?
Solved

Device Missing in Watchguard Report Server

Posted on 2011-10-21
3
Medium Priority
?
1,850 Views
Last Modified: 2012-08-13
I guess this is a couple of questions rolled into one.  I have recently installed our new Watchguard X510.  Once I had that properly configured, I went onto one of our servers, and installed the Watchguard Server Center (including the Management Server, Log Server, Report Server and WebBlocker Server).  The status shows running and Enabled for all of these services.  I also went into the Policy Manager, and enabled logging for the HTTP Proxy.  

Now, when I go to https://[ReportServerIPAddress]:4122, I am presented with the certificate warning.  I go ahead and accept.  However, once I log in with admin and password, and it says "Select A Device", there are no devices listed.  This is all if I perform these actions from the servers web browser.  If I try to visit this link from a client machine, I am not even presented with the certificate warning.  However, when I log in, and still has no devices listed.  I thought maybe something was wrong with the install, so I uninstalled, and then reinstalled the Report Server.  Rebooted the server.  Still having the same results.  Not really sure why this is not working.

My main reason for wanting to do this is to check reports on end-users who are trying to visit inappropriate sites that are being blocked by Webblocker.  I'm assuming I can view this information through the Report Server.  What I would really like to achieve is for the server to send me an email whenever an end-user attempts to visit an inappropriate site and is blocked.  Is this function of emailing available through the Report Server?  Any ideas of why the X510 is not listed as a device?
Thanks in advance for any assistance.
0
Comment
Question by:dgreer1201
  • 2
3 Comments
 
LVL 32

Accepted Solution

by:
dpk_wal earned 2000 total points
ID: 37013118
Ensure that you have configured logging on WG:

Configure your server [follow step 2]:
http://www.watchguard.com/help/docs/wsm/11-xtm/en-US/Content/en-US/logging/setup_logging_task_wsm.html
Set the log encryption key:
http://www.watchguard.com/help/docs/wsm/11-xtm/en-US/Content/en-US/logging/ls_configure_server_settings_tab_wsm.html

Configure "Watchguard Log Server" on the device [with same log encryption key as configured above]:
http://www.watchguard.com/help/docs/wsm/11-xtm/en-US/Content/en-US/logging/set_up_logging_on_device_wsm.html

Your device should now be visible.

To set up alarm [select "Alarm if denied" option for Action to take under the categories]:
http://www.watchguard.com/help/docs/wsm/11-xtm/en-US/Content/en-US/services/webblocker/categories_to_block_select_wsm.html

Please implement and update.

Thank you.
0
 

Author Comment

by:dgreer1201
ID: 37018474
That worked perfectly.  I still don't understand exactly why though.  I already had all of that setup.  The only thing I did change...........was changing the encryption key, and "check-mark" for the Alarm on the WebBlock categories.  Everything else was already setup.

In any case.........after changing the encryption key and turning on Alarms..........the device became visible.
Thanks for the great assistance!!!

0
 
LVL 32

Expert Comment

by:dpk_wal
ID: 37022119
Happy I could be assitance; log encryption is the key here; if it does not match then all other settings are as good as not done! :)
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses
Course of the Month15 days, 22 hours left to enroll

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question