These are mainly taken from the classes I teach:
1) Using the keyboard number pad to enter digits that are part of the admin password or SIC activation key, but Num Lock is not set. This results in junk becoming part of the password/key and having to reset the password.
2) In SmartConsole pressing "Install Policy" button with unpublished changes pending, being forced to publish the changes, then canceling out of the confirmation screen to actually install policy to the gateway. Administrator then wonders why the changes they just made are not working on the gateway...
3) Accidentally selecting both Security Management Server and Security Gateway checkboxes when running through the post-installation wizard, when a distributed configuration was intended. The Security Management Server ends up with InitialPolicy loaded, and logs from the gateway(s) to the SMS get blocked by it. While the purpose (SMS vs. gateway) can be changed on an existing system by hacking the registry through cpprod_util and such, it is much cleaner and safer to just completely reload the system with Gaia and select only the correct checkboxes.
4) Unchecking "Drop out of state TCP packets" on the Stateful Inspection screen of Global Properties during troubleshooting, and forgetting to recheck it.
5) Defining slow or invalid DNS servers in the Gaia OS of the gateway, this causes all kinds of nasty issues with the rad daemon and domain-based objects among others...
6) Dropping/Rejecting/Blocking traffic in the policy, but not setting Track to log. I call this the "roach motel" effect. There is an exception to this of course for dropping but not logging "trash" or "noise" traffic such as subnet and NetBIOS broadcasts.
7) Using multiple embedded nested groups in the antispoofing topology definitions for the gateway, this will bite you eventually. This can be somewhat avoided by using groups in the gateway topology definitions that are exclusively used for antispoofing enforcement and nothing else, and they are clearly marked/named as such.
😎 Placing the host IP or network number/mask in the name of the object, but it doesn't actually match the value defined in the object itself. Been bitten by that one...
9) Making a typo in the network portion of an address used in an automatic or manual NAT definition, or even in a manual proxy ARP definition. Logs say everything is fine, but it simply doesn't work because the return traffic is not coming back to your firewall. Very difficult to figure out if you don't spot the typo.
10) Performing a migrate import (upgrade_import) on an SMS thinking it will merge whatever configuration is currently present on the SMS with what is being imported. It won't, anything currently in the configuration of the SMS (including SIC certificates and the ICA) will be destroyed.
11) Believing you need a "Any Any Any Accept" rule at the bottom of an ordered APCL/URLF or Threat Prevention policy (or even explicit rule allows for internal to internal traffic). You don't since the implicit cleanup rule's action in these types of policies is an Accept, not a Drop since these layers are usually implemented as blacklists, not whitelists. Doing so will adversely affect SecureXL acceleration.
12) Not realizing that when searching for logs in SmartLog or the Logs & Monitor tab of SmartConsole, that any unquoted space will be treated as a logical AND operation, not an OR operation or a phrase search.
13) Using Internet Explorer instead of literally any other browser to interact with the Gaia web interface. Works but is dog slow.
14) Unchecking any boxes on the NAT Properties screen of Global Properties. Just don't, unless you want some serious pain.
15) Disabling the spanning tree protocol (STP) on any switches in your network, you will pay dearly when a bridging loop forms. This is *not* the same thing as setting portfast.
Those are the ones I can think of off the top of my head, I'm sure I could come up with a few more...
--
"IPS Immersion Training" Self-paced Video Class
Now Available at http://www.maxpowerfirewalls.com
Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com