1. Overview - Barracuda Campus

Transcription

1. Overview - Barracuda Campus
1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1 Release Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.1 Release Notes 6.1.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.2 Release Notes 6.1.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.3 Release Notes 6.1.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.1 Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2 Virtual Systems (Vx) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2.1 How to Deploy a Barracuda NG Vx OVA Image on VMware Hypervisors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2.2 How to Deploy a Barracuda NG Vx using Barracuda NG Install on a VMware Hypervisor . . . . . . . . . . . . . . . . . . . . .
1.2.2.3 How to Deploy the Barracuda NG Vx on a Citrix XenServer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2.4 How to Deploy the Barracuda NG Vx on an Opensource Xen Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2.5 How to Deploy the Barracuda NG Vx on KVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.2.6 How to Deploy the Barracuda NG Vx on Hyper-V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3 Public Cloud Hosting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.1 How to Deploy the Barracuda NG Firewall in Azure via the Preview Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.2 How to Deploy the Barracuda NG Firewall in Microsoft Azure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.3 How to Deploy the Barracuda NG Firewall on Microsoft Azure via PowerShell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.4 How to Create a Azure Image from a VHD Disk Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.5 How to Deploy the Barracuda NG Firewall in an Amazon Virtual Private Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.3.6 How to Deploy the NG Firewall on VMware vCloud Air . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1 WAN Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.1 How to Configure an ISP with Static IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.2 How to Configure an ISP with Dynamic IP Addresses (DHCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.3 How to Configure an ISP with xDSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.3.1 How to Configure an ISP with xDSL using PPPoE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.3.2 How to Configure an ISP with xDSL using PPTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.4 How to Configure an ISP with UMTS/3G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.4.1 How to Display the Barracuda UMTS Modem IMEI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.5 How to Configure an ISP with ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.6 How to Configure Link Balancing and Failover for Multiple WAN Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.1.7 How to Configure Automatic Failover with Dual DHCP WAN Connections using the Same Remote Gateway . . . . . .
1.4.2 How to Activate Network Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.3 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.3.1 How to Add a Direct Attached Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.3.2 How to Configure Gateway Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.3.3 How to Configure Source-Based Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.3.4 How to Configure Linux Standard Multipath Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.4 How to Change the Management IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.5 How to Use IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.6 How to Make a Barracuda NG Firewall Centrally Manageable Without a Barracuda NG Control Center . . . . . . . . . . . . . . .
1.4.7 How to Configure VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.8 How to Add Additional Network Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.9 How to Configure Ethernet Bundles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.10 Advanced Networking in the Azure Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.11 How to Configure IP Tunneling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4.12 How to Configure User Defined Routes in Azure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5 High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.1 How to Set Up a High Availability Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.2 Transparent Failover for an HA Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.3 Monitoring, Managing, and Rebuilding HA Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.4 How to Perform a Manual High Availability Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.5 How to Configure a High Availability Cluster in Azure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.6 How to Configure a High Availability Cluster in Azure via PowerShell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.5.7 Mail Gateway Synchronization with HA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6 Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6.1 How to License your Barracuda NG Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6.1.1 How to Activate and License a Standalone Hardware Barracuda NG Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6.1.2 How to Activate and License a Standalone Virtual Barracuda NG Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6.1.3 How to Activate and License a Barracuda NG High Availability Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6.1.4 Azure Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6.2 Protected IP Count Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.6.3 How to Manually Install License Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9
10
13
20
27
30
31
32
34
37
44
46
48
51
54
56
64
70
71
76
89
100
103
105
106
108
110
111
113
116
119
121
123
126
128
129
131
132
133
134
135
136
138
140
142
145
146
147
150
151
153
157
159
163
169
170
171
173
178
179
180
182
184
186
190
1.7 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.1 Managing Access for Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.1.1 How to Create a New Admin Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.1.2 How to Configure Certificate Based Authentication for the Root User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.1.3 How to Configure System Access for the Service User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.1.4 How to Enable System Access via Serial Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.1.5 How to Change Admin Credentials on Stand-alone NG Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.2 How to Change the Root Password and Management ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.3 How to Configure DNS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.4 How to Configure DNS Interception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.5 How to Configure Time Server (NTP) Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.6 How to Set Idle Administrative Session Time Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.7 How to Configure Global HTTP Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.8 How to Configure the System Email Notification Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.7.9 How to Configure SCEP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.1 How to Configure MSAD Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.2 How to Configure MS-CHAP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.3 How to Configure LDAP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.3.1 How to Configure LDAP Authentication for Mac OS X Directory Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.4 How to Configure RADIUS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.5 How to Configure TACACS+ Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.6 How to Configure RSA-ACE SercurID Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.7 How to Configure MSNT Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.8 How to Configure Barracuda Web Filter Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.9 How to Configure WiFi AP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.9.1 WiFi AP Authentication Aerohive Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.9.2 WiFi AP Authentication Ruckus Wireless Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.9.3 WiFi AP Authentication Aruba Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.10 How to Configure Kerberos Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.11 How to Configure Explicit Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.12 How to Configure NGF Local Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.13 How to Configure MSAD DC Client Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.14 How to Configure TS Agent Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.15 How to Configure Additional Authentication Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.8.16 How to Configure Authentication Service Timeouts and Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.9 Virtual Servers and Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.9.1 How to Configure Virtual Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.9.2 Virtual Server Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.9.3 How to Configure Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10 NG Firewall Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.1 Access Control Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.1.1 Configuring Access Control Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.1.2 Configuring Access Control Service Trustzones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2 DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.1 How to Configure the DHCP Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.2 Advanced DHCP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.2.1 How to Configure Advanced DHCP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.2.2 How to Configure DHCP Subnets and Address Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.2.3 How to Configure DHCP Option Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.2.4 How to Configure DHCP Parameter Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.2.5 How to Configure Known Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.2.6 How to Configure DHCP Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.2.7 How to Configure DHCP with Dynamic DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.2.8 How to Activate Text-Based Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.2.9 How to Configure Additional DHCP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.2.10 Example - DHCP Configuration for Two Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.3 How to Configure the DHCP Relay Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.2.4 How to Configure a DHCP Relay over a VPN Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.3 DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.3.1 How to Configure the DNS Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.3.2 How to Configure DNS Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4 Dynamic Routing Protocols (OSPF/RIP/BGP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.1 How to Install and Configure the OSPF/RIP/BGP Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.2 How to Configure BGP Router Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
191
192
193
197
198
199
200
202
203
205
206
208
209
210
211
214
215
217
219
221
223
224
225
227
228
229
231
233
234
236
239
240
241
242
243
244
245
246
248
251
255
257
258
261
275
276
278
279
280
282
284
286
288
289
290
291
292
296
298
301
303
305
313
315
319
1.10.4.3 How to Configure EBGP Multihop Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.4 How to Configure BGP for Inbound Link Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.5 How to Configure BGP Routing over IPsec VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.6 How to Configure BGP Routing over TINA VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.7 How to Configure Inbound Load Balancing and Link Failover with BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.8 How to Configure OSPF Routers and Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.9 How to Configure Network Interfaces for OSPF and RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.10 How to Configure Filter Setup for OSPF and RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.11 How to Configure OSPF Routing over TINA VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.12 How to Enable Debugging for OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.13 How to Configure RIP Router Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.4.14 Example for OSPF and RIP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5 Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1 Forwarding Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.1 Firewall Access Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.2 Firewall Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.3 Application Control 2.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.4 How to Configure SSL Interception in the Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.5 How to Configure Virus Scanning in the Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.6 How to Configure ATD in the Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.7 URL Filtering in the Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.8 How to Enforce Safe Search in the Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.9 How to Enforce YouTube for Schools in the Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.10 How to Configure Custom Block Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.11 Intrusion Prevention System (IPS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.12 Traffic Shaping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.13 Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.14 Firewall Plugin Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.15 Firewall Authentication and Guest Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.16 How to Configure ICMP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.17 Layer 7 Application Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.1.18 How to Configure DNS Blacklisting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.2 Host Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.2.1 Default Host Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.3 Firewall Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.3.1 Forwarding Firewall Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.5.3.2 General Firewall Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.6 FTP Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.6.1 How to Configure the FTP Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.6.2 How to Configure Authentication and Access Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.7 HTTP Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.7.1 How to Set Up and Configure the HTTP Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.7.2 How to Configure Malware Protection in the HTTP Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.7.3 How to Configure ATD in the HTTP Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.7.4 How to Configure the Barracuda Web Security Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.7.5 How to Configure Web Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.7.6 How to Configure Neighbor Proxies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.7.7 How to Set Up a Reverse Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.7.8 Example - Reverse Proxy for Exchange Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.7.9 How to Configure User Authentication and Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8 Mail Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.1 Mail Gateway Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.1.1 How to Configure the Mail Gateway Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.1.2 How to Configure Extended Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.1.3 How to Configure POP3 Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.1.4 How to Configure Advanced Mail Gateway Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.1.5 How to Configure Antivirus Mail Gateway Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.1.6 How to Configure Content Stripping, Grey Listing, and Blacklists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.1.7 How to Configure Mail Gateway Service Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.1.8 How to Configure Mail Gateway Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.1.9 How to Configure Custom Mail Gateway Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.2 Mail Gateway Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.2.1 How to Use the Mail Gateway Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.2.2 How to Use the Grey Listing Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.8.2.3 Logs, Statistics, Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
322
325
327
334
341
346
350
352
354
360
361
363
364
365
367
400
435
457
460
464
469
479
482
484
486
494
509
523
551
567
569
580
582
583
588
589
591
600
601
603
606
608
615
620
624
626
631
635
637
640
648
649
650
653
661
663
666
669
676
678
680
681
682
688
689
1.10.9 SSH Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.9.1 How to Configure the SSH Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.9.2 How to Configure Permission Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.10 SIP Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.10.1 How to Configure the SIP Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.10.2 How to Configure TLS with SIP Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.11 Spam Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.11.1 How to Configure Spam Filter Client Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.11.2 How to Configure the Spam Filter Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.11.3 How to Improve Spam Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.11.4 How to Modify the Barracuda RBL Configuration in the SPAM Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.11.5 How to Set Up a Training Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.11.6 Spam Filter Database Archiving and Updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.12 URL Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.12.1 Barracuda NG Web Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.12.1.1 How to Configure the URL Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.12.2 Barracuda Web Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.12.2.1 How to Enable the Barracuda Web Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.13 Virus Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.13.1 How to Enable the Virus Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.13.1.1 How to Configure Avira Virus Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.13.1.2 How to Configure ClamAV Virus Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.13.2 Advanced Threat Detection (ATD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.13.2.1 How to Manually Upload Files to ATD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.13.3 How to Update Virus Patterns Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.13.4 Virus Scanner Integration in the HTTP Proxy and FTP Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14 VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.1 Authentication, Encryption, Transport, and VPN Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2 Client-to-Site VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.1 How to Configure a Client-to-Site Barracuda TINA VPN with Personal Licenses . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.2 How to Configure a Client-to-Site TINA VPN with Client Certificate Authentication . . . . . . . . . . . . . . . . . . . .
1.10.14.2.3 How to Configure a Client-to-Site IPsec VPN with Client Certificate Authentication . . . . . . . . . . . . . . . . . . . .
1.10.14.2.4 How to Configure a Client-to-Site IPsec VPN with PSK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.5 How to Configure a Client-to-Site L2TP/IPsec VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.6 How to Configure a Client-to-Site PPTP VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.7 How to Configure an Access Rule for a Client-to-Site VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.8 How to Configure a Client-to-Site VPN Group Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.9 How to Configure Android Devices for Client-to-Site IPsec VPN Connections . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.10 How to Configure Apple iOS Devices for Client-to-Site VPN Connections . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.11 How to Configure Android Devices for Client-to-Site IPsec VPNs with PSK . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.12 How to Configure Apple iOS Devices for Client-to-Site IPsec VPNs with PSK . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.13 How to Configure VPN Authentication for SMS PASSCODE® . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.14 How to Use the Barracuda VPN Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.2.15 How to Configure the Azure Connectivity Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3 Site-to-Site VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.1 Site-to-Site VPN Encryption and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.2 How to Create a TINA VPN Tunnel between Barracuda NG Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.3 How to Create Access Rules for Site-to-Site VPN Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.4 Examples for TINA VPN Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.5 TINA Tunnel Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.6 How to Create an IPsec VPN Tunnel between the Barracuda NG Firewall and a pfSense Firewall . . . . . . .
1.10.14.3.7 How to Configure an IPsec Site-to-Site VPN to a Microsoft Azure VPN Gateway . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.8 How to Configure an IPsec VPN to an AWS VPN Gateway with BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.9 IPsec Tunnel Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.10 IPsec Log Messages and Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.11 Traffic Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.12 Dynamic Mesh VPN Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.3.13 WAN Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.4 How to Configure VPN Access via a Dynamic WAN IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5 SSL VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.1 How to Configure the NG SSL VPN Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.2 Mobile Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.3 How to Configure an Outlook Web Access Web Forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.4 How to Configure a SharePoint Web Forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.5 How to Configure a Generic Web Forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
690
691
693
695
696
699
700
701
704
707
709
710
711
712
713
715
716
717
718
719
720
722
724
726
727
728
730
731
735
737
741
746
751
757
761
763
764
767
768
770
772
774
778
779
792
793
794
797
798
808
809
815
820
821
825
827
833
843
848
851
853
856
864
865
866
1.10.14.5.6 How to Configure Single Sign On for Web Forwards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.7 How to Activate Dynamic Rules via SSL VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.8 How to Configure VPN Templates in the SSL VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.9 How to Use and Create Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.10 How to Install the Transparent NG SSL VPN Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.11 How to Set Up the Transparent NG SSL VPN Client for Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.12 How to Configure an SSH Resource for SSL VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.13 How to Configure a Remote Desktop Resource for SSL VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.14 Example SSL VPN Resource Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.15 NG Firewall Configuration for CudaLaunch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.16 How to Configure NAC for SSL VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.5.17 How to Configure Client Certificate Authentication for the SSL VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.6 How to Set Up VPN Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.14.6.1 How to Configure OCSP Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.15 Wi-Fi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.15.1 How to Configure a Wi-Fi Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.15.2 How to Configure Wi-Fi Guest Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.10.15.3 How to Configure a RADIUS/EAP Server for WiFi authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11 NG Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.1 Getting Started - NG Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.2 Getting Started - NG Control Center without CC Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.3 Getting Started - NG Control Center for Microsoft Azure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4 Central Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.1 How to Manage Ranges and Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.2 Global Firewall Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.3 How to Add a new Barracuda NG Firewall to the Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.4 How to Import an Existing Barracuda NG Firewall into a NG Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.5 How to Configure a Remote Management Tunnel for Barracuda NG Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.6 How to Move, Copy and Delete Barracuda NG Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.7 Licensing on a NG Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.7.1 How to Manually Install the Licenses for the Barracuda NG Control Center . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.7.2 How to Install and Assign Pool Licenses on a Barracuda NG Control Center . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.7.3 How to Assign and Activate Single Licenses on a Barracuda NG Control Center . . . . . . . . . . . . . . . . . . . . . .
1.11.4.7.4 How to Update or Switch Licenses of Managed NG Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.8 How to Update Barracuda NG Control Center Managed Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.8.1 How to Prepare Repository Linked Box Configurations for Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.9 How to Update the IPS Security Database on the NG Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.4.10 Repositories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.5 Barracuda NG Control Center Admins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.5.1 How to Configure Administrative Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.5.2 How to Configure Administrative Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.5.3 How to Configure Administrator Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.5.4 How to Configure System Access for Root Aliases on CC-Managed Units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.5.5 How to Change Control Center Credentials for Non-Root Admins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.6 GTI Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.6.1 How to Configure VPN GTI Settings for a VPN Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.6.2 How to Create a VPN Tunnel with the VPN GTI Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.6.3 How to Add an External VPN Server to the GTI Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.6.4 How to Configure Traffic Intelligence Using the VPN GTI Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.6.5 How to Configure a Dynamic Mesh VPN with the GTI Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.7 Revision Control System (RCS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.7.1 How to View and Revert RCS Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.8 Barracuda NG Control Center Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.8.1 How to Configure Statistics Processing and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.8.2 How to Configure Statistics Transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.8.3 How to Configure the Statistics Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.8.4 How to Monitor and Recover Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.9 Control Center Syslog Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.9.1 How to Configure the CC Syslog Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.9.2 Example - Configure a Syslog Proxy and CC Syslog Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.9.3 Log File Structure and Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.10 Shared Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.10.1 Distributed Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.10.1.1 How to Configure a Distributed Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.10.2 How to Configure a Shared Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
867
872
873
882
883
885
887
888
889
892
893
895
898
899
900
901
903
908
909
911
918
920
923
925
928
929
930
932
938
939
941
942
943
944
946
949
950
952
954
955
961
963
967
968
970
971
972
975
976
979
990
992
994
996
999
1000
1001
1003
1007
1016
1020
1024
1025
1029
1031
1.11.11 FW Audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.12 CC Eventing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.12.1 How to Configure Event Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.12.2 Control Center Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.12.2.1 Operational Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.12.2.2 Security Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.12.3 How to Delete the Event Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.13 Control Center PKI Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.13.1 How to Configure PKI Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.13.2 How to Configure the PKI Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.13.3 PKI Certificate Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.14 Barracuda NG Earth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.14.1 How to Set Up Barracuda NG Earth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.15 Control Center CC Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.11.16 NG Control Center Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12 Best Practice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.1 Best Practice - Web Filtering Features in the Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.2 Best Practice - Azure Public Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.3 Best Practice - Switch to a Static Internal IP Address in Microsoft Azure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.4 Best Practice - How to Handle Incorrect Time Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.5 Best Practice - Small Barracuda NG Firewall Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.6 Best Practice - How to Protect Against DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.7 Best Practice - High Performance Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.8 Best Practice - Performance Tuning on VMware Hypervisors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.9 Best Practice - Performance Tuning on KVM Hypervisors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.10 Best Practice - Changing the VIP Address of a Centrally Managed NG Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.11 Best Practice - Migrate the NG Control Center to a New Network Segment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.12 Best Practice - Service Dependencies and Multiple Services of the Same Type on one Virtual Server . . . . . . . . . . . . . .
1.12.13 Best Practice - Protect Against TCP SYN Flooding Attacks with TCP Accept Policies . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.14 Best Practice - Network Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.15 Best Practice - Core System Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.12.16 Best Practice - Evaluate or Demo the Barracuda NG Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.13 Implementation Guides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.13.1 Implementation Guide - VPN Network with Static Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14 Monitoring and Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.1 How to Configure Audit & Reporting with IPFIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.2 How to Configure Box-Level Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.3 How to Configure CPU Load, Hardware and Disk Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.4 How to Configure the SNMP Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.5 PHION-MIB Field Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.6 How to Configure Revision Control System Monitoring (RCS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.7 Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.7.1 Log File Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.7.2 Available Log Files and Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.7.3 How to Enable the Firewall Audit Log Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.7.4 How to Configure Syslog Streaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.7.5 Log Files: FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.8 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.8.1 How to Configure Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.9 Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.9.1 How to Configure Event Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.9.2 How to Configure Access Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.9.3 How to Configure Audit and Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.9.4 Logging of Clock Skew Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.10 Watchdog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.10.1 How to Configure the Watchdog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.14.11 Splunk Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15 Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.1 Updating Barracuda NG Firewalls and NG Control Centers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.1.1 How to Download Applications, Updates, and Hotfixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.1.2 Migrating to 6.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.1.3 How to Update High Availability Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.1.4 How to Update the Barracuda NG Firewall or Control Center via SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.1.5 How to Update the Barracuda NG Firewall or NG Control Center using NG Admin . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.2 How to Generate a System Report for Barracuda Networks Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1032
1035
1036
1037
1038
1050
1062
1063
1064
1067
1068
1071
1073
1075
1076
1078
1079
1081
1085
1088
1089
1090
1092
1093
1095
1096
1098
1099
1100
1103
1107
1108
1109
1110
1126
1128
1131
1132
1133
1136
1157
1161
1163
1165
1174
1175
1179
1180
1182
1183
1184
1187
1188
1190
1193
1196
1197
1204
1205
1207
1209
1210
1212
1213
1216
1.15.3 Command-Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.1 acpfctrl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.2 admintcpdump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.3 Configuration Files and Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.4 conftool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.5 Dynamic Network Start and Stop Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.6 How to Create PAR or PCA Files on the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.7 ktinactrl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.8 Linux Networking Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.9 mailclt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.10 Maintaining Recipient Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.11 phibstest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.12 phion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.13 phionar and conftool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.14 phionctrl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.15 phionrcscleanup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.16 showbdb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.17 statcheck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.18 vpnadminclt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.19 How to Perform a Release Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.20 How to Configure SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.21 CLI Commands for Barracuda 3G USB Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.3.22 Basic Linux Command Line Interface Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.4 How to Configure Cronjobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.5 How to Configure the Bootloader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.6 How to Configure Advanced Barracuda OS System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.7 How to Configure SMS Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.8 Backups and Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.8.1 How to Back Up and Restore Your Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.8.2 How to Recover the Barracuda NG Firewall with a USB Flash Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.8.3 How to Restore a Configuration on Appliances After an RMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.8.4 How to Use Active Recovery Technology (ART) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.15.9 IPMI Appliance Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16 Management Tools and Apps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1 Barracuda NG Admin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.1 NG Admin Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.2 DASHBOARD Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.2.1 DASHBOARD General Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.2.2 DASHBOARD Firewall Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.2.3 DASHBOARD VPN Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.3 CONFIGURATION Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.3.1 Firewall Rule List Interface and Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.3.2 Configuration Pages - Access and Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.4 CONTROL Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.4.1 Server Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.4.2 Network Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.4.3 Resources Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.4.4 Licenses Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.4.5 Box Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.4.6 Sessions Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5 FIREWALL Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5.1 Monitor Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5.2 Live Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5.3 History Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5.4 Threat Scan Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5.5 ATD Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5.6 Audit Log Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5.7 Trace Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5.8 Shaping Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5.9 Users Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5.10 Dynamic Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.5.11 Host and Forwarding Rules Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.6 WIFI Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.7 VPN Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.8 PROXY Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1217
1219
1220
1221
1222
1224
1225
1226
1230
1231
1232
1233
1237
1238
1239
1240
1241
1242
1243
1244
1245
1249
1250
1251
1252
1253
1258
1260
1261
1264
1266
1268
1272
1274
1275
1278
1283
1284
1290
1294
1296
1300
1304
1309
1310
1312
1316
1318
1319
1322
1323
1324
1326
1334
1337
1339
1341
1344
1347
1348
1349
1352
1353
1354
1358
1.16.1.9 LOGS Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.10 STATISTICS Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.11 SSH Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.12 EVENTS Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.13 DHCP Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14 CC CONTROL Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.1 CC Status Map Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.2 CC Geo Maps Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.3 CC Configuration Updates Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.4 CC File Updates Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.5 CC Sessions Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.6 CC Barracuda Activation Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.7 CC Floating Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.8 CC Statistics Collection Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.9 CC Remote Execution Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.10 CC Scanner Versions Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.11 CC Firmware Update Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.14.12 CC Update Tasks Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.15 CC CONFIGURATION Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.16 CC ADMINS Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.17 CC DATABASE Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.18 CC Configuration Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.19 CC VPN GTI Editor User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.1.20 CC FWAUDIT Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.2 Barracuda Report Creator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.2.1 How to Create Custom Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.3 Barracuda NG Firewall Remote . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.4 CudaLaunch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.4.1 How to Configure CudaLaunch with Client Certificate Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.16.4.2 Using the CudaLaunch VPN Connections for Native Apps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17 Hardware Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.1 Barracuda NG Firewall F10 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.2 Barracuda NG Firewall F10 Revision B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.3 Barracuda NG Firewall F18 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.4 Barracuda NG Firewall F80 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.5 Barracuda NG Firewall F100 / F101 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.6 Barracuda NG Firewall F100 / F101 Revision B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.7 Barracuda NG Firewall F180 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.8 Barracuda NG Firewall F200 / F201 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.9 Barracuda NG Firewall F200 / F201 Revision B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.10 Barracuda NG Firewall F200 / F201 Revision C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.11 Barracuda NG Firewall F280 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.12 Barracuda NG Firewall F280 Revision B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.13 Barracuda NG Firewall F300 / F301 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.14 Barracuda NG Firewall F300 / F301 Revision B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.15 Barracuda NG Firewall F380 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.16 Barracuda NG Firewall F400 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.17 Barracuda NG Firewall F400 Revision B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.18 Barracuda NG Firewall F600 Revision B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.19 Barracuda NG Firewall F600 Revision C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.20 Barracuda NG Firewall F800 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.21 Barracuda NG Firewall F800 Revision B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.22 Barracuda NG Firewall F900 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.23 Barracuda NG Firewall F1000 Revision A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.24 Barracuda NG Control Center C400 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.25 Barracuda NG Control Center C610 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.17.26 Barracuda Network Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1359
1361
1363
1364
1367
1368
1369
1371
1373
1375
1377
1379
1381
1383
1385
1389
1390
1394
1396
1399
1401
1402
1404
1407
1410
1416
1418
1422
1426
1428
1431
1435
1438
1441
1444
1447
1450
1453
1456
1459
1462
1465
1467
1470
1473
1476
1479
1483
1487
1491
1496
1499
1503
1507
1511
1513
1515
Barracuda NG Firewall 6.1 Administrator's Guide - Page
9
Overview
The Barracuda NG Firewall is a family of hardware and virtual appliances designed to protect your network infrastructure. On top of
industry-leading centralized management, highly resilient VPN technology combined with intelligent traffic management capabilities allow the
customer to save line costs and increase overall network availability
Barracuda NG Firewall
The Barracuda NG Firewall is an enterprise-grade, next-generation firewall that was purpose-built for efficient deployment and operation within
dispersed, highly dynamic, and security-critical network environments. In addition to next-generation firewall protection, it provides
industry-leading operations efficiency and added business value by safeguarding network traffic against line outages and link quality degradation.
User identity and application awareness are used to select the best network path, traffic priority, and available bandwidth for business-critical
traffic. The Barracuda NG Firewall can transparently move traffic to alternative lines to keep traffic flowing.
Barracuda NG Control Center
All policies, client, and device settings can be centrally managed and tracked by the Barracuda NG Control Center. This allows the Barracuda NG
Firewall to meet enterprise requirements of massive scalability, efficient configuration, and life cycle and license management across dispersed
networks, while at the same time offering performance guarantees for business-critical applications. The concept of integrated WAN optimization
coupled with industry-leading centralized management results in significantly lower overall operational costs for multi-site deployments.
Platform Flexibility
The Barracuda NG offers hardware and virtual models in various sizes, from branch offices up to headquarters and data centers. Virtual NG
Firewall and NG Control Center can run on a wide range of hypervisors, effortlessly integrating with your existing network and server
infrastructure. The Barracuda NG Firewall is designed for deployment across the entire enterprise, including environments using Microsoft Azure
and Amazon AWS public clouds.
First Steps with the Barracuda NG Firewall and NG Control Center
Follow the deployment and getting started guides to get your NG Firewall and NG Control Center up and running:
Deployment – Deployment for hardware, virtual and public cloud NG Firewalls and NG Control Centers
Getting Started – Follow this guide to get your NG Firewall or NG Control Center integrated in your existing network.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
10
Release Notes
Before installing or upgrading to the new firmware version, back up your configuration and read the release and migration notes. If you
are updating from a version earlier than 6.0.x, all migration instructions for 5.x and 6.0 also apply.
Do not manually reboot your system at any time while the update is in process, unless otherwise instructed by Barracuda Networks
Technical Support. Upgrading can take up to 60 minutes, depending on your current firmware version and other system factors. If the
process takes longer, please contact Barracuda Networks Technical Support for further assistance.
In these Release Notes:
General
GPL Compliance Statement
Hotfixes Included with Barracuda NG Firewall Version 6.1.3
Improvements Included in Barracuda NG Firewall Version 6.1.3
Known Issues
General
If you want to update an existing system:
When updating from an earlier version to 6.1, the following update path applies: 4.2 > 5.0 > 5.2 > 5.4 > 6.0 > 6.1.
Barracuda NG Firewall F100 and F101 models using the ClamAV Virus Scanner may not have enough free disk space for
updating. For more information, see Migrating to 6.1.
Do not upgrade Barracuda NG Firewalls or NG Control Centers using Xen HVM images to 6.1.0.
For more information, see Migrating to 6.1.
GPL Compliance Statement
This product is in part Linux-based and contains both Barracuda Networks proprietary software components and open source components in
modified and unmodified form. Some of the open source components included underlie either the GPL or LGPL, or other similar licensing, which
requires all modified or unmodified source code to be made freely available to the public. This source code is available at http://source.barracuda.
com.
Hotfixes Included with Barracuda NG Firewall Version 6.1.3
Hotfix 736: DNS Server
Hotfix 731: Dynamic Routing
Hotfix 727: VPN Configurations in CudaLaunch
Hotfix 724: Firewall
Hotfix 722: Boxconfig
Improvements Included in Barracuda NG Firewall Version 6.1.3
Barracuda NG Admin
NG Admin now works as expected for Windows usernames in all languages. (BNNGF-34773)
The Firewall Audit user interface now also processes and displays purged data that was moved to a custom directory. (BNNGF-23820)
In the GTI Editor service list, external VPN servers are now listed in the service list. (BNNGF-26754)
FAN rpm values are now displayed in integral numbers. (BNNGF-35773)
On the VPN > Client to Site page, you can now enable a CN Name column to show the CN Name of the client certificate.
(BNNGF-29310)
Input validation for DKIM records has been updated to allow periods FQDNs. (BNNGF-27546)
On stand-alone NG Firewalls, the HTTP Proxy tab is now accessible for all admins with the necessary permissions. (BNNGF-22710)
On stand-alone NG Firewalls, the ATD tab is now accessible for all admins with the necessary permissions. (BNNGF-35888)
Entering multiple comma-separated DNS Server IP addresses in the client-to-site template now works as expected. (BNNGF-35864)
Barracuda OS
Updated BIND to version 9.9.8P2 to fix security vulnerability CVE-2015-8000. (BNNGF-35608)
Updated libuser to fix the following security vulnerabilities: CVE-2015-3245 and CVE-2015-3246 (BNNGF-32316)
Updated NTP to fix several security vulnerabilities. (BNNGF-35032)
Improved log message for model-specific performance script to: Applying model-specific performance settings
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
11
Firewall
SSL Interception domain exceptions now works as expected. (BNNGF-31886)
Increased default certificate size generated by SSL Interception to 2048 for non-export restricted firewalls. (BNNGF-33024)
Logging for ICMP connections now works as expected. (BNNGF-28753)
ICMP replies without ECHO sent to the management IP address are now dropped. (BNNGF-28557)
Traffic Shaping now works expected for synced sessions after an HA failover. (BNNGF-28870)
If Log Session State Changed is enabled for an access rule matching an ICMP echo request to the management IP address, it is now
logged as expected to the firewall log.
Blocked ICMP packets are no longer logged twice if Log ICMP Packets is set to Log-All. (BNNGF-30357)
The client-to-site Group Policy configuration now displays correctly when setting the screen resolution to medium-125%.
(BNNGF-35150)
Application Control now works as expected to for SSL-encrypted connections when SSL Interception is disabled. (BNNGF-34855)
OSPF/RIP/BGP
The OSPF service can now listen correctly on interfaces that were down when the service started. (BNNGF-35732)
NG Control Center
Create a box wizard now configures Wi-Fi correctly for Barracuda NextGen Firewall F280b, F180, and F80. (BNNGF-35348)
HTTP Proxy
Activating configuration changes no longer causes the HTTP Proxy to fail in rare cases. (BNNGF-25238)
Flushing selected proxy cache entries now works as expected. (BNNGF-23118)
VPN
Added option to bind the dynamic tunnels to an explicit IP address. (BNNGF-34544)
Azure
Changing the password of the NG Firewall VM via the Azure web interface now works as expected. (BNNGF-33675)
SSL VPN
VPN profiles are now imported correctly. (BNNGS-1596)
Updated certificates used for provisioning resources. (BNNGS-1505)
Known Issues
6.1.3
HA session sync between NG Firewalls using firmware 6.1.3 and 6.2.0 does not work.
Miscellaneous
NG Control Center: Network > Azure Advanced Networking is displayed in a 6.1 cluster even if the managed NG Firewall is running
version 6.1.1 or 6.1.0 that does not support this feature.
HTTP Proxy: Custom block pages do not work for the HTTP Proxy when running on the same NG Firewall as the Firewall service. This
issue does not occur when running the HTTP proxy service on a second NG Firewall behind the NG Firewall running the Firewall service.
SSL VPN: Favorites are not included in the PAR file.
SSL VPN: Text fields do not accept the # character.
SSL VPN: The mobile navigation bar is missing from servers entered in the Allowed Hosts.
SSL VPN: User Attributes do not support UTF-8.
SSL VPN: The allowed host filter path must be unique.
Safe Search: In some cases, YouTube safety mode does not work when logged in with a Google account.
