwill regenerate both the Proxy Server and Proxy Authority defaultcertificates

l If you originally used a third-party tool to create the CSR you can simply re-import your existing third-party certificate and private key

l If you originally created your CSR from the Firebox youmust create a new CSR to be signed and thenimport a new third-party certificate

CLI Commands to Regenerate Default Firebox CertificatesTo regenerate any default Firebox certificates delete the certificate and reboot the Firebox If you want toregenerate default certificates without a reboot you can use these CLI commands

l To upgrade the default Proxy Authority and Proxy Server certificates for use with HTTPS contentinspection you can use the CLI command upgrade certificate proxy

l To upgrade the Firebox web server certificate use the CLI command upgrade certificate webl To upgrade the SSLVPN certificate use the CLI command upgrade certificate sslvpnl To upgrade the 8021x certificate use the CLI command upgrade certificate 8021x

Formore information about the CLI see the Command Line Interface Reference

Important Information about Firebox Certificates

6 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 7

Fireware and WSM v122 Operating System CompatibilityLast revised 12 December 2017

WSMFirewareComponent

MicrosoftWindows788110

(32-bitamp64-bit)

MicrosoftWindowsServer2012amp2012R2(64-bit)

MicrosoftWindowsServer2016(64-bit)

MacOSXmacOSv1010

v1011v1012ampv1013

Android6x

7x amp8x

iOSv8 v9v10 ampv11

WatchGuard SystemManager

WatchGuard Servers

For information onWatchGuardDimension see the Dimension ReleaseNotes

Single Sign-On Agent(Includes Event LogMonitor)1

Single Sign-On Client

Single Sign-On ExchangeMonitor2

Terminal Services Agent3

Mobile VPN with IPSec 4 4

Mobile VPN with SSL

Notes about Microsoft Windows supportl Windows 8x support does not includeWindows RT

The following browsers are supported for both FirewareWebUI andWebCenter (Javascript required)l IE 11 and laterl Microsoft Edgel Firefox v55l Safari 10l Safari iOS 10l Chrome v60

1The Server Core installation option is supported forWindows Server 20162Microsoft Exchange Server 2007 and 2010 are supported Microsoft Exchange Server 2013 is supported if youinstall Windows Server 2012 or 2012 R2 and NET Framework 353Terminal Services support with manual or Single Sign-On authentication operates in aMicrosoft TerminalServices or Citrix XenApp 45 50 60 65 76 or 712 environment4Native (Cisco) IPSec client andOpenVPN are supported for all recent versions of Mac OS and iOS To useTheWatchGuardMobile VPN with IPSec client with OS 1013 youmust upgrade to the v300 client release

Authentication SupportThis table gives you a quick view of the types of authentication servers supported by key features of FirewareUsing an authentication server gives you the ability to configure user and group-based firewall and VPN policiesin your Firebox or XTM device configuration With each type of third-party authentication server supported youcan specify a backup server IP address for failover

Fully supported by WatchGuard Not yet supported but tested with success by WatchGuardcustomers

Fireware andWSM v122 Operating System Compatibility

8 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 9

ActiveDirectory

1 LDAPRADIUS

2SecurID

2

Firebox(Firebox-DB)

LocalAuthentication

Mobile VPN with IPSecShrew Soft 3 ndash

Mobile VPN withIPSecWatchGuard client (NCP)

Mobile VPN with IPSec for iOS andMacOS X native VPN client

Mobile VPN with IPSec for Androiddevices

ndash

Mobile VPN with SSL forWindows 4 4

Mobile VPN with SSL for Mac

Mobile VPN with SSL for iOS andAndroid devices

Mobile VPN with L2TP 6 ndash ndash

Built-in AuthenticationWeb Page onPort 4100

Single Sign-On Support (with or withoutclient software)

ndash ndash ndash

Terminal Services ManualAuthentication

Terminal Services Authentication withSingle Sign-On

5 ndash ndash ndash ndash

Citrix Manual Authentication

Citrix Manual Authentication with SingleSign-On

5 ndash ndash ndash ndash

1 Active Directory support includes both single domain and multi-domain support unless otherwise noted2 RADIUS and SecurID support includes support for both one-time passphrases and challengeresponse

authentication integrated with RADIUS In many cases SecurID can also be used with other RADIUSimplementations including Vasco

3 The Shrew Soft client does not support two-factor authentication4 Fireware supports RADIUS Filter ID 11 for group authentication5 Both single and multiple domain Active Directory configurations are supported For information about the

supported Operating System compatibility for the WatchGuard TO Agent and SSO Agent see the currentFireware and WSM Operating System Compatibility table

6 Active Directory authentication methods are supported only through a RADIUS server

System RequirementsIf you have WatchGuard SystemManager client software onlyinstalled

If you install WatchGuard SystemManager and WatchGuard Serversoftware

Minimum CPU Intel Core or Xeon

2GHz

Intel Core or Xeon

2GHz

MinimumMemory 1GB 2GB

Minimum AvailableDisk Space

250MB 1GB

MinimumRecommendedScreen Resolution

1024x768 1024x768

FireboxV System RequirementsWith support for installation in both a VMware and a Hyper-V environment aWatchGuard FireboxV virtualmachine can run on a VMware ESXi 55 60 or 65 host or onWindows Server 2012 R2 or 2016 or Hyper-VServer 2012 R2 or 2016

The hardware requirements for FireboxV are the same as for the hypervisor environment it runs in

Each FireboxV virtual machine requires 5 GB of disk space CPU andmemory requirements vary by model

FireboxV Model vCPUs (maximum) Memory (recommended)

Small 2 2048MB

Medium 4 4096MB

Large 8 4096MB

Extra Large 16 4096MB

Fireware andWSM v122 Operating System Compatibility

10 WatchGuard Technologies Inc

Downloading Software

Release Notes 11

Downloading SoftwareYou can download software from theWatchGuard Software Downloads Center

There are several software files available for download with this release See the descriptions below so youknow what software packages you will need for your upgrade

WatchGuard System ManagerWith this software package you can install WSM and theWatchGuard Server Center software

WSM12_2exemdashUse this file to install WSM v122 or to upgradeWatchGuard SystemManager from anearlier version toWSM v122

Fireware OSIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from the FirewareWebUI System gt Upgrade OS page

If you prefer to upgrade from Policy Manager or from an earlier version of Fireware you can use download theFireware OS image for your Firebox or XTM device Use the exe file if you want to install or upgrade theOSusingWSM Use the zip file if you want to install or upgrade theOS manually using FirewareWebUI Use theova or vhd file to deploy a new FireboxV device

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 7: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Fireware andWSM v122 Operating System Compatibility

Release Notes 7

Fireware and WSM v122 Operating System CompatibilityLast revised 12 December 2017

WSMFirewareComponent

MicrosoftWindows788110

(32-bitamp64-bit)