Safe Search: If Safe Search is enabled, it is not possible to log into YouTube when cookies are disabled.
Safe Search: Safe Search is not enforced by Bing when using HTTP.
VPN Routing: When a duplicate route to an already existing VPN route in the main routing table is announced to the NG Firewall via RIP,
OSPF, or BGP, a duplicate routing entry is created and the route that was added last is used.
VPN Routing: Creating a direct or gateway route with the same metric and destination as a VPN route in the main routing table results in
duplicate routes. The route added last is used.
HTTP Proxy: Custom Cipher String and Allow SSLv3 settings only apply to reverse proxy configurations.
CC Wizard: The CC Wizard is currently not supported for NG Control Centers deployed using NG Install.
ATD: Only the first URL in the Quarantine Tab that leads to a quarantine entry is displayed, even if the User and/or IP address
downloaded more than one infected file.This can be dangerous if the first downloaded file is a false-positive.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
12
Firewall: It is not possible to join a join.me session if SSL Interception and Virus Scanning is enabled in the matching access rule.
Firewall: Using SSL Interception in combination with URL Filtering and category exemptions may result in degraded performance.
NG Admin: SPoE does not work if an IPv6 virtual server IP address is used.
Barracuda OS: Provider DNS option for DHCP connections created with the box wizard must be enabled manually.
Terminal Server Agent: It is not currently possible to assign connections to Windows networks shares to the actual user.
Firmware Update: Log messages similar to WARNING:
/lib/modules/2.6.38.7-9ph5.4.3.06.x86_64/kernel/drivers/net/wireless/zd1211rw/zd1211rw.ko needs
unknown symbol ieee80211_free_hw may appear while updating, but can be ignored.
Attention: Amazon AWS/Microsoft Azure: Performing Copy from Default of Forwarding Firewall rules currently locks out administrators
from the unit and requires a fresh installation of the system.
Application Control 2.0 and Virus Scanning: Data Trickling is done only while the file is downloaded, but not during the virus scan. This
may result in browser timeouts while downloading very large files.
Application Control 2.0 and Virus Scanning: If the Content-Length field in HTTP headers is missing or invalid, the Large File Policy may
be ignored.
Application Control 2.0 and Virus Scanning: It is not currently possible to perform virus scanning for chunked transfer encoded HTTP
sessions such as media content streaming. Barracuda Networks recommends excluding such traffic from being scanned.
Application Control 2.0 and Virus Scanning: In very rare cases, if the SSL Interception process is not running, but the option Action if
Virus Scanner is unavailable is set to Fail Close, a small amount of traffic may already have passed through the firewall.
Application Control 2.0 and Virus Scanning: In rare cases, Google Play updates are sometimes delivered as partial updates. These
partial updates cannot be extracted and are blocked by the virus scanning engine. The engine reports The archive couldn't be
scanned completely. Either create a dedicated firewall rule that does not scan Google Play traffic, or set Block on Other Error in Avira
Archive Scanning to No.
Barracuda OS: Restoring units in default configuration with par files created on an NG Control Center may result in a corrupt virtual
server. Instead, copy the par file to opt/phion/update/box.par and reboot the unit.
VPN: Rekeying does not currently work for IPsec Xauth VPN connections. The VPN tunnel terminates after the configured rekeying time
and needs to be re-initiated.
High Availability: IPv6 network sessions might not be established correctly after an HA failover.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
13
Release Notes 6.1.0
Before installing or upgrading to the new firmware version, back up your configuration and read the release and migration notes. If you
are updating from a version earlier than 6.0.x all migration instructions for 5.x and 6.0 also apply.
Do not manually reboot your system at any time while the update is in process, unless otherwise instructed by Barracuda Networks
Technical Support. Upgrading can take up to 60 minutes, depending on your current firmware version and other system factors. If the
process takes longer, please contact Barracuda Networks Technical Support for further assistance.
In these Release Notes:
General
GPL Compliance Statement
Hotfixes Included with Barracuda NG Firewall Version 6.1
What´s New in Barracuda NG Firewall Version 6.1
Improvements Included in Barracuda NG Firewall Version 6.1
Known Issues
General
If you want to update an existing system:
When updating from an earlier version to 6.1, the following update path applies: 4.2 > 5.0 > 5.2 > 5.4 > 6.0 > 6.1.
Barracuda NG Firewall F100 and F101 models using the ClamAV Virus Scanner may not have enough free disk space for
updating. For more information, see Migrating to 6.1.
Do not upgrade Barracuda NG Firewalls or NG Control Centers using Xen HVM images to 6.1.0.
For more information, see Migrating to 6.1.
GPL Compliance Statement
This product is in part Linux-based and contains both Barracuda Networks proprietary software components and open source components in
modified and unmodified form. Some of the open source components included underlie either the GPL or LGPL, or other similar licensing, which
require all modified or unmodified source code to be made freely available to the public. This source code is available on http://source.barracuda.
com.
Hotfixes Included with Barracuda NG Firewall Version 6.1
Hotfix 663: Security Fix for GHOST Vulnerability
Hotfix 678: Barracuda URLfilter Service Timeouts
Hotfix 679: BGP Fixes
Hotfix 670: HTTP/HTTPS Stability and Performance Improvements and AV Performance on Barracuda NG Firewall F100/F101.
What´s New in Barracuda NG Firewall Version 6.1
Dynamic Mesh VPN
A Dynamic Mesh VPN network allows you to use the advantages of a fully meshed network without having to provide the resources needed for
the large number of static VPN tunnels on every unit. Dynamic tunnels between remote Barracuda NG Firewalls are triggered when traffic is
relayed by the VPN hub. If the dynamic tunnel is idle, it is automatically terminated. This whole process is completely transparent to the user.
For more information, see Dynamic Mesh VPN Networks.
Add VPN Routes to Main Routing Table
You can now configure the VPN service to add the VPN routes to the main routing table.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
14
For more information, see Authentication, Encryption, Transport, and VPN Routing.
Enforcing Safe Search in the Firewall
Protect users behind a Barracuda NG Firewall from undesired content in search results by enabling Safe Search for the access rules handling
web traffic. No configuration is required on the clients. The necessary parameters are automatically appended to the URL when the request is
forwarded by the Barracuda NG Firewall. Safe Search is supported for Google, Bing, and Yahoo search engines.
For more information, see How to Enforce Safe Search in the Firewall.
Enforcing YouTube for Schools in the Firewall
The Barracuda NG Firewall can transparently add YouTube for Schools restrictions for all connections the Barracuda NG Firewall forwards to
YouTube without the need to configure the clients. YouTube for Schools is configured directly in the access rules matching HTTP and HTTPS
traffic connecting to YouTube.
For more information, see How to Enforce YouTube for Schools in the Firewall.
Custom Block Pages
You can customize the block pages for Virus Scanner, URL Filter, Application Control 2.0, and SSL Interception when used in combination with
the Forwarding Firewall Service. Each page has a predefined list of placeholder objects that are replaced on-the-fly by the Barracuda NG Firewall
when the block page is delivered to the client. HTTP connections blocked by a Deny or Block access rule can be redirected to a HTTP block
page. The same feature can also be used to redirect users in the ATD quarantine to the new quarantine page.
For more information, see How to Configure Custom Block Pages, How to Create a Block Access Rule and How to Configure ATD in the Firewall.
URL Filter Warn and Continue
Each URL category in the URL Policy object can be configured to redirect the user to the customizable URL Filter Warning page. After clicking C
ontinue the user is allowed to view the website. This action is logged.
For more information, see How to Create an URL Filter Policy Object.
WiFi AP Authentication
The Barracuda NG Firewall can authenticate users by using the authentication information from Aerohive and Ruckus wireless access points.
For more information, see How to Configure WiFi AP Authentication.
Schedule Objects
Schedule objects are used as an additional matching criteria to restrict access rules to specific times and intervals . Schedule objects can be
used in host, access, and application rules and provide time granularity in minutes.
For more information, see Schedule Objects.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
15
SSL VPN Web Forwards Improvements
Create Web Forwards to allow SSL VPN users to access web-based internal applications. There are predefined web forward types for Outlook
Web Access and SharePoint servers as well as generic settings that allow you full control over how the web content is rewritten.
For more information, see How to Configure a Generic Web Forward, How to Configure an Outlook Web Access Web Forward and How to
Configure a SharePoint Web Forward.
SSL VPN User Attributes
User attributes are placeholder variables used to personalize Web Forwards or to configure single-sign-on authentication. They are created by
the admin and filled in by the end user in either the desktop or mobile portal.
For more information, see How to Use and Create Attributes
Single Sign On for Web Forwards
Web Forwards can be configured to automatically log the user in when accessing Web Forwards requiring authentication. The Barracuda NG
Firewall SSL VPN supports HTTP and Form based (POST; GET and JavaScript) authentication. User Attributes allow you to use different user
credentials than those used to log into the SSL VPN.
For more information, see How to Configure Single Sign On for Web Forwards.
SSL VPN Self-Provisioning for VPN Templates
The NG SSL VPN service allows the end users to self-provision their VPN client on Windows, OS X or iOS devices. To automatically download
and install the configuration, the user must log into one of the NG SSL VPN portals and click the VPN Template provisioning link. VPN Templates
can be created for all group policy based Client-to-Site VPN configurations.
For more information, see How to Configure VPN Templates in the SSL VPN.
Barracuda NG Remote App
The Barracuda NG Remote application for Apple iOS provides easy remote access to your Barracuda NG Firewalls and Barracuda NG Control
Centers from any place at any time. With the Barracuda NG Remote Application you can:
Connect via VPN to a Barracuda Networks demo environment to try/test the application.
Create a connection to one or more Barracuda NG Firewall units via a Barracuda NG Control Center.
View a Barracuda NG Admin style status map for NG Control Centers and NG Firewalls.
View general details for a unit (including uptime, license state, activation state, firmware version, and model and serial number).
View the status of a unit (including server/service control, CPU load, system, network control, events, and licenses).
View graphics for Box resource usage by memory, data disk usage, and system disk usage.
View dynamic graphs for allowed sessions, blocked sessions, and bit/sec throughput.
Perform a unit reboot, services restart, network reconnect, and management tunnel rebuild as remote actions.
Use full Terminal Access (SSH).
Enable and disable dynamic access rules (for example, to provide temporary access to a blocked web application).
For more information, see Barracuda NG Firewall Remote.
Upcoming Azure and AWS Pay-As-You-Go Images
In addition to the BYOL image, Azure and AWS pay-as-you-go images will soon be available via the Azure and AWS Marketplaces. This allows
you to pay for your NG Firewall on an hourly basis.
For more information, see Licensing.
Product Tips
Barracuda Networks can now inform customers of important issues such as security vulnerabilities or other important messages for your
Barracuda NG Firewall. These notifications are displayed in the Message Board element on the Dashboard. Go to Box > Advanced
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
16
Configuration > Message Board to enable Product Tips.
Update Notifications
A new Dashboard element contains all available Hotfixes, Firmware and NG Admin updates for your individual NG Firewall. The element
displays dependencies and installed updates and hotfixes as well as detailed information for each download. Go to CONFIGURATION >
Configuration Tree > Advanced Configuration > Firmware Update to enable the UPDATES element.
For more information, see DASHBOARD General Page and How to Update the Barracuda NG Firewall or NG Control Center using NG Admin.
Multi-Filter Custom Reports
The newest version of the Barracuda Report Creator added support for multiple entries in the filter element of a custom report. This allows you to
create custom report data for multiple users, IP addresses, applications, and URL and Application Categories.
For more information, see How to Create Custom Reports.
Improvements Included in Barracuda NG Firewall Version 6.1
Barracuda NG Admin
NG Admin no longer shows a pop-up every 5 seconds when port 806 is not accessible on an NG Control Center. (BNNGF-29355)
Entries in the Entries column for connection objects are now displayed in CIDR notation. (BNNGF-29143)
NG Admin no longer crashes when opening a trace record. (BNNGF-27752)
Barracuda OS
HA firewall session sync no longer causes soft-lockups. (BNNGF-27977)
Updated OpenSSL to fix several security vulnerabilities (BNNGF-29257)
Authentication service (phibs) no longer crashes when a large number of file descriptors are used. (BNNGF-28877)
Updated glibc due to security vulnerability CVE-2015-0235. (BNNGF-28018)
Updated NTP due to security vulnerabilities CVE-2014-9293, CVE-2014-9294, CVE-2014-9295 and CVE-2014-9296. (BNNGF-27518)
Fixed legacy Management Centers download of OPSWAT pattern updates. (BNNGF-29191)
Added disk monitoring to the box level SNMP service. (BNNGF-28202)
Added power supply information to the box level SNMP service. (BNNGF-27808)
The DC client logout timeout is now in hours instead of days and the default timeout is changed to 24h. (BNNGF-28023)
Updated curl and libcurl due to security vulnerabilities CVE-2014-8150 and CVE-2014-8151. (BNNGF-27645)
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
17
TS client now listens on every box IP address. (BNNGF-29175)
SSL encrypted syslog streaming now works as expected. (BNNGF-27957)
SIP Proxy
The SIP Proxy now reacts gracefully when failing to open additional dynamic ports. (BNNGF-29131)
URL Filter
Updated IP addresses of the URL filter databases in the Barracuda Cloud. (BNNGF-28080)
Barracuda NG Web Filter updated with new categories. (BNNGF-28811)
DHCP Server
Added a new event to be triggered when the number of DHCP leases is exhausted. (BNNGF-27931)
Dynamic Routing Service
Propagating additional static VPN routes via OSPF when multiple VPN routes are already propagated now works as expected.
(BNNGF-29214)
Removing the primary route of two redundant BGP routes using special routing tables now works. (BNNGF-29205)
Fixed various filtering issues for access lists. (BNNGF-28145)
Firewall
IPS no longer drops traffic for out-of-window TCP ACKs when in report-only mode. (BNNGF-29062)
Enabled virus scanning in the firewall for Barracuda NG Firewall F100 and F101. (BNNGF-28909)
Websites now load as expected when TCP Stream Reassembly is disabled and Virus Scanning in the Firewall is enabled.
(BNNGF-27649)
SSL Interception now works for connections using a one-character CN in its certificate. (BNNGF-27923)
HTTP Proxy
Updated OpenSSL version used by the HTTP service to fix several security vulnerabilities (BNNGF-29261)
Virus scanning in the HTTP Proxy now works in combination with the download progress bar. (BNNGF-27136)
Removed HTTP Proxy service from the default configuration for all Barracuda NG Firewall F100 and F101 models. (BNNGF-28930)
It is no longer possible to add a certificate that does not match the private key when configuring a reverse proxy with Use SSL set to yes.
(BNNGF-27679)
Entries in the Excluded Domains for SSL Interception now when both the domain with and without pretended dot (.).(BNNGF-28858)
VPN
Source routes for the remote networks are now created as expected on the VPN hub. (BNNGF-29053)
L2TP clients behind the same NAT device now work as expected. (BNNGF-29476)
IPsec Site-to-Site connections using NAT traversal no longer drop when a configuration change is made. (BNNGF-27422)
AES encryption with 192bit key length for TINA tunnel no longer cause kernel panic. (BNNGF-27421)
Client-to-Site MSAD and OTP (via RADIUS) authentication now work as expected. (BNNGF-29282)
Removed legacy WANOpt Master VPN setting. (BNNGF-29719)
Virus Scanner
Retrieving ATD results now subtracts the time zone correctly. (BNNGF-28326)
Fixed potential path traversal exploit for files with a malicious folder structure. (BNNGF-27814)
Added a new X-ALERT-DESCRIPTION header. (BNNGF-29287)
Disabled and removed ClamAV virus scanning engine for Barracuda NG Firewall F100 and F101. The Avira virus scanning engine is
automatically started with the default configuration as a replacement. (BNNGF-28526)
SSL VPN
Activate Content Rewrite is removed from NG Admin and enabled by default for all Web Forwards. (BNNGF-708)
Web Resources were renamed to Web Forwards. (BNNGS-696)
Web Forwards with Allowed Hosts now work as expected. (BNNGS-675)
Mobile Portal Bar Exemptions now checks only for paths in the URL. (BNNGS-673)
Certificate authentication now works as expected. (BNNGS-671)
The mobile portal now correctly appends the Launch Path when launching a Web Forward. (BNNGS-615)
Fixed connectivity issues for Outlook Web Access 2007 Web Forwards. (BNNGS-605)
Logging into the desktop portal using Safari now works as expected. (BNNGS-536)
The Settings menu on the desktop and mobile portal is displayed only when needed. (BNNGS-391)
VPN connections via the Transparent Agent now work as expected when using Barracuda license files. (BNNGF-25705)
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
18
WiFi
The ticketing database is now synced to the HA partner. (BNNGF-27390)
Distributed Firewall
Creating a ruleset now works as expected. (BNNGF-29091)
NG Control Center
Added configuration update icon column to the status page of the NG Control Center. (BNNGF-25426)
Known Issues
6.1
Amazon AWS/Microsoft Azure: Installing hotfixes or updates via SSH or NG Control Center is currently not possible. Update directly on
the unit over NG Admin instead.
Virus Scanning in the Firewall: The default MIME types scanned differ for HTTP and HTTPS. Go to CONFIGURATION > Configuration
Tree > Box > Virtual Servers > your virtual server > Firewall > Security Policy and add application/* to the Scanned MIME
Types to scan the same MIME types for HTTP and HTTPS.
Virus Scanning in the Firewall: File trickling currently does not work for downloads over HTTP.
Xen HVM: Updating or Installing Xen HVM virtual NG Firewalls or NG Control Centers to version 6.1 is currently not supported.
SSL VPN: Favorites are not included in the PAR file.
SSL VPN: Text fields do not accept the # character.
SSL VPN: The mobile navigation bar is missing from servers entered in the Allowed Hosts.
SSL VPN: User Attributes do not support UTF-8.
SSL VPN: The allowed host filter path must be unique.
WiFi Authentication: In some cases the IP address may be incorrect (0.0.0.0) for the first login of a user. Subsequent logins use the
correct IP address.
Safe Search: In some cases, YouTube safety mode does not work when logged in with a Google account.
Safe Search: If safe search is enabled, it is not possible to log in to YouTube when cookies are disabled.
Safe Search: Safe search is not enforced by Bing when using HTTPS.
Custom Block Pages: Even though access to a blocked website is properly denied, Application or URL Filter block pages are not
displayed on the first request for a website blocked by a URL policy object when SSL Interception is enabled.
NG Admin: Links from dashboard elements are always opened in Internet Explorer and not in the default browser.
VPN Routing: When a duplicate route to an already existing VPN route in the main routing table is announced to the NG Firewall via RIP,
OSPF or BGP, a duplicate routing entry is created and the route that was added last is used.
VPN Routing: Creating a direct or gateway route with the same metric and destination as a VPN route in the main routing table results in
duplicate routes. The route added last is used.
Miscellaneous
HTTP Proxy: Custom Cipher String and Allow SSLv3 settings only apply to reverse proxy configurations.
CC Wizard: The CC Wizard is currently not supported for NG Control Centers deployed using NG Install.
ATD: Only the first URL in the Quarantine Tab that leads to a quarantine entry is displayed, even if the User and/or IP address
downloaded more than one infected file.This can be dangerous if the first downloaded file is a false-positive.
Firewall: It is not possible to join a join.me session if SSL Interception and Virus Scanning is enabled in the matching access rule.
Firewall: Using SSL Interception in combination with URL Filtering and category exemptions may result in degraded performance.
NG Admin: SPoE does not work if an IPv6 virtual server IP address is used.
Barracuda OS: Provider DNS option for DHCP connections created with the box wizard must be enabled manually.
Terminal Server Agent: It is not currently possible to assign connections to Windows networks shares to the actual user.
Firmware Update: Log messages similar to WARNING:
/lib/modules/2.6.38.7-9ph5.4.3.06.x86_64/kernel/drivers/net/wireless/zd1211rw/zd1211rw.ko needs
unknown symbol ieee80211_free_hw may appear while updating, but can be ignored.
Attention: Amazon AWS/Microsoft Azure: Performing Copy from Default of Forwarding Firewall rules currently locks out administrators
from the unit and requires a fresh installation of the system.
Application Control 2.0 and Virus Scanning: Data Trickling is only done while the file is downloaded, but not during the virus scan. This
may result in browser timeouts while downloading very large files.
Application Control 2.0 and Virus Scanning: If the Content-Length field in HTTP headers is missing or invalid, the Large File Policy may
be ignored.
Application Control 2.0 and Virus Scanning: It is not currently possible to perform virus scanning for chunked transfer encoded HTTP
sessions such as media content streaming. Barracuda Networks recommends excluding such traffic from being scanned.
Application Control 2.0 and Virus Scanning: In very rare cases, if the SSL Interception process is not running, but the option Action if
Virus Scanner is unavailable is set to Fail Close, small amount of traffic may already have passed through the firewall.
Application Control 2.0 and Virus Scanning: In rare cases, Google Play updates are sometimes delivered as partial updates. These
partial updates cannot be extracted and are blocked by the virus scanning engine. The engine reports The archive couldn't be
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
19
scanned completely. Either create a dedicated firewall rule that does not scan Google Play traffic, or set Block on Other Error in Avira
Archive Scanning to No.
High Availability: IPv6 network sessions might not be established correctly after an HA failover.
Barracuda OS: Restoring units in default configuration with par files created on a NG Control Center may result in a corrupt virtual server.
Instead, copy the par file to opt/phion/update/box.par and reboot the unit.
VPN: Rekeying does not currently work for IPsec Xauth VPN connections. The VPN tunnel terminates after the configured rekeying time
and needs to be re-initiated.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
20
Release Notes 6.1.1
Before installing or upgrading to the new firmware version, back up your configuration and read the release and migration notes. If you
are updating from a version earlier than 6.0.x, all migration instructions for 5.x and 6.0 also apply.
Do not manually reboot your system at any time while the update is in process, unless otherwise instructed by Barracuda Networks
Technical Support. Upgrading can take up to 60 minutes, depending on your current firmware version and other system factors. If the
process takes longer, please contact Barracuda Networks Technical Support for further assistance.
In these Release Notes:
General
GPL Compliance Statement
Hotfixes Included with Barracuda NG Firewall Version 6.1.1
What´s New in Barracuda NG Firewall Version 6.1.1
Updated Available Instance Types for Barracuda NG Firewalls in AWS and Azure
Improvements Included in Barracuda NG Firewall Version 6.1.1
Known Issues
General
If you want to update an existing system:
When updating from an earlier version to 6.1, the following update path applies: 4.2 > 5.0 > 5.2 > 5.4 > 6.0 > 6.1.
Barracuda NG Firewall F100 and F101 models using the ClamAV Virus Scanner may not have enough free disk space for
updating. For more information, see Migrating to 6.1.
Do not upgrade Barracuda NG Firewalls or NG Control Centers using Xen HVM images to 6.1.0.
For more information, see Migrating to 6.1.
GPL Compliance Statement
This product is in part Linux-based and contains both Barracuda Networks proprietary software components and open source components in
modified and unmodified form. Some of the open source components included underlie either the GPL or LGPL, or other similar licensing, which
requires all modified or unmodified source code to be made freely available to the public. This source code is available at http://source.barracuda.
com.
Hotfixes Included with Barracuda NG Firewall Version 6.1.1
Hotfix 686: Wi-Fi Access Point Authentication
Hotfix 687: SSL VPN Generic Web Forwards
Hotfix 693: Leap Second Update 2015
Hotfix 697: DHCP Server Restart Policy
Hotfix 699: Azure Public Cloud Detection
What´s New in Barracuda NG Firewall Version 6.1.1
CudaLaunch
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
21
CudaLaunch offers secure remote access to your organization's applications and data from mobile devices. CudaLaunch is available for iOS and
Android devices via the Apple App Store or Google Play Store. Both versions offer the same functionality. Full Device VPN uses the same VPN
group policy. CudaLaunch on Android uses the TINA VPN protocol; the iOS app manages the built-in IPsec VPN client.
For more information, see CudaLaunch and NG Firewall Configuration for CudaLaunch.
URL Filter Overrides
The Override feature of the URL Filter grants temporary access to otherwise blocked URL categories. URL categories that are set to the override
policy redirect the user to the customizable Override Block page of the URL Filter. The override admin must grant the request for a specified time.
When the request has been granted, the user is automatically forwarded to the website. Overrides are always granted for the entire URL
category.
For more information, see How to Configure URL Filter Overrides and How to Grant URL Category Overrides - User Guide.
NAC for SSL VPN and CudaLaunch
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
22
SSL VPN Network Access Control (NAC) limits access to the web portals of the SSL VPN service according to a variety of factors that are not
connected to the user. Users who fail the NAC check are not allowed to log in until they have a conforming system.
For more information, see How to Configure NAC for SSL VPN.
Firmware Update Management on the NG Control Center
Similar to standalone units, the Barracuda NG Control Center Firmware Update page is now tied in with the new Barracuda Download Portal. The
Download Portal tab displays dependencies for updates and hotfixes as well as detailed information for each download. On the box level of the
NG Control Center, go to CONFIGURATION > Configuration Tree > Advanced Configuration > Firmware Update to enable the Download
Products tab.
For more information, see How to Update Barracuda NG Control Center Managed Systems.
Product Tips on the NG Control Center
Barracuda Networks can now inform customers of important issues such as security vulnerabilities or other important messages concerning the
Barracuda NG Firewalls managed by the NG Control Center. These notifications are displayed in the Product Tips element on the Dashboard.
On the box level of the NG Control Center, go to Box > Advanced Configuration > Message Board to enable Product Tips.
Interface Dashboard Element
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
23
The Interface element shows the port configuration for your Barracuda NG Firewall. All ports are displayed in the same location and with the
same port names as on the physical appliance.
For more information, see DASHBOARD General Page.
Updated Available Instance Types for Barracuda NG Firewalls in AWS and Azure
When deploying the Barracuda NG Firewall in Azure or AWS, you can now choose from an updated list of Instance sizes and types. In Azure, it is
now possible to use any Instance size, as long as the license level matches the number of available CPU cores. AWS Instance types have been
updated to use the new generation of AWS Instances. These changes apply to both BYOL and PAYG (Hourly) images.
For more information, see Public Cloud Hosting.
Improvements Included in Barracuda NG Firewall Version 6.1.1
Barracuda NG Admin
The Firmware update element no longer causes NG Admin to crash on systems that are located in a time zone with a negative offset.
(BNNGF-30967)
Improved error handling when receiving invalid responses from the Barracuda Servers while downloading licenses. (BNNGF-30618)
Changed the input validation of the YouTube for Schools Token to allow underlines. (BNNGF-31421)
Downloading update via the firmware update element now works as expected. (BNNGF-30094, BNNGF-30824)
Entering Networks for Site-to-Site tunnels is no longer required. This is required for an OSPF over VPN configuration. (BNNGF-31444)
Changed input validation for Site Specific Objects to allow all characters also allowed for Forwarding Firewall Objects. (BNNGF-31040)
Generating system reports now works as expected. (BNNGF-31181)
The access rule dialog now handles larger system text sizes. (BNNGF-31068)
NG Admin no longer crashes in unconfigured GTI Editor. (BNNGF-29676)
Session details now contain the URL Category and Application Context. (BNNGF-31665)
Copying/Paste and cloning of Schedule objects now work as expected. (BNNGF-31630)
Switch to Advanced View is visible again on the Box > Administrators page. (BNNGF-31449)
The IPsec tunnel statuses are now displayed on CONTROL > GeoMaps and CONTROL> Status Map. (BNNGF-24002)
NG Admin now works as expected on Windows Vista. (BNNGF-30495)
Added check to ensure names for GTI Editor groups are unique. (BNNGF-30431)
Added column for the serial number to the NG Control Center CONTROL > Status Map. (BNNGF-29850)
Using range regular expressions for filtering in NG Admin now works as expected. (BNNGF-20283)
Licenses that are about to expire are now displayed in yellow on the CONTROL > Licenses page. (BNNGF-13807)
RCS now works as expected on the Security Policy and Response Messages pages. (BNNGF-29819)
RCS now works as expected on the Network page when a UMTS/3G modem is configured. (BNNGF-21274)
The eventing service is now included in the status displayed on the CONTROL > Status Map page. (BNNGF-29674)
Changed input validation to allow - (dash) and _ (underscore) in the shell script editor on the CONTROL > Remote Execution page.
(BNNGF-31551)
The Firmware Update element now also works with SF licenses. (BNNGF-30056)
Pressing delete key repeatedly no longer temporarily removes list items without a page lock. (BNNGF-30091)
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
24
Exporting the Trusted Root Certificate to the clipboard on the Security Policy page now works as expected. (BNNGF-29936)
Rate-Max for inbound traffic shaping rates larger than 2047 Mbit on the FIREWALL > Shaping page are now displayed correctly.
(BNNGF-28993)
Icons in the CONTROL > Network > ARP are now displayed correctly. (BNNGF-27948)
Changing the welcome message for the Access Control Service now works as expected.(BNNGF-24005)
Barracuda OS
Increased the number of supported DHCP WAN connections to twelve. (BNNGF-31523)
After updating, controld now restarts if necessary. (BNNGF-30455)
Updated libcurl to fix several security vulnerabilities. (BNNGF-39894, BNNGF-30108)
installUpdate now writes to the box_Release_update.log file. (BNNGF-31305)
Fixed potential issues caused by leap seconds. (BNNGF-31167, BNNGF-31160)
Improved event handling for events not reaching the Notification Threshold defined for one week. (BNNGF-28795)
Added rpm signature checks to hotfix files and PhionRelCheck. (BNNGF-30551)
For Wi-Fi AP authentication, it is now possible to define a subnet or an individual IP address as the access point source network.
(BNNGF-30126)
Improved memory management of the MSAD DC Client authentication. (BNNGF-29964)
Updated default values for the general firewall configuration parameters. (BNNGF-31425)
Updated OpenSSL to version 0.9.8zf. (BNNGF-21059)
Users authenticating the first time via an Aerohive Wi-Fi access point are no longer assigned a wrong IP address. (BNNGF-30080)
It is now possible to migrate virtual servers to VF2000 or higher. (BNNGF-30051)
Removed option to use wildcards in the pre-authentication value patterns. (BNNGF-26436)
The control daemon now automatically monitors and restarts ntpd. (BNNGF-29702)
Product Tips and Firmware Update Element now generate events when new items are available. (BNNGF-29447)
Firewall
YouTube for Schools now works as expected when accessing YouTube via HTTPS. (BNNGF-31370)
Changes to the forwarding firewall ruleset no longer terminate sessions allowed due to a firewall plugin. (BNNGF-25686)
The FTP plugin now handles EPRT ftp commands correctly. (BNNGF-30323)
YouTube SafeSearch can no longer be deactivated when using the Chrome browser. (BNNGF-30268)
Added IP addresses for dlportal.barracudanetworks.com (64.235.151.85 and 95.172.71.5) to the Barracuda Update Servers network
object. (BNNGF-29445)
The Authentication Timeout when accessing the Barracuda Web Security Service (Flex) is now configurable. (BNNGF-31510)
Internal access rules not accessible for the user no longer generate events. (BNNGF-26014)
Client-to-Site VPN traffic is no longer blocked when a MAC-based access rule is located before the client-to-site access rule in the
ruleset. (BNNGF-29862)
The number of network objects that can contain hostnames is no longer limited to 383. (BNNGF-30590)
Distributed Firewall
Using application objects in the application ruleset now works as expected. (BNNGF-31430)
HTTP Proxy
The progress bar popup now works as expected. (BNNGF-31782)
Handling of URL categorization in the HTTP Proxy service now works as expected. (BNNGF-31126)
Files analyzed by ATD are no longer cached by the HTTP Proxy. (BNNGF-27131)
Virus Scanner
Improved handling of RAR files no longer cause high CPU loads. (BNNGF-29816)
Virus patterns are now updated immediately after installing an update or hotfix containing the virus scanner rpm. (BNNGF-29152)
Using legacy phion pool licenses in combination with Avira now works as expected. (BNNGF-30304)
DHCP Server
The DHCP server now listens on both LAN and Wi-Fi interfaces if DHCP subnets are served over both interfaces. (BNNGF-29780)
VPN Server
Encapsulation for IPsec tunnels using NAT-T is now set correctly. (BNNGF-29755)
L2TP tunnels now work as expected when a referenced firewall object is used for the static IP address of the user. (BNNGF-31052)
To avoid excessive logging, the default Log Level for WAN Optimization is now set to 0. (BNNGF-30784)
SSL VPN
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
25
Checking documents in and out on a SharePoint 2010 server now works as expected. (BNNGF-517)
The password attribute value is no longer visible in the browser page source. (BNNGS-1001)
You can now remove all permissions from the custom VPN profiles. (BNNGS-999)
SSL tunnels associated with generic applications are now correctly scoped to the respective Application. (BNNGF-30333, BNNGS-983)
Writing to log file while loading a Web Forward now works as expected. (BNNGS-936)
Single Sign-On via JavaScript authentication now works as expected. (BNNGS-935)
Tapping Logout now works as expected on iOS and Windows Phone devices. (BNNGS-930)
Added input validation to ensure the Allowed Host filter path is unique. (BNNGS-748)
Saving and displaying text for User Attributes using the TextArea format now works as expected. (BNNGS-368)
Clicking Login button repeatedly after logging in no longer results in a JavaScript error. (BNNGS-240)
FTP Gateway
Added option to limit the Maximal Workers per Peer to avoid high system load. (BNNGF-21237)
Changed the maximum number allowed for Maximal Allowed Workers to 255 and the default value to 128. (BNNGF-30574)
OSPF/RIP/BGP Service
BGP weight changes now work as expected. (BNNGF-30028)
Azure
A MAC address change because of a reboot no longer invalidates the license on managed Barracuda NG Firewalls in Azure.