MicrosoftWindowsServer2012amp2012R2(64-bit)

MicrosoftWindowsServer2016(64-bit)

MacOSXmacOSv1010

v1011v1012ampv1013

Android6x

7x amp8x

iOSv8 v9v10 ampv11

WatchGuard SystemManager

WatchGuard Servers

For information onWatchGuardDimension see the Dimension ReleaseNotes

Single Sign-On Agent(Includes Event LogMonitor)1

Single Sign-On Client

Single Sign-On ExchangeMonitor2

Terminal Services Agent3

Mobile VPN with IPSec 4 4

Mobile VPN with SSL

Notes about Microsoft Windows supportl Windows 8x support does not includeWindows RT

The following browsers are supported for both FirewareWebUI andWebCenter (Javascript required)l IE 11 and laterl Microsoft Edgel Firefox v55l Safari 10l Safari iOS 10l Chrome v60

1The Server Core installation option is supported forWindows Server 20162Microsoft Exchange Server 2007 and 2010 are supported Microsoft Exchange Server 2013 is supported if youinstall Windows Server 2012 or 2012 R2 and NET Framework 353Terminal Services support with manual or Single Sign-On authentication operates in aMicrosoft TerminalServices or Citrix XenApp 45 50 60 65 76 or 712 environment4Native (Cisco) IPSec client andOpenVPN are supported for all recent versions of Mac OS and iOS To useTheWatchGuardMobile VPN with IPSec client with OS 1013 youmust upgrade to the v300 client release

Authentication SupportThis table gives you a quick view of the types of authentication servers supported by key features of FirewareUsing an authentication server gives you the ability to configure user and group-based firewall and VPN policiesin your Firebox or XTM device configuration With each type of third-party authentication server supported youcan specify a backup server IP address for failover

Fully supported by WatchGuard Not yet supported but tested with success by WatchGuardcustomers

Fireware andWSM v122 Operating System Compatibility

8 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 9

ActiveDirectory

1 LDAPRADIUS

2SecurID

2

Firebox(Firebox-DB)

LocalAuthentication

Mobile VPN with IPSecShrew Soft 3 ndash

Mobile VPN withIPSecWatchGuard client (NCP)

Mobile VPN with IPSec for iOS andMacOS X native VPN client

Mobile VPN with IPSec for Androiddevices

ndash

Mobile VPN with SSL forWindows 4 4

Mobile VPN with SSL for Mac

Mobile VPN with SSL for iOS andAndroid devices

Mobile VPN with L2TP 6 ndash ndash

Built-in AuthenticationWeb Page onPort 4100

Single Sign-On Support (with or withoutclient software)

ndash ndash ndash

Terminal Services ManualAuthentication

Terminal Services Authentication withSingle Sign-On

5 ndash ndash ndash ndash

Citrix Manual Authentication

Citrix Manual Authentication with SingleSign-On

5 ndash ndash ndash ndash

1 Active Directory support includes both single domain and multi-domain support unless otherwise noted2 RADIUS and SecurID support includes support for both one-time passphrases and challengeresponse

authentication integrated with RADIUS In many cases SecurID can also be used with other RADIUSimplementations including Vasco

3 The Shrew Soft client does not support two-factor authentication4 Fireware supports RADIUS Filter ID 11 for group authentication5 Both single and multiple domain Active Directory configurations are supported For information about the

supported Operating System compatibility for the WatchGuard TO Agent and SSO Agent see the currentFireware and WSM Operating System Compatibility table

6 Active Directory authentication methods are supported only through a RADIUS server

System RequirementsIf you have WatchGuard SystemManager client software onlyinstalled

If you install WatchGuard SystemManager and WatchGuard Serversoftware

Minimum CPU Intel Core or Xeon

2GHz

Intel Core or Xeon

2GHz

MinimumMemory 1GB 2GB

Minimum AvailableDisk Space

250MB 1GB

MinimumRecommendedScreen Resolution

1024x768 1024x768

FireboxV System RequirementsWith support for installation in both a VMware and a Hyper-V environment aWatchGuard FireboxV virtualmachine can run on a VMware ESXi 55 60 or 65 host or onWindows Server 2012 R2 or 2016 or Hyper-VServer 2012 R2 or 2016

The hardware requirements for FireboxV are the same as for the hypervisor environment it runs in

Each FireboxV virtual machine requires 5 GB of disk space CPU andmemory requirements vary by model

FireboxV Model vCPUs (maximum) Memory (recommended)

Small 2 2048MB

Medium 4 4096MB

Large 8 4096MB

Extra Large 16 4096MB

Fireware andWSM v122 Operating System Compatibility

10 WatchGuard Technologies Inc

Downloading Software

Release Notes 11

Downloading SoftwareYou can download software from theWatchGuard Software Downloads Center

There are several software files available for download with this release See the descriptions below so youknow what software packages you will need for your upgrade

WatchGuard System ManagerWith this software package you can install WSM and theWatchGuard Server Center software

WSM12_2exemdashUse this file to install WSM v122 or to upgradeWatchGuard SystemManager from anearlier version toWSM v122

Fireware OSIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from the FirewareWebUI System gt Upgrade OS page

If you prefer to upgrade from Policy Manager or from an earlier version of Fireware you can use download theFireware OS image for your Firebox or XTM device Use the exe file if you want to install or upgrade theOSusingWSM Use the zip file if you want to install or upgrade theOS manually using FirewareWebUI Use theova or vhd file to deploy a new FireboxV device

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 8: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

1The Server Core installation option is supported forWindows Server 20162Microsoft Exchange Server 2007 and 2010 are supported Microsoft Exchange Server 2013 is supported if youinstall Windows Server 2012 or 2012 R2 and NET Framework 353Terminal Services support with manual or Single Sign-On authentication operates in aMicrosoft TerminalServices or Citrix XenApp 45 50 60 65 76 or 712 environment4Native (Cisco) IPSec client andOpenVPN are supported for all recent versions of Mac OS and iOS To useTheWatchGuardMobile VPN with IPSec client with OS 1013 youmust upgrade to the v300 client release

Authentication SupportThis table gives you a quick view of the types of authentication servers supported by key features of FirewareUsing an authentication server gives you the ability to configure user and group-based firewall and VPN policiesin your Firebox or XTM device configuration With each type of third-party authentication server supported youcan specify a backup server IP address for failover

Fully supported by WatchGuard Not yet supported but tested with success by WatchGuardcustomers

Fireware andWSM v122 Operating System Compatibility

8 WatchGuard Technologies Inc

Fireware andWSM v122 Operating System Compatibility

Release Notes 9

ActiveDirectory

1 LDAPRADIUS

2SecurID

2

Firebox(Firebox-DB)

LocalAuthentication

Mobile VPN with IPSecShrew Soft 3 ndash

Mobile VPN withIPSecWatchGuard client (NCP)