(BNNGF-31497)
Xen
Xen HVM images now work as expected. (BNNGF-28214)
Xen HVM images now use the xen-netfront network driver by default if possible. (BNNGF-27392)
NG Control Center
Managed NG Firewalls running on a Xen hypervisor report their serial number correctly. (BNNGF-31701)
Setting Enforce password strength to No password enforcement for NG Control Center admins now works as expected.
(BNNGF-27960)
NG Control Center admins assigned to an Administrative Role that disallows Create PAR File can no longer create system reports
containing PAR files. (BNNGF-21496)
Box level configuration for Firmware Update Element and Products tips is now accessible through Set Area Config on the CONTROL >
File Upload page on the NG Control Center. (BNNGF-29443)
Known Issues
6.1.1
Product Tips: A NG Admin session may temporarily freeze when the Barracuda Update servers are unreachable.
Product Tips: Product Tips on the NG Control Center are enabled, even though the Enabled is set to No in the Set Area Config for Pro
duct Tips on the CONTROL > File Update page. Do a dummy change set the configuration. This settings also applies to all NG
Firewalls managed by the NG Control Center.
Opensource Xen HVM: Opensource (Linux) Xen HVM images are currently not supported for firmware 6.1.1.
Interface Element: In some cases the interface element may not work correctly on virtual NG Firewalls.
Firewall Plugin: The DCERPC firewall plugin module is disabled.
Azure: During the update to 6.1.1 the ssh key is regenerated replacing the existing ssh key.
Barracuda NG Control Center C610: Verification of the raid rpm signature included in the extra update archive fails, causing
phionRelCheck to show a dirty release state.
Application Control 2.0: The URL Category Search Engine may not be set to override when URL Filtering is used in combination with
SafeSearch.
HTTP Proxy: Custom block pages do not work for the HTTP Proxy when running on the same NG Firewall as the Firewall service. This
issue does not occur when running the HTTP proxy service on a second NG Firewall behind the NG Firewall running the Firewall service.
SSL VPN: Favorites are not included in the PAR file.
SSL VPN: Text fields do not accept the # character.
SSL VPN: The mobile navigation bar is missing from servers entered in the Allowed Hosts.
SSL VPN: User Attributes do not support UTF-8.
SSL VPN: The allowed host filter path must be unique.
Safe Search: In some cases, YouTube safety mode does not work when logged in with a Google account.
Safe Search: If safe search is enabled, it is not possible to log in to YouTube when cookies are disabled.
Safe Search: Safe search is not enforced by Bing when using HTTP.
VPN Routing: When a duplicate route to an already existing VPN route in the main routing table is announced to the NG Firewall via RIP,
OSPF or BGP, a duplicate routing entry is created and the route that was added last is used.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
26
VPN Routing: Creating a direct or gateway route with the same metric and destination as a VPN route in the main routing table results in
duplicate routes. The route added last is used.
Miscellaneous
HTTP Proxy: Custom Cipher String and Allow SSLv3 settings only apply to reverse proxy configurations.
CC Wizard: The CC Wizard is currently not supported for NG Control Centers deployed using NG Install.
ATD: Only the first URL in the Quarantine Tab that leads to a quarantine entry is displayed, even if the User and/or IP address
downloaded more than one infected file.This can be dangerous if the first downloaded file is a false-positive.
Firewall: It is not possible to join a join.me session if SSL Interception and Virus Scanning is enabled in the matching access rule.
Firewall: Using SSL Interception in combination with URL Filtering and category exemptions may result in degraded performance.
NG Admin: SPoE does not work if an IPv6 virtual server IP address is used.
Barracuda OS: Provider DNS option for DHCP connections created with the box wizard must be enabled manually.
Terminal Server Agent: It is not currently possible to assign connections to Windows networks shares to the actual user.
Firmware Update: Log messages similar to WARNING:
/lib/modules/2.6.38.7-9ph5.4.3.06.x86_64/kernel/drivers/net/wireless/zd1211rw/zd1211rw.ko needs
unknown symbol ieee80211_free_hw may appear while updating, but can be ignored.
Attention: Amazon AWS/Microsoft Azure: Performing Copy from Default of Forwarding Firewall rules currently locks out administrators
from the unit and requires a fresh installation of the system.
Application Control 2.0 and Virus Scanning: Data Trickling is only done while the file is downloaded, but not during the virus scan. This
may result in browser timeouts while downloading very large files.
Application Control 2.0 and Virus Scanning: If the Content-Length field in HTTP headers is missing or invalid, the Large File Policy may
be ignored.
Application Control 2.0 and Virus Scanning: It is not currently possible to perform virus scanning for chunked transfer encoded HTTP
sessions such as media content streaming. Barracuda Networks recommends excluding such traffic from being scanned.
Application Control 2.0 and Virus Scanning: In very rare cases, if the SSL Interception process is not running, but the option Action if
Virus Scanner is unavailable is set to Fail Close, a small amount of traffic may already have passed through the firewall.
Application Control 2.0 and Virus Scanning: In rare cases, Google Play updates are sometimes delivered as partial updates. These
partial updates cannot be extracted and are blocked by the virus scanning engine. The engine reports The archive couldn't be
scanned completely. Either create a dedicated firewall rule that does not scan Google Play traffic, or set Block on Other Error in Avira
Archive Scanning to No.
High Availability: IPv6 network sessions might not be established correctly after an HA failover.
Barracuda OS: Restoring units in default configuration with par files created on an NG Control Center may result in a corrupt virtual
server. Instead, copy the par file to opt/phion/update/box.par and reboot the unit.
VPN: Rekeying does not currently work for IPsec Xauth VPN connections. The VPN tunnel terminates after the configured rekeying time
and needs to be re-initiated.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
27
Release Notes 6.1.2
Before installing or upgrading to the new firmware version, back up your configuration and read the release and migration notes. If you
are updating from a version earlier than 6.0.x, all migration instructions for 5.x and 6.0 also apply.
Do not manually reboot your system at any time while the update is in process, unless otherwise instructed by Barracuda Networks
Technical Support. Upgrading can take up to 60 minutes, depending on your current firmware version and other system factors. If the
process takes longer, please contact Barracuda Networks Technical Support for further assistance.
In these Release Notes:
General
GPL Compliance Statement
Hotfixes Included with Barracuda NG Firewall Version 6.1.2
What´s New in Barracuda NG Firewall Version 6.1.2
Improvements Included in Barracuda NG Firewall Version 6.1.2
Known Issues
General
If you want to update an existing system:
When updating from an earlier version to 6.1, the following update path applies: 4.2 > 5.0 > 5.2 > 5.4 > 6.0 > 6.1.
Barracuda NG Firewall F100 and F101 models using the ClamAV Virus Scanner may not have enough free disk space for
updating. For more information, see Migrating to 6.1.
Do not upgrade Barracuda NG Firewalls or NG Control Centers using Xen HVM images to 6.1.0.
For more information, see Migrating to 6.1.
GPL Compliance Statement
This product is in part Linux-based and contains both Barracuda Networks proprietary software components and open source components in
modified and unmodified form. Some of the open source components included underlie either the GPL or LGPL, or other similar licensing, which
requires all modified or unmodified source code to be made freely available to the public. This source code is available at http://source.barracuda.
com.
Hotfixes Included with Barracuda NG Firewall Version 6.1.2
Hotfix 702: TKEY Queries in bind
Hotfix 706: VPN Profiles for SSL VPN
Hotfix 708: SSL Interception (included in Hotfix 711)
Hotfix 711: Cumulative Firewall Hotfix
Hotfix 716: DC Client Authentication
What´s New in Barracuda NG Firewall Version 6.1.2
Wi-Fi Access Point Authentication for Aruba AP
It is now possible to collect authentication information by configuring the Barracuda NG Firewall as a logging server for your Aruba Access Points.
For more information, see How to Configure WiFi AP Authentication and WiFi AP Authentication Aruba Configuration
Improvements Included in Barracuda NG Firewall Version 6.1.2
Barracuda NG Admin
Exporting, Importing, and Merging box licenses from and to the clipboard now works as expected. (BNNGF-30523)
Re-enabled option to link the Network configuration to a repository entry. (BNNGF-33037)
VPN tunnel status is now displayed correctly on the Status Map. (BNNGF-32645)
Exporting, Importing, and Merging HTTP Proxy ACL entries from and to the clipboard now works as expected. (BNNGF-23121)
Disabled routes are now displayed in red. (BNNGF-33226)
It is now possible to set the IPsec-ID for IPsec tunnels created with the GTI editor. (BNNGF-32705)
When restoring from a PAR file, NG Admin no longer locks up when the PAR file is unavailable. (BNNGF-32514)
Removing Client-to-Site VPN group policies now works as expected. (BNNGF-31778)
Values in the FIREWALL > Audit Log duration columns are now displayed correctly. (BNNGF-32189)
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
28
In the NG Control Center, active tunnels in CONTROL > Geo Maps are now displayed in green to be consistent with the Status Map.
(BNNGF-30904)
Reputation search for IP addresses in FIREWALL > Live and FIREWALL > History now works as expected. (BNNGF-33440)
In the NG Control Center, Reset to Cluster Default now requires a configuration lock. (BNNGF-31851)
NG Admin no longer freezes if a large amount of FW Audit data is requested. (BNNGF-31774)
Barracuda OS
HA sync no longer causes soft lockups if the HA-partner is unavailable. (BNNGF-31427
Updated HP smart array drivers (hspa) to version 3.4.10. (BNNGF-32068)
The DC Client now correctly interprets user group information sent by the DC Agent. (BNNGF-33146)
DHCP with multiple encapsulated options now works as expected. (BNNGF-32895)
Restoring PAR files larger than two GB now works as expected. (BNNGF-31879)
The virtual server monitoring state is no longer listed on the CONTROL > Server page if IP Monitoring Policy is set to No.
(BNNGF-24160)
Updated LSI megaraid driver (megaraid_sas) to version 6.808.12. (BNNGF-32585)
Changing duplex settings for interfaces using the netsemi.ko driver now works as expected. (BNNGF-31973)
Added source and destination IP address to the box level eventS.log logfile. (BNNGF-32438)
Firewall
The Firewall service no longer causes a kernel panic due to a race condition in the source object allocation. (BNNGF-32484)
Disabling ping for management or service addresses now works as expected. (BNNGF-33169)
Parsing compressed HTML pages by IPS now works as expected. (BNNGF-25552)
The DNS plug-in now works correctly and no longer crashes. (BNNGF-32456)
The Firewall service now correctly processes NAT/PAT operations to address issues with website loading and connection drops in
general. (BNNGF-32386)
Updated OpenSSL version used for SSL Interception to enable elliptic curve ciphers. (BNNGF-26180)
Fixed a memory leak related to delivery of Application Control 2.0 Block Pages. (BNNGF-32838)
SSL Interception now works with all imported root certificates. (BNNGF-32771)
The Firewall activity log now correctly displays denied and blocked IPv6 sessions. (BNNGF-31750)
Distributed Firewall
It is now possible to select custom IPS policies for rules in the Global Rules ruleset. (BNNGF-23221)
OSPF/RIP/BGP Service
Configuration changes no longer deactivate OSPF on vpnr interfaces. (BNNGF-31309)
VPN
L2TP Client-to-Site VPN now works as expected for Android and iOS devices. (BNNGF-31289)
Dynamic Mesh tunnels can now be triggered without a source or destination network if a routed VPN is used. (BNNGF-31213)
Added Prevent Tunnel Timeout option to the TI settings of the connection object to be able to choose if the matching traffic is used as a
criteria for terminating the dynamic tunnel (BNNGF-32854, BNNGF-21214)
Added MD160, SHA256, and SHA512 to the supported hash algorithms for IPsec VPNs. (BNNGF-32702, BNNGF-30929)
Fix for a dead loop on the virtual device vpn0 that caused issues when enabling QoS on VPN tunnels. (BNNGF-31717)
Dynamic Mesh Tunnels no longer cause an error when a tunnel is destroyed while still in the initiation phase. (BNNGF-32835)
IPsec ID Type is now configurable for IPsec Site-to-Site VPN tunnels. (BNNGF-17248)
DNS Server
TKEY queries are now handled correctly. This fixes security vulnerability CVE-2015-5477. (BNNGF-32391)
SSH Proxy
Added aes-128-ctr to the allowed cipher list. (BNNGF-32327)
HTTP Proxy
It is no longer possible to use SSL Interception and the download progress bar in the HTTP Proxy service. (BNNGF-31364)
NG Control Center
Reassigning pool licenses for phion-legacy and SF-licensed units now works as expected. (BNNGF-31535)
Enable Product Tips now shows the correct state on freshly installed NG Control Centers. (BBNNGF-32410)
Added Message column to RCS report. (BNNGF-30981)
CC Admins using peer IP restrictions and SPoE can now successfully authenticate. (BNNGF-27515)
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
29
Known Issues
6.1.2
NG Control Center: Network > Azure Advanced Networking is displayed in a 6.1. cluster even if the managed NG Firewall is running
version 6.1.1 or 6.1.0 that does not support this feature.
After importing a PAR file singed by the NG Control Center on a managed NG Firewall a soft network activation is automatically
executed. Restart the active network configuration on the CONTROL > Box page to finish the network activation.
When a license is changed an automatic soft network activation is executed.
6.1.1
Opensource Xen HVM: Opensource (Linux) Xen HVM images are currently not supported for firmware 6.1.2.
Firewall Plugin: The DCERPC firewall plugin module is disabled.
Azure: During the update to 6.1.2, the ssh key is regenerated and replaces the existing ssh key.
Application Control 2.0: The URL Category Search Engine may not be set to override when URL Filtering is used in combination with
SafeSearch.
HTTP Proxy: Custom block pages do not work for the HTTP Proxy when running on the same NG Firewall as the Firewall service. This
issue does not occur when running the HTTP proxy service on a second NG Firewall behind the NG Firewall running the Firewall service.
SSL VPN: Favorites are not included in the PAR file.
SSL VPN: Text fields do not accept the # character.
SSL VPN: The mobile navigation bar is missing from servers entered in the Allowed Hosts.
SSL VPN: User Attributes do not support UTF-8.
SSL VPN: The allowed host filter path must be unique.
Safe Search: In some cases, YouTube safety mode does not work when logged in with a Google account.
Safe Search: If Safe Search is enabled, it is not possible to log into YouTube when cookies are disabled.
Safe Search: Safe Search is not enforced by Bing when using HTTP.
VPN Routing: When a duplicate route to an already existing VPN route in the main routing table is announced to the NG Firewall via RIP,
OSPF or BGP, a duplicate routing entry is created and the route that was added last is used.
VPN Routing: Creating a direct or gateway route with the same metric and destination as a VPN route in the main routing table results in
duplicate routes. The route added last is used.
Miscellaneous
HTTP Proxy: Custom Cipher String and Allow SSLv3 settings only apply to reverse proxy configurations.
CC Wizard: The CC Wizard is currently not supported for NG Control Centers deployed using NG Install.
ATD: Only the first URL in the Quarantine Tab that leads to a quarantine entry is displayed, even if the User and/or IP address
downloaded more than one infected file.This can be dangerous if the first downloaded file is a false-positive.
Firewall: It is not possible to join a join.me session if SSL Interception and Virus Scanning is enabled in the matching access rule.
Firewall: Using SSL Interception in combination with URL Filtering and category exemptions may result in degraded performance.
NG Admin: SPoE does not work if an IPv6 virtual server IP address is used.
Barracuda OS: Provider DNS option for DHCP connections created with the box wizard must be enabled manually.
Terminal Server Agent: It is not currently possible to assign connections to Windows networks shares to the actual user.
Firmware Update: Log messages similar to WARNING:
/lib/modules/2.6.38.7-9ph5.4.3.06.x86_64/kernel/drivers/net/wireless/zd1211rw/zd1211rw.ko needs
unknown symbol ieee80211_free_hw may appear while updating, but can be ignored.
Attention: Amazon AWS/Microsoft Azure: Performing Copy from Default of Forwarding Firewall rules currently locks out administrators
from the unit and requires a fresh installation of the system.
Application Control 2.0 and Virus Scanning: Data Trickling is done only while the file is downloaded, but not during the virus scan. This
may result in browser timeouts while downloading very large files.
Application Control 2.0 and Virus Scanning: If the Content-Length field in HTTP headers is missing or invalid, the Large File Policy may
be ignored.
Application Control 2.0 and Virus Scanning: It is not currently possible to perform virus scanning for chunked transfer encoded HTTP
sessions such as media content streaming. Barracuda Networks recommends excluding such traffic from being scanned.
Application Control 2.0 and Virus Scanning: In very rare cases, if the SSL Interception process is not running, but the option Action if
Virus Scanner is unavailable is set to Fail Close, a small amount of traffic may already have passed through the firewall.
Application Control 2.0 and Virus Scanning: In rare cases, Google Play updates are sometimes delivered as partial updates. These
partial updates cannot be extracted and are blocked by the virus scanning engine. The engine reports The archive couldn't be
scanned completely. Either create a dedicated firewall rule that does not scan Google Play traffic, or set Block on Other Error in Avira
Archive Scanning to No.
High Availability: IPv6 network sessions might not be established correctly after an HA failover.
Barracuda OS: Restoring units in default configuration with par files created on an NG Control Center may result in a corrupt virtual
server. Instead, copy the par file to opt/phion/update/box.par and reboot the unit.
VPN: Rekeying does not currently work for IPsec Xauth VPN connections. The VPN tunnel terminates after the configured rekeying time
and needs to be re-initiated.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
30
Deployment
The Barracuda NG Firewall and Barracuda NG Control Center is available as a hardware appliance, virtual system, or can be deployed in the
public cloud (NG Firewall only).
Hardware Deployment – Continue with the Hardware Deployment Guide.
Virtual Deployment – Continue with the Virtual Systems(Vx) Deployment Guide.
Cloud Deployment – Continue with the Public Cloud Deployment Guide.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
31
Hardware
The Barracuda NG Firewall is available in multiple hardware models to meet different networking requirements, ranging from the Barracuda NG
Firewall F10 for small or home offices to the Barracuda NG Firewall F1000 for large data centers.
Step 1. (Optional) Install the NG Firewall or NG Control Center in a Rack
Some Barracuda NG systems are desktop sized, the larger models can be mounted in a standard size racks.
For more information, see Rack Installation for Barracuda Appliances.
Step 2. Management Ports
The management port for the Barracuda NG Firewall differs depending on the model. Connect the management port to the network the
management PC is in.
Hardware System
Management Port
WAN Port
Barracuda NG Firewall F10 - F30x
Port 1
Port 4
Barracuda NG Firewall F400 - F600
Port 1
-
Barracuda NG Firewall F800
MGMT port
-
Barracuda NG Firewall F900
MGMT port
-
Barracuda NG Firewall F1000
MGMT port
-
Step 3. Complete the Quick Start Guide
Every Barracuda NG Firewall or NG Control Center appliance is shipped with the Quick Start Guide. Complete all the steps listed in the
Quickstart Guide for the Standard Deployment Mode.
Next Steps
To start log-in and configuration of your Barracuda NG, see Getting Started.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
32
Virtual Systems (Vx)
The Barracuda NG Vx can be deployed on VMware, Xen, KVM, and Hyper-V hypervisors using the virtual images provided by Barracuda
Networks. Each Barracuda NG Vx comes with one virtual network adapter. Virtual Systems are classified by a "capacity" number in the model
name that defines the number of protected Firewall IPs, SSL-VPN users, VPN users and Proxy users (AV and Webfilter). For specialized
installations, use Barracuda NG Install and a generic Barracuda NG ISO image to deploy a custom configuration.
In this article:
Sizing your Virtual Machine
VMware ESXi
Citrix
Opensource Linux Xen
KVM
Hyper-V
Performance Considerations
Sizing your Virtual Machine
Your Vx license limits the amount of supported CPU cores you can use for your virtual Barracuda NG Vx. Storage and RAM can be sized to fit
your needs and are not limited by the license of the Barracuda NG Vx.
Vx Virtual System
Number of Licensed Cores
Minimum Storage [GB]
Minimum Memory [GB]
NG Firewall VF25, VF50, VF100,
VF250, VF500, VF1000
2
80
2
NG Firewall VF2000
4
80
2
NG Firewall VF4000
8
80
2
NG Firewall VF8000
16
80
2
NG Control Center VC400
No core limitation
125
2
NG Control Center VC610,
VC820
No core limitation
250
2
VMware ESXi
Supported Versions – VMware ESX(i) version 3.5 or above
Image Format – *.ova
Max Number of virtual network adapters – 10
To deploy the Barracuda NG Vx on your VMware hypervisor, download the NG Firewall or NG Control Center image from the Barracuda
Networks Download Portal. If you want to deploy using the standard configuration, use the OVA image. If you want a custom configuration,
download the generic Barracuda NG Vx ISO image and Barracuda NG Install to carry out the deployment.
To deploy a Barracuda NG Vx on a VMware ESXi server, see How to Deploy a Barracuda NG Vx OVA Image on VMware Hypervisors or How to
Deploy a Barracuda NG Vx using Barracuda NG Install on a VMware Hypervisor.
Citrix
Supported Versions – Citrix XenServer 6.2 or above
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
33
Image Format – *.hvm.xva (PVHVM) or *.pv.xva (PV) disk images.
Max Number of virtual network adapters – 7
Xen images come in a PVHVM (mix of fully virtualized and paravirtualized drivers) or PV (only paravirtualized drivers) version. If your Citrix
XenServer supports PVHVM, it is recommended to use the PVHVM image for near-native performance. Download images from the Barracuda
Networks Download Portal.
To deploy a Barracuda NG Vx on a XenServer, see How to Deploy the Barracuda NG Vx on a Citrix XenServer.
Opensource Linux Xen
Supported Versions – XenServer 4.X or above
Image Format – Linux script (.sh) script containing PVHVM or PV disk images.
Max Number of virtual network adapters – 7
Xen images come in a PVHVM (mix of fully virtualized and paravirtualized drivers) or PVM (only paravirtualized drivers) version.It is
recommended to use the PVHVM image for near-native performance. Download the installation package to match your Linux Xen hypervisor
from the Barracuda Networks Download Portal.
To deploy a Barracuda NG Vx on a XenServer, see How to Deploy the Barracuda NG Vx on an Opensource Xen Server.
KVM
Supported Versions – KVM 5.4.2 and above
Image Format – *.kvm.zip
Max Number of Virtual Network Adapters – up to 28 (depending on the configuration and number of devices in the VM configuration)
KVM uses a different approach for attaching devices to the virtual machine. It uses an emulated PCI controller with 32 slots. 5 slots are
permanently occupied by necessary system components and disk controller. The remaining 27 slots can be freely assigned to other devices,
including networks adapters. The KVM image for the Barracuda NG Vx uses the virtio paravirtualized network adapters for best performance.
To deploy a Barracuda NG Vx on a KVM hypervisor, see How to Deploy the Barracuda NG Vx on KVM.
Hyper-V
Virtual Disk Format – *.vhd
Max Number of Virtual Network Adapters – up to 8 network adapters + up to 4 additional "legacy network adapters"
Barracuda Networks offers a Virtual Disk you can use to install the Hyper-V version of the Barracuda NG Firewall. Download the virtual disk from
the Virtual Appliance Download Page.
To deploy a Barracuda NG Vx on a Hyper-V hypervisor, see How to Deploy the Barracuda NG Vx on Hyper-V.
Performance Considerations
When choosing which hypervisor to use, Barracuda Networks recommends using VMware ESXi hypervisors for network-intensive tasks, and
KVM hypervisors for units with high disk load.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
34
How to Deploy a Barracuda NG Vx OVA Image on VMware Hypervisors
If you are deploying the Barracuda NG Vx in a high performance environment or require support for VLANs, do not deploy using the
OVA packages. Instead, create a custom configuration using Barracuda NG Install. For
more information, see How to Deploy a
Barracuda NG Vx using Barracuda NG Install on a VMware Hypervisor.
To ease deployment, the Barracuda NG Vx units are available as prebuilt OVA images that can be imported into your VMware hypervisor. You do
not need to create or configure a virtual machine (VM).
Before deploying the Barracuda NG Vx unit, verify that the host system meets the minimum storage requirements and review the resource
recommendations for the production system.
You can deploy the Barracuda NG Vx unit using either the VMware vSphere Client or the VMware OVF Tool (ovftool).
In this article:
Before You Begin
Use the VMware vSphere Client
Step 1. Download and Import the OVA Image
Step 2. Turn On and Configure the Barracuda NG Vx Unit
Use the VMware OVF Tool
Next Step
Before You Begin
For information regarding the sizing of your CPU, disk, and RAM, see Virtual Systems (Vx).
Before you start the Barracuda NG Firewall Vx for the first time, assign a manual MAC address to the first virtual network interface. This
lets you move the VM later without invalidating your license. For more information, see Best Practice - Performance Tuning on VMware
Hypervisors.
Download the VMware OVA image from the Barracuda Download Portal.
Use the VMware vSphere Client
Step 1. Download and Import the OVA Image
1. Download the OVA image for your Barracuda NG Firewall or Barracuda NG Control Center from your Barracuda Networks Account.
2. Connect to your VMware hypervisor using the vSphere client.
3. Click File > Deploy OVF Template.
4. In the deployment wizard, click Browse and select the OVA image. Click Next to proceed.
5. Enter a name for the virtual machine to be created. Click Next to proceed.
6. Select the datastore that the Barracuda NG Vx unit should be installed on.
When you import an OVA file with VMware 4.1 and later, you are offered the Thin provisioned format setting that lets you
change the VM size. If you choose to reduce the VM size, do not choose a value below 50 GB for VFxxx or a value below 100
GB for VC400, VC610, or VC820. Barracuda Networks recommends that you select Thick provisioned format.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
35
7. Map to the required network in your existing inventory and then click Next to proceed.
8. After the deployment wizard summarizes all your settings, click Finish to start the deployment process. After successful deployment, the
Barracuda NG Vx unit is displayed in your VMware hypervisor inventory list.
9. Select the Barracuda NG Vx unit from the list on the left and edit settings such as Disk Provisioning with appropriate values.
Step 2. Turn On and Configure the Barracuda NG Vx Unit
1. Turn on the Barracuda NG Vx unit and click the Console tab of the virtual machine.
The Barracuda NG Vx unit begins to boot.
For a basic network configuration, the Barracuda NG Vx unit launches the Active Recovery Technology menu.
2. Select Basic Configuration, enter the following network settings, and then press F3 to save your changes:
Hostname – The desired hostname for your Barracuda NG Vx unit.
Management IP – The IP address that your Barracuda NG Vx unit should be reachable through.
Netmask – The subnet mask in dotted quad notation. For example, 255.255.255.0.
Default Gateway – The IP address of the next hop device that serves as an access point to another network.
3.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
36
3. When the window opens to announce that your configuration changes were saved, press any key to continue.
4. Select Reboot to restart the Barracuda NG Vx unit with the new network configuration.
Use the VMware OVF Tool
1. Download the VMware OVF Tool from vmware.com. Use the following command:
ovftool -datastore=datastorename ovaimage vi://server-ip
where:
datastore – The name for the data store.
ovaimage – The path and name of the OVA file.
server-ip – The IP address for the virtual appliance.
2. Configure the resources pool and the network mapping within the VMware virtual machine settings.
3. Using Barracuda NG Admin, connect to the virtual appliance for configuration.
Use the latest version of Barracuda NG Admin. If you configure the Barracuda NG Firewall with a version of Barracuda NG Admin that
is older than the firewall version, you might lose configuration data.
Next Step
After you deploy the Barracuda NG Vx unit, continue with Getting Started and optionally Best Practice - Performance Tuning on VMware
Hypervisors.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
37
How to Deploy a Barracuda NG Vx using Barracuda NG Install on a VMware Hypervisor
The OVA package uses a default configuration that may not be suitable for your deployment. If you want to use multiple network interfaces, a
different type of network adapter, or a bigger size for the virtual disk, use Barracuda NG Install to create the custom configuration files that you
need to deploy the Barracuda NG Vx with your specific settings.
In this article:
Before You Begin
Step 1. Create Configuration Files with Barracuda NG Install
Step 2. Create a Floppy Image with WinImage
Step 3. Create a New Virtual Machine
Step 4. Power On the Barracuda NG Vx Virtual Machine
Next Step
Before You Begin
From the Barracuda Download Portal, download the following:
The ISO image for the Barracuda NG Firewall Vx version that you want to install. There is only one ISO for the Barracuda NG
Firewall and Barracuda NG Control Center.
Barracuda NG Install for the firmware version that you are going to install.
Download and install WinImage or a comparable utility to create flp floppy images.
You must install the Visual C++ Redistributable for Visual Studio 2012 on your computer to use Barracuda NG Install.
Decide on the sizing requirements for your Barracuda NG Vx. For more information, see Virtual Systems (Vx).
Step 1. Create Configuration Files with Barracuda NG Install
Create the configuration files with Barracuda NG Install.
1. Start Barracuda NG Install.
2. Select the Full wizard mode, and then click Next.
3. On the Box Type Settings page, select the Product Type and Hardware Model for your virtual appliance. You can configure Barracud
a NG Virtual Appliances and Barracuda NG Control Centers. After making your selections, click Next.
4. On the Systems Settings page:
a. Enter the following settings:
Hostname – Enter a hostname (e.g., Barracuda NG Firewall VF50).
Timezone – Select the timezone that the appliance is in.
Keyboard Layout – Select the keyboard layout for the console of the Barracuda NG Vx.
DNS – Enter the DNS servers for your network.
Domain Suffix – Enter the domain that your appliance is in.
Use NTP & IP – Enable NTP and enter the IP address for the NTP server.
b. Click Next.
5. On the Partition Settings page:
a. In the Fixed Disk Capacity field, enter the virtual disk size in gigabytes. Barracuda Networks recommends that you use disks
Copyright © 2015, Barracuda Networks Inc.
5.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
38
a.
that are at least the sizes recommended in Firewall Settings.
b. Click Suggest to adjust the partitions to your disk size.
c. Click Next.
6. On the Network Device Settings page:
a. Select the existing eth0 network card in the Network adapters table and click Delete.
b. Click Add and then specify these settings in the NIC reseller list window:
Reseller – Select VMware.
Network adapter – Select vmxnet3 virtual NIC.
Number – Select the number of network interfaces.
c. Click OK.
d. Double-click the eth0 network interface in the Network Adapter table and then specify these settings in the NIC adapter
configuration window:
Management IP address – Enter the IP address that you want to use as the management IP address.
Subnet mask – Enter the subnet mask.
(Optional) Configure an Additional Gateway route.
e. Click OK.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
39
f. Click Next.
7. On the Security Settings page, enter the Password and Service Login Password and then click Next.
8. On the Software Packages page, click Next.
9. On the Script Settings page, enter the destination for your configuration files in the Save to field.
10. Click Next.
11. Click Finish. After the configuration files are successfully created, a message appears.
The following configuration files are created in the destination that you selected:
Step 2. Create a Floppy Image with WinImage
Add the configuration files that you created with Barracuda NG Install to a floppy image FLP file. You will attach this image to the VMware virtual
machine during installation.
1.
2.
3.
4.
Start WinImage.
Locate the configuration files that you created with Barracuda NG Install.
Select all the Barracuda NG Install configuration files and drag them to the WinImage window.
In the Format selection window, select 1.44 MB from the Standard format list and then click OK.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
40
5. In the Inject window, click Yes.
6. Click the Save icon.
7. In the Save as window:
a. Select Virtual floppy Image (*.vfd,*.flp) from the Save as type list.
b. Enter a File name with the .flp extension (e.g., NGInstallFloppy.flp). Otherwise, WinImage saves the floppy image with
the .vfd extension, which cannot be used by the VMware hypervisor.
c. Click Save.
Step 3. Create a New Virtual Machine
On the VMware server, create a new virtual machine for the Barracuda NG Vx.
1. Using VMware vSphere Client, log into your VMware hypervisor.
2. Right-click the VMware server that you want to deploy the Barracuda NG Vx image on and select New Virtual Machine. The Create
New Virtual Machine window opens.
3. On the Configuration page, select Typical and then click Next.
4. On the Name and Location page, enter a Name for the virtual machine (e.g., BarracudaNGFirewallVF50) and then click Next.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
41
5. On the Storage page, select the datastore where the virtual disk should be created and then click Next.
6. On the Guest Operating System page:
a. From the Guest Operating System list, select Linux.
b. From the Version list, select Other 2.6.x Linux (64-bit).
c. Click Next.
7. On the Network page:
a. Select the number of network interfaces from the How many NICs do you wan to connect list. The number must match the
number of network interfaces that you selected in Step 1. Create Configuration Files with Barracuda NG Install.
You can only add four network interfaces in the Create New Virtual Machine wizard. If you need more than four
virtual network interfaces, add the additional NICs by editing the finished virtual machine configuration. VMware limits
the number of virtual network interfaces per guest OS to 10.
b. For every NIC, specify these settings:
Network – Select the virtual network that the virtual interface will connect to.
Adapter – Select VMXNET 3. The adapter must match the Barracuda NG Install configuration. Barracuda Networks
recommends using the VMXNET3 driver.
Connect at Power On – Select this check box to connect the NIC to the VM.
c. Click Next.
8. On the Create a Disk page:
a. Enter the Virtual disk size. For more information, see Firewall Settings.
b. Select Thick Provision Eager Zeroed.
c. Click Next.
9. On the Ready to Complete page, click Finish. Depending on your virtual disk size, it can take a couple of minutes for the VM to be
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
42
9.
created. You can view the status of the Create Virtual Machine task in the Recent Tasks pane at the bottom of the vSphere Client win
dow.
10. Right-click the VM that you created and then select Edit Settings.
11. In the Virtual Machine Properties window:
a. Configure the Memory and CPUs according to your Barracuda NG Vx model.
Do not assign more than the licensed number of vCPUs to your virtual machine. For more information, see Licensing.
b. Click OK.
Your virtual machine is now listed in the left pane under the VMware server that you created it on.
Step 4. Power On the Barracuda NG Vx Virtual Machine
Connect the Barracuda NG Vx ISO and the floppy image to the virtual machine for the automated installation.
1. Using VMware vSphere Client, log into your VMware hypervisor.
2. Power on your Barracuda NG Vx virtual machine.
3. From the taskbar, click the CD icon (
), click CD/DVD Drive 1, and then select Connect to ISO image on local disk.
4. Select the Barracuda NG Vx ISO file on the local hard disk and then click Open.
5. Press Ctrl + Alt + Ins to reboot the VM.
6. At the Welcome to Barracuda NG Firewall boot prompt, press any key except <Enter> to stop the 10 second timeout.
7. From the taskbar, click the Floppy icon (
) and select Connect to floppy image on local disk.
8. From your local hard disk, select the floppy image (e.g., NGInstallFloppy.flp) that you created in Step 2. Create a Floppy Image
with WinImage.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
43
9. Press Enter to start the installation.
10. After the installation completes, press Enter to reboot.
Next Step
After you deploy the Barracuda NextGen F-Series Vx unit, continue with Getting Started and optionally Best Practice - Performance Tuning on
VMware Hypervisors.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
44
How to Deploy the Barracuda NG Vx on a Citrix XenServer
The Barracuda NG Vx is available as a fully virtualized or paravirtualized image for your Citrix XenServer version 6.0 or above. Before deploying
the Barracuda NG Vx unit, verify that the host system meets the minimum storage requirements and review the resource recommendations for
the production system.
In this article:
Before you Begin
Step 1. Deploy Citrix XenServer Image
Step 2. Configure the Barracuda NG Vx Unit on First Boot
Next Step
Before you Begin
For information regarding the sizing of your CPU, disk, and RAM, see Virtual Systems (Vx).
Download the Citrix PV (paravirtualized) or HVM (fully virtualized) xva image from the Barracuda Download Portal.
Step 1. Deploy Citrix XenServer Image
1. Launch Citrix XenCenter.
2. From the File menu, choose Import VM.
3. Browse to the xva file. E.g., GWAY-5.4.2-108-VFxxx-pv.xva
4.
5.
6.
7.
Click Next.
Select the Home Server (Citrix XenServer) to deploy the Barracuda NG Firewall on.
Click Next.
Select the storage repository. Note: Verify that there is enough free space on the storage repository. For more information, see Firewall
Settings.
8. Click Import.
9. Select the MAC Address for the virtual network adapter and if needed add more network adapters.
(optional) Before you start the Barracuda NG Firewall Vx for the first time, assign a manual MAC address to the first virtual
network interface. This lets you move the VM later without invalidating your license.
10. Click Next.
11. Review the import settings and click Finish.
Step 2. Configure the Barracuda NG Vx Unit on First Boot
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
45
You need to connect to the console of the VM to enter the minimal network configuration.
1. Launch Citrix XenCenter.
2. In the left pane click on the Barracuda NG Vx VM and select the Console tab. You can now see the console of the virtual Barracuda NG
Vx.
3. When the Barracuda NG VM has started the Active Recovery Technology (ART) menu is launched.
4. Select Basic Configuration, enter the following network settings, and then press F3 to save your changes:
Hostname – The desired hostname for your Barracuda NG Vx unit.
Management IP – The internal IP address for your Barracuda NG Vx unit. This IP address must be reachable from your PC.
E.g., 192.168.200.200
Netmask – The subnet mask. E.g., 255.255.255.0
Default Gateway – The IP address of the next hop device that serves as and access point to another network. E.g., 192.168.
200.1
5. Press F3 to save the configuration.
6. Select Reboot. The Barracuda NG Vx will restart with the new network configuration.
Next Step
After you deploy the Barracuda NG Vx unit, continue with Getting Started.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
46
How to Deploy the Barracuda NG Vx on an Opensource Xen Server
If you are using an open source Xen hypervisor use the Xen images to deploy your Barracuda NG Vx. To deploy on a Citrix XenServer,
see How to Deploy the Barracuda NG Vx on a Citrix XenServer.
To ease deployment the Barracuda NG Vx are available as script containing an XML configuration file and the virtual disk.
Before deploying the Barracuda NG Vx unit, verify that the host system meets the minimum storage requirements and review the resource
recommendations for production systems.
In this article:
Before you Begin
Step 1. Import and Start the Barracuda NG Vx VM
Step 2. Configure the Barracuda NG Vx Unit on First Boot
Next Step
Before you Begin
For information regarding the sizing of your CPU, disk, and RAM, see Virtual Systems (Vx).
Download and install a VNC viewer.
Configure the virtual networking on the Xen host server. Use a network bridge for best performance.
Download the Xen HVM or PV images from the Barracuda Download Portal.
Step 1. Import and Start the Barracuda NG Vx VM
Execute the install script to deploy the image on the opensource Xen Server.
1. Log into the Xen server server with root permissions.
2. Copy the Barracuda NG Firewall Vx Xen install file to the Xen host server (e.g., install.GWAY-6.0.0-135-VFxxx.xen.sh).
3. Make the file executable
chmod +x install.GWAY-6.0.0-135-VFxxx.xen.sh
4. Start the install script.
./install.GWAY-6.0.0-135-VFxxx.xen.sh
5.
6.
7.
8.
9.
(optional) Enter the name and path you want the image file deployed to. Press Enter to use the default value.
(optional) Enter the path for the configuration file. Press Enter to use the default value.
Choose non-sparse deployment for production deployments, sparse for testing purposes.
Enter the domain name for the deployment. Press Enter to accept the default value suggested
Enter the MAC for virtual network interface. Press Enter to accept the default value suggested.
Your license is bound to this MAC address. Changing the MAC address will result in a invalid license.
You can now use xm to import and start the virtual Barracuda NG Firewall Vx. Adapt the network configuration of your Xen VM to your hypervisor.
Step 2. Configure the Barracuda NG Vx Unit on First Boot
Connect to the console of the VM to enter the minimal network configuration.
1. Use a VNC client to connect to the IP address of the Xen host server. A console appears and displays the screen output of the
Barracuda NG Vx that is running on the Xen server. For a basic network configuration, the Active Recovery Technology (ART) menu la
unches.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
47
2. Select Basic Configuration, enter the following network settings, and then press F3 to save your changes:
Hostname – A hostname for your Barracuda NG Vx unit.
Management IP – The internal IP address for your Barracuda NG Vx unit. This IP address must be reachable from your PC
(e.g., 192.168.200.200).
Netmask – The subnet mask (e.g., 255.255.255.0).
Default Gateway – The IP address of the next hop device that serves as an access point to another network (e.g., 192.168.20
0.1).
3. Press F3 to save the configuration.
4. Select Reboot. The Barracuda NG Vx restarts with the new network configuration.
Next Step
After you deploy the Barracuda NG Vx unit, continue with Getting Started.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
48
How to Deploy the Barracuda NG Vx on KVM
The KVM version of the Barracuda NG Vx is available as a pre-built image for your KVM hypervisor.
Before deploying the Barracuda NG Vx unit, verify that the host system meets the minimum storage requirements and review the resource
recommendations for the production system.
In this article:
Before You Begin
Step 1. Import and Start the Barracuda NG Vx VM
Step 2. Configure the Barracuda NG Vx Unit on First Boot
Next Step
Before You Begin
For information on the sizing of your CPU, disk, and RAM, see Virtual Systems (Vx).
Download and install a VNC viewer.
Configure the virtual network on the KVM host server.
Download the KVM image for the Barracuda NG Vx from the Barracuda Download Portal.
Step 1. Import and Start the Barracuda NG Vx VM
Execute the install script to deploy the image and use virsh to define and start the virtual machine.
1. Log into the KVM host server with root permissions.
2. Copy the Barracuda NG Firewall Vx KVM install file KVM host server (e.g., install.GWAY-5.4.4-071-VFxxx.kvm.sh).
3. Make the file executable
chmod +x install.GWAY-5.4.4-071-VFxxx.kvm.sh
4. Start the install script.
./install.GWAY-5.4.4-071-VFxxx.kvm.sh
5. (optional) Enter the name and path you want the image file deployed to. Press Enter to use the default value.
6. (optional) Enter the path for the configuration file. Press Enter to use the default value.
7. Choose non-sparse deployment for production deployments, sparse for testing purposes.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
49
8. Enter the domain name for the deployment. Press Enter to accept the default value suggested
9. Enter the MAC for virtual network interface. Press Enter to accept the default value suggested.
Your license is bound to this MAC address. Changing the MAC address will result in a invalid license.
10. (optional) Depending on the network configuration of your KVM host you must adapt the network settings in the xml configuration file. Per
default the configuration file is stored in /etc/libvirt/qemu.
11. Connect to the virtual console.
virsh --connect qemu:///system
12. Import the configuration file.
define /etc/libvirt/qemu/GWAY-5.4.4-071-VFxxx-pv
13. Start the virtual machine.
start GWAY-5.4.4-071-VFxxx-pv
The virtual Barracuda NG Firewall Vx is now running on the KVM hypervisor.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
50
Step 2. Configure the Barracuda NG Vx Unit on First Boot
Connect to the console of the VM to enter the minimal network configuration.
1. Use a VNC client to connect to the IP address of the KVM host server. A console appears and displays the screen output of the
Barracuda NG Vx that is running on the KVM server. For a basic network configuration, the Active Recovery Technology (ART) menu l
aunches.
2. Select Basic Configuration, enter the following network settings, and then press F3 to save your changes:
Hostname – A hostname for your Barracuda NG Vx unit.
Management IP – The internal IP address for your Barracuda NG Vx unit. This IP address must be reachable from your PC
(e.g., 192.168.200.200).
Netmask – The subnet mask (e.g., 255.255.255.0).
Default Gateway – The IP address of the next hop device that serves as an access point to another network (e.g., 192.168.20
0.1).
3. Press F3 to save the configuration.
4. Select Reboot. The Barracuda NG Vx restarts with the new network configuration.
Next Step
After you deploy the Barracuda NG Vx unit, continue with Getting Started and optionally Best Practice - Performance Tuning on KVM Hypervisors
.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
51
How to Deploy the Barracuda NG Vx on Hyper-V
The Barracuda NG Vx is available as a virtual machine for your Microsoft Hyper-V hypervisor.
Before deploying the Barracuda NG Vx, verify that the host system meets the minimum storage requirements and review the resource
recommendations for the production system.
In this article:
Before you Begin
Step 1. Create a New Virtual Machine
Step 2. Configure the Barracuda NG Vx Unit on First Boot
Next Step
Before you Begin
For information regarding the sizing of your CPU, disk, and RAM, see Virtual Systems (Vx).
Download the Barracuda NG Vx VHD virtual disk image from the Barracuda Download Portal.
Copy the VHD virtual disk image to the Microsoft Hyper-V server.
Step 1. Create a New Virtual Machine
Create a virtual machine using the sizing recommendations for your model of the Barracuda NG Vx.
1. Launch Hyper-V Manager.
2. Right click on your Hyper V server and Select New > Virtual Machine. The New Virtual Machine Wizard opens.
3. Enter the Name. E.g., Barracuda NG Vx
4. Click Next.
5. Enter the amount of memory in MB. E.g., 2048
6. Click Next.
7. Select the virtual network from the Connection drop down.
8. Click Next.
9.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
52
9. Select Use an existing virtual disk and enter the Location of the VHD file.
10. Click Next.
11. Review the Summery and click Finish.
You can now launch the Barracuda NG Vx by selecting the virtual machine and clicking Start in the right pane.
Step 2. Configure the Barracuda NG Vx Unit on First Boot
You need to connect to the console of the VM to enter the minimal network configuration.
1. Launch Hyper-V Manager.
2. In the Virtual Machines pane double click on the Barracuda NG Vx VM. The console of the virtual Barracuda NG Vx opens.
3. When the Barracuda NG VM has started the Active Recovery Technology (ART) menu is launched.
4. Select Basic Configuration, enter the following network settings, and then press F3 to save your changes:
Hostname – The desired hostname for your Barracuda NG Vx unit.
Management IP – The internal IP address for your Barracuda NG Vx unit. This IP address must be reachable from your PC.
E.g., 192.168.200.200
Netmask – The subnet mask. E.g., 255.255.255.0
Default Gateway – The IP address of the next hop device that serves as and access point to another network. E.g., 192.168.
200.1
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
5. Press F3 to save the configuration.
6. Select Reboot. The Barracuda NG Vx will restart with the new network configuration.
Next Step
After you deploy the Barracuda NG Vx unit, continue with Getting Started.
Copyright © 2015, Barracuda Networks Inc.
53
Barracuda NG Firewall 6.1 Administrator's Guide - Page
54
Public Cloud Hosting
The growth of cloud computing capabilities and services has driven more data into places where traditional IT security cannot reach - into the
datacenters of public cloud providers. Cloud-based deployments can be in the form of a private cloud, where the Barracuda NG Firewall can act
as a gateway device, or in a public or hybrid cloud. You can secure instances in a public or hybrid cloud by deploying a Barracuda NG Firewall as
a virtual security device within your cloud environment. The Barracuda NG Firewall uses application and user awareness combined with
advanced bandwidth management to optimize WAN performance and reliability, thereby securely handling all incoming traffic for the backend
server instances.
Microsoft Azure Cloud
Microsoft Azure is a public cloud service. The Barracuda NG Firewall integrates into your Microsoft Azure virtual network by creating a network
security gateway between Internet-facing endpoints and your virtual machines. Microsoft Azure Small and Medium instances use one virtual
network interface with a dynamic IP address per virtual machine and can be deployed via web interface or a Microsoft PowerShell script. Large a
nd Extra Large instances support two and four network interfaces, respectively, and must be deployed via PowerShell. There are two types of
images available in the Marketplace: Bring-Your-Own-License (BYOL) and an hourly rate (PAYG). The Barracuda NG Firewall Azure can be
deployed on any Azure pricing tier. The NG Firewall license is bound to the number of CPU cores. Barracuda Networks recommends the
following Azure pricing tiers:
License
Azure Pricing Tier
Number of CPU Cores
Number of NICs
NG Firewall Level 2
A1
1
1
NG Firewall Level 4
A2
2
1
NG Firewall Level 6
A3
4
up to 2
NG Firewall Level 8
A4
8
up to 4
NG Control Center
A1 - A4
n/a
1
Use the deployment method matching your required feature set:
Azure Preview Portal – BYOL and PAYG images. Limited to one network interface. For more information, see How to Deploy the
Barracuda NG Firewall in Azure via the Preview Portal.
Azure Portal – BYOL image only. For more information, see How to Deploy the Barracuda NG Firewall in Microsoft Azure.
PowerShell – BYOL and PAYG images. High Availability deployments, multiple network interfaces, advanced Azure networking
features. For more information, see How to Deploy the Barracuda NG Firewall on Microsoft Azure via PowerShell or How to Configure a
High Availability Cluster in Azure via PowerShell.
Amazon Web Services (AWS)
Amazon AWS offers both virtual private and public cloud services. If you are deploying a virtual private cloud, the Barracuda NG Firewall AWS
will act as a gateway device, just like in a traditional network. Internal IP addresses in the VPC can be static or dynamic; public IPs (Amazon
Elastic IPs) are then mapped to the internal Network Interfaces. The AMI uses one dynamic Network Interface as a default configuration. Up to 9
additional Amazon Network Interfaces can be added, depending on the instance type with a total of up to 100 network interfaces per VPC. These
network interfaces can be connected to subnets in the virtual private cloud, with each subnet containing server instances hosted in a different
Availability Zone of your choice. There are two types of images available in the Marketplace: Bring-Your-Own-License (BYOL) and an hourly rate
(PAYG). Starting with 6.1.1 both image types are only available in HVM virtualization type. The Barracuda NG Firewall AWS is available in four
different sizes:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
55
NG Firewall License
Amazon Instance Type
Number of vCPUs
Number of NICs
IP addresses per
Interface
Level 2
m3.medium
1
up to 2
4
Level 4
m3.large
2
3
10
c3.large (recommended)
2
3
10
m3.xlarge
4
4
10
c3.xlarge
4
4
15
m3.2xlarge
8
4
30
c3.2xlarge
8
4
15
Level 6
Level 8
To deploy a Barracuda NG Firewall in an Amazon Virtual Private Cloud, see How to Deploy the Barracuda NG Firewall in an Amazon Virtual
Private Cloud.
VMware vCloud Air
VMware vCloud Air is a public cloud solution based on the VMware vSphere hypervisor. vCloud Air seamlessly integrates with your local VMware
setup and features. The Barracuda NG Firewall can act as a gateway device in the cloud, just like in a traditional network. A public IP address of
the virtual datacenter is mapped to the internal IP address of the NG Firewall so all traffic passes through the NG Firewall VM. Standard VMware
OVA images and Vx licenses are used for deployment. Just like for standard VMware virtual machines there is a ten network adapter limit. It is
also possible to deploy a Barracuda NG Control Center using the standard OVA images.
For more information on Vx licensing, see Licensing.
To deploy a Barracuda NG Firewall in the VMware vCloud, see How to Deploy the NG Firewall on VMware vCloud Air.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
56
How to Deploy the Barracuda NG Firewall in Azure via the Preview Portal
The Barracuda NG Firewall firmware version 6.1 is no longer available in the Microsoft Azure Marketplace. Deploy the version 6.2.1
instead. For more information, see How to Deploy an F-Series Firewall in Microsoft Azure using Azure Portal and ARM.
To deploy the Barracuda NG Firewall with advanced networking features such as multiple Network Interfaces, you must use Azure
PowerShell scripts. For more information, see How to Deploy the Barracuda NG Firewall on Microsoft Azure via PowerShell
Microsoft Azure charges apply. For more information, see the Microsoft Azure Pricing Calculator.
The Barracuda NG Firewall Azure can be deployed as a virtual machine in the Microsoft Azure cloud. You can use up-to-date Application Control,
user awareness, integrated malware protection, and VPN services to securely manage all traffic in your virtual network. You can choose between
two images in the Azure Marketplace:
Barracuda NextGen Firewall (BYOL) – These images use licenses purchased directly from Barracuda Networks. Barracuda Networks
offers a 30-day evaluation license.
Barracuda NextGen Firewall (Hourly) – These images do not need to be licensed separately. Licensing fees are included in the hourly
price of the Instance. All charges are billed directly through your Microsoft Azure account.
Barracuda NextGen Control Center for Microsoft Azure (BYOL) – These images use licenses purchased directly from Barracuda
Networks. Barracuda Networks offers a 30-day evaluation license.
In this article
Video
Before you Begin
Step 1. Create a NG Firewall or NG Control Center VM in Azure
Step 3. Verify SpoE is enabled in Barracuda NG Admin
Step 4. Log into your Barracuda NG Firewall or NG Control Center
Next Steps
NG Firewall BYOL Image
NG Firewall PAYG
NG Control Center for Microsoft Azure:
Video
Watch the following video to see a short walkthrough of this deployment.
Videos are not visible in the PDF export.
Before you Begin
Create a Microsoft Azure account.
(BYOL images only) Purchase a Barracuda NG Firewall or NG Control Center for Microsoft Azure license or register to receive an
evaluation license from the Barracuda Networks Evaluation page.
Step 1. Create a NG Firewall or NG Control Center VM in Azure
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
1.
2.
3.
4.
57
Go to the Azure Preview Portal: https://portal.azure.com
In the upper left-hand corner, click NEW.
In the Create column, click Compute.
In the Compute column, click Azure Marketplace.
5. In the Security + Identity column, search for Barracuda NextGen Firewall or NextGen Control Center
6. Select the image you want to deploy from the list. a column with the image name opens.
7. Click Create.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
58
8. In the Create VM column, enter the following settings:
Host Name – Enter the hostname for the Barracuda NG Firewall.
User Name – Enter a random username. The Barracuda NG Firewall ignores this setting. All authentication settings
(password/SSH key) are applied to the root user.
Authentication Type – Click on Password.
Password – Enter the password for your Barracuda NG Firewall. This password is used for the root user.
Pricing Tier – Click to select the pricing tier. For more information, see Public Cloud Hosting.
9. (optional) Click Optional Configuration to configure static IP addresses, storage account, and/or Endpoints.
NG Firewall images create the following Endpoints:
Endpoint Name
Protocol
Public Port
Internal Port
MGMT
TCP
807
807
TINA VPN UDP
UDP
691
691
TINA VPN TCP
TCP
691
691
SSH
TCP
RANDOM
22
NG Control Center images require/create the following Endpoints. If you are deploying the
Endpoint Name
Protocol
Public Port
Internal Port
MGMT Box Level
TCP
807
807
MGMT CC Level
TCP
806
806
Remote MGMT VPN
TCP
692
692
SSH
TCP
RANDOM
22
10. (optional) Click Resource Group to select an exiting Resource group. By default, a new resource group using the hostname is created.
11. (optional) Click Subscription to select the Azure subscription. If you previously selected a resource that is already bound to a
subscription, this setting can no longer be changed.
12.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
59
12. (optional) Click Location to select the datacenter the Barracuda NG Firewall is deployed to. If you previously selected a resource that is
already bound to a location, this setting can no longer be changed.
13. Click Create
14. In the Buy column, click Buy.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
60
Wait for the Barracuda NG Firewall or NG Control Center VM to be created. You can follow the progress in the Notification Section or on the
dashboard.
Step 3. Verify SpoE is enabled in Barracuda NG Admin
Use the latest version of Barracuda NG Admin.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
61
You must enable SPoE to be able to connect.
1. Launch NG Admin.
2. In the upper left-hand corner, click Options and select Settings.
3. In the Client Settings section, verify that the checkbox for SPoE as default is ticked.
Step 4. Log into your Barracuda NG Firewall or NG Control Center
Locate the public IP of the NG Firewall or NG Control Center VM you just launched.
1. Go to the Azure Preview Portal: https://portal.azure.com
2. Click on your Barracuda NG Firewall in the Dashboard of the preview portal or in the Browse section.
3. Identify the DNS Name or IP address of the Barracuda NG Firewall.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
62
4. Launch Barracuda NG Admin.
5. Select Box.
6. Enter the login information:
Management IP – Enter the DNS name or Virtual IP address.
Username – Enter root.
Password – Enter the password you set during deployment.
7. Click Log In.
You are now successfully logged in to your Barracuda NG Firewall.
Next Steps
NG Firewall BYOL Image
(BYOL VMs only) Enter the license token and serial number that you received from Barracuda Networks.
To use two Barracuda NG Firewalls in a high availability (HA) cluster, see How to Configure a High Availability Cluster in Azure.
To use Public Instance Level IPs, Reserved IPs, or other advanced Azure networks setups, see Advanced Networking in the Azure
Cloud.
To change to a static network interface and internal IP address, see Best Practice - Switch to a Static Internal IP Address in Microsoft
Azure
To continue setting up your Barracuda NG Firewall, see Getting Started.
NG Firewall PAYG
To use two Barracuda NG Firewalls in a high availability (HA) cluster, see How to Configure a High Availability Cluster in Azure.
To use Public Instance Level IPs, Reserved IPs, or other advanced Azure networks setups, see Advanced Networking in the Azure
Cloud.
To change to a static network interface and internal IP address, see Best Practice - Switch to a Static Internal IP Address in Microsoft
Azure
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
63
To continue setting up your Barracuda NG Firewall, see Getting Started.
NG Control Center for Microsoft Azure:
To change to a static network interface and internal IP address, see Best Practice - Switch to a Static Internal IP Address in Microsoft
Azure
To use Public Instance Level IPs, Reserved IPs, or other advanced Azure networks setups, see Advanced Networking in the Azure
Cloud.
To continue setting up your Barracuda NG Control Center, see Getting Started - NG Control Center for Microsoft Azure.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
64
How to Deploy the Barracuda NG Firewall in Microsoft Azure
Only Barracuda NG Firewall BYOL images are available when deploying via Azure Portal. For more information, see Public Cloud
Hosting.
The Barracuda NG Firewall Azure can be deployed as a virtual machine in the Microsoft Azure cloud. You can use up-to-date Application Control
2.0, user awareness, integrated malware protection, and VPN services to securely handle and manage all traffic in your virtual network.
Microsoft Azure charges apply. For more information, see the Microsoft Azure Pricing Calculator.
In this article
Before you Begin
Step 1. Create an Azure Virtual Network
Step 2. Launch the Barracuda NG Virtual Machine Instance
Step 3. Configure Barracuda NG Admin
Next Steps
Before you Begin
Create a Microsoft Azure account.
Get a Barracuda NG Azure license from the Barracuda Networks Evaluation page:
1. From the Select a Product list, select Barracuda NextGen Firewall under the Public Cloud Solutions category.
2. From the Select Edition list, select the Level that you want.
3. Complete and submit the rest of the form. You will receive an email containing your serial number and license token.
Step 1. Create an Azure Virtual Network
1. Log into your Microsoft Azure Management Portal (https://manage.windowsazure.com)
2. In the left pane, click NETWORKS.
3. In the bottom left corner, click + NEW.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
65
4. Click CUSTOM CREATE. The CREATE A VIRTUAL NETWORK window opens.
5. Enter a unique NAME. E.g., AzureVirtualNet
6. Select a LOCATION. The virtual network can only be used for Azure VMs in this geographic region. E.g., West Europe
7.
8.
9.
10.
Click Next.
(Optional) Select or enter your DNS SERVERS.
Click Next.
On the Virtual Network Address Space configure the ADDRESS SPACE:
STARTING IP – Enter the first IP address of the address space you want to use. E.g., 10.0.0.0
CIDR – Select the subnet mask for the virtual network. The maximum number of VMs for a virtual network are listed in
parentheses. E.g., /16 (65536)
11. Add a SUBNET
STARTING IP – Enter the fist IP address of the subnet. E..g, 10.0.21.0
CIDR – Select the subnet mask for the subnet. E.g., /24 (256)
12. Click FINISH.
The virtual network is now listed in VIRTUAL NETWORKS.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
66
Step 2. Launch the Barracuda NG Virtual Machine Instance
1. Log into your Microsoft Azure Management Portal (https://manage.windowsazure.com).
2. In the left pane, click VIRTUAL MACHINES.
3. Click NEW in the bottom left-hand corner.
4. Click FROM GALLERY. The CREATE A VIRTUAL MACHINE windows opens.
5. In the search bar on the top left enter Barracuda NG Firewall. The Barracuda NG Firewall 6.1 image is displayed in the Featured
column.
6. From the FEATURED column in the middle pane, select Barracuda NG Firewall 6.1.
7. Click NEXT.
8. Enter the following settings in the Virtual machine configuration:
VIRTUAL MACHINE NAME – Enter the name for the virtual Barracuda NG Firewall (e.g., BNG). The name must be unique in the
domain.
SIZE – Select an instance level that matches your Barracuda NG Firewall Azure license (e.g., Level 2 (1 CPU cores), Level 4 (2
CPU cores)).
NEW USER NAME – This entry is not used by the Barracuda NG Firewall. You may enter a random username.
PASSWORD – Select PROVIDE A PASSWORD and enter the root password for the Barracuda NG Firewall.
After deploying your Barracuda NG Firewall the initial, three day, grace period starts. You must complete licensing
during the initial grace period or the unit will switch into demo mode and the default root password (ngf1r3wall) is
enabled.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
67
9. Click Next.
10. Enter a CLOUD SERVICE DNS NAME The name must be unique for the used domain. (e.g., barracudaNG60).
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
68
11. Enable Barracuda NG Admin access to the new Barracuda NG Firewall instance by adding the following endpoints:
NAME
PROTOCOL
PUBLIC PORT
PRIVATE PORT
SSH
TCP
22
22
NG Admin TCP
TCP
807
807
12. Click FINISH.
Step 3. Configure Barracuda NG Admin
You must use the latest version of Barracuda NG Admin to connect to your Barracuda NG Firewall Azure.
Enable support for Microsoft Azure in NG Admin.
1. Launch NG Admin.
2. In the upper left hand corner, click Options and select Settings.
3. In the Client Settings section, verify that the check box for SPoE as default is ticked.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
69
Next Steps
You can now connect to your Barracuda NG Firewall in the Microsoft Azure cloud.
On the Barracuda NG Firewall, enter the license token and serial number that you received from Barracuda Networks.
To use two Barracuda NG Firewalls in a high availability (HA) cluster, see How to Configure a High Availability Cluster in Azure.
To use Public Instance Level IPs, Reserved IPs, or other advanced Azure networks setups, see Reserved, Static and Public IP
Addresses in the Azure Cloud using ASM
To continue setting up your Barracuda NG Firewall, see Getting Started.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
70
How to Deploy the Barracuda NG Firewall on Microsoft Azure via PowerShell
Missing the language English in this article! Please add the language, otherwise this article can not be displayed properly.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
71
How to Create a Azure Image from a VHD Disk Image
To create your own custom Barracuda NG Firewall or NG Control Center images from the VHD disk images available in the Barracuda Download
Portal, you must upload the VHD file to your Azure storage account. Then, you can create a custom image using the uploaded disk image.
In this article
Before You Begin
Step 1. Create an Azure Storage Account
Step 2. Create a Storage Container
Step 3. Upload the Barracuda NG Firewall Azure VHD Image
Step 4. Create a Virtual Machine from a VHD Image
Next Steps
Before You Begin
Download and install the latest version of Azure PowerShell.