Mobile VPN with IPSec for iOS andMacOS X native VPN client

Mobile VPN with IPSec for Androiddevices

ndash

Mobile VPN with SSL forWindows 4 4

Mobile VPN with SSL for Mac

Mobile VPN with SSL for iOS andAndroid devices

Mobile VPN with L2TP 6 ndash ndash

Built-in AuthenticationWeb Page onPort 4100

Single Sign-On Support (with or withoutclient software)

ndash ndash ndash

Terminal Services ManualAuthentication

Terminal Services Authentication withSingle Sign-On

5 ndash ndash ndash ndash

Citrix Manual Authentication

Citrix Manual Authentication with SingleSign-On

5 ndash ndash ndash ndash

1 Active Directory support includes both single domain and multi-domain support unless otherwise noted2 RADIUS and SecurID support includes support for both one-time passphrases and challengeresponse

authentication integrated with RADIUS In many cases SecurID can also be used with other RADIUSimplementations including Vasco

3 The Shrew Soft client does not support two-factor authentication4 Fireware supports RADIUS Filter ID 11 for group authentication5 Both single and multiple domain Active Directory configurations are supported For information about the

supported Operating System compatibility for the WatchGuard TO Agent and SSO Agent see the currentFireware and WSM Operating System Compatibility table

6 Active Directory authentication methods are supported only through a RADIUS server

System RequirementsIf you have WatchGuard SystemManager client software onlyinstalled

If you install WatchGuard SystemManager and WatchGuard Serversoftware

Minimum CPU Intel Core or Xeon

2GHz

Intel Core or Xeon

2GHz

MinimumMemory 1GB 2GB

Minimum AvailableDisk Space

250MB 1GB

MinimumRecommendedScreen Resolution

1024x768 1024x768

FireboxV System RequirementsWith support for installation in both a VMware and a Hyper-V environment aWatchGuard FireboxV virtualmachine can run on a VMware ESXi 55 60 or 65 host or onWindows Server 2012 R2 or 2016 or Hyper-VServer 2012 R2 or 2016

The hardware requirements for FireboxV are the same as for the hypervisor environment it runs in

Each FireboxV virtual machine requires 5 GB of disk space CPU andmemory requirements vary by model

FireboxV Model vCPUs (maximum) Memory (recommended)

Small 2 2048MB

Medium 4 4096MB

Large 8 4096MB

Extra Large 16 4096MB

Fireware andWSM v122 Operating System Compatibility

10 WatchGuard Technologies Inc

Downloading Software

Release Notes 11

Downloading SoftwareYou can download software from theWatchGuard Software Downloads Center

There are several software files available for download with this release See the descriptions below so youknow what software packages you will need for your upgrade

WatchGuard System ManagerWith this software package you can install WSM and theWatchGuard Server Center software

WSM12_2exemdashUse this file to install WSM v122 or to upgradeWatchGuard SystemManager from anearlier version toWSM v122

Fireware OSIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from the FirewareWebUI System gt Upgrade OS page

If you prefer to upgrade from Policy Manager or from an earlier version of Fireware you can use download theFireware OS image for your Firebox or XTM device Use the exe file if you want to install or upgrade theOSusingWSM Use the zip file if you want to install or upgrade theOS manually using FirewareWebUI Use theova or vhd file to deploy a new FireboxV device

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 9: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Fireware andWSM v122 Operating System Compatibility

Release Notes 9

ActiveDirectory

1 LDAPRADIUS

2SecurID

2

Firebox(Firebox-DB)

LocalAuthentication

Mobile VPN with IPSecShrew Soft 3 ndash

Mobile VPN withIPSecWatchGuard client (NCP)

Mobile VPN with IPSec for iOS andMacOS X native VPN client

Mobile VPN with IPSec for Androiddevices

ndash

Mobile VPN with SSL forWindows 4 4

Mobile VPN with SSL for Mac

Mobile VPN with SSL for iOS andAndroid devices

Mobile VPN with L2TP 6 ndash ndash

Built-in AuthenticationWeb Page onPort 4100

Single Sign-On Support (with or withoutclient software)

ndash ndash ndash

Terminal Services ManualAuthentication

Terminal Services Authentication withSingle Sign-On

5 ndash ndash ndash ndash

Citrix Manual Authentication

Citrix Manual Authentication with SingleSign-On

5 ndash ndash ndash ndash

1 Active Directory support includes both single domain and multi-domain support unless otherwise noted2 RADIUS and SecurID support includes support for both one-time passphrases and challengeresponse

authentication integrated with RADIUS In many cases SecurID can also be used with other RADIUSimplementations including Vasco

3 The Shrew Soft client does not support two-factor authentication4 Fireware supports RADIUS Filter ID 11 for group authentication5 Both single and multiple domain Active Directory configurations are supported For information about the

supported Operating System compatibility for the WatchGuard TO Agent and SSO Agent see the currentFireware and WSM Operating System Compatibility table

6 Active Directory authentication methods are supported only through a RADIUS server

System RequirementsIf you have WatchGuard SystemManager client software onlyinstalled

If you install WatchGuard SystemManager and WatchGuard Serversoftware

Minimum CPU Intel Core or Xeon

2GHz

Intel Core or Xeon

2GHz

MinimumMemory 1GB 2GB

Minimum AvailableDisk Space

250MB 1GB

MinimumRecommendedScreen Resolution

1024x768 1024x768

FireboxV System RequirementsWith support for installation in both a VMware and a Hyper-V environment aWatchGuard FireboxV virtualmachine can run on a VMware ESXi 55 60 or 65 host or onWindows Server 2012 R2 or 2016 or Hyper-VServer 2012 R2 or 2016

The hardware requirements for FireboxV are the same as for the hypervisor environment it runs in

Each FireboxV virtual machine requires 5 GB of disk space CPU andmemory requirements vary by model

FireboxV Model vCPUs (maximum) Memory (recommended)

Small 2 2048MB

Medium 4 4096MB

Large 8 4096MB

Extra Large 16 4096MB

Fireware andWSM v122 Operating System Compatibility

10 WatchGuard Technologies Inc

Downloading Software

Release Notes 11

Downloading SoftwareYou can download software from theWatchGuard Software Downloads Center

There are several software files available for download with this release See the descriptions below so youknow what software packages you will need for your upgrade

WatchGuard System ManagerWith this software package you can install WSM and theWatchGuard Server Center software

WSM12_2exemdashUse this file to install WSM v122 or to upgradeWatchGuard SystemManager from anearlier version toWSM v122

Fireware OSIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from the FirewareWebUI System gt Upgrade OS page

If you prefer to upgrade from Policy Manager or from an earlier version of Fireware you can use download theFireware OS image for your Firebox or XTM device Use the exe file if you want to install or upgrade theOSusingWSM Use the zip file if you want to install or upgrade theOS manually using FirewareWebUI Use theova or vhd file to deploy a new FireboxV device