Download the Barracuda NG Firewall or NG Control Center VHD disk image from the Barracuda Download Portal: https://dlportal.barrac
udanetworks.com
Step 1. Create an Azure Storage Account
Create the storage account and a container as the upload destination.
1. Log into your Microsoft Azure Management Portal (https://manage.windowsazure.com).
2. In the left pane, click STORAGE.
3. In the bottom left corner, click + NEW. The Storage Account window opens.
4. Click Quick Create, and configure the following settings:
URL – Enter a unique URL.
Location/Affinity Group – Select your Location. E.g., West Europe
Replication – Select Geo-Redundant.
5. Click CREATE STORAGE ACCOUNT.
The storage account is ready when its status changes from Creating to Online.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
72
Step 2. Create a Storage Container
You must create a storage container because you cannot create virtual machine images from files that are uploaded to the root directory of the
storage account.
1.
2.
3.
4.
5.
Log into your Microsoft Azure Management Portal (https://manage.windowsazure.com).
In the left pane, click STORAGE.
Click the storage account that you created in Step 1.
Click on the CONTAINERS tab.
Click CREATE A CONTAINER.
6. Enter a NAME for the container (e.g., vhd).
7. From the ACCESS list, select Private.
8. Click the check mark icon (
).
Step 3. Upload the Barracuda NG Firewall Azure VHD Image
Upload the Barracuda NG Firewall Azure VHD image to a Microsoft Azure storage container.
You only need to import the publishsettings file when using Azure PowerShell for the first time.
1. Launch the Azure PowerShell.
2. At the PS prompt, download your Azure Publish Settings file:
Get-AzurePublishSettingsFile
3. Your default browser opens. Save the publish settings file.
4. Import the publishsettings file by typing:
Import-AzurePublishSettingsFile c:\path-to-settingsfile\settingsfile.publishsettings
5. Verify the Azure account subscription by typing:
Get-AzureSubscription
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
73
6. Log into your Microsoft Azure Management Portal (https://manage.windowsazure.com).
7. On the DASHBOARD page of the storage account, click Storage in the left pane and get the URL of the Blob destination (e.g., http://
techlib.blob.core.windows.net).
8. Upload the VHD to your Azure storage container by typing:
Add-AzureVhd -Destination <BLOBS-URL/container/FILENAME.vhd> -LocalFilePath
<path-to-vhd-file/filename.vhd>
Upload the VHD to a storage container. Microsoft Azure does not allow a virtual machine to be created from a VHD file in the
root ($root) directory.
Step 4. Create a Virtual Machine from a VHD Image
Create a virtual image from the uploaded VHD image.
1. Log into your Microsoft Azure Management Portal (https://manage.windowsazure.com).
2. In the left pane, click VIRTUAL MACHINES.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
74
3. Click IMAGES.
4. Click CREATE AN IMAGE.
5. In the Create an image from a VHD window:
a. Enter the NAME for the virtual image (e.g., BNG).
b. Either enter the VHD URL, or click the folder icon to select the image that you uploaded in Step 3 from the storage container.
c. From the OPERATING SYSTEM FAMILY list, select Linux.
d. Select the check box to confirm that the Microsoft Azure Linux Agent has been run on the virtual machine associated with the
VHD.
6. Click the checkmark icon (
).
You can now select your custom Barracuda NG Firewall or NG Control Center image when deploying the VM.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Next Steps
How to Deploy the Barracuda NG Firewall in Azure via the Preview Portal
How to Deploy the Barracuda NG Firewall in Microsoft Azure
How to Deploy the Barracuda NG Firewall on Microsoft Azure via PowerShell
Copyright © 2015, Barracuda Networks Inc.
75
Barracuda NG Firewall 6.1 Administrator's Guide - Page
76
How to Deploy the Barracuda NG Firewall in an Amazon Virtual Private Cloud
The Barracuda NG Firewall can run as a virtual appliance in the Amazon cloud as a gateway device for Amazon EC2 instances in an Amazon
Virtual Private Cloud (VPC).
Follow the steps in this article to deploy the Barracuda NG Firewall in an Amazon VPC.
Amazon AWS charges apply. For more information, see Amazon's monthly pricing calculator at http://calculator.s3.amazonaws.com/cal
c5.html.
In this article:
Before you Begin
Step 1. Set Up the Amazon VPC Cloud
Step 2. Create an Internet Gateway
Step 3. Create Subnets
Step 3.1. Create the Private Subnet
Step 3.2. Create the Public Subnet
Step 4. Set Up Amazon Security Groups and Network ACLs
Step 4.1. Create a Security Group for Barracuda NG Admin Access
Step 4.2. Configure a Security Group for the Private Subnetwork
Step 4.3. Set Up the Network ACLs
Step 5. Deploy a Barracuda NG Firewall in an Amazon EC2 Instance
Start the Amazon Launch Instance Wizard
Launch Instance Wizard Step 1: Choose AMI
Launch Instance Wizard Step 2: Choose Instance Type
Launch Instance Wizard Step 3: Configure Instance
Launch Instance Wizard Step 4: Add Storage
Launch Instance Wizard Step 5: Tag Instance
Launch Instance Wizard Step 6: Configure Security Group
Launch Instance Wizard Step 7: Review
Deactivate the Source/Destination Check
Step 6. Allocate and Associate an Amazon Elastic IP Address to the Barracuda NG Firewall EC2 Instance
Step 7. Create and Attach a Network Interface
Step 8. Create Route Tables
Step 8.1. Create a Route Table for the Private Network
Step 8.2. Create a Route Table for the Public Network
Step 9. Add Amazon Network Interface to the Barracuda NG Firewall Instance
Additional Information
Troubleshooting Tips
Next Steps
Before you Begin
Before you deploy the Barracuda NG Firewall in the Amazon VPC:
Get an Amazon Web Service (AWS) account.
Get a Barracuda NG Firewall Vx license. The Barracuda NG Firewall AMI itself is free (BYOL = Bring Your Own License).
Choose the country and availability zone in which you want to create the Amazon VPC. All instances and services must be in the same
availability zone.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
77
Step 1. Set Up the Amazon VPC Cloud
The Amazon VPC is a smaller, isolated version of the public Amazon Elastic Compute Cloud (EC2). The VPC is restricted to its own /16 network
subnet. Create a VPC in the 192.168.0.0/16 subnet.
1.
2.
3.
4.
Go to the Amazon Web Services Console (https://console.aws.amazon.com).
In the Compute & Networking section, click VPC - Isolated Cloud Resources.
In the left pane of the VPC console, click Your VPCs.
Create a VPC with the following settings:
CIDR Block – Enter 192.168.0.0/16.
Tenancy – Select Default.
5. Click Yes, Create.
Your VPC is now listed on the Your VPCs page.
Step 2. Create an Internet Gateway
Create an Internet gateway to enable devices in the Amazon VPC to access the Internet.
1.
2.
3.
4.
Go to the Amazon Web Services VPC console (https://console.aws.amazon.com/vpc/home).
In the left pane, click Internet Gateways.
Click Create Internet Gateway.
In the Create Internet Gateway window, click Yes, Create.
5. Select the new Internet gateway, and then click Attach to VPC.
6. Select the VPC that you created in Step 1 (e.g., vpc-b0a9a0db (192.168.0.0/16)), and then click Yes, Attach.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
78
The Internet gateway is now associated with the Amazon VPC.
Step 3. Create Subnets
Create two /24 subnets inside the Amazon VPC:
A public network that connects the dhcp (eth0) interface of the Barracuda NG Firewall to the Internet gateway.
A private network for the eth1 interface on the Barracuda NG Firewall and the EC2 instances in the VPC.
Step 3.1. Create the Private Subnet
1.
2.
3.
4.
Go to the Amazon Web Services VPC console (https://console.aws.amazon.com/vpc/home).
In the left pane, click Subnets.
Click Create Subnet.
In the Create Subnet window, configure the following settings:
VPC – Select the VPC with the 192.168.0.0./16 subnet (e.g., vpc-abcd1234568 (192.168.0.0/16)).
Availability Zone – Select the availability zone that your VPC is in (e.g., eu-west-1a).
CIDR Block – Enter 192.168.200.0/24.
5. Click Yes, Create.
Step 3.2. Create the Public Subnet
1.
2.
3.
4.
Go to the Amazon Web Services VPC console (https://console.aws.amazon.com/vpc/home).
Click Subnets.
Click Create Subnet.
In the Create Subnet window, configure the following settings:
VPC – Select the VPC with the 192.168.0.0./16 subnet (e.g., vpc-abcd1234568 (192.168.0.0/16)).
Availability Zone – Select the availability zone that your VPC is in (e.g., eu-west-1a).
CIDR Block – Enter any 192.168.XX.0/24 subnet, except for 192.168.200.0/24 (e.g., you can enter 192.168.10.0/24).
5. Click Yes, Create.
The private (192.168.200.0/24) and public (192.168.10.0/24) subnets are now in your VPN.
Step 4. Set Up Amazon Security Groups and Network ACLs
To secure incoming and outgoing connections to the VPC, set up the following features:
Security Groups – Act as stateful firewalls that control traffic to one or more Amazon EC2 instances. Every instance must be associated
with one or more security groups. With security groups, you can only allow specific connections; by default, connections are blocked.
Network ACLs – Act as a stateless firewall that controls traffic going in and out of a subnet. With network ACLs, you can allow and block
connections. By default, an Amazon network ACL blocks all traffic.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
79
For more information on Amazon security groups and network ACLs, see http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Secu
rity.html.
Step 4.1. Create a Security Group for Barracuda NG Admin Access
1.
2.
3.
4.
Go to the Amazon Web Services VPC console (https://console.aws.amazon.com/vpc/home).
In the left pane, expand SECURITY and then click Security Groups.
Click Create Security Group.
In the Create Security Group window, configure the following settings:
Name – Enter NGSecurityGroup.
Description – Enter Access for NG Admin.
VPC – Select the VPC from the list (e.g., vpc-b0a9a0db).
5. Click Yes, Create.
6. Select NGSecurityGroup.
7. In the lower pane, click the Inbound tab.
8. Add rules with the following settings to allow inbound traffic for the SSH daemon and ping:
Create a new Rule
Source
SSH
0.0.0.0/0
All ICMP
0.0.0.0/0
DNS
0.0.0.0/0
9. Add custom rules with the following settings to allow inbound traffic for Barracuda NG Admin (port 807), the VPN service (port 691), and
the management tunnel (port 692):
Create a new Rule
Port range
Copyright © 2015, Barracuda Networks Inc.
Source
Barracuda NG Firewall 6.1 Administrator's Guide - Page
80
Custom TCP rule
807
0.0.0.0/0
Custom UDP rule
807
0.0.0.0/0
Custom TCP rule
691-692
0.0.0.0/0
Custom UDP rule
691-692
0.0.0.0/0
10. Create additional rules for all services running on the Barracuda NG Firewall and all services forwarded for EC2 Instances in the Amazon
VPC (e.g., port 80/443 for web servers, port 25 for SMTP, etc.).
11. Click Apply Rule Changes.
All inbound rules are now listed under the Inbound tab of the security group.
Step 4.2. Configure a Security Group for the Private Subnetwork
Instances in the private subnetwork are only accessed by connections passing through the Barracuda NG Firewall EC2 instance. Configure the
default security group to only allow traffic that is coming from the NGSecurityGroup.
1.
2.
3.
4.
5.
Go to the Amazon Web Services VPC console (https://console.aws.amazon.com/vpc/home).
In the left pane, expand SECURITY and then click Security Groups.
Select the default security group.
In the lower pane, click the Inbound tab.
Add rules with the following settings to allow incoming traffic for the default security group coming from the NGSecurityGroup and for
traffic within in the default security group.
Rule
Rule Settings
To allow incoming traffic from the NGSecurityGroup.
Create a new Rule – Select All Traffic.
Source – Enter the group ID for NGSecurityGroup (e.g., sg
-cf49bca0). You can find the group ID by selecting the
NGSecurityGroup security group and then clicking the Detai
ls tab.
To allow incoming traffic from the default security group.
Create a new Rule – Select All Traffic.
Source – Enter the group ID for the default security group
(e.g., sg-ae4ebbc1). You can find the group ID by
selecting the default security group and then clicking the Det
ails tab.
6. Click Apply Rule Changes.
7. Click the Outbound tab.
8. Add the following rules to allow all outgoing traffic coming from the default security group going to the NGSecurityGroup or for traffic
within the default security group.
Rule
Rule Settings
To allow outgoing traffic to the NGSecurityGroup.
Create a new Rule – Select All Traffic.
Source – Enter the group ID for NGSecurityGroup (e.g., sg
-cf49bca0). You can find the group ID by selecting the
NGSecurityGroup security group and then clicking the Detai
ls tab.
To allow outgoing traffic within the default security group.
Create a new Rule – Select All Traffic.
Source – Enter the group ID for the default security group
(e.g., sg-ae4ebbc1). You can find the group ID by
selecting the default security group and then clicking the Det
ails tab.
9. Click Apply Rule Changes.
The default security group now lets all traffic pass between the two security groups.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
81
Step 4.3. Set Up the Network ACLs
By default, network ACLs block all incoming and outgoing traffic. To use the Barracuda NG Firewall instead of the Amazon network ACL, add
rules to allow all inbound and outbound traffic.
To use the Barracuda NG Firewall as a gateway device, allow all traffic into the private network.
1.
2.
3.
4.
5.
6.
Go to the Amazon Web Services VPC console (https://console.aws.amazon.com/vpc/home).
In the left pane, expand SECURITY and then click Network ACLs.
Click Create Network ACL.
Select the VPC with the 192.168.0.0./16 subnet (e.g., vpc-abcd1234568 (192.168.0.0/16)), and then click Yes, Create.
Click the Inbound tab.
Add a rule with the following settings to allow inbound traffic.
Traffic
Rule Settings
Inbound
Create a new Rule: All Traffic
Rule #: 100
Source: 0.0.0.0/0
Allow/Deny: ALLOW
7. Click the Outbound tab.
8. Add a rule with the following settings to allow outbound traffic.
Traffic
Rule Settings
Outbound
Create a new Rule: All Traffic
Rule #: 100
Source: 0.0.0.0/0
Allow/Deny: ALLOW
The network ACL now permits all traffic on all ports in and out of the subnets. All hosts in the private network are protected by the Firewall service
running on the Barracuda NG Firewall.
Step 5. Deploy a Barracuda NG Firewall in an Amazon EC2 Instance
In the Amazon VPC that you created in Step 1, launch an Amazon EC2 instance with the Barracuda NG Firewall AMI image. Note that the
Barracuda NG Firewall AMI image is EBS backed, so powering down the Barracuda NG Firewall EC2 instance will not result in data loss. The
Barracuda NG Firewall will be launched with one dynamic DHCP interface. More Network interfaces are added after launching the Instance. The
Amazon Launch Instance wizard guides you through the following steps:
Start the Amazon Launch Instance Wizard
1.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
82
1. Go to the Amazon Web Services EC2 console (https://console.aws.amazon.com/ec2/home).
2. Click Launch Instance.
Launch Instance Wizard Step 1: Choose AMI
1. Click on AWS Marketplace in the left navigation.
2. Enter Barracuda NextGen in the search box and click Search.
3. Click Select next to the Barracuda NG Firewall image you want to install (e.g., Barracuda NextGen Firewall BYOL or hourly ).
Launch Instance Wizard Step 2: Choose Instance Type
1. Select an EC2 instance type. Verify that the number of CPUs for your license matches the number of vCPUs of the EC2 instance type.
2. Click Next: Configure Instance Details.
Launch Instance Wizard Step 3: Configure Instance
1.
2.
3.
4.
From the Network list, select the VPC created in Step 1 (e.g., vpc-b0a9a0db (192.168.0.0/16)).
From the Subnet list, select the 192.168.XX.0/24 subnet created in Step 3.2 (e.g., subnet-f6a8a19d (192.168.10.0/24)).
Select the Enable termination protection check box.
(Optional) To improve I/O performance, enable EBS-optimized instance.
5. Click Next: Add Storage.
Launch Instance Wizard Step 4: Add Storage
1. (Optional) If you want the EBS volumes to be deleted after the Barracuda NG Firewall EC2 instance has been terminated
(deleted), select the Delete on Termination check boxes.
2. (Optional) Enter a larger Size for the /dev/sdf EBS volume.
3. (Optional) To improve the I/O performance of your EC2 instance, select Provisioned IOPS from the Volume Type list.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
83
4. Click Next: Tag Instance.
Launch Instance Wizard Step 5: Tag Instance
1. (Optional) Add tags to identify your EC2 instance.
2. Click Next: Configure Security Group.
Launch Instance Wizard Step 6: Configure Security Group
1. From the Assign a security group list, select Select an existing security group.
2. Select the NGSecurityGroup that you created in Step 4.1 from the list of Security Group (e.g., sg-cf49bca0- NGSecurityGroup).
3. Click Review and Launch.
4. In the Warning window, click Continue.
Launch Instance Wizard Step 7: Review
1. Click Launch.
2. In the Select an existing key pair or create a new key pair window:
Select Proceed without a key pair.
Click the check box to acknowledge that you will not be able to connect to this instance unless you already know the password
built into the AMI.
3. Click Launch Instances.
Deactivate the Source/Destination Check
1. Click View Instances.
2. Right-click the Barracuda NG EC2 instance that you just created, and then select Change Source/Dest. Check.
3. Click Yes, Disable.
Your EC2 Instance appears in the EC2 list. After the instance is up, the State and Status Checks change to green.
Step 6. Allocate and Associate an Amazon Elastic IP Address to the Barracuda NG Firewall EC2 Instance
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
84
The private IP address assigned to the external interface (eth1) on the Barracuda NG Firewall instance is not yet reachable from the Internet.
Create and attach an Amazon Elastic IP Address (EIP) to the external network interface.
1.
2.
3.
4.
5.
6.
7.
Go to the Amazon Web Services VPC console (https://console.aws.amazon.com/vpc/home).
In the left pane, click Elastic IPs.
Click Allocate New Address.
From the EIP used in list, select VPC.
Click Yes, Allocate.
Select the new EIP, and then then click Associate Address.
In the Associate Address window, configure the following settings:
Instance – Select the Barracuda NG Firewall instance (e.g., i-2adb8d65 (Barracuda NG Firewall 5.4.2)).
Private IP address – Select the IP address in the public subnet that you created in Step 3.2 (e.g., 192.168.10.89*).
8. Click Yes, Associate.
Your EIP is now listed with the instance ID and ENI ID associated with the Barracuda NG Firewall instance.
Step 7. Create and Attach a Network Interface
Create a Network Interface in the private subnet. This interface will be registered as eth1 on the Barracuda NG Firewall.
1.
2.
3.
4.
Go to the Amazon Web Services EC2 console (https://console.aws.amazon.com/ec2/home).
In the left pane, click on Network Interfaces.
Click Create Network Interface.
Configure the Network Interface with the following settings:
Subnet – Select the private subnet (192.168.200.0/24) you created in Step 3.1. E.g., subnet-e8a8a183
Private IP - Enter a free IP in the private subnet This IP will not be used as the management IP E.g., 192.168.200.200
Security Group – Select the NG Security Group created in Step 4.1
5. Click Yes, Create. The Network Interface is now listed in the Network Interface list
6. Select the Network Interface you just created and click Attach.
7. Select the Barracuda NG Firewall EC2 instance you created in step 5. E.g. i-2adb8d65 Barracuda NG Firewall (running)
8. Click Yes, Attach.
Copyright © 2015, Barracuda Networks Inc.
8.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
85
9. Right click on the Network Interface you just created and select Change Source/Dest. Check.
10. Disable the Source/Dest. check.
11. Click Save.
12. Go to the Amazon Web Services EC2 console (https://console.aws.amazon.com/ec2/home).
13. Right-click on the Barracuda NG Firewall Instance and click Reboot. You must reboot the Barracuda NG Firewall after adding additional
Network Interfaces to make sure that the NG Firewall will detect and assign the correct network interface number to the new Elastic
Network Interface.
Step 8. Create Route Tables
Create two routing tables to route the networks:
A table to route traffic in the private network to the internal interface on the Barracuda NG Firewall.
A table to route traffic from the Barracuda NG Firewall's external interface to the Internet gateway.
These route tables ensure that all traffic in the VPC passes through the Barracuda NG Firewall.
Step 8.1. Create a Route Table for the Private Network
Route all traffic in the private network to the eth1 interface on the Barracuda NG Firewall.
1.
2.
3.
4.
5.
6.
Go to the Amazon Web Services VPC console (https://console.aws.amazon.com/vpc/home).
In the left pane, click Route Tables.
Click Create Route Table.
Select the VPC with the 192.168.0.0./16 subnet (e.g., vpc-abcd1234568 (192.168.0.0/16)), and then click Yes, Create.
From the list of route tables on the page, select the route table that you just created.
In the lower pane, click the Routes tab and then add a routing entry with the following settings:
Destination – Enter 0.0.0.0/0.
Target – Select Enter network interface ID, and then select the network interface in the private subnet you created in Step 7
(e.g., eni-f39b8d87). To find the network interface ID, go to the AWS EC2 console and click Network Interfaces. The network
interface is in the 192.168.200.0/24 subnet.
7. Click Add.
8. Click the Associations tab.
9. From the Select a subnet list, select the 192.168.200.0/24 subnet (e.g., subnet-d79be8bf (192.168.200.0/24)).
10. Click Associate.
11. Click Yes, Associate to confirm the association.
Step 8.2. Create a Route Table for the Public Network
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
86
Route traffic from the Barracuda NG Firewall's external interface to the Internet gateway that you created in Step 2 .
1.
2.
3.
4.
5.
6.
Go to the Amazon Web Services VPC console (https://console.aws.amazon.com/vpc/home).
In the left pane, click Route Tables.
Click Create Route Table.
Select the VPC with the 192.168.0.0./16 subnet (e.g., vpc-abcd1234568 (192.168.0.0/16)), and then click Yes, Create.
From the list of route tables on the page, select the route table that you just created.
In the lower pane, click the Routes tab and then add a routing entry with the following settings:
Destination – Enter 0.0.0.0/0.
Target – Select the Internet gateway that you created in Step 2 (e.g., igw-6e81f206).
7. Click Add.
8. Click the Associations tab.
9. From the Select a subnet list, select the 192.168.XX.0/24 subnet that you created in Step 3.2 (e.g., subnet-2429574c
(192.168.10.0./24)).
10. Click Associate.
11. Click Yes, Associate to confirm the association.
Your Barracuda NG Firewall instance is now reachable from the Internet.
Step 9. Add Amazon Network Interface to the Barracuda NG Firewall Instance
Add the second Amazon Network interface to the Barracuda NG Firewall Instance.
1. Reboot the Barracuda NG Firewall Instance, to correctly detect the new Network Interface.
2. With Barracuda NG Admin, log into the Barracuda NG Firewall. Use the following settings:
Management IP: The Amazon Elastic IP address that you created in Step 6 (e.g., 54.229.198.60).
Login: root
Password: <your Instance ID> (e.g., i-2adb8d65)
You have three days initial grace period to license your Barracuda NG Firewall, after that the default password (ngf1r
3wall) also authenticates the root user.
3. Open the CONTROL > Network page.
4. Ensure that there are two network interfaces listed: dhcp and eth1. if the second network interface is listed as eth0, reboot the
Barracuda NG Firewall.
5.
6.
7.
8.
9.
10.
Open the CONFIGURATION > Configuration Tree > Box > Network page.
In the left pane click on Interfaces.
Click Lock.
Double Click on 10dynmod entry in the Network Interface Cards list. The Network Interface Cards: 10dynmod window will open.
Select 2 from the Number of Interfaces drop down menu.
Click OK.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
87
11. Click Send Changes. The eth1 interface is now listed in the Physical Interface list.
12. In the left pane click on Routing.
13. Click on + in the Main Routing Table section. The Routes windows opens.
14. Enter a Name for the route. E.g., privateVPCSubnet.
15. Configure the route with the following settings:
Target Network Address – Enter the destination address for the private subnet: 192.168.200.0/24
16.
17.
18.
19.
20.
21.
22.
23.
Route Type – Select directly attached network from the drop down.
Interface Name – Select eth1
Trust Level – Select Trusted
Click OK.
Click Send Changes and Activate.
Open the CONTROL > Box page.
In the left pane in the Network section click Activate new network configuration. The Network Activation window opens.
Click on Failsafe.
Open Server Properties page for the S1 virtual server (CONFIGURATION > Full Configuration > Virtual Servers > S1 > Server
Properties).
Click Lock.
Enter the IP address you assigned to the Amazon Network Interface in Step 8. in Second-IP [IP2]. E.g., 192.168.200.200
Do not change the First IP for the virtual server S1. You will lock yourself out if you do.
24. Select yes from the Reply to Ping drop down.
25. Click Send Changes.
26. Click Activate.
Additional Information
Do not delete the default virtual server S1. By deleting the virtual server, the application redirect rule that lets you connect to the
Barracuda NG Firewall EC2 is removed.
When you add additional IP addresses to network interfaces or virtual servers on the Barracuda NG Firewall, you must also add these IP
addresses to the respective Amazon network interfaces as additional IP addresses. Depending on the Amazon EC2 instance type used,
there are limitations on the number of IP addresses that you can assign to a single Amazon network interface.
To patch or update the Barracuda NG Firewall EC2 instance firmware, it is recommended that you use the Barracuda NG Admin graphic
interface and not the SSH shell.
Troubleshooting Tips
If you cannot activate the network after attaching an additional Amazon Network Interface make verify that the network interface
numbering is correct. E.g., eth1 not eth0 if a dhcp device is already present. Reboot the Barracuda NG Firewall instance for the interface
numbers to be assigned correctly.
If you cannot connect to the other Amazon EC2 instances in the private subnet, check the following settings:
Network Interfaces – Mismatch between the IP address assigned to the network interface on the Barracuda NG Firewall and
the Amazon Network Interface associated with it.
Security Groups – If the settings for the Security Group are too restrictive, the traffic will be blocked by the Amazon firewall. For
debugging purposes, introduce a Security Group policy allowing all traffic in and out, and all traffic between the two security
groups.
Network ACLs – If the rules in the Amazon network ACLs are too restrictive, traffic going into the subnet will be blocked by the
Amazon firewall.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
88
Routing Tables – Verify that the Amazon network interface associated with eth1 on the Barracuda NG Firewall is the default
gateway for the private subnet and that the private subnet is associated with the correct routing table.
If you cannot connect to the Internet from the Barracuda NG firewall, check the following settings:
Security Groups – If the settings for the Security Group are too restrictive, the traffic will be blocked by the Amazon firewall. For
debugging purposes, introduce a Security Group policy allowing all traffic in and out, and all traffic between the two security
groups.
Network ACLs – If the rules in the Amazon Network ACLs are too restrictive, traffic going into the subnet will be blocked by the
Amazon firewall.
Routing Tables – Verify that the Amazon Internet Gateway (igw) is the default route and that the public subnet is associated
with the correct routing table.
Next Steps
To continue setting up the Barracuda NG Firewall, you can proceed with the following tasks:
Task
Instructions
License the Barracuda NG Firewall.
How to Activate and License a Standalone Virtual Barracuda NG
Firewall
After the deployment you have an initial grace period of
three days to license your Barracuda NG Firewall. After
that the root user will also be able to log in with the default
(ngf1r3wall) password.
Complete the Getting Started guide for the Barracuda NG Firewall.
Getting Started
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
89
How to Deploy the NG Firewall on VMware vCloud Air
VMware vCloud Air is a public cloud platform built on VMware vSphere/ESXi hypervisors. The infrastructure is split into multiple logical units:
Datacenter Location – Choose from multiple worldwide VMware datacenters.
Virtual Datacenter – The security and virtualized network for the VMs is handled on this level.
vApp – A collection of VMs and other vApps that host a multi-tier application, its policies and service levels.
VM – In our case, this is the individual Barracuda NG Firewall Vx Instance running in the cloud.
Use the standard Vx OVA images and Vx licenses for the Barracuda NG Firewall and NG Control Center. Create a routed frontend network and
up to 9 additional isolated backend networks. The VMware Edge Gateway of the virtual datacenter is then configured to allow only inbound and
outbound traffic through the NG Firewall VM.
In this article
Before you Begin
Step 1. Create Virtual Datacenter
Step 2. Create Frontend and Backend Networks
Step 3. Upload the Barracuda NG Firewall Vx image
Upload via OVF Tool
Uploading via Browser
Step 4. Create a vApp and Deploy the Barracuda NG Firewall VM in the vApp
Step 5. Add Additional Network Adapters
Step 6. Set the Management IP Address
Step 7. Configure Edge Gateway Firewall Rules and Routes
Step 7.1. Add Public IP address to the Edge Gateway
Step 7.2. Add NAT Rules
Step 7.3. Add Firewall Rules
Performance Tuning
Next Steps
Before you Begin
Download the Barracuda NG Firewall Image.
Create a vCloud Air Account.
Use vCloud with a compatible 32-bit browser with the latest VMware Remote Console plugin. For more information, see VMware
Knowledge Base.
(Optional) If you do not want to upload the OVA image via a browser, download and install the VMware OVF Tool.
Step 1. Create Virtual Datacenter
Create the Virtual Datacenter in a VMware datacenter of your choice.
1. Log in to the VMware vCloud.
2. Select Virtual Private Cloud OnDemand.
3. Select the Virtual Private Cloud Location.
4. Click + next to Virtual Data Centers. The New Virtual Datacenter window opens.
5. Enter the Name.
6. Click Create Virtual Data Center.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
90
Step 2. Create Frontend and Backend Networks
Create the frontend and backend networks for the Barracuda NG Firewall. Due to the limit of 10 network adapters per VM, you can use up to 9
backend networks.
1. Log into the VMware vCloud.
2. Open your Virtual Datacenter.
3. Click on the Networks tab.
4. Click New Network. The Add Network window opens.
5. Enter the settings for the frontend network:
Name – Enter a name. E.g., Frontend
IP Range – Enter the first and last IP address of the IP range for the virtual machines. Optional:
Click + to add multiple IP ranges.
Subnet Mask – Enter the netmask. E.g., 255.255.255.0
Gateway to route through – Select a gateway.
Address to assign to gateway – Enter the IP address that should be used for the default gateway in this network. The gateway
may not be on the IP Range.
6. Click Add Network.
7. Repeat steps 4 - 6 for each backend network.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
91
For every network you create, a tile is added to the Network tab.
Step 3. Upload the Barracuda NG Firewall Vx image
You can upload the Barracuda NG Firewall OVA image via browser plugin or command line OVF tool.
Upload via OVF Tool
Use the command line tool to upload your OVA image to a catalog. If you want to use a dedicated catalog, you must create it before uploading
via the OVF tool.
1. Open the command prompt or terminal.
2. Upload the OVA with the following command: ovftool [OVA-FILE] [VCLOUD-LOCATOR]
C:\Program Files\VMware\VMware OVF Tool> ovftool.exe OVA_FILE
vcloud://username:password@host:port?org=vCLOUD_ORGANISATION_NAME&vapp=vAPP_NAME&
catalog=CATALOG_NAME&vappTemplate=vAPP_TEMPLATE_NAME&vdc=VDC_NAME
Uploading via Browser
Verify that you are using a compatible browser and that the VMware Client Plugin is allowed to run.
1. Log into the VMware vCloud.
2. Open your Virtual Datacenter.
3. Click New Virtual Machine.
4. Click Create my Virtual Machine from Scratch. The VMware vCloud Director opens in a new tab.
5. Click the Add vApp from OVF icon.
6. Select Local file or enter the download URL of the Barracuda NG Firewall OVA image.
When using a URL, the OVA image download is not uploaded directly from the source URL. All traffic (download and upload)
passes through your computer.
7. Click Next.
8. Review the details of the OVA and click Next.
9. Enter Name and Description.
10.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
92
10. Select the Virtual Datacenter.
11. Click Next.
12. Select SSD-Accelerated from the Storage Policy dropdown.
13. Click Next.
14. Enter a Computer Name and select the frontend Network.
15. Click Next.
16. Select the Number of virtual CPUs cores per socket to match your Barracuda NG Firewall license. For more information, see Licensing
.
17. Enter the Total Memory for the virtual machine. Use at least 1 GB per CPU core.
18. Enter 80 GB as the Disk0 size.
19.
20.
21.
22.
Click Next.
Click Finish. The vCloud Director Login window opens.
Enter your User name and Password.
Click OK.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
93
Follow the upload progress in the popup window. Uploading the OVA will take some time.
Step 4. Create a vApp and Deploy the Barracuda NG Firewall VM in the vApp
1.
2.
3.
4.
Log in to the VMware vCloud.
In the left menu, click on your Virtual Datacenter.
Click New Virtual Machine. The New Virtual Machine on YOUR VIRTUAL DATA CENTERS window opens.
Click Create My Virtual Machine from Scratch. The VMware vCloud Director opens in a new tab.
5. Click on the Build new vApp icon (
). The New vApp pop-over opens.
6. Enter a Name for the vApp.
7. Select the VDC from the Virtual Datacenter list.
8. Click Next.
9. Select the Image you uploaded in Step 3 from the catalog and click Add.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
94
10. Click Next.
11. (Optional) Change the Name for the virtual machine. This is the full name, not the computer name. E.g., Barracuda NG Firewall
VF2000
12. In the Storage Policy column select SSD-Accelerated.
13. Click Next.
14. Enter the Computer Name. E.g., NGFW1
15. In the Network column, select the Frontend network you created in Step 3
16. In the IP Assignment column, select Static-Manual and enter an IP address from the IP range of the frontend network.
17. Click Next.
18. Click Next.
19. Review the settings and click Finish.
The NG Firewall vApp is now displayed in the vApps list.
Step 5. Add Additional Network Adapters
By default, the NG Firewall is deployed with one VMXNET3 network adapter. Add an additional network adapter for each backend network. The
VM must be powered off to add additional network adapters.
1. Click on the Barracuda NG Firewall vApp created in Step 4.
2. Right-click on the NG Firewall VM and click Properties. The Virtual Machine Properties pop-over opens.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
3.
4.
5.
6.
95
Click on the Hardware tab.
Select Show network adapter type.
In the NICs section, click Add.
Configure the NIC you just added:
Network – Select one of the backend networks you created in Step 4.
Adapter Type – Select VMXNET 3.
IP Mode – Select Static - Manual and enter an IP address from the IP range of the backend network.
7. Click OK.
You can now power on the Barracuda NG Firewall VM.
Step 6. Set the Management IP Address
Configure the management IP address on the console of the Barracuda NG Firewall.
1.
2.
3.
4.
Go to the vCloud Director.
In the left menu, click on vApps.
Click on the Console icon in the vApps list. The console opens in a separate window.
For a basic network configuration, the Barracuda NG Vx unit launches the Active Recovery Technology menu.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
96
5. Select Basic Configuration, enter the following network settings, and then press F3 to save your changes:
Hostname – Enter the desired hostname.
Management IP – Enter the IP address in the frontend network you assigned to the first NIC in Step 6.
Netmask – The subnet mask in dotted quad notation. For example, 255.255.255.0.
Default Gateway – Enter the gateway IP address you configured in Step 4 for the frontend network.
6. When the window opens to announce that your configuration changes were saved, press any key to continue.
7. Select Reboot to restart the Barracuda NG Firewall with the new network configuration.
Step 7. Configure Edge Gateway Firewall Rules and Routes
Configure the routing and firewall rules for the Edge Gateway to allow access to the NG Firewall via a public IP address.
Step 7.1. Add Public IP address to the Edge Gateway
Use the public IP address for all traffic into and out of the Virtual Datacenter.
1.
2.
3.
4.
5.
6.
Log in to the VMware vCloud.
In the left menu, click on your Virtual Datacenter.
Click on the Gateways tab.
Click on the Gateway tile.
Click on the Public IPs tab.
Click Add IP Address.
7. Click Add.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
97
It may take a couple of minutes for the public IP to be displayed in the list.
Step 7.2. Add NAT Rules
Create two NAT rules to redirect incoming traffic to the IP address of the NG Firewall in the frontend network and to rewrite the source IP of
outgoing connections with the public IP address.
1.
2.
3.
4.
5.
6.
Log into the VMware vCloud.
In the left menu, click on your Virtual Datacenter.
Click on the Gateways tab.
Click on the Gateway tile.
Click on the NAT Rules tab.
Click Add NAT Rule. The New NAT Rule on gateway pop-over opens.
7. Create a NAT rule to rewrite the source IP address with the public IP address for all outgoing connections of the NG Firewall:
Type – Select SNAT.
Original (Internal) Source – Enter the IP address of the NG Firewall in the frontend network you configured in step 4.
Translated (External) Source – Select the public IP address you just created from the dropdown.
Settings – Check Enable this rule.
8. Click Next.
9. Click Add.
10. Create a NAT rule to redirect all incoming traffic to the internal IP address of the NG Firewall in the frontend network:
Type – Select DNAT.
Original (External) IP – Select the public IP address you just created from the dropdown.
Protocol – Select Any.
Original Port – Select Any.
Translated (Internal) IP/Range – Enter the IP address of the NG Firewall in the frontend network you configured in step 4.
Translated Port – Select Any.
Settings – Check Enable this rule.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
98
11. Click Next
12. Click Finish.
Step 7.3. Add Firewall Rules
By default, everything is blocked. Create a firewall rule to permit traffic to and from the IP address of the Barracuda NG Firewall in the frontend
network.
1.
2.
3.
4.
5.
6.
7.
Log into the VMware vCloud.
In the left menu, click on your Virtual Datacenter.
Click on the Gateways tab.
Click on the Gateway tile.
Click on the Firewall Rules tab.
Click Add Firewall Rule.
Create a firewall rule to allow traffic with the public IP address as the destination:
Name – Enter a descriptive name. E.g., IN
Settings – Check Enable this rule.
Protocol – Select Any.
Source – Select Any.
Destination – Select Specific CIDR, IP or IP Range and enter the public IP address your created in step 7.1.
8. Click Next.
9. Click Add.
10. Create a firewall rule to allow traffic from the IP address of the Barracuda NG Firewall in the frontend network to the Internet.
Name – Enter a descriptive name.
Settings – Select Enable this rule.
Protocol – Select Any.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
99
Source – Select Any.
Destination – Select Specific CIDR, IP or IP Range and enter the public IP address your created in step 7.1.
11. Click Add.
12. Click Finish.
You can now access your Barracuda NG Firewall in the VMware vCloud via the public IP address configured in Step 7.1.
Performance Tuning
You can increase performance by enabling jumbo frames for your VMXNET3 adapters. Open the CONFIGURATION > Configuration Tree >
Box > Network page and increase the MTU for the network interfaces to 8950. Jumbo frames are enabled by default on the vSwitches in vCloud
Air.
Next Steps
Activate the license of the Barracuda NG Firewalls. For more information, see How to Activate and License a Standalone Virtual
Barracuda NG Firewall.
Add the additional network adapters to the Barracuda NG Firewall configuration. For more information, see How to Add Additional
Network Interfaces.
Configure direct attached routes for the additional network interfaces. For more information, see How to Add a Direct Attached Route.
Add one IP address per network to the virtual server IP addresses. For more information, see Virtual Servers and Services.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
100
Getting Started
If you are deploying a Barracuda NG Control Center with the CC Wizard, see Getting Started - NG Control Center.
When deploying a Barracuda NG Firewall, basic settings need to be made before the system can be used in production. There are some
differences, depending on the deployment option you choose (hardware, virtual, or public cloud).
Before you Begin
Make sure you completed the steps listed in the deployment articles, depending on which platform you are deploying the Barracuda NG Firewall
on:
Hardware – Complete Hardware deployment and the included Quick Start Guide. The Quick Start Guide is included in the box for every
Barracuda NG Firewall. Your PC must be connected to the management port of the NG Firewall and use an IP address in the
192.168.200.0/24 range. Do not use 192.168.200.200 because this IP address is the default management IP address of the Barracuda
NG Firewall.
Virtual (Vx) – Complete the deployment steps in Virtual Systems (Vx) for your hypervisor.
Public Cloud – Complete the steps in Public Cloud Hosting for your public cloud provider.
Step 1. Prepare the Client
To connect to the Barracuda NG Firewall, you must use the Barracuda NG Admin application. The application is a standalone, portable
executable. Always use the latest version of NG Admin. You can download it from the Barracuda Download Portal.
For more information on the system requirements and NG Admin, see Barracuda NG Admin.
Step 2. Log into the Barracuda NG Firewall
Connect to your Barracuda NG Firewall using Barracuda NG Admin:
1. Launch Barracuda NG Admin.
2. In the Log In window, select Box.
3. Enter the Management IP, Username, and Password:
Management IP Address
Username
Default Password
Hardware
192.168.200.200
root
ngf1r3wall
Virtual (Vx)
Set during deployment
root
ngf1r3wall
Public Cloud - Amazon AWS
Elastic IP pointing to the
Barracuda NG Instance
root
Instance ID of your Barracuda
NG Instance E.g., i-0aaaa123
Public Cloud - Microsoft
Azure
<your cloud service>.clouda
pp.net or Virtual IP (VIP) for
the cloud service
root
4. Click Log In. The Authentication Check window opens.
5. Click Trust.
Copyright © 2015, Barracuda Networks Inc.
Set during deployment
If not set during
deployment: ngf1r3wall
Barracuda NG Firewall 6.1 Administrator's Guide - Page
101
5.
Step 3. Configure Basic Settings
The box wizard can only be used on hardware units. If you are deploying a virtual Barracuda NG Firewall system, you must configure the time
zone and change the password manually.
Step 3.1 Complete the Wizard for the Barracuda NG Firewall
If you are using a hardware appliance, the wizard helps you configure basic settings during deployment. Follow the instructions for the Standard
Deployment Mode. Skip this step if you are connected to a Barracuda NG Firewall in the public cloud because these settings were already
configured during deployment.
Step 3.2 Configure the Time Zone and Change the Root Password for the Virtual Barracuda NG Firewall
When using a virtual Barracuda NG Firewall, complete the following tasks:
Task
Link
Change the password
How to Change the Root Password and Management ACL
Set the time zone
Step 1 in How to Configure Time Server (NTP) Settings
(optional) Change the management IP address
How to Change the Management IP Address
Step 4. Configure an Internet Connection
If you are deploying a Barracuda NG Firewall that must connect to the Internet via ISP, configure the Internet connection. If your Barracuda NG
Firewall can already access the Internet via Management interface, you can skip this step. The Barracuda NG Firewall F10 to F30x already have
a preconfigured DHCP interface on port 4.
Complete the configuration for your type of Internet connection:
Internet Connection Type
Link
Static IP address
How to Configure an ISP with Static IP Addresses
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
102
DHCP
How to Configure an ISP with Dynamic IP Addresses (DHCP)
xDSL (PPP, PPPoE and PPTP)
How to Configure an ISP with xDSL
UMTS/3G
How to Configure an ISP with UMTS/3G
ISDN
How to Configure an ISP with ISDN
Step 5. Activate and License your Barracuda NG Firewall
To license your Barracuda NG Firewall, the NG Admin application must be able to connect to the Internet directly or via proxy. For hardware
appliances you only need to activate the unit; licenses are automatically downloaded and installed afterwards. For virtual and public cloud
systems you must enter a license token before activating your unit. If you are licensing a Barracuda NG Firewall that is to be used in a high
availability cluster, it is important to activate the secondary unit first. For more information, see How to Activate and License a Barracuda NG High
Availability Cluster.
License Installation
Link
Hardware
1. Fill out the activation form.
2. Licenses are downloaded and installed
automatically.
3. For Barracuda NG Firewall F10 - F30X,
preconfigured services must be enabled
manually.
How to Activate and License a Standalone
Hardware Barracuda NG Appliance
Virtual (Vx) + Public Cloud
1. Enter the license token.
2. Fill out the activation form.
3. Licenses are downloaded and installed
automatically.
How to Activate and License a Standalone
Virtual Barracuda NG Firewall
Step 6. Configure Administrative Settings
Configure the Barracuda NG Firewall to use your preferred DNS and NTP servers. To receive email notifications from selected services, you
must configure a recipient email address.
Link
DNS Servers
How to Configure DNS Settings
NTP Servers
Step 2 in How to Configure Time Server (NTP) Settings
System Email Notification Address
How to Configure the System Email Notification Address
Next Steps
If you are deploying a Barracuda NG Control Center, continue with Getting Started - NG Control Center without CC Setup Wizard.
Continue with the steps below to set up the system according to your needs.
Link
Configure VLANs, routing and add additional network interfaces.
Network
Create and configure the virtual server.
Virtual Servers and Services
How to Configure Virtual Servers
Create and configure services (e.g., Forwarding Firewall, VPN,...).
NG Firewall Services
How to Configure Services
Configure external authentication servers.
Authentication
Configure administrator accounts.
Managing Access for Administrators
Create a high availability cluster
High Availability
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
103
Network
The box layer network subsystem of the Barracuda NG Firewall and NG Control Center provide all basic features related to network connectivity,
such as WAN connections, network traffic, routing, or VLAN.
Connecting to the Internet - WAN Connections
Routing
VLAN
Management IP Address
Network Interfaces
IPv6
Advanced Network Configurations
Connecting to the Internet - WAN Connections
The Barracuda NG Firewall supports various types of Internet connections. If multiple ISP connections are used, the Barracuda NG Firewall
offers granular control over link and loadbalancing either on a per-access rule basis or via route metric. You can configure the following Internet
connections:
Static IP addresses
Dynamic IP addresses (DHCP)
xDSL with PPPoE and PPTP
UMTS/3G using the external Barracuda USB Modem
ISDN
For more information, see WAN Connections
Routing
Routing tables are used to store the best path to a remote network. The Barracuda NG Firewall uses the routing tables to forward traffic to the
correct interfaces, next hop gateways, or VPN tunnels. The destination, route metric, and source address (optional) of an IP packet is used to
determine which route matches and where the packet is forwarded to.
For more information, see Routing.
VLAN
VLANs allow you to split one physical network interface into several virtual LANs. The physical interface behaves as if it were several interfaces,
and the switch behaves as if it were multiple switches. The Barracuda NG Firewall can use up to 256 VLANs on one physical network interface
and a maximum of 4096 VLANs globally.
For more information, see How to Configure VLANs.
Management IP Address
The management IP address is used to connect and manage the Barracuda NG Firewall or the box level of the NG Control Center. It is located
on box level and is thus independent from the virtual server and services running on the Barracuda NG Firewall. Routes for the management
network are automatically introduced and do not need to be configured separately. The management IP address can be changed to match you
network.
For more information, see How to Change the Management IP Address.
Network Interfaces
Hardware systems are automatically configured with the correct number of network ports and interfaces. For hardware systems with Barracuda
network modules or virtual systems, it may be necessary to add additional network interfaces. These network interfaces must also be added to
the configuration of the Barracuda NG Firewall. If you are planning to use VLANs, make sure to use Barracuda network modules or virtual
network adapters that use kernel modules with VLAN support.
For more information, see How to Add Additional Network Interfaces
IPv6
The Barracuda NG Firewall supports the use of IPv6 for selected services. Enable IPv6 for the Barracuda NG Firewall or NG Control Center to
accept IPv4 and IPv6 traffic.
For more information, see How to Use IPv6
Advanced Network Configurations
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
104
How to Configure Ethernet Bundles
How to Make a Barracuda NG Firewall Centrally Manageable Without a Barracuda NG Control Center
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
105
WAN Connections
The Barracuda NG Firewall supports all commonly used WAN connection types. You can set up static, DHCP, xDSL, UMTS/3G, and ISDN WAN
connections to connect your network to the Internet. Link failover and balancing can be configured either on a per-access rule basis by using
custom connection objects or in a more basic configuration via route metrics. You can also select different Internet connections based on the
application type.
Static Internet Connections
If your ISP assigns a static IP address or network to your Internet connection, configure a static Internet connection to connect the Barracuda NG
Firewall to the Internet. You must add a route on box layer for the network port the ISP is connected to. The connection becomes active when the
assigned IP address or IP address within the assigned network is configured as virtual server IP address or if the unit is remote managed a
additional IP address is defined on box layer.
For more information, see How to Configure an ISP with Static IP Addresses.
DHCP Connections
If the IP address is assigned dynamically by your ISP via a DHCP server, the Barracuda NG Firewall acts as a DHCP client. The Barracuda NG
Firewall supports up to six concurrent DHCP connections. No extra routing rules need to be configured for DHCP connections.
For more information, see How to Configure an ISP with Dynamic IP Addresses (DHCP).
xDSL Connections
The Barracuda NG Firewall supports xDSL connections using PPP, PPTP, and PPPoE. Because some xDSL providers periodically disconnect
your xDSL modem from the network, xDSL link management automatically introduces and deactivates routes as required.
For more information, see How to Configure an ISP with xDSL.
UMTS/3G Connections
Configure UMTS/3G WAN connections for locations without a terrestrial Internet connection, mobile offices or as backup lines. You must use a
supported USB UMTS modem, such as the external Barracuda USB modem, for UMTS/3G connections.
For information on setting up the Barracuda USB modem, see the Barracuda USB Modem Quick Start Guide (PDF).
For information on how to configure UMTS/3G connections, see How to Configure an ISP with UMTS/3G.
ISDN Connections
The Barracuda NG Firewall ISDN configuration provides flexible dial-in options, dynamic DNS support, channel bonding (mppp), and usage of a
second S0 bus with a
different phone number. ISDN connections can be used with static or dynamic IP addresses.
For more information, see How to Configure an ISP with ISDN.
Link Balancing and Failover
Configure link balancing and failover to optimize usage of two or more WAN connections. Use custom connection objects to select the optimal
connection for the traffic handled by that access rule. You can define multiple connection objects, each with a different failover or link balancing
policy. You can also use route metrics for basic link failover functionality.
For information on link balancing for multiple WAN connections, see How to Configure Link Balancing and Failover for Multiple WAN Connections
.
For information on link balancing for two DHCP connections, see How to Configure Automatic Failover with Dual DHCP WAN Connections using
the Same Remote Gateway.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
106
How to Configure an ISP with Static IP Addresses
If your Internet connection is using static IP addresses or entire network ranges assigned by your ISP, you must create routing entries on box
level and then assign the IP address(es) to the virtual server. Choose the network type Untrusted to automatically create a default route
(0.0.0.0/0) for the connection.
In this article:
Before you Begin
Step 1. Add a Direct Route
Step 2. Network Activation
Step 3. Add the Static IP Address to a Virtual Server
Verify the Network Configuration
Before you Begin
Connect the network equipment installed by your provider to an unused port (not the management port) of your Barracuda NG Firewall.
Step 1. Add a Direct Route
Create a direct attached route entry to create the network on box level of the Barracuda NG Firewall. Be sure to create the route on the port the
ISP is plugged into.
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select Routing.
Click Lock.
In the Main Routing Table, click + to add a new route.
Enter a Name for the route and click OK.
6. In the Target
7.
8.
9.
10.
11.
Network Address field, enter the IP address of the target network. E.g.,: 62.99.0.0/24
Select directly attached network as the Route Type.
From the Interface Name list, select the port the ISP is connected to. E.g.,: port 2.
If the default route will be introduced in an environment where multiple dynamic links are available, specify a Route Metric.
Select Untrusted as the Trust Level.
Enter the Default Gateway IP address. E.g.,: 62.99.0.254
12. Click OK.
13. Click Send Changes and Activate.
Step 2. Network Activation
After you create or change basic network configurations such as routing, you must activate your new network configurations.
1. Go to CONTROL > Box.
2. In the left menu, expand the Network section and click Activate new network configuration.
3. Select Soft. The 'Soft Activation Succeeded' message is displayed after your new network configurations have been successfully
activated.
Your route is now displayed as a disabled route (grey "x" icon) in CONTROL > Network.
Step 3. Add the Static IP Address to a Virtual Server
Assign the individual WAN IP addresses you want to use to the virtual servers on the Barracuda NG Firewall. By introducing the external IP
addresses on the virtual server, you can use a high availability (HA) cluster to transfer the WAN address to the secondary unit and still be
reachable under the same IP address. In our example, you would enter 62.99.0.221 in the virtual Server Properties (CONFIGURATION >
Full Configuration > Virtual Servers > your virtual server) as the First-IP, Second-IP or Additional IP address.
For more information, see Virtual Servers and Services.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
107
Verify the Network Configuration
Open the CONTROL > Network page to verify that all network routes have been introduced successfully. Verify the WAN IP addresses are
displayed with a green status icon and that the introduced routes are available in the tables Main and Default and that the default route is
directing traffic through your ISP connection.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
108
How to Configure an ISP with Dynamic IP Addresses (DHCP)
If your ISP assigns the IP address via DHCP server, configure a DHCP interface on the port the ISP is plugged into. The Barracuda NG Firewall
supports up to six DHCP connections. You can operate a DHCP connection in active or standby mode. In active mode, the link is
automatically brought up during the network activation process. In standby mode, the link is dormant until it is activated by a command line script.
For each link, you can configure separate connection details, and routing and monitoring settings.
If multiple DHCP connections to a remote network or Internet use the same remote gateway, only one of these connections can be
active at the same time.
In this article:
Before you Begin
Step 1. Create a DHCP Connection
Step 2. (optional) Configure Dynamic DNS for the DHCP link
Step 3. Configure Routing Settings
Step 4. Configure Connection Monitoring
Step 5. Activate the Network Changes
Operating a DHCP Link in Standby Mode
Before you Begin
Before creating the Internet connection, verify which port you are using to connect to your ISP. This port is subsequently used exclusively for the
DHCP connection. No other IP addresses or routes may use it. The port is renamed to dhcp.
Step 1. Create a DHCP Connection
1.
2.
3.
4.
5.
6.
7.
8.
Go to CONFIGURATION > Configuration Tree > Box > Network).
In the left menu, select xDSL/DHCP/ISDN.
Click Lock.
Set DHCP Enabled to Yes.
In the DHCP Links table, click + to add an entry.
Enter a name for the link and click OK. The DHCP Links window opens.
Select the interface the ISP is connected to in the DHCP Interface list. E.g., eth1 or port 3
If you want to use the DNS servers provided by your ISP, set Use Provider DNS to Yes.
Step 2. (optional) Configure Dynamic DNS for the DHCP link
1.
2.
3.
4.
5.
(optional) Enable Use Dynamic DNS if you are using a dyndns.org account for dynamic DNS:
Click Set. The Dynamic DNS Params window opens.
Select a dynamic DNS Service Type. For information about available DynDNS service types, see http://dyn.com/dns/.
Enter the Dyn DNS Name that was registered at dyndns.org.
Enter User Access ID and Password for accessing the server as defined during registration at dyndns.org.
Changing the MX setting is not recommended. If required, see www.dyndns.org for detailed information.
6. Click OK.
Step 3. Configure Routing Settings
Configure the routes and routing tables for the DHCP link.
1. In the Routing section,
Disable Own Routing Table to route all traffic to the target networks through this DHCP interface, or
Enable Own Routing Table to specify which networks should be routed through the interface.
a.
Copyright © 2015, Barracuda Networks Inc.
1.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
109
a. Add the Source Networks (IP/mask notation; for a single host, enter 32 as netmask (e.g. 192.168.0.55/32).
b. Enable Clone Routes to clone the dynamic routes to the main or default table. This setting is useful for setups where
application-based selection (explicit binding in a firewall rule) of a traffic path is supposed to coexist with link failover
(proxy dynamic).
2. Enable Create Default Route to automatically introduce the default route assigned by the provider.
When disabling Create Default Route, specify the Target Networks that will be reachable through the interface. If your route
should be set dynamically when the DHCP connection is established, add 0.0.0.0/0 to the Target Networks table.
3.
4.
5.
6.
Select Advertise Route when using dynamic routing protocols such as OSPF/RIP/BGP.
Select Untrusted as the Trust Level.
Specify the route preference number in the Route Metric field if multiple ISP connections are available.
Enable GRE with Assigned IP if you want to create a PPTP server listening on the dynamic IP address.
Step 4. Configure Connection Monitoring
The connection is monitored by pinging a remote IP address every 20 seconds. When the remote reachable IP does not answer to two ICMP
probes, the connection is either terminated or the routing metric is increased, depending on which Unreachable Action is set. If the connection is
terminated, the Barracuda NG Firewall will attempt to connect until the connection is re-established successfully.
1. (optional) In the Reachable IPs table, add at least one target IP address that will be regularly pinged to monitor the availability of the
connection. Target IP addresses must be accessible only via the DHCP connection.
2.
(optional) Select the Unreachable Action to be taken if the connection cannot be established. The
following options are available:
a. Restart – Restarts the DHCP connection.
b. Increase-Metric – Changes the preference for DHCP routes until the probe succeeds.
3.
4.
Click OK.
Click Send Changes and Activate.
The DHCP link is now listed in DHCP Links.
Step 5. Activate the Network Changes
You must activate the network changes to bring up the ISP connection with a dynamic IP address.
1. Go to CONTROL > Box.
2. In the left menu, expand the Network section and click Activate new network configuration.
3. Select Soft. The 'Soft Activation Succeeded' message is displayed after your new network configurations have been successfully
activated.
Your DHCP connection is now established and the IP address assigned by your ISP is visible on the CONTROL > Network page. All status icons
next to the DHCP link are green, indicating an active connection. If the DHCP connection is your primary uplink, the default route uses the
connection information from your DHCP interface. If more than one default route is present, the connection with the lowest route metric is used.
Operating a DHCP Link in Standby Mode
In standby mode, activation and subsequent monitoring of the link must be triggered externally. Standby mode also combines HA setups for HA
DHCP connections. In standby mode,
1. The involved routes are set to pending state, and it is not checked whether they are established.
2. The configuration is completely run through, but the connection is not established.
Connections are handled from the command-line interface via a server-side script:
Start all DHCP connections - /etc/phion/dynconf/network/openxdhcp start &
Stop all DHCP connections - /etc/phion/dynconf/network/openxdhcp stop &
Start an explicit DHCP connection - /etc/phion/dynconf/network/openxdhcp start *linkname* &
Stop an explicit DHCP connection -/etc/phion/dynconf/network/openxdhcp stop *linkname* &
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
110
How to Configure an ISP with xDSL
An xDSL connection is a tunneled connection using Point-to-Point Protocol over Ethernet (PPPoE) or Point-to-Point Tunneling Protocol (PPTP), d
epending on your ISP. The Barracuda NG Firewall can handle up to four xDSL connections. The WAN IP address assigned by the ISP can be
dynamic or static, depending on your ISP.
Before you Begin
To use Dynamic DNS, you must have an active account at www.dyndns.org. For more information on DynDNS, see http://dyn.com/dns/.
To use the xDSL connection as part of a PPP multilink bundle, your ISP must support PPP multilink connections.
If your ISP supports synchronous PPP mode, using it can result in higher PPP performance. The performance gain is achieved only in
some cases and depends on your and your ISPs setup.
Enabling synchronous PPP without support of the remote server causes an unstable connection and massive performance
loss.
Configuring an ISP with xDSL
Configure an xDSL connection using PPPoE or PPTP as the tunneling protocol, depending on your ISP:
How to Configure an ISP with xDSL using PPPoE
How to Configure an ISP with xDSL using PPTP
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
111
How to Configure an ISP with xDSL using PPPoE
Point-to-Point Protocol over Ethernet (PPPoE) provides an easy solution for high-speed access services by using broadband modems. Configure
an xDSL connection using PPPoE that uses the configuration parameters supplied by your ISP. PPPoE requires no special configuration to the
access network. Each PPP session learns the Ethernet address of the remote peer and creates a unique session identification (ID).
In this article:
Before you Begin
Step 1. Configure Link Properties
Step 3. Configure Authentication
Step 4. Configure Routing Settings
Step 5. Configure Connection Monitoring
Step 6. Activate Network Changes
Operating a xDSL Link in Standby Mode
Troubleshooting
Before you Begin
Connect the Ethernet port of the ISP modem to a free port of your Barracuda NG Firewall. Depending on the modem, a standard Ethernet cable
or a crossover cable must be used. Contact the ISP or vendor of the xDSL modem for more information.
Step 1. Configure Link Properties
Specify the properties for the DHCP link and define the transport protocol for PPP.
1.
2.
3.
4.
5.
6.
7.
8.
9.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select xDSL/DHCP/ISDN.
Click Lock.
Set xDSL Enabled to Yes.
In the XDSL Links table, click + to add an entry.
Enter a name for the xDSL link (no special characters) and click OK. The xDSL Links window opens.
Select the Connection Type to specify the transport protocol for PPP.
(optional) Enter the Static Local and Gateway IP address if your ISP does not assign it automatically.
Select the Ethernet Interface the xDSL modem is attached to.
PPPoA and PPPoE and Bridged Ethernet are only useable with a legacy-integrated ADSL modem.
Step 3. Configure Authentication
Most ISPs require authentication information to connect. These configuration settings are provided by your ISP. If no authentication is required,
set Authentication Method to NONE.
1.
2.
3.
4.
5.
6.
7.
8.
In the Authentication section, select the Authentication Method. Default: PAP_or_CHAP
Enter the User Access ID (PPP username) assigned by your ISP.
If provided by your ISP, enter the User Access Sub-ID. The # and @ symbols are generated automatically.
The complete user ID is formatted as follows: [user_id]#[access_sub_id]@[provider_name], e.g.,
000xxxxxxxxx520069204717#[email protected]
Enter the Access Password assigned by your ISP.
If you want to use your ISPs DNS servers, select Use ProviderDNS.
To use dynamic DNS, select Use Dynamic DNS and click Set. The Dynamic DNS Params window opens.
a. Select a dynamic DNS Service Type. For information on DynDNS service types, see http://www.dyndns.com/services/.
b. Enter the Dyn DNS Name that was registered on dyndns.org.
c. Enter the User Access ID and Password for accessing the dyndns.org service.
Click OK.
Step 4. Configure Routing Settings
Configure whether to create a default route, dynamic routing, and the route metric.
1. Set Create Default Route to YES to automatically create a default route via this xDSL connection.
2. If you are using dynamic routing protocols like OSPF/RIP/BGP, enable Advertise Route.
3. Enter a Route Metric if multiple dynamic links are available. The link with the lowest route metric is automatically chosen if more than
one default route is available.
Step 5. Configure Connection Monitoring
Configure log settings and define target IP addresses that will be regularly pinged to monitor the availability of the connection. Each target IP
address is pinged every 20 seconds (2 ICMP packets each). If there is no response, the link is re-established.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
112
1. In the Connection Monitoring section, select the Monitoring method:
LCP – If ping fails, the dial-in daemon is probed directly via LCP.
ICMP – The Barracuda NG Firewall probes the Reachable IPs and, if there is no response, the gateway.
StrictLCP – No ICMP probing occurs.
2. Enter one or more Reachable IPs to monitor the availability of the connection. The target IP addresses should only be accessible via the
xDSL connection.
3. Select the Unreachable Action to be taken if the connection cannot be established. The following options are available:
Restart – Restarts the xDSL connection.
Increase-Metric – Changes the preference for xDSL routes until the probe succeeds.
4. Click OK.
5. Click Send Changes and Activate.
Step 6. Activate Network Changes
You must activate the network changes to bring up the xDSL connection.
1. Go to CONTROL > Box.
2. In the left menu, expand the Network section and click Activate new network configuration.
3. Select Failsafe. The 'Failsafe Activation Succeeded' message is displayed after your new network configurations have been successfully
activated.
Your xDSL connection is now active and the IP address assigned by your ISP is visible on the CONTROL > Network page. All status icons next
to the ppp1 interface are green, indicating an active connection. If the xDSL connection is your primary Internet connection, the default route
pointing to the ppp1 interface is also created. If more than one default route is present, the connection with the lowest route metric is used.