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 10: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

1 Active Directory support includes both single domain and multi-domain support unless otherwise noted2 RADIUS and SecurID support includes support for both one-time passphrases and challengeresponse

authentication integrated with RADIUS In many cases SecurID can also be used with other RADIUSimplementations including Vasco

3 The Shrew Soft client does not support two-factor authentication4 Fireware supports RADIUS Filter ID 11 for group authentication5 Both single and multiple domain Active Directory configurations are supported For information about the

supported Operating System compatibility for the WatchGuard TO Agent and SSO Agent see the currentFireware and WSM Operating System Compatibility table

6 Active Directory authentication methods are supported only through a RADIUS server

System RequirementsIf you have WatchGuard SystemManager client software onlyinstalled

If you install WatchGuard SystemManager and WatchGuard Serversoftware

Minimum CPU Intel Core or Xeon

2GHz

Intel Core or Xeon

2GHz

MinimumMemory 1GB 2GB

Minimum AvailableDisk Space

250MB 1GB

MinimumRecommendedScreen Resolution

1024x768 1024x768

FireboxV System RequirementsWith support for installation in both a VMware and a Hyper-V environment aWatchGuard FireboxV virtualmachine can run on a VMware ESXi 55 60 or 65 host or onWindows Server 2012 R2 or 2016 or Hyper-VServer 2012 R2 or 2016

The hardware requirements for FireboxV are the same as for the hypervisor environment it runs in

Each FireboxV virtual machine requires 5 GB of disk space CPU andmemory requirements vary by model

FireboxV Model vCPUs (maximum) Memory (recommended)

Small 2 2048MB

Medium 4 4096MB

Large 8 4096MB

Extra Large 16 4096MB

Fireware andWSM v122 Operating System Compatibility

10 WatchGuard Technologies Inc

Downloading Software

Release Notes 11

Downloading SoftwareYou can download software from theWatchGuard Software Downloads Center

There are several software files available for download with this release See the descriptions below so youknow what software packages you will need for your upgrade

WatchGuard System ManagerWith this software package you can install WSM and theWatchGuard Server Center software

WSM12_2exemdashUse this file to install WSM v122 or to upgradeWatchGuard SystemManager from anearlier version toWSM v122

Fireware OSIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from the FirewareWebUI System gt Upgrade OS page

If you prefer to upgrade from Policy Manager or from an earlier version of Fireware you can use download theFireware OS image for your Firebox or XTM device Use the exe file if you want to install or upgrade theOSusingWSM Use the zip file if you want to install or upgrade theOS manually using FirewareWebUI Use theova or vhd file to deploy a new FireboxV device

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 11: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Downloading Software

Release Notes 11

Downloading SoftwareYou can download software from theWatchGuard Software Downloads Center

There are several software files available for download with this release See the descriptions below so youknow what software packages you will need for your upgrade

WatchGuard System ManagerWith this software package you can install WSM and theWatchGuard Server Center software

WSM12_2exemdashUse this file to install WSM v122 or to upgradeWatchGuard SystemManager from anearlier version toWSM v122

Fireware OSIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from the FirewareWebUI System gt Upgrade OS page

If you prefer to upgrade from Policy Manager or from an earlier version of Fireware you can use download theFireware OS image for your Firebox or XTM device Use the exe file if you want to install or upgrade theOSusingWSM Use the zip file if you want to install or upgrade theOS manually using FirewareWebUI Use theova or vhd file to deploy a new FireboxV device

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 12: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

If you havehellip Select from these Fireware OS packages

Firebox M5600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M4600 Firebox_OS_M4600_M5600_12_2exefirebox_M4600_M5600_12_2zip

Firebox M670 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M570 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M500 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M470 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M440 Firebox_OS_M440_12_2exefirebox_M440_12_2zip

Firebox M400 Firebox_OS_M400_M500_12_2exefirebox_M400_M500_12_2zip

Firebox M370 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M300 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox M270 Firebox_OS_M270_M370_M470_M570_M670_12_2exefirebox_M_270_M370_M470_M570_M670_12_2zip

Firebox M200 Firebox_OS_M200_M300_12_2exefirebox_M200_M300_12_2zip

Firebox T70 Firebox_OS_T70_12_2exefirebox_T70_12_2zip

Firebox T55 Firebox_OS_T55_12_2exefirebox_T55_12_2zip

Firebox T50 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Firebox T35 Firebox_OS_T35_12_2exefirebox_T35_12_2zip

Firebox T30 Firebox_OS_T30_T50_12_2exefirebox_T30_T50_12_2zip

Downloading Software

12 WatchGuard Technologies Inc

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 13: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Downloading Software

Release Notes 13

If you havehellip Select from these Fireware OS packages

Firebox T15 Firebox_OS_T15_12_2exefirebox_T15_12_2zip

Firebox T10 Firebox_OS_T10_12_2exefirebox_T10_12_2zip

FireboxVAll editions for VMware

FireboxV_12_2ovaXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

FireboxVAll editions for Hyper-V

FireboxV_12_2_vhdzipXTM_OS_FireboxV_12_2exextm_FireboxV_12_2zip

Firebox Cloud FireboxCloud_12_2zip

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 14: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Single Sign-On SoftwareThese files are available for Single Sign-OnThe SSOAgent software has been updated with this release

l WG-Authentication-Gateway_12_2exe (SSOAgent software - required for Single Sign-On andincludes optional Event LogMonitor for clientless SSO)

l WG-Authentication-Client_11122msi (SSOClient software forWindows)l WG-SSOCLIENT-MAC_12_0dmg (SSOClient software for Mac OS X)l SSOExchangeMonitor_x86_12_0exe (ExchangeMonitor for 32-bit operating systems)l SSOExchangeMonitor_x64_12_0exe (ExchangeMonitor for 64-bit operating systems)

For information about how to install and set up Single Sign-On see the product documentation

WebBlocker On-Premises ServerThe 122 release introduced support for an on-premises server forWebBlocker The current release ofWebBlocker Server is 10

l watchguard-webblocker_1_0ova (For vSphere deployment)l watchguard-webblocker_1_0vhdzip (For Hyper-V deployment)

Terminal Services Authentication SoftwareThis file is not updated with the Fireware v122 release

l TO_AGENT_SETUP_11_12exe (This installer includes both 32-bit and 64-bit file support)

Mobile VPN with SSL Client for Windows and MacThere are two files available for download if you useMobile VPN with SSL Both files are updated with thisrelease

l WG-MVPN-SSL_12_2exe (Client software forWindows)l WG-MVPN-SSL_12_2dmg (Client software for Mac)

Mobile VPN with IPSec client for Windows and MacThere are several available files to download