Operating a xDSL Link in Standby Mode
If required, e.g., for maintenance purposes, you can enable Standby Mode in the link configuration. In standby mode, the activation and
subsequent monitoring of the link must be triggered externally. Standby mode also lets you combine HA setups for HA xDSL connections. In
standby mode,
1. The involved routes are set to pending state, and it is not checked whether they are established.
2. The configuration is completely run through, but the connection is not yet established.
Connecting is handled from the Command-Line Interface via a server-side script that is used for starting and stopping the connection with
corresponding command lines:
Start all xDSL connections - /etc/phion/dynconf/network/openxdsl start &
Stop all xDSL connections - /etc/phion/dynconf/network/openxdsl stop &
Start an explicit xDSL connection - /etc/phion/dynconf/network/openxdsl start <linkname> &
Stop an explicit xDSL connections - /etc/phion/dynconf/network/openxdsl stop <linkname> &
<linkname> is the name of the configuration entry in the xDSL Links list:
Troubleshooting
In some cases, especially in combination with PPPoE acceleration, the segment size of the packets going into the tunnel might be too big. Set the
MSS (Maximum Segment Size) to 1350 and clear DF bit to yes in the Advanced Settings tab for all access rules handling incoming and
outgoing traffic for the PPPoE connection.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
113
How to Configure an ISP with xDSL using PPTP
xDSL connections can also use the Point-to-Point Tunneling Protocol (PPTP). You can operate the xDSL connection in active or standby mode.
In standby mode, the activation and subsequent monitoring of the link must be triggered externally.
In this article:
Before you Begin
Step 1. Create a xDSL Connection
Step 2. Configure Connection Details
Step 3. Configure Authentication
Step 4. Configure Routing Settings
Step 5. Configure Connection Monitoring
Step 6. Activate Network Changes
Operating a xDSL Link in Standby Mode
Before you Begin
Connect the xDSL modem to a port on the Barracuda NG Firewall.
Verify that you have all the necessary configuration information provided to you by your ISP.
Step 1. Create a xDSL Connection
Enable xDSL and create a new xDSL connection.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select xDSL/DHCP/ISDN.
In the Configuration Mode menu, select Switch to Advanced.
Click Lock.
Enable xDSL.
In the xDSL Links table, click + to add an entry.
Enter a name for the link (no special characters) and click OK. The xDSL Links window opens.
Enable Synchronous PPP if supported by your ISP and applicable to your network environment.
Select PPTP as the Connection Type.
Enter the Static Local and Gateway IP address if your ISP does not assign it automatically.
Step 2. Configure Connection Details
Enter the PPTP configuration settings you received from your ISP.
1. Enter the Modem IP address or the IP address of the PPTP server in the PPTP Connection Details section.
2. Select the applicable option from the Local IP Selection list:
Static – The local address is used. Select, if your provider expects you to use a static IP address.
Enter the Local IP address that is used to establish a connection with the specified modem IP address. You must use a
local IP address that is already configured. This address is used for local GRE protocol registration with the local
firewall.
DHCP – Your provider first assigns a local net via DHCP through which the DSL modem is then reached. The path to the
modem is selected according to current routing.
Dynamic – The device selects the address that is provided by routing to reach the PPTP server. This address is then reported
to the firewall engine for GRE registration.
In the Required DHCP Link field, enter the name of the DHCP section that this xDSL link relies upon for providing a
routing path to the specified modem IP address.
3. Add the IP address of the gateway in the Gateway to Modem IP field if the xDSL modem or PPTP server is not directly attached to the
gateway. A gateway route will automatically be created for PPTP. This setting and the Required DHCP Link setting are mutually
exclusive.
Step 3. Configure Authentication
1. In the Authentication section, select the Authentication Method for the connection.
2. In the User Access ID field, enter the principal account name (PPP username) assigned by your provider.
3. Enter the User Access Sub-ID if provided. The # and @ symbols are generated automatically.
The complete user ID is formatted as follows: [user_id]#[access_sub_id]@[provider_name], E.g., 000xxxxxxxxx520069204
717#[email protected]
4. Enter the PPP Access Password assigned by your ISP.
5. If you want to use your ISPs DNS server, select Use ProviderDNS.
6. If you are using dynamic DNS, select Use Dynamic DNS.
a. Click Set. The Dynamic DNS Params window opens.
b.
Copyright © 2015, Barracuda Networks Inc.
6.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
114
b. Select a dynamic DNS Service Type. For information about available DynDNS service types, see http://www.dyndns.com/servic
es/.
c. Enter the Dyn DNS Name that was registered at dyndns.org.
d. Enter the User Access ID and Password for accessing the server as defined during registration at dyndns.org.
7. Click OK.
Step 4. Configure Routing Settings
Configure the routes and routing tables for the xDSL link. For PPP multilink bundles, the routing settings of the primary link are adopted for the
bundled link.
1. In the Routing section, enable Create Default Route. This automatically introduces a default route for the xDSL link.
2. If you are using dynamic routing protocols, enable Advertise Route. For more information, see OSPF/RIP/BGP.
3. Enter the Route Metric. If multiple routes to the same destination are available, the Barracuda NG Firewall selects the route with the
lowest route metric. If this route becomes unavailable, the route with the second lowest route metric is automatically selected. Default: 50
Step 5. Configure Connection Monitoring
Configure log settings and define target IP addresses that will be regularly pinged to monitor the availability of the connection. Each target IP
address is pinged every 20 seconds (2 ICMP packets each). If there is no response, the link is re-established.
1. In the Connection Monitoring section, select the Monitoring method:
LCP – If pings are not answered, the Barracuda NG Firewall uses LCP to probe the dial-in daemon directly.
ICMP – The Reachable IPs are periodically pinged - if there is no response, the gateways are probed.
StrictLCP – No ICMP probing occurs.
2. Add at least one target IP address to the Reachable IPs table. The target IP addresses must be accessible only via the xDSL
connection.
3. Select the Unreachable Action to be taken if the connection cannot be established. The following options are available:
Restart – Restarts the xDSL connection.
Increase-Metric – Increases the metric for the xDSL connection, so that a backup connection (which now has the lowest metric)
is chosen until the healthcheck targets are reachable again.
4. Click OK.
5. Click Send Changes and Activate.
Step 6. Activate Network Changes
You must activate the network changes to bring up the xDSL connection.
1. Go to CONTROL > Box.
2. In the left menu, expand the Network section and click Activate new network configuration.
3. Select Failsafe. The 'Failsafe Activation Succeeded' message is displayed after your new network configurations have been successfully
activated.
Your xDSL connection is now active and the IP address assigned by your ISP is visible on the CONTROL > Network page. All status icons next
to the ppp1 interface are green, indicating an active connection. If the xDSL connection is your primary Internet connection, the default route
pointing to the ppp1 interface is also created. If more than one default route is present, the connection with the lowest route metric is used.
Operating a xDSL Link in Standby Mode
If required, e.g., for maintenance purposes, you can enable Standby Mode in the link configuration. In standby mode, the activation and
subsequent monitoring of the link must be triggered externally. Standby mode also lets you combine HA setups for HA xDSL connections. In
standby mode,
1. The involved routes are set to pending state, and it is not checked whether they are established.
2. The configuration is completely run through, but the connection is not yet established.
Connecting is handled from the Command-Line Interface via a server-side script that is used for starting and stopping the connection with
corresponding command lines:
Start all xDSL connections - /etc/phion/dynconf/network/openxdsl start &
Stop all xDSL connections - /etc/phion/dynconf/network/openxdsl stop &
Start an explicit xDSL connection - /etc/phion/dynconf/network/openxdsl start <linkname> &
Stop an explicit xDSL connections - /etc/phion/dynconf/network/openxdsl stop <linkname> &
<linkname> is the name of the configuration entry in the xDSL Links list:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Copyright © 2015, Barracuda Networks Inc.
115
Barracuda NG Firewall 6.1 Administrator's Guide - Page
116
How to Configure an ISP with UMTS/3G
For locations without land-based Internet connection, or as a backup in case the land-based ISP connections fail, you can use a UMTS/3G
broadband modem to connect to a 3G network. Configure the connection settings and introduce a network route via the 3G WAN interface. You
can operate the UMTS link in active or standby mode. With active mode, the link is automatically brought up with the network activation process.
When operating the link in standby mode, the link is manually brought up and down by a command script.
In this article:
Before you Begin
Step 1. Configure Connection Details
Step 2. Configure Authentication
Step 3. Configure Routing Settings
Step 4. Configure Connection Monitoring
Step 5. Activate Network Changes
Operating an UMTS/3G Link in Standby Mode
Before you Begin
Connect a supported (e.g., Barracuda 3G Modem) to the USB port of the Barracuda NG Firewall.
You need the APN configurations settings for your mobile broadband provider.
(optional) PIN code to unlock your SIM card.
Step 1. Configure Connection Details
Configure the settings for your UMTS card and specify the connection details.
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select UMTS/3G.
Click Lock.
Set UMTS/3G Enabled to Yes.
To use the 3G modem as a backup connection, set Standby Mode to Yes.
Standby connections must be started by a command line script. For more information, see Operating an UMTS/3G Link in
Standby Mode.
6. Select your UMTS/3G modem from the UMTS/3G Modem Card list. E.g., Barracuda 3G Modem
7. Select the interface associated with the UMTS card from the Modem Interface list.
8. Enter the Access Point Name (APN) as suggested by your provider.
9.
10.
If your SIM card has a PIN code to unlock, enter the SIM PIN.
If required, enter the Phone Number. (Do not enter the # sign.)
If your mobile broadband provider does not assign a number that ends in 1, switch to Advanced Configuration Mode and
change the Context Identifier setting in the PDP Context section accordingly.
Step 2. Configure Authentication
Select an authentication method and enter the PPP credentials provided by your ISP. You can also set up dynamic DNS.
1.
2.
3.
4.
5.
In the Authentication section, select the Authentication Method that is used for the connection.
In the User Access ID field, enter the principal account name (PPP username) assigned to you by your provider.
If your provider assigned a sub-ID to you, enter it in the User Access Sub-ID field. Do not enter the # sign.
Enter the PPP Access Password assigned to you by your ISP.
Select Use ProviderDNS to use the DNS servers assigned by your provider. To use dynamic DNS, select Use Dynamic DNS and click
Set. The Dynamic DNS Params window opens.
a. Select a dynamic DNS Service Type. For information on DynDNS service types, see http://www.dyndns.com/services/.
b. Enter the Dyn DNS Name that was registered on dyndns.org.
c.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
117
c. Enter the User Access ID and Password for accessing the dyndns.org service.
6. Click OK.
Step 3. Configure Routing Settings
Configure the routes and routing tables for the UMTS link.
1. In the Routing section,
Disable Own Routing Table to only insert routes in the main and default tables, or
Enable Own Routing Table to use policy routing. With policy routing, a new table named 'umts1' is introduced to the main
routing table where UMTS routes are inserted.
a. To use the IP address dynamically assigned by your ISP as the source network for policy routing, select Use Assigned
IP. Until the ISP has successfully assigned an address, the rule uses 0.0.0.0 as a source address.
b. In the Source Networks table, add source networks or single hosts that will point to the 'umts1' table (IP
address/netmask notation; for a single host, enter 32 as netmask (e.g., 192.168.0.55/32).
2. Enable Create Default Route to automatically introduce the default route assigned by the provider.
When disabling Create Default Route, you must add Target Networks that are supposed to be reachable through this link.
3. Use the Remote Peer IP override mechanism if your provider does not assign a remote gateway IP address.
4. If your default route should be set dynamically when the xDSL connection is established, add 0.0.0.0/0 to the Target Networks table.
5. When the OSPF/RIP/BGP service is used, select Advertise Route.
6. Select a Trust Level to define which IP address types are counted by the firewall for traffic on this interface.
7. Enable Clone Routes to clone the dynamic routes to the main or default table if Create Default Route is disabled. This setting is useful
for setups where application-based selection (explicit binding in a firewall rule) of a traffic path is supposed to coexist with link failover
(proxy dynamic).
8. Specify a Route Metric to assign a preference number to the routes to the specified target networks or if multiple dynamic links are
available. To use your UMTS uplink as a backup connection (provider failover), enter a value larger than 0.
9. Enable GRE with Assigned IP to register the assigned IP address for IP protocol 47.
Step 4. Configure Connection Monitoring
Configure
connection monitoring by entering a list of health check targets that are only reachable through this
connection. Should the ping to these health check targets fail, the Barracuda NG Firewall will terminate and
reestablish the connection until the monitoring target IP addresses are reachable again.
1. In the Connection Monitoring section, select the Monitoring method:
LCP – If ping fails, the dial in daemon is probed directly via LCP.
ICMP – The Barracuda NG Firewall probes the Reachable IPs and. if there is no response, the gateway.
StrictLCP – No ICMP probing occurs.
2. Enter one or more Reachable IPs to monitor the availability of the connection. The target IP addresses should only be accessible via this
connection.
Do not use the Modem Error Policy setting for USB modems such as the Barracuda M10 USB modem. To reset the bus for
PCMCIA type modems on persistent error conditions, select Reset-Modem.
3. Select the Unreachable Action to be taken if the connection cannot be established. The following options are available:
Restart – Restarts the connection.
Increase-Metric – Changes the preference for UTMS/3G routes until the probe succeeds.
4. Click OK.
5. Click Send Changes and Activate.
Your UMTS/3G connection is now active and the IP address assigned by your ISP is visible on the CONTROL > Network page. All status icons
next to the ppp5 interface are green, indicating an active connection. If the UMTS/3G connection is your primary uplink, the default route pointing
to the ppp5 interface is also created. If more than one default route is present, the connection with the lowest route metric is used.
Step 5. Activate Network Changes
You must activate the network changes to bring up the xDSL connection.
1. Go to CONTROL > Box.
2. In the left menu, expand the Network section and click Activate new network configuration.
3. Select Failsafe. The 'Failsafe Activation Succeeded' message is displayed after your new network configurations have been successfully
activated.
Your xDSL connection is now active and the IP address assigned by your ISP is visible on the CONTROL > Network page. All status icons next
to the ppp1 interface are green, indicating an active connection. If the xDSL connection is your primary uplink, the default route pointing to the
ppp1 interface is also created. If more than one default route is present, the connection with the lowest route metric is used.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
118
Operating an UMTS/3G Link in Standby Mode
Enable Standby Mode in the link configuration if the UTMS/3G connection is used as a backup connection. In standby mode, the activation and
subsequent monitoring of the link must be triggered externally. Standby mode also lets you combine HA setups for HA UMTS/3G
connectio
ns.
1. The UMTS/3G routes are set to pending, and the Barracuda NG Firewall does not check whether they are established.
2. The configuration is completely run through but the connection is not yet established.
Standby connection can only be started by a command line script. Example usage:
Start UMTS connections - /etc/phion/dynconf/network/openumts start first &
Stop UMTS connections - /etc/phion/dynconf/network/openumts stop first &
To enable link operation in standby mode,
1. On the UMTS/3G page, enable Standby Mode.
2. Select Register in Standby. This accelerates the dial-in process when the link is fully activated.
3. In the UMTS/3G Connection Details, enable Active GSM Channel to register on the 3G network. No data connection is established
when registering on the 3G network.
4. Click Send Changes and Activate.
You can now use the command line scripts listed above to enable the UMTS/3G connection.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
119
How to Display the Barracuda UMTS Modem IMEI
If you want to get the IMEI and/or software version information of an attached USB UMTS modem (M10/M11), you can do so on the command
line using minicom.
Step 1. Change the Minicom Serial Port to the UMTS Modem
1. Connect to your Barracuda appliance on the shell as the root user.
2. Stop the UMTS connection with the command: [root@ng:~]# /etc/phion/bin/openumts stop
3. Start the minicom setup with the command: [root@ng:~]# minicom -s
The text-based minicom menu is displayed.
4. Select Serial port setup.
5. Select A >Serial Device and change this to /dev/ttyUSB2 or /dev/ttyUSB1 depending on which USB port the modem is connected to.
6. Press Enter.
7. Select Save setup as dfl.
8. Select Exit from Minicom.
This setting is now configured as default for minicom.
Step 2. Enter the AT Command to Display the Modem Details
1. Start minicom with the default settings:
[root@ng:~]# minicom
2. Enter the AT command:
ATI.
If you want the software version also enter
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
AT+LCTSW
The output will be shown as follows:
3. To leave minicom, press Ctrl+a and z and select q to exit.
Step 3. Restart the UMTS Connection
Restart the UMTS connection:
[root@ng:~]# /etc/phion/bin/openumts start
Copyright © 2015, Barracuda Networks Inc.
120
Barracuda NG Firewall 6.1 Administrator's Guide - Page
121
How to Configure an ISP with ISDN
The Barracuda NG Firewall supports up to four ISDN connections. The ISDN connection is initiated at startup or in Dial-On-Demand mode when
used as a backup connection.
In this article:
Before you Begin
Step 1. Create and Configure the ISDN Connection
Step 2. Configure Authentication
Step 3. Configure Connection Monitoring
Step 4. Activate Network Changes
Operating an ISDN Link in Standby Mode
Before you Begin
Verify that you have the necessary configuration information provided to you by your ISP.
Before configuring channel bonding (=mppp), verify that your provider supports this feature.
Step 1. Create and Configure the ISDN Connection
Enter the properties for the ISDN modem card and configure connection details.
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select xDSL/DHCP/ISDN.
Click Lock.
Set ISDN Enabled to Yes.
To use the ISDN modem as a backup connection, set Standby Mode to Yes.
Standby connections must be started by a command line script. For more information, see Operating an ISDN Link in Standby
Mode
6.
7.
8.
9.
10.
11.
12.
13.
Click Set next to ISDN Settings. The ISDN Settings window opens.
Select your card type from the ISDN Modem Card list.
Enter the Provider Phone Number that has been given to you by your provider.
Select the applicable Encapsulation Mode. The following modes are available:
SyncPPP (default) – Bit-oriented transfer protocol.
RawIP – No PPP; IP addresses must be specified manually. This mode can only be used with static IP addresses.
Select the Dial Mode. If set to Dial-On-Demand, specify Idle Hangup Time to automatically disable the link when it is not used
anymore.
Enable Use Channel Bonding if applicable and supported by your ISP:
a. Click Set next to Channel Bonding Settings and adjust the on-demand bandwidth allocation for the second channel.
b. Enable Use 2nd S0 Bus if a 2nd S0 is required.
c. Click Set next to Parameters for 2nd S0 Bus and configure the settings.
If you want to restrict the time when the ISDN connection can be established, set Dial Allowed From / Until.
If your ISP assigned your connection a static address, disable Dynamic Address Assignment and enter the Static IP/Mask and Static
Gateway IP address.
Step 2. Configure Authentication
Select an authentication method and enter the credentials provided by your ISP.
1.
2.
3.
4.
In the Authentication section, select the Authentication Method that is used for the connection.
Enter the User Access ID, Sub-ID, and Password assigned by your provider. Do not enter the # sign.
If required, enter the Provider Name, which is appended to your User Access ID.
Select Use ProviderDNS to use the DNS servers assigned by your provider.
5.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
122
5. When using dynamic DNS, select Use Dynamic DNS and click Set. The Dynamic DNS Params window opens.
a. Select a dynamic DNS Service Type. For information about available DynDNS service types, see http://www.dyndns.com/servic
es/.
b. Enter the Dyn DNS Name that was registered at dyndns.org.
c. Enter the User Access ID and Password for accessing the server as defined during registration at dyndns.org.
Step 3. Configure Connection Monitoring
Configure connection monitoring by entering a list of health check targets that are only reachable through this connection. Should the ping to
these health check targets fail, the Barracuda NG Firewall will terminate and reestablish the connection until the monitoring target IP addresses
are reachable again.
1. In the Connection Monitoring section, select the Monitoring method:
LCP – If ping fails, the dial-in daemon is probed directly via LCP.
ICMP – The Barracuda NG Firewall probes the Reachable IPs and, if there is no response, the gateway.
StrictLCP – No ICMP probing occurs.
2. Enter one or more Reachable IPs to monitor the availability of the connection. The target IP addresses should only be accessible via this
connection.
3. Select the Unreachable Action to be taken if the connection cannot be established. The following options are available:
Restart – Restarts the connection.
Increase-Metric – Changes the preference for ISDN routes until the probe succeeds.
4. Click OK.
5. Click Send Changes and Activate.
Step 4. Activate Network Changes
You must activate the network changes to bring up the xDSL connection.
1. Go to CONTROL > Box.
2. In the left menu, expand the Network section and click Activate new network configuration.
3. Select Failsafe. The 'Failsafe Activation Succeeded' message is displayed after your new network configurations have been successfully
activated.
Your ISDN connection is now active and the IP addresses assigned by your ISP are visible on the CONTROL > Network page. The status icons
next to the ISDN interface are green, indicating an active connection. If the ISDN connection is your primary uplink, the default route pointing to
the ISDN interface is also created. If more than one default route is present, the connection with the lowest route metric is used.
Operating an ISDN Link in Standby Mode
Enable Standby Mode in the ISDN configuration if you want to use the ISDN connection as a backup uplink. In standby mode, activation and
subsequent monitoring of the connection must be triggered externally. Standby mode also lets you combine HA setups for HA ISDN connections.
1. The ISDN routes are set to pending, and the Barracuda NG Firewall does not check whether they are established.
2. The configuration is completely run through but the connection is not yet established.
Standby connection can only be started by a command line script. Example usage:
connection start: /etc/phion/dynconf/network/isdnrestart &
connection stop: /etc/phion/dynconf/network/wipeisdn &
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
123
How to Configure Link Balancing and Failover for Multiple WAN Connections
If you are using two DHCP connections from the same carrier that is using the same remote network and gateway, see How to
Configure Automatic Failover with Dual DHCP WAN Connections using the Same Remote Gateway.
If you are using two or more ISP connections, you can use outbound link and load balancing to balance the traffic between the different Internet
connections. If one ISP goes down, the traffic will be routed over the remaining connection. Basic link failover functionality can be achieved by
using different route metrics. A better solution is to use custom connection objects to distribute the load and/or configure failover for different links.
Using custom connection objects allows you to decide on link balancing on a per-access rule basis. For this article, we assume we are using a
mix of one static and one dynamic (DHCP) Internet connection.
In this article:
Step 1. Configure the WAN Connections
Step 2. Add a Source Based Route
Step 3. Configure Link Monitoring
Step 4. Create a Custom Connection Object for Link Balancing with Failover (Fallback)
Step 5. Apply the Connection Object
Step 6. (optional) Configure Notifications
Step 1. Configure the WAN Connections
Configure your WAN connections:
For information on setting up an ISP with static IP address assignment, see How to Configure an ISP with Static IP Addresses.
For information on setting up an ISP with dynamic DHCP IP address assignment, see How to Configure an ISP with Dynamic IP
Addresses (DHCP) .
This configuration uses the following example settings for both WAN connections:
ISP
IP Address
Gateway
Network Interface
ISP 1
62.99.0.69
62.99.0.254
port 3
ISP 2
dynamically assigned
dynamically assigned
dhcp
For WAN connections with dynamic address assignment (e.g. ,DHCP), verify that you enable the settings Own Routing Table, Use Assigned IP
, Create Default Route, and Clone Routes in the configuration.
Step 2. Add a Source Based Route
Configure the source routes for both connections to avoid IP packets from being sent via the wrong ISP line. For DHCP connections, the routes
are already introduced automatically by the DHCP client. For ISP connections with static IP addresses, configure a source-based route.
1.
2.
3.
4.
5.
6.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select Routing.
Click Lock.
In the Source Based Routing section, click + to add a new route.
Enter a Name for the route and click OK.
In the Source Networks table, add the network for which the routing table is consulted., e.g., 62.99.0.0/24
7. In the Routing Table Contents section, click + to configure the route.
8. In the Target Network Address field, enter 0.0.0.0/0.
9. Select unicast as the Route Type.
10. Enter the Gateway IP address, e.g., 62.99.0.254
11.
12.
13.
14.
Click OK.
Select postmain as the Table Placement option.
Click OK.
Click Send Changes and Activate.
Step 3. Configure Link Monitoring
For the dynamic Internet connection, configure link monitoring for both routes (default and source based) to monitor IP addresses beyond the
ISP gateway.
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select xDSL/DHCP/ISDN.
In the Configuration Mode menu, select Switch to Advanced View .
Click Lock.
Edit the DHCP link.
6.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
124
6. In the Connection Monitoring section, add a target IP address to be used for monitoring into the Reachable IPs table. This address
must be reachable only via the DHCP connection.
7. Click OK.
8. Click Send Changes and Activate.
After you configure your routes, you must activate your new network configurations.
1. Go to CONTROL > Box.
2. In the left menu, expand Network and click Activate new network configuration.
3. Select Failsafe. A Network Configuration Reconfigured message will appear.
Step 4. Create a Custom Connection Object for Link Balancing with Failover (Fallback)
The Barracuda NG Firewall can perform link failover and link cycling using multiple connections. The failover and load balancing policy used in
the custom connection object defines how the traffic is routed:
Link Balancing with Fallback – Traffic is always routed over the primary uplink as long as it is available. If the main uplink fails, the
secondary uplink is used.
Random Link Balancing – Sessions are distributed randomly according to the weight of the connections. If one of the connections fails,
traffic is routed through the other available connections as defined in the connection policy.
Sequential Link Balancing – The Source IPs are sequentially cycled through, factoring in the weight defined for each uplink. The
Barracuda NG Firewall remembers the sources/destination of active sessions and will reuse the same connection if a similar connection
is established.
Create a custom connection object for link balancing and failover:
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. In the left menu, click on Connections.
4. Right-click and select New. The Edit/Create a Connection Object window opens.
5. Enter a Name for the connection object. E.g., LBFailover
6. Select From Interface as the NAT Address.
7. In the Interface Name field, enter the port the ISP 1 is connected to. E.g. , port3 or dhcp
8. In the Failover and Load Balancing section, select one load balancing/failover Policy:
a. FALLBACK (Fallback to alternative Source Addresses)
Select either Interface or source IP address for each Internet connection.
Enter the interface or source IP address for the connection.
b. SEQ (Sequentially cycle Source Addresses)
Select either Interface or source IP address for each Alternative connection.
Enter the interface or source IP address for each connection.
Enter the Weight factor. This value determines how the load is distributed between the different connections.
c. RAND (Random Source Addresses)
Select either Interface or source IP address for each Alternative connection.
Enter the interface or source IP address for each connection.
Enter the Weight factor. This value determines how the load is distributed between the different connections.
9. Click OK.
10. Click Send Changes and Activate.
Step 5. Apply the Connection Object
Use the object for all access rules handling outgoing traffic.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Edit an access rule handling outgoing traffic. E.g., LAN-2-INTERNET
4. Select the custom connection object created in Step 4 from the Connection Method list.
5. Click OK.
6. Click Send Changes and Activate.
Step 6. (optional) Configure Notifications
You can configure the Barracuda NG Firewall to send SNMP traps or email notifications in case one of the ISP connections fails. Depending on
what kind of notification you want to send, change the notification ID for:
62 (Route Changed)
64 (Route Disabled)
For more information, see Events.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
125
You are now load balancing and/or using failover for all outgoing connections, which are handled by access rules using the custom connection
object. If needed, you can define multiple custom connection objects and use them to control which ISP connections are used by a specific
network or IP address.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
126
How to Configure Automatic Failover with Dual DHCP WAN Connections using the Same
Remote Gateway
Only use this setup if you are using two WAN connections that are using the same remote network and gateway IP address . For all
other setups, see How to Configure Link Balancing and Failover for Multiple WAN Connections
When using two Internet connections from the same ISP, both links cannot be active at the same time if they are connecting to the same remote
network and using the same remote gateway IP address. Since it is not possible to have two default routes each using the same remote gateway,
the backup uplink must be used in standby mode only and used if the primary connection goes down. A second virtual server is used to monitor
the primary uplink. When the primary uplink becomes unavailable, a script is executed to activate the secondary uplink. Lowering the route metric
of the secondary uplink ensures that the backup uplink is used. When the primary uplink becomes available again (probing is successful), a script
will place the secondary uplink into standby again.
In this article:
Step 1. Configure Two DHCP Connections
Step 2. Create an Additional Virtual Server
Step 3. Create a Host Firewall Rule
Step 1. Configure Two DHCP Connections
Configure two DHCP WAN connections. For more information, see How to Configure an ISP with Dynamic IP
Addresses (DHCP).
For the primary and secondary DHCP uplink, use the following settings:
Setting
Primary DHCP Connection
Secondary DHCP Connection
Link Active
yes
yes
Standby Mode
no
yes
Route Metric
100
99
Step 2. Create an Additional Virtual Server
Create an additional virtual server and configure a monitoring policy of the virtual server to execute a custom script in case of failure / success.
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > your box.
Right-click Virtual Servers and select Create Server.
Enter a Server Name.
In the First-IP [IP1] field, enter 127.0.0.10
5. Click Next.
6. From the IP Monitoring Policy list, select all-OR-all-present.
7. In the Monitored IPs I table, add the IP address to be monitored. This is typically an IP address in the Internet or from your ISP that
indicates that a connection to the Internet is available.
8. Click Next.
9. In the Start Script field, add the following script for the secondary DHCP uplink: /epb/openxdhcp
stop <secondary
DHCP uplink name>
10. In the Stop Script field, add the following script for the secondary DHCP uplink: /epb/openxdhcp
start <secondary
DHCP uplink name>
By default, DHCP02 is the name for the uplink. In the following scripts, replace <secondary DHCP uplink name> with the
name that you specified for your secondary DHCP uplink.
11. Click Finish.
If the
monitoring IP address is available again, the virtual server starts and disables the secondary DHCP uplink by
executing the the start script.
If the monitoring IP address is unreachable, the virtual server stops and enables the secondary DHCP uplink by executing the stop script.
Step 3. Create a Host Firewall Rule
Create a Host Firewall rule to make sure that IP address probing is always done through the primary DHCP uplink (using the DHCP interface).
1. Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Host Firewall Rules.
2.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
2.
3.
4.
5.
6.
127
Click Lock.
Select the Outbound rule set on top of the rule list.
Right-click in the rule list and select New > Rule.
Select Pass as the action.
Enter a name for the rule. For example, ISP-Fallback.
7. Specify the following settings that must be matched by the traffic handled by the access rule:
Source – Select All-LocalIPs
Destination – Enter the IP address to be monitored.
Service – Select ICMP
8. In the left pane, select the Object Viewer check box. The Object Viewer window opens.
9. Open the Connections tab and create the connection object:
a. Right-click the table and select New Connection. The Edit/Create a Connection Object window opens.
b. Enter a Name for the connection object. E.g., Fallback
c. From the NAT Address list, select From Interface.
d. In the Interface Name field, enter dhcp
e. Click OK.
10. In the Edit Rule window, select the new connection object in the Connection Method section.
11. Click OK.
12. Drag and drop the new access rule in the rule set so no rule above it matches the traffic you want to forward.
13. Click Send Changes and Activate.
You can now see the active routes of the primary uplink and the pending route of the secondary uplink. If the primary uplink goes down, the
virtual server is stopped and the stop script is executed - activating the secondary uplink. When the primary connection is available again, the
virtual server executes the start script, which places the secondary link into standby mode again.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
128
How to Activate Network Changes
After changing the configuration of the network subsystem, you must activate the new network configuration. There are three types of network
activation:
Failsafe – A backup of the existing configuration is created, and the new network configuration is activated. If the connection to NG
Admin is established successfully after activation, the network activation is complete. If it fails, the network configuration is reverted to
the previously working state. During activation in failsafe mode, the whole network system is shut down and the Barracuda NG Firewall is
briefly unreachable. All active connections are terminated.
Force – In this activation mode, the new network configuration is activated without making a backup of the old configuration. If the new
network configuration does not work, there is no fallback mechanism. During activation in Force mode, the whole network system is shut
down and the Barracuda NG Firewall is briefly unreachable. All active connections are terminated.
Soft – Only use the Soft activation mode to add a route to an existing network configuration. All other network configuration changes
cannot be activated in Soft mode. During activation in this mode, the network system is not shut down and firewall connections are not
interrupted.
Alternatively, you can soft activate a new network configuration and reboot the Barracuda NG Firewall or NG Control Center for the network
configuration changes to take effect.
Activate the Network Configuration
1. Go to CONTROL > Box.
2. In the left menu, expand the Network section and click Activate new network configuration.
3. Click on the desired activation mode.
After activation, the network may briefly show an error state until all connections are established.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
129
Routing
Routing tables are used to store the best path to a remote network. The Barracuda NG Firewall uses the routing tables to forward traffic to the
correct interfaces, next hop gateways, or VPN tunnels. Routes are first evaluated by destination, route metric (preference) and. optionally, source
address of an IP packet and then by the scope (network size) to determine which routes matches. Two routes of the same scope (e.g., /24) and
metric can not be created. The Management IP address always uses a preference of 0.
If two routes with different preferences exist, the route with the lower preference is chosen. E.g., 10.0.10.0/25 (preference 10) is
preferred over 10.0.10.0/25 (preference 100)
If two routes with the same preference exist to a destination the route with the smaller subnet mask is used. E.g., 10.0.10.0/24 is
preferred over 10.0.0.0/16
VPN routes are source-based routes by default. If single routing table is enabled in the VPN Settings, VPN routes are inserted with a
preference of 10. For more information, see Authentication, Encryption, Transport, and VPN Routing.
Directly Attached Network Routes (Direct Routing)
Gateway Routes (Next Hop Routing)
Multipath Routing
Source-Based Routes (Policy Based Routing)
Directly Attached Network Routes (Direct Routing)
Define how to reach networks that are directly plugged in to a port (virtual or physical) of the Barracuda NG Firewall. To define a directly attached
network route, you must enter:
Target network in CIDR Format – E.g., 172.16.0.0/24
Interface – The network interface on the Barracuda NG Firewall the network is attached to. E.g., eth2 or port 2
After you have introduced the directly attached route and activated the network, the route is in a pending state. Pending routes are marked with
the
icon in CONTROL > Network and are not active. When an suitable source network address (virtual server IP or additional IP address
on box level) has been introduced, the route becomes active and the
icon is displayed for the route.
In the example above, you must create a direct route for the ISP issued 62.99.0.0/24. To reach the Internet, a gateway route (see below) must be
created. If you enter the optional gateway IP address when creating the direct attached route, the default gateway route is created automatically.
You do not need to create a directly attached route for the network the management IP address is in. This route is created automatically when the
management IP address is configured.
For setup instructions, see How to Configure Direct Routes.
Gateway Routes (Next Hop Routing)
To reach networks that cannot be directly accessed, you must define gateway routes. A common gateway route is the default route (0.0.0.0/0),
which will forward all packets not belonging to one of the trusted networks to the remote gateway provided by the ISP. Before adding a gateway
route, a direct route must be configured. Otherwise, you cannot contact the next hop IP address. To define a gateway route, you must enter:
Target network – Target network in CIDR format. E.g., 0.0.0.0/0 for the default route
Next hop address – IP Address of the gateway device the traffic is sent to. E.g., 62.99.0.254
After adding the gateway route, you must initiate a Soft network activation for the route to become active (
n CONTROL > Network)
For setup instructions, see How to Configure Gateway Routes.
Multipath Routing
The Barracuda NG Firewall supports standard Linux multipath routing and Firewall-assisted multipath routing. Standard Linux multipath routing
balances does not offer dead next hop detection or session packet balancing. Simple redundancy by next hop detection can be provided by
adding multiple routing entries with different route preference numbers. Firewall-assisted multipath routing supports per packet balancing
between next hops and dead next peer detection and is configured in the Forwarding Firewall service.
Copyright © 2015, Barracuda Networks Inc.
i
Barracuda NG Firewall 6.1 Administrator's Guide - Page
130
For setup instructions, see:
How to Configure Multipath Routing
How to Configure Linux Standard Multipath Routing
Source-Based Routes (Policy Based Routing)
Source-based or policy routing is a way to implement more complex routing scenarios. The implementation provided by the Barracuda
NG Firewall only uses a subset of the functional scope of policy routing. The source address used to establish a connection determines whether
or not a routing table is consulted.
Because the firewall configuration (on a per rule basis) lets you specify the address with which an allowed connection is established, policy
routing represents an extremely powerful instrument to manage routing on the NG Firewall in complex topologies. VPN tunnels make use of
policy routing.
Policy routing rules assign an IP address range (source addresses) to a named routing table. These rules are organized in an ordered list, so that
each rule is associated with a preference number. Routing decisions are made by evaluating the ruleset starting with lowest preference number
rule. The first ruleset (route table) that matches the source IP address is chosen. If a matching route to the desired destination address is found in
the table, the route is applied. Otherwise, the Barracuda NG Firewall continues to evaluate the routing tables (rules) until a match is found. If none
of the rules match, the destination is unreachable.
For setup instructions, see How to Configure Source-Based Routes.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
131
How to Add a Direct Attached Route
Direct attached routes are routing entries for network that can be reached from an interface of the Barracuda NG Firewall without having to use a
next hop gateway.
In this article:
Before you Begin
Step 1. Configure a Direct Route
Step 2. Activate the Network Configuration
Next Steps
Before you Begin
Connect the network to a port of the Barracuda NG Firewall. Do not use the management port.
Step 1. Configure a Direct Route
Add a route for the direct attached network.
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, click Routing.
Click Lock.
In the Routes table, click + to add a route:
Name – Enter a name.
Target Network Address – Enter the network in CIDR format. E.g., 62.99.0.0/24
Route Type – Select direct attached network.
Interface Name – Select the interface you used to connect to the network. E..g, eth1
Trust Level – Select the trust level. Your network will automatically be connected to the corresponding network objects. Use Un
trusted for WAN connections, Trusted for LAN connections.
(optional) Advertise Route – To propagate this network route via the OSPF/RIP/BGP service, select Yes. For more
information, see Dynamic Routing Protocols (OSPF/RIP/BGP)
5. Click OK.
6. Click Send Changes and Activate.
Step 2. Activate the Network Configuration
After you have configured the network route, you must activate your new network configuration.
1. Go to CONTROL > Box.
2. In the left menu, expand Network and click Activate new network configuration.
3. Select Soft. The Soft Activation Succeeded message is displayed after your new network configurations have been successfully
activated.
The direct attached route is now displayed as pending on the CONTROL > Network page. To make the route active, you must use one of the IP
addresses in the network as a virtual server IP address (default) or as an additional IP address (remote units).
Next Steps
Default: You must use at least one IP address from the network as a virtual server IP address. If you are using a high availability
setup, these virtual server IP addresses will be transferred to the secondary NG Firewall in case of a failure.
In case of remote access: If you are using the Barracuda NG Firewall via remote management tunnel, add the IP address to the Additi
onal IP addresses (CONFIGURATION > Configuration Tree > Box > Network). IP addresses assigned on box level are not synced to
the HA partner. When using the IP address on box level, the route will remain active even if the virtual server is running on the other NG
Firewall in the HA cluster.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
132
How to Configure Gateway Routes
Gateway routes are defined for all networks that are not directly attached to a port of the Barracuda NG Firewall. The Barracuda NG Firewall will
forward all traffic with the configured destination to the gateway (next hop) IP address specified in the gateway route. For example the default
route (0.0.0.0/0), which will route all traffic to the ISP gateway IP address is a gateway route.
Step 1. Configure a Gateway Route
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Network.
From the Configuration menu in the left navigation pane, click Routing.
Click Lock.
In the Routes table click + to add a gateway route:
Name – Enter a name.
Target Network Address – Enter the network in CIDR format. E.g., 0.0.0.0/0 for the default route
Route Type – Select gateway.
Gateway – The gateway IP address. E.g., 62.99.0.254
Trust Level – Select the trust level. Use Untrusted for WAN connections,
(optional) Advertise Route – To propagate this network route via the dynamic routing service, select Yes. For more
information, see Dynamic Routing Proctocols (OSPF/RIP/BGP)
5. Click OK.
6. Click Send Changes and Activate.
Step 2. Activate the Network Configuration
After you have configured the network route, you must execute your new network configuration.
1. Go to CONTROL > Box.
2. In the left menu, expand Network and click Activate new network configuration.
3. Select Soft. The "Soft Activation Succeeded" message is displayed after your new network configurations have been successfully
activated.
The gateway route is now active on the CONTROL > Network page. If the remote gateway no longer answers ARP request, the route is placed
in a pending state until the gateway is reachable again.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
133
How to Configure Source-Based Routes
Source-based routing, often referred to as policy routing, is used when the source IP address of the connection determines, in part or completely,
which route is used. Source-based routing can be used to ensure that traffic is sent via a specific connection. For each source-based routing
entry, a routing table for that specific IP address/network is created and consulted when traffic from that network comes in.
Step 1. Create a Source-Based Route
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, click Routing.
Click Lock.
In the Source Based Routing section, add or edit an entry for your route in the Routing Rules table:
a. Name – Enter a name. E.g., route1
b. Source Networks – Add the source IP address or network. E.g., 10.0.10.0/24
c. Routes – Click + to add a route table entry for the source network.
Target Network Address – Enter the target network IP address. E.g., 0.0.0.0/0
Route Type – Select unicast, multipath or throw. If throw is selected, the route lookup will end once the first matching
route is found.
Gateway (only for unicast routes) – Enter the IP address of the remote gateway.
Multipath Gateway (only for multicast routes) – Enter the Multipath Gateway and Weight Number (Metric) for each
route.
Packet Load Balancing (only for multicast routes) – If needed, enable packet load balancing.
Route Metric (only for unicast routes) – Enter the route metric for the gateway route.
Advertise Route – Select YES if you want to use dynamic routing service. For more information, see Dynamic Routing
Protocols (OSPF/RIP/BGP).
5. Select where the route table is placed, before (premain) or after (postmain) the main routing table.
6. Click OK.
7. Click Send Changes and Activate.
Step 2. Activate the New Network Configuration
After you have configured the network route, you must execute your new network configurations.
1. Go to CONTROL > Box.
2. In the left navigation pane, expand Network and then click Activate new network configuration.
3. Select Failsafe. The Failsafe Activation Succeeded message is displayed after your new network configurations have been
successfully activated.
4. Click OK.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
134
How to Configure Linux Standard Multipath Routing
Barracuda Networks recommends using ACPF-assisted multipath routing. For more information, see How to Configure Multipath
Routing.
The Barracuda NG Firewall supports Linux standard multipath routing. Simple redundancy by next hop detection is provided by adding multiple
routing entries with different route metrics. Linux-based standard multipath routing provides source IP-based balancing between next hops. Once
the source destination combination is in the routing cache, this combination will stay on the selected next hop IP address. For dead next hop
detection per ARP request or session packet balancing, use ACPF-assisted multipath routing.
Step 1. Add a Linux Standard Multipath Route
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, click on Routing.
In the left menu, expand Configuration Mode and click on Switch to Advanced Mode.
Add an entry to the Routes table.
Enter the Target Network Address. E.g., 192.168.100.0/24
6. Click + to add Multipath Gateways and provide the following Information:
Multipath Gateway – Next hop IP address of the multipath route.
Weight Number – Weight number of path (valid range from 1 - 100).
Assigned Source IP – The assigned source IP address.
7. Click OK.
8. Click Send Changes and Activate.
Step 2. Activate Network Configuration
1.
2.
3.
4.
Go to CONTROL > Box.
In the left menu, expand Network and click Activate new network configuration. The Activate Network window opens.
Click Soft. The Activation Succeeded window opens.
Click OK.
Open the CONTROL > Network page. If a green icon (
) is displayed in the first column for the multipath route, the route is active.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
135
How to Change the Management IP Address
When deploying the Barracuda NG Firewall in your network, you might have to change its management IP (MIP) address. After changing the
management IP address, you must activate the new network configuration.
Step 1. Change the MIP Address
Change the management IP address to match your existing network addresses.
1.
2.
3.
4.
5.
6.
7.
Go to CONFIGURATION > Configuration Tree > Box > Network.
Click Lock.
In the Management IP and Network section, enter the new Management IP (MIP).
Select the Associated Netmask for your network from the list.
(optional) Set Responds to Ping to yes.
Set Use for NTPd to yes.
Click Send Changes and Activate.
Step 2. (optional) Change or Add Gateway Route
If the client from which you are connecting to the Barracuda NG Firewall is not in the same network as the Barracuda NG Firewall, you must
create or change a gateway route to be able to access the Barracuda NG Firewall after changing the management IP address. You do not need
to add a route if your client is in the same network as the new management IP address.
For more information, see How to Configure Gateway Routes.
Step 3. Network Activation
After you create or change basic network configurations, you must activate your new network configuration:
1.
2.
3.
4.
Go to CONTROL > Box.
In the left menu, expand the Network section and click Activate new network configuration.
Select Force. The 'Force Activation Succeeded' message is displayed after your new network configuration has been activated.
Restart Barracuda NG Admin.
A few moments after activating your network configuration changes, you will be able to log into the Barracuda NG Firewall with the new MIP
address. If you are using a static IP, verify that the management PC can reach the new MIP.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
136
How to Use IPv6
The Barracuda NG Firewall supports IPv6 along with its predecessor IPv4. By default, IPv6 is disabled and only traffic from IPv4 networks is
accepted. When IPv6 is enabled, the Barracuda NG Firewall accepts both IPv4 and IPv6 traffic. IPv6 addresses can only be used via NG Admin
and not via command line tools. To configure IPv6 services, you must first assign IPv6 addresses to the interfaces. IPv6 is supported for the
following services:
Firewall Service
Virus Scanner
DNS Service
DHCP Service
DHCP Relay
Dynamic Routing: OSPF/RIP/BGP
SNMP Service
Mail Gateway
NG Firewall Management
In this article:
IPv6 Advantages and Address Notation
Enabling IPv6
Assigning IPv6 Addresses
IPv6 Advantages and Address Notation
The main advantage of IPv6 is that it provides a larger address space than IPv4.
IPv6 uses 128-bit IP addresses, compared to 32-bit IP addresses used by IPv4.
IPv6 supports varied addressing types (unicast, anycast, multicast, link-local, sitelocal, and global).
IPv6 addresses can be associated with one or more interfaces.
IPv6 addresses are represented as eight 16-bit hexadecimal blocks separated by colons (:).
For example:
FEDC:0000:0000:0000:FEDC:E4BF:0100:0010
You can omit leading zeros within each 16-bit hexadecimal block. For example, you can write 0 instead of 0000, 100 instead of 0100, and 10 inst
ead of 0010. You can compress the zeros further with double colons (::). However, you can only use double colons once to compress an IPv6
address, either in the beginning, middle, or end of the address.
For example:
FEDC::FEDC:E4BF:100:10 is equivalent to FEDC:0000:0000:0000:FEDC:E4BF:100:10
Enabling IPv6
By default, IPv6 is disabled. To enable IPv6:
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Network.
Click Lock.
In the IPv6 section, set Enable IPv6 to Yes.
Reboot your Barracuda NG Firewall.
To synchronize the IPv6 configuration for Barracuda NG Firewalls that are part of a cluster in the Barracuda NG Control Center, you
must enable IPv6 on all of the systems in the cluster.
Assigning IPv6 Addresses
Before configuring IPv6 services, you must assign IPv6 addresses to the interfaces.
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select IP Configuration.
Click Lock.
From the Configuration Mode menu in the left navigation pane, click Switch to Advanced View.
In the Additional IPv6 Addresses table, add an entry for the interface. In the entry settings, specify the interface name and its IPv6
address.
6. Click Send Changes and Activate.
7. Activate the network changes on the CONTROL > Box page.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
You can now connect to an IPv6 network.
Copyright © 2015, Barracuda Networks Inc.
137
Barracuda NG Firewall 6.1 Administrator's Guide - Page
138
How to Make a Barracuda NG Firewall Centrally Manageable Without a
Barracuda NG Control Center
If you are managing only one or two remote Barracuda NG Firewalls and are not using a Barracuda NG Control Center, use Site-to-Site VPN
tunnels to securely manage the remote units. Exchange the box certificates to authenticate the Site-to-Site VPN tunnel.
In this article:
Step 1. Export the Public Key
Step 2. Configure a Site-to-Site Tunnel at the VPN Server Peer
Step 3. Configure Remote Access
Step 1. Export the Public Key
Export the box identification certificate from the remote box. The certificate is used to authenticate the remote Barracuda NG Firewall.
1. Go to CONFIGURATION > Configuration Tree > Box > Identity.
2. From Box Private Key, click Ex/Import and select Export Public to Clipboard.
Step 2. Configure a Site-to-Site Tunnel at the VPN Server Peer
Configure the Site-to-Site VPN tunnel on the central unit. The remote management tunnel is a site-to-site tunnel.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > VPN-Service >
Site to Site.
2. Click Lock.
3. Right-click the table and select New TINA tunnel.
4. Enter a name for the tunnel.
5. Under the Local Networks tab, select Passive from the Call Direction list.
6. In the Network Address section, enter the LAN and any other connected private subnets you wish to connect from, and click Add.
7. Click the Local tab.
8. In the IP Address or Interface used section, select or enter the external IP address which the remote box will connect to (reference: first
or second server IP, or select Explicit List (ordered) and enter below).
9. Click the Peer Identification tab.
10. From Public Key, click Ex/Import and select Import from Clipboard.
If necessary, change Identity > Identification Type: Public Key.
11. Click the Identify tab.
12. From the Server Protocol Key list, click Ex/Import and select an RSA key or create a new key.
Keys in the dropdown menu are created/imported under VPN Settings > Service Certificates/Keys.
13. In the Server Protocol Key section, export the public key to clipboard.
14. Click the Remote tab.
15. In the Remote Peer IP Addresses field, enter either 0.0.0.0/0 (if the remote partner uses a dynamic IP), or the external IP of the remote
partner (if static), and click Add.
16. Click the Remote Networks tab.
17. Choose a free IP address for your virtual IP (VIP) address, enter this address in the Remote Network section, and click Add.
The VIP may be either routed (it is within a network range not used on either local or remote sites) or it may be part of the local
LAN connected to your central firewall. In this case, you must create a Proxy ARP to be able to connect (see: How to Create
Proxy ARP Objects). Do not use the remote Management IP from the remote LAN.
18. Click OK.
19. Click Send Changes and Activate.
For more information about TINA tunnels, see How to Create a TINA VPN Tunnel between Barracuda NG Firewalls.
Step 3. Configure Remote Access
Configure the remote partner to connect to the central firewall:
1.
2.
3.
4.
5.
6.
7.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select Management Access.
In the left menu, expand Configuration Mode, and click Switch to Advanced.
Click Lock.
From the Enable Tunnel list, select yes.
In the Virtual IP (VIP) field, enter the VIP address chosen in Step 2.17.
From Tunnel Details, click Set.
a. From VPN Server Key, click Ex/Import and select Import from Clipboard.
b.
Copyright © 2015, Barracuda Networks Inc.
7.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
139
b. In the VPN Server table, add the point of entry to reach the central gateway (defined under step 2.8).
c. In the Remote Networks table, add the remote LANs (defined under step 2.7).
d. Add an IP address of the central firewall to the list of Reachable IPs. This IP address will be used as probing target to keep the
tunnel alive. If no probing target is defined, the tunnel will be restarted periodically.
8. Click OK.
9. Click Send Changes and Activate.
Go to VPN > Status and verify that the site-to-site tunnel is ACTIVE in the state column.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
140
How to Configure VLANs
VLANs allow you to split one physical network interface (with one MAC address) into several virtual LANs. The physical interface behaves like
several interfaces, and the switch behaves like multiple switches. VLANs are useful when not enough network interfaces exist on the unit. The
Barracuda NG can use up to 256 VLANs on one physical network interface and a maximum of 4096 VLANs globally. The VLAN interfaces are
named <physical interface>.<VLAN id> (e.g., eth2.200). Only tagged traffic is handled by the Firewall - traffic on the physical interface is
discarded. You must use a properly configured 802.1q VLAN capable switch and NICs that use one of the following kernel modules that are
capable of 802.1q VLAN tagging on the Barracuda NG Firewall:
The interface label is formatted as <interface-name>.<VLAN ID>:<Virtual Server Name>. Verify that the length of the label does not
exceed 15 characters. E.g., port10.1111:S01 would be a valid 15 character interface label.
Intel 100 MBit:
Intel 100 MBit Driver by Intel (e100.o)
Intel 100 MBit Driver by Intel (certified by Compaq) (e100compaq.o)
Intel 1000 MBit:
Intel 1000 MBit Driver by Intel (e1000.o)
Intel 1000 MBit Driver by Intel (e1000e.o)
Intel 1000 MBit PCI-e Driver by Intel (igb.o)
Intel 10000 MBit:
Intel 10000 MBit Driver by Intel (ixgb.o)
Intel 10000 MBit PCI-e Driver by Intel (ixgbe.o)
Broadcom 1000 MBit:
Broadcom 1000 MBit Netextreme I Driver (tg3.o)
Broadcom 1000 MBit Netextreme II Driver (bnx2.o)
Realtek:
Realtek RLT8139 (8139too.o)
VMware:
VMXnet3 (vmxnet3.o)
KVM
virtio (virtio.o, virtio-net.o)
In this article:
Step 1. Add a VLAN interface
Step 2. Create a Direct Route for the VLAN
Step 3. Activate the New Network Configuration
Next Steps
Step 1. Add a VLAN interface
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select Virtual LANs.
Click Lock.
Add an entry in the VLAN table:
Name – Enter a name and click OK.
Physical VLAN Interface – Select the physical interface that will host the VLAN. E.g., eth2
VLAN Tag – Enter the VLAN tag that was configured on the switch port the physical interface is plugged in to. E.g., 200
Header Reordering – This setting makes the virtual interface seem like a real Ethernet interface. Keep disabled for better
performance. Enable if you are experiencing problems with network services, such as DHCP running in the VLAN.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
141
5. Click OK.
6. Click Send Changes and Activate.
Step 2. Create a Direct Route for the VLAN
Add a direct attached route for the VLAN network.
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select Routing.
Click Lock.
In the Routes table, add an entry for the VLAN route. Specify the following settings:
Target Network Address – Enter the network used on the VLAN. E.g.,192.168.8.10
Route Type – Select directly attached network.
Interface Name – Select the virtual interface matching the VLAN and target network address. E.g., eth2.200
5. Click OK.
6. Click Send Changes and Activate.
Step 3. Activate the New Network Configuration
If you activate the network in failsafe mode, a short network interruption occurs, which may require a maintenance window. It is possible to carry
out the network activation for VLAN interfaces without interruption by using the command line.
Failsafe activation with temporary network connectivity disruption:
1.
2.
3.
4.
Go to CONTROL > Box.
In the left navigation pane, expand Network and then click Activate new network configuration.
Select the Failsafe mode.
To verify that the VLAN interface and its pending direct route were successfully introduced, go to CONTROL > Network.
Soft activation without temporary network connectivity disruption:
1. Change to the command-line interface and execute the following commands for each configured VLAN on device eth<n> with
corresponding <VLAN-ID>:
/etc/phion/bin/vconfig add eth<n> <VLAN-ID>
ip link set eth<n>.<VLAN-ID> up
2. Activate the network configuration by clicking the Soft activate button.
Next Steps
The virtual network interfaces can be used just like physical network interfaces. The virtual network interfaces are now listed on the CONTROL >
Network page. If you want to combine VLANs and bridging, see Bridging.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
142
How to Add Additional Network Interfaces
When you add network modules to Barracuda appliances or virtual network adapters to virtual systems, you must add these network interfaces to
the network configuration of your Barracuda NG Firewall. Every Barracuda NG Firewall model has its own set of interface names (naming eth<n>,
port<n>, LAN<n>, etc.). You must have the product and model configured correctly in the Box Properties configuration before adding additional
network interfaces. Hardware appliances are automatically configured with the correct network interfaces.
When adding additional network interfaces to a Barracuda NG Firewall Vx on a VMware hypervisor, check the order of the network
adapters after rebooting. You may have to change the assigned virtual switch in the VMware configuration if the new network adapter
has not been placed last in the configuration.
In this article:
Before you Begin
Step 1. Add Network Interface(s)
Step 2. Activate Network Changes
Interface Parameters Description
Before you Begin
Find out which network driver is needed for your network adapter/interface.
Step 1. Add Network Interface(s)
Add the additional network interfaces to the Barracuda NG Firewall.
1.
2.
3.
4.
5.
6.
7.
8.
9.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left pane, click Interfaces.
Expand the Configuration Mode menu, and then click Switch to Advanced.
Click Lock.
In the Network Interface Cards table, add or edit an entry for the NIC. For more information on the NIC settings, see the following Interf
ace Settings section.
To dynamically update the settings in the Physical Interfaces table, select yes from the Interface Computation list. The physical
interface settings are updated whenever the network configuration is changed. Otherwise, you must manually update settings.
In the Physical Interfaces table, add or edit an entry for your physical interface. For more information on the physical interface settings,
see the following Interface Settings section.
In the Internal Interface Configuration table, add loopback equivalent devices.
Click Send Changes and Activate.
Step 2. Activate Network Changes
You must activate the network changes to add the network devices.
1. Go to CONTROL > Box.
2. In the left menu, expand the Network section and click Activate new network configuration.
3. Select Failsafe. The 'Failsafe Activation Succeeded' message is displayed after your new network configurations have been successfully
activated.
The Barracuda NG Firewall can now send traffic over the new network interfaces.
Interface Parameters Description
Network Interface Cards Table
Descriptions of the settings that you can configure in the Network Interface Cards table:
Setting
Description
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Driver Module Name
143
The driver that is used for the NIC. Only recommended cards are
listed. If you require a card that is not listed, see the list of supported
NICs to verify that your card is supported. To manually enter the card
name, select the Other check box and enter the card name in the Dri
ver Module Name field.
If you are using a Marvel network adapter that requires the
sk98lin_cb.o interface, interface naming must begin with
eth1. The eth0 interface is NOT supported.
Number of Interfaces
The number of NIC interfaces that can be used simultaneously. This
indicates the number of ports and not the number of cards of the
particular type. For example, one dual-port NIC counts as two
interfaces, but one combo-type card with support for three different
connectors (for example, BNC, AUI, RJ45) counts as one because
only one connection is active at one time. If you enter 0, the module
is not loaded.
Driver Options
(Advanced Configuration Mode)
This setting is used with module-based driver support. Note that
several interface-specific option strings may be added to this table.
They are formatted as:
key=value1 … valueN
with N being the number of interfaces.
Fallback Enabled
(Advanced Configuration Mode)
(Advanced Configuration Mode) Activates an alternative NIC driver
that is defined via the Fallback Module Name and Fallback Driver
Options settings. This setting might be helpful during and after
updating sequences. If the primary driver does not work, the fallback
driver is used. If the fallback driver does not work, both drivers are
loaded.
Fallback Module Name/Fallback Driver Options
(Advanced Configuration Mode)
(Advanced Configuration Mode) The fallback driver to be used for
the NIC. Only recommended cards are listed. If you require a card
that is not listed, see the list of supported NICs to verify that your
card is supported.
Activate Driver
Enable or disable the driver.
NIC Type
NIC type. This information is used for logical consistency checks. In
conjunction with the specified number of interfaces, it is possible to
check whether a particular interface may be referenced in some of
the other sections. Available NICs: Ethernet.
Driver Type
(Advanced Configuration Mode)
(Advanced Configuration Mode) Specifies if driver support is
module-based or kernel-based. Default is Loadable_Module.
Ethernet MTU
The MTU size for an Ethernet NIC. Packets exceeding this value are
fragmented when sent. This MTU is used as the default value for all
existing interfaces. To specify an MTU for an interface, edit its MTU s
etting in the Physical Interfaces table.
MTUs can also be set for virtual LANs, box network, additional
networks, and standard routing. The maximum accepted MTU of the
next hop is used.
Example 1: If you have a NIC with MTU size 1500 and a
Standard Route with MTU size 2000, the valid MTU size is 1500.
Example 2: If you have a NIC with MTU size 2000 and a
Standard Route with MTU size 1500, the valid MTU size is 1500.
Physical Interfaces Table
Setting
MTU
Description
The MTU for the interface. This setting overrides the MTU that is
entered in the Network Interface Cards table.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Availability
144
If nothing else has been configured, all recognized interfaces are
generally available by default. Interfaces can be claimed for exclusive
use by xDSL (Connection Type: PPPOE) and DHCP links (see How
to Configure an ISP with Dynamic IP Addresses (DHCP)). When an
interface has been claimed as Modem Interface or DHCP Interface,
its usage is set to status Reserved. If an interface is claimed by
multiple services concurrently, its usage status is set to Overbooked.
Interfaces marked as overbooked cannot work properly.
They will not be available for any of the configured
services.
References
An interface that has not been claimed by a service is flagged with n
one. Interfaces claimed by xDSL or DHCP links are flagged with xdsl
or dhcp, respectively, followed by the link name as specified in the
xDSL/DHCP configuration area when creating the link. For example,
xdsl::xDSLLinkName.
Name of NIC
The NIC name as specified in the Network Interface Cards table.
NIC Type
The NIC type as specified in the Network Interface Cards table.
Used Driver
The driver module driver name as defined in the Network Interface
Cards table.
Enable Autonegotiation
If the driver module does not support static network speed and
duplex mode settings, select no in order to manually enter these
settings. Speed and duplex mode options that cannot be steered
through the NIC driver are manually set to a static value via the
ethtool utility.
Forced Speed [Mpbs]
The static network speed for the NIC. To manually set the forced
speed, enable autonegotation and select 10, 100, or 1000 Mbps.
Duplex Mode
The static duplex mode for the NIC. To manually set the duplex
mode, enable autonegotation and select half or full.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
145
How to Configure Ethernet Bundles
Ethernet bundles combine multiple physical ports to a single virtual link to increase the physical bandwidth available for the connection. You also
increase the fault tolerance of the Ethernet link because the connection will continue to work even if one link fails. The Ethernet bundles feature is
also known as "Etherchannels," "Link Aggregation", "Trunking," or "Bonding" depending on the vendor. You can create a maximum of 16
Ethernet bundles on a Barracuda NG Firewall. Ethernet bundles can be operated in one of the following modes:
Balance-RR – In this mode (round-robin policy), as many configured slave interfaces as possible are activated. The kernel will distribute
network traffic sent to the master interface sequentially to all slave interfaces involved. In a similar fashion, inbound traffic to any of the
slave interfaces is directed to the master interface.
Active Backup – In this mode (active backup policy), at least two interfaces are required with only a single slave interface being active at
any one time. A prolonged failure of the link check on the active interface will trigger the activation of a backup slave interface. Only the
link status is monitored, not if actual traffic can be transmitted over the connection.
Balance-XOR – Link is chosen by calculating the hash out of the source/destination MAC (Layer 2) combined with the IP addresses
(Level 3). Depending on the hash, a interface is selected. This ensures that sessions from the same interface always use the same link
from the Ethernet bundle.
Broadcast – Everything is transmitted on all slave interfaces.
802.3ad Link Aggregation – Uses the LACPDU protocol to negotiate automatic bundling links. The directly connected devices must
also support LACPDU.
In this article:
Step 1. Configure an Ethernet Bundle
Step 2. Activate the Network Configuration
Next Steps
Step 1. Configure an Ethernet Bundle
Create the virtual bond interface and add the physical network interfaces. You must also choose the operations mode.
1.
2.
3.
4.
5.
6.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, select Ethernet Bundles.
Click Lock.
In the Ethernet Bundles table, click +.
Enter a descriptive Name.
Click OK. The Ethernet Bundles window opens. Specify the following settings:
Bundled Interface – Select a bond interface. E.g., bond0
Bundled Interfaces – Click + and double-click the physical interfaces you want to include in the Ethernet bundle.
Operation Mode – Select how traffic is distributed between the interfaces.
LACPDU Packet Rate (802.3ad Link Aggregation only) – Select how fast (every second) or slow (every 30seconds) LACPDU
packets are sent to the switch.
Hashing Policy (802.3ad Link Aggregation only) – Select how traffic is split over the slave links.
Layer2 – Selects the link based on destination MAC addresses.
Layer2+3 – Uses a mix of MAC addresses and IP addresses and, thus, also works for routed traffic. Traffic to the same
IP address always ends up on the same link.
Link Check Mode – Select if the link availability is checked in Compatibility (default) or Efficiency mode.
Link Check (ms) – Enter the interval in milliseconds for checking the link state of the slave interfaces. Default: 100msec
Activation Lag(ms) – Enter the time in milliseconds to delay the activation of a backup slave interface. Has to be a multiple of
the link check interval.
Deactivation Lag (ms) – Enter the time in milliseconds to delay the deactivation of a link. It has to be a multiple of the link check
interval.
7. Click OK.
8. Click Send Changes and Activate.
Step 2. Activate the Network Configuration
Complete the network activation to activate the new Ethernet bundle interface.
1. Go to CONTROL > Box.
2. In the left menu, expand the Network section and click Activate new network configuration.
3. Select Failsafe. The 'Failsafe