Shrew Soft Client

l Shrew Soft Client 222 for Windows - No client license required

WatchGuard IPSec Mobile VPN Clients

The current WatchGuard IPSec Mobile VPN Client forWindows version is 1213

l WatchGuard IPSec Mobile VPN Client for Windows (32-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

l WatchGuard IPSec Mobile VPN Client for Windows (64-bit) powered by NCP - There is alicense required for this premium client with a 30-day free trial available with download

The current macOS client version is 300

l WatchGuard IPSec Mobile VPN Client for macOS powered by NCP - There is a license requiredfor this premium client with a 30-day free trial available with download

WatchGuard Mobile VPN License Server

Downloading Software

14 WatchGuard Technologies Inc

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 15: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Upgrade Notes

Release Notes 15

l WatchGuard Mobile VPN License Server (MVLS) v20 powered by NCP- Click here for moreinformation about MVLS If you have a VPN bundle ID for macOS it must be updated on the licenseserver to support the new macOS 300 client To update your bundle ID contact WatchGuard CustomerSupport Make sure to have your existing bundle ID available to expedite the update

Upgrade Notes

XTM Appliances do not support FIreware 122 and higherWatchGuard continues to add new features and services to enhance our customersrsquo security The continuedgrowth of the Fireware OS means it is no longer suitable for older generation appliances with more limitedresources The new Fireware 122 release is only available on Firebox appliances Fireware 122 andsubsequent releases greater than 122 will not be available on any XTM appliances WatchGuard will continueto provide updates to the 121x firmware versions to provide bug fixes and important security updates asrequired

Customers with XTM appliances may want to consider trade-up to the newer Firebox models Full details abouttheWatchGuard Trade-up program are available here Customer Loyalty Trade Up Program

WebBlocker Server with SurfControl End of LifeThe local WebBlocker Server with SurfControl is not supported in Fireware v122 If you use Policy Managerv122 to save a configuration file to a Firebox that runs v121x or lower and uses a local WebBlocker Serverwith SurfControl the configuration file will be automatically updated to useWebBlocker Cloud

If you want to continue to use the local WebBlocker Server with SurfControl save your configuration file withFirewareWebUI or Policy Manager v121x

It is important to understand that after 30 November 2018 all new and cached queries made to theWebBlocker Server with SurfControl will return uncategorized responses This is because of our vendorpartners license procedures for end-of-life products We recommend that you upgrade toWebBlocker Cloud orswitch to the new on-premises WebBlocker Server when it is available

SSLTLS Settings Precedence and InheritanceFour Firebox features use SSLTLS for secure communication and share the sameOpenVPN serverManagement Tunnel over SSL on hub devices BOVPN over TLS in Server mode Mobile VPN with SSL andthe Access Portal These features also share some settings When you enablemore than one of thesefeatures settings for some features have a higher precedence than settings for other features Shared settingsare not configurable for the features with lower precedence For more information see this topic in FirewareHelp

Modem Configurations Converted to External Interfaces with Failover EnabledIf your Firebox was configured for modem failover when you upgrade your Firebox to Fireware v121 or higherthemodem configuration is automatically converted to an external interface with modem failover enabled If allother external interfaces become unavailable traffic automatically fails over to themodem interface Modeminterfaces can also participate in multi-WAN on all devices except the Firebox T10 Firebox T15 and XTM 2Series devices that do not have the Pro upgrade

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 16: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

HTTPS Proxy Content Inspection with Fireware v121With Fireware 121 we updated the HTTPS proxy action to include a Content Inspection Exceptions list whichincludes domains for services such as Dropbox Skype andMicrosoft Office that are known to be incompatiblewith content inspection The HTTPS proxy does not perform content inspection for domains with enabledexceptions on the Content Inspection Exceptions list

When you upgrade your Firebox to Fireware v121 or higher the Content Inspection Exceptions list isautomatically enabled in all HTTPS proxy actions that have content inspection enabled After the upgrade werecommend that you review the Content Inspection Exceptions list in your configured HTTPS proxy actionsand disable the exception for any domain you do not want the HTTPS proxy to allow without content inspectionFor more information seeWhich applications are on the default exception list in an HTTPS proxy action in theKnowledge Base

Gateway AV Engine Upgrade with Fireware v120With Fireware v120 we updated the engine used by Gateway AV to a new engine from BitDefender As aresult any Firebox that upgrades from Fireware v11x version to v120 or later must download a new signatureset which can take 7-10minutes for the first update It can take an additional 5-7minutes to synchronize aFireCluster We recommend that you upgrade to Fireware v12x at a quiet time on your network After the initialupdate signature updates are incremental andmuch faster than in previous versions

While the new signature set is being downloaded network users could experience issues related to GatewayAV scan failures for several minutes after the update and inbound emails sent through the SMTP proxy couldbe locked

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Upgrade Notes

16 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 17: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Upgrade to Fireware v122

Release Notes 17

Upgrade to Fireware v122

If your Firebox is a T10 with Fireware v121 or older youmight not be able to perform abackup before you upgrade the Firebox This occurs because thememory use by Firewarev121 or older does not leave enoughmemory free to successfully complete the upgradeprocess on these devices For these devices we recommend you save a copy of the xmlconfiguration file with a distinctive name as described here Save the Configuration File

If you need to downgrade a Firebox without a backup file after you complete the upgrade toFireware v12x we recommend you Downgrade withWebUI This process deletes theconfiguration file but does not remove the device feature keys and certificates After youdowngrade the Firebox you can use Policy Manager to Save the Configuration File to theFireboxIf your Firebox has Fireware v1211 or later the Firebox will temporarily disable somesecurity services to free up enoughmemory to successfully perform a backup To learnmoresee Backup and Restore for XTM 25 XTM 26 and Firebox T10

Important Information about the upgrade process

l We recommend you use FirewareWebUI to upgrade to Fireware v12x You can also use PolicyManager if you prefer

l We strongly recommend that you save a local copy of your Firebox configuration and create a Fireboxbackup image before you upgrade

l If you useWatchGuard SystemManager (WSM) make sure yourWSM version is equal to or higherthan the version of Fireware OS installed on your Firebox and the version of WSM installed on yourManagement Server Also make sure to upgradeWSM before you upgrade the version of Fireware OSon your Firebox

If you want to upgrade a Firebox T10 device we recommend that you reboot your Fireboxbefore you upgrade This clears your devicememory and can prevent many problemscommonly associated with upgrades in those devices

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 18: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Back Up Your WatchGuard ServersIt is not usually necessary to uninstall your previous v11x or v12x server or client software when you upgradetoWSM v12x You can install the v12x server and client software on top of your existing installation toupgrade yourWatchGuard software components We do however strongly recommend that you back up yourWatchGuard Servers (for example yourWatchGuardManagement Server) to a safe location before youupgrade You will need these backup files if you ever want to downgrade

You cannot restore aWatchGuard Server backup file created withWatchGuard SystemManager v12x to to a v11x installation Make sure to retain your older server backup fileswhen you upgrade to v120 or later in case you want to downgrade in the future

To back up your Management Server configuration from the computer where you installed theManagementServer

1 FromWatchGuard Server Center select BackupRestore Management ServerThe WatchGuard Server Center BackupRestore Wizard starts

2 Click NextThe Select an action screen appears

3 Select Back up settings4 Click Next

The Specify a backup file screen appears5 Click Browse to select a location for the backup file Make sure you save the configuration file to a

location you can access later to restore the configuration6 Click Next

The WatchGuard Server Center BackupRestore Wizard is complete screen appears7 Click Finish to exit the wizard

Upgrade to Fireware v122 fromWeb UIIf your Firebox is running Fireware v1110 or later you can upgrade the Fireware OS on your Fireboxautomatically from theSystem gt Upgrade OS page If your Firebox is running v119x or earlier use thesesteps to upgrade

1 Before you begin save a local copy of your configuration file2 Go toSystem gt Backup Image or use the USB Backup feature to back up your current device image3 On your management computer launch the OS software file you downloaded from theWatchGuard

Software Downloads pageIf you use theWindows-based installer on a computer with aWindows 64-bit operating system thisinstallation extracts an upgrade file called [product series]_[product code]sysa-dl to the defaultlocation of CProgram Files(x86)Common FilesWatchGuardresourcesFirewareXTM122[model] or[model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Connect to your Firebox with theWebUI and select System gt Upgrade OS5 Browse to the location of the [product series]_[product code]sysa-dl from Step 2 and click Upgrade

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

Upgrade to Fireware v122

18 WatchGuard Technologies Inc

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 19: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Upgrade to Fireware v122

Release Notes 19

Upgrade to Fireware v122 fromWSMPolicy Manager1 Before you begin save a local copy of your configuration file2 Select File gt Backup or use the USB Backup feature to back up your current device image3 On amanagement computer running aWindows 64-bit operating system launch the OS executable file

you downloaded from theWatchGuard Portal This installation extracts an upgrade file called [Firebox orxtm series]_[product code]sysa-dl to the default location of CProgram Files(x86)CommonfilesWatchGuardresourcesFirewareXTM122[model] or [model][product_code]On a computer with aWindows 32-bit operating system the path is CProgram FilesCommonFilesWatchGuardresourcesFirewareXTM122

4 Install and openWatchGuard SystemManager v122 Connect to your Firebox and launch PolicyManager

5 From Policy Manager select File gt Upgrade When prompted browse to and select the [productseries]_[product code]sysa-dl file from Step 2

If you have installed a beta release of Fireware v122 on your computer youmust run the Fireware v122installer twice (once to remove v122 software and again to install v122)

If you like tomake updates to your Firebox configuration from a saved configuration file makesure you open the configuration from the Firebox and save it to a new file after you upgradeThis is to make sure that you do not overwrite any configuration changes that weremade aspart of the upgrade

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

WatchGuard updated the certificate used to sign the ova files with the release of Firewarev1111 When you deploy the OVF template a certificate error may appear in the OVF templatedetails This error occurs when the host machine is missing an intermediate certificate fromSymantic (Symantec Class 3 SHA256 Code Signing CA) and theWindows CryptoAPI wasunable to download it To resolve this error you can download and install the certificate fromSymantec

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 20: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Update AP DevicesBeginning with Fireware v11124 AP firmware is no longer bundled with Fireware OS All AP device firmwareis managed by the Gateway Wireless Controller on your Firebox TheGateway Wireless Controllerautomatically checks for new AP firmware updates and enables you to download the firmware directly fromWatchGuard servers

Important Upgrade StepsIf you have not previously upgraded to Fireware 1201 or higher and the latest AP firmware youmust performthese steps

1 Make sure all your APs are online You can check AP status from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager selecttheGateway Wireless Controller tab

2 Make sure you are not using insecure default AP passphrases such as wgwap orwatchguard Yourcurrent AP passphrasemust be secure and at least 8 characters in length You can change your APpassphrase inNetwork gt Gateway Wireless Controller gt Settings

If you do not have a secure passphrase correctly configured before the upgrade you will losethemanagement connection with your deployed APs If this occurs youmust physicallyreset the APs to factory default settings to be able tomanage the APs from GatewayWireless Controller

Depending on the version of Fireware you are upgrading from youmay need tomark APs as trusted after theupgrade to Fireware v1201 or higher You canmark APs as trusted from FirewareWebUI inDashboardgt Gateway Wireless Controller on theAccess Points tab or from Firebox SystemManager select theGateway Wireless Controller tab

Update AP Devices

20 WatchGuard Technologies Inc

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 21: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Update AP Devices

Release Notes 21

AP Firmware UpgradeThe current AP firmware versions for each AP devicemodel are

AP Device Model Current Firmware Version

AP100 AP102 AP200 12916

AP300 20011

AP120 AP320 AP322 AP325AP420

850-658

Tomanage AP firmware and download the latest AP firmware to your Firebox

n From FirewareWebUI select Dashboard gt Gateway Wireless Controller From theSummary tabclick Manage Firmware

n From Firebox SystemManager select theGateway Wireless Controller tab then click ManageFirmware

Note that you cannot upgrade an AP120 AP320 AP322 or AP420 to 830-657 or higher unless your Firebox isrunning Fireware v11124 or higher If your Firebox does not run v11124 or higher you will not see an optionto upgrade to AP firmware v830-657 or higher

If you have enabled automatic AP device firmware updates in Gateway Wireless Controller your AP devicesare automatically updated betweenmidnight and 400am local time

Tomanually update firmware on your AP devices

1 On theAccess Points tab select one or more AP devices2 From theActions drop-down list click Upgrade3 Click Yes to confirm that you want to upgrade the AP device

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 22: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Upgrade your FireCluster to Fireware v122You can upgrade Fireware OS for a FireCluster from Policy Manager or FirewareWebUI To upgrade aFireCluster from Fireware v1110x or lower we recommend you use Policy Manager

As part of the upgrade process each cluster member reboots and rejoins the cluster Because the clustercannot do load balancing while a cluster member reboot is in progress we recommend you upgrade anactiveactive cluster at a time when the network traffic is lightest

For information on how to upgrade your FireCluster see this Help topic

There is an upgrade issue that affects some Firebox M400M500 andM440 devices Pleasereview this knowledge base article carefully before you upgrade

Before you upgrade to Fireware v1111 or higher your Firebox must be running- Fireware XTM v1175- Fireware XTM v1184- Fireware XTM v119 or higher

If you try to upgrade from Policy Manager and your Firebox is running an unsupported versionthe upgrade is prevented

If you try to schedule anOS update of managed devices through aManagement Server theupgrade is also prevented

If you use the FirewareWebUI to upgrade your device you see a warning but it is possible tocontinue so youmust make sure your Firebox is running v1175 v1184 or v119x before youupgrade to Fireware v1111x or higher or your Firebox will be reset to a default state

Upgrade your FireCluster to Fireware v122

22 WatchGuard Technologies Inc

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 23: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Downgrade Instructions

Release Notes 23

Downgrade Instructions

Downgrade from WSM v122 to earlier WSM v12x or v11xIf you want to revert fromWSM v122 to an earlier version youmust uninstall WSM v122When you uninstallchooseYeswhen the uninstaller asks if you want to delete server configuration and data files After the serverconfiguration and data files are deleted youmust restore the data and server configuration files you backed upbefore you upgraded toWSM v122

Next install the same version of WSM that you used before you upgraded toWSM v122 The installer shoulddetect your existing server configuration and try to restart your servers from the Finish dialog box If you use aWatchGuardManagement Server useWatchGuard Server Center to restore the backupManagement Serverconfiguration you created before you first upgraded toWSM v122 Verify that all WatchGuard servers arerunning

Downgrade from Fireware v122 to earlier Fireware v12x or v11x

If you use the FirewareWebUI or CLI to downgrade from Fireware v122 to an earlier versionthe downgrade process resets the network and security settings on your device to theirfactory-default settings The downgrade process does not change the device passphrasesand does not remove the feature keys and certificates

If you want to downgrade from Fireware v122 to an earlier version of Fireware the recommendedmethod is touse a backup image that you created before the upgrade to Fireware v122 With a backup image you caneither

l Restore the full backup image you created when you upgraded to Fireware v122 to complete thedowngrade or

l Use the USB backup file you created before the upgrade as your auto-restore image and then boot intorecovery mode with the USB drive plugged in to your device

See Fireware Help for more information about these downgrade procedures and information about how todowngrade if you do not have a backup image

Downgrade RestrictionsSee this Knowledge Base article for a list of downgrade restrictions

When you downgrade the Fireware OS on your Firebox the firmware on any paired AP devicesis not automatically downgraded We recommend that you reset the AP device to its factory-default settings tomake sure that it can bemanaged by the older version of Fireware OS

This page does not include every issue resolved in a releaseIssues discovered in internal testing or beta testing are not usually included in this list

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 24: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Enhancements and Resolved Issues in Fireware 122

Generall The Firebox now correctly hashes dynamic DNS passphrases in the xml configuration file and doesnot display them in plain text [FBX-10470 FBX-10849]

l The Firebox now correctly hashes SNMPv3 passphrases in the xml configuration file and does notdisplay them in plain text [FBX-10487]

l This release resolves an issue that caused the Firebox to sometimes fail to update [FBX-12001]l The Firebox SystemManager certificates view has improved filter options [FBX-11903]l The Firebox default CA bundle now includes the Comodo CA [FBX-12058]l Policy Manager now prompts you to create a backup file before you upgrade on all Firebox models [FBX-

12135]l This release resolves amemory management issue that caused Firebox T10 and T35 devices to crash

[FBX-10641]l This release resolves a FirewareWebUI issue in which Javascript would crash when you sortcertificates by type [FBX-12234]

l When you edit a Policy Template the Protocols list now resizes correctly when you resize the dialogbox [FBX-12235]

l An issue that caused policies to reorder has been resolved [FBX-12330]l Quick SetupWizard can now connect to a Firebox in sysB recovery mode [FBX-12650]l TheMaster Control Panel shortcut no longer causes Policy Manager to crash onWindows 10 withCreators Update [FBX-5931]

l The FirewareWebUI Front Panel now displays send and receive KB values for interfaces for aFireCluster [FBX-3069]

l FirewareWebUI users can no longer reveal the log encryption key with the Chrome inspect command[FBX-11008]

l You can now save a configuration file to the Firebox with FirewareWebUI [FBX-10959]l Firebox Cloud now supports WatchGuard SystemManager [FBX-8898]l This release allows you to configure policies tomanage traffic from the Firebox [FBX-4714]l This release features improvements to the certificate import process [FBX-3905]l This release resolves amemory leak with snmpd [FBX-10994]

Authenticationl Single Sign-On now supports multiple redundant SSOAgents [FBX-8944]l Firebox Cloud now supports Single Sign-On [SSO-163]l The default port that shows in the RADIUS port tool tip in Policy Manager has been corrected [FBX-

12440]l This release introduces the SSO Agent Connection Tool in Firebox SystemManager [FBX-5839]

Access Portall You can now successfully add an RDP host to the Access Portal for use with Firebox M270 devices

[FBX-12486]l Access Portal now correctly allows image upload without false errors [FBX-11968]

Enhancements and Resolved Issues in Fireware 122

24 WatchGuard Technologies Inc

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 25: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Enhancements and Resolved Issues in Fireware 122

Release Notes 25

Integrationsl More contextual information has been added to the ticket and note titles in ConnectWise and AutoTasktickets [FBX-6338]

Networkingl The Firebox now correctly routes traffic through a PPPoE connection after it is lost and then re-established [FBX-11668]

l Multi-WAN no longer incorrectly exposes Policy-Based Routing and Sticky Connection options onBOVPN policies [FBX-6634]

l You can now add FQDNs to Static NAT rules with Policy Manager [FBX-10964 FBX-1304]l This release resolves an issue in which the Firebox would use the incorrect policy for traffic when twoFQDNs resolve to the same IP address [FBX-6914]

l This release improves policy handling of FQDNs when a single hostname resolves to a large number ofIP addresses [FBX-11083]

l FQDN now supports wildcard subdomains [FBX-4434]l DHCP relay for VLAN interfaces no longer fails after you reboot a Firebox [FBX-11464]l This release adds support for FujiSoft FS040U UX302NC LTE and UX302NC-R LTE USB modems

[FBX-10419 FBX-10421 FBX-10192]l This release adds support for Netgear 341U modems [FBX-7926]l You can now modify modem Link Monitor settings for Firebox T10 and T15 devices [FBX-11040]l The Firebox now correctly sends logmessages through the correct interface after aMulti-WAN failbackevent [FBX-2380]

l Policy Manager no longer allows you to configureMulti-WAN Link Monitoring in a configuration with onlya single external interface [FBX-11840]

l This release allows you to configure loopback interface addresses for global dynamic NAT and perpolicy dynamic NAT [FBX-11225 FBX-10760]

l You can now use the CLI to globally enable or disable the anti-replay window size [FBX-9887]

VPNl This release adds CLI support for BOVPNVIF secondary IP addresses [FBX-11405]l This release resolves an issue that caused packet loss through BOVPN tunnels on Firebox M4600 andM5600 devices that handle large amounts of traffic [FBX-11584]

l This release resolves an issue in which the Firebox sends decrypted BOVPN VIF tunnel traffic to thewrong interface [FBX-11987]

l Connections from the Firebox to a Log Server on local network will no longer route through tunnel whenthe VPN remote network overlaps with local Subnet [FBX-2416]

l This release resolves multiple iked process crash issues [FBX-10289 FBX-12555]l The Firebox no longer routes the SSLVPN-Management tunnel through the Zero-Route IPsec Tunnel

[FBX-4905 FBX-8273]l Mobile VPN with SSL configured to use UDP data channel and TCP configuration port will now triggeran overlap warning if policies for the same ports exist [FBX-7873]

l This release introduces AES-GCM ciphers for IKEv2 and TLS-based VPNs [FBX-6340]l You can now configure BranchOffice VPN gateways with secondary IP addresses [FBX-10580]l This release removes the VPN portal Features of the VPN portal now reside in the Access Portal orMobile VPN with SSL configuration [FBX-10703]

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 26: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Proxies and Servicesl This release introduces IntelligentAV a supplemental AntiVirus service powered by Cylance [FBX-

8895]l You can now configure Geolocation on a per-policy basis [FBX-8610]l You can now specify theminimum TLS or SSL version in the TLS profile [FBX-3698]l This release adds new HTTPS Content Exception entries for GoToMeeting WatchGuard Cloud IoTendpoints and Lastline [FBX-11677 FBX-12067 FBX-11039]

l A FireCluster member without a DNSWatch license now correctly registers to the DNSWatch servicewhen it becomes Master [FBX-10180]

l You can now use the File Exceptions list to bypass some subscription services for specific files [FBX-12300]

l The SMTP proxy no longer includes TCP port 465 when TLS support is not enabled [FBX-12526]l You can now use FirewareWebUI to disable Application Control when the license has expired [FBX-

10495]l This release resolves file download issues for Firebox T10s with large files through the HTTP proxy

[FBX-10008]l The POP3 proxy now correctly handles the x-microsoft-exchange-diagnostics header and does notinject additional text [FBX-10083]

l APT scanning and caching for IMAP Proxy now works correctly [FBX-12376]l This release resolves a display issue in the TCP-UDP proxy configuration when a proxy action has aname longer than 34 characters [FBX-9897]

l The POP3 and SMTP proxies now support TLS profiles [FBX-4667 FBX-9919]l Firebox Cloud now supports spamBlocker andQuarantine Server [FBX-10745 FBX-11126]l This release features enhancements toWebBlocker usability [FBX-1258]l You can now use inbound HTTPS content inspection with multiple servers with different certificates

[FBX-11793]l FirewareWebUI and FSM Front Panel now display DNSWatch status [FBX-10956 FBX-10435]l Gateway AV scan errors for encrypted files now display the specific path and file name [FBX-4025]l This release resolves an issue in which files over the scan limit size would fail to pass with action set toAllow [FBX-12046]

l The APT hold option no longer causes email delivery to fail [FBX-12213]l This release resolves an issue Firebox Cloud instances with Pay-As-You-Go signature updates [FBX-

11762]

Wirelessl This release adds the ability to configure the Band Steering RSSI in the Gateway Wireless Controller

[FBX-9862]l This release enables SSH command line access to AP100 AP102 AP200 and AP300 devices [FBX-

10908]

Enhancements and Resolved Issues in Fireware 122

26 WatchGuard Technologies Inc

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 27: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Known Issues and Limitations

Release Notes 27

Known Issues and LimitationsKnown issues for Fireware v122 and its management applications including workarounds where availablecan be found on the Technical Search gt Knowledge Base tab To see known issues for a specific release fromtheProduct amp Version filters you can expand the Fireware version list and select the check box for thatversion

Using the CLIThe Fireware CLI (Command Line Interface) is fully supported for v12x releases For information on how tostart and use the CLI see theCommand Line ReferenceGuide You can download the latest CLI guide fromthe documentation web site forWatchGuard Firebox amp Dimension

Technical AssistanceFor technical assistance contact WatchGuard Technical Support by telephone or log in to theWatchGuardPortal on theWeb at httpswwwwatchguardcomwgrd-supportoverview When you contact TechnicalSupport youmust supply your registered Product Serial Number or Partner ID

Phone Number

US End Users 8772323531

International End Users +1 2066130456

AuthorizedWatchGuard Resellers 2065218375

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance
Page 28: Fireware v12.2 Release Notes - WatchGuard · 2018-10-02 · ImportantInformationaboutFireboxCertificates SHA-1isbeingdeprecatedbymanypopularwebbrowsers,andWatchGuardrecommendsthatyounowuse

Technical Assistance

Release Notes 28

  • Fireware v122 Release Notes
  • Introduction
  • Before You Begin
  • Localization
    • Fireware Web UI
    • WatchGuard System Manager
    • Dimension WebCenter Quarantine Web UI and Wireless Hotspot
    • Documentation
      • Important Information about Firebox Certificates
        • CLI Commands to Regenerate Default Firebox Certificates
          • Fireware and WSM v122 Operating System Compatibility
            • Authentication Support
            • System Requirements
            • FireboxV System Requirements
              • Downloading Software
                • WatchGuard System Manager
                • Fireware OS
                • Single Sign-On Software
                • WebBlocker On-Premises Server
                • Terminal Services Authentication Software
                • Mobile VPN with SSL Client for Windows and Mac
                • Mobile VPN with IPSec client for Windows and Mac
                  • Upgrade Notes
                    • XTM Appliances do not support FIreware 122 and higher
                    • WebBlocker Server with SurfControl End of Life
                    • SSLTLS Settings Precedence and Inheritance
                    • Modem Configurations Converted to External Interfaces with Failover Enabled
                    • HTTPS Proxy Content Inspection with Fireware v121
                    • Gateway AV Engine Upgrade with Fireware v120
                      • Upgrade to Fireware v122
                        • Back Up Your WatchGuard Servers
                        • Upgrade to Fireware v122 from Web UI
                        • Upgrade to Fireware v122 from WSMPolicy Manager
                          • Update AP Devices
                            • Important Upgrade Steps
                            • AP Firmware Upgrade
                              • Upgrade your FireCluster to Fireware v122
                              • Downgrade Instructions
                                • Downgrade from WSM v122 to earlier WSM v12x or v11x
                                • Downgrade from Fireware v122 to earlier Fireware v12x or v11x
                                • Downgrade Restrictions
                                  • Enhancements and Resolved Issues in Fireware 122
                                    • General
                                    • Authentication
                                    • Access Portal
                                    • Integrations
                                    • Networking
                                    • VPN
                                    • Proxies and Services
                                    • Wireless
                                      • Known Issues and Limitations
                                      • Using the CLI
                                      • Technical Assistance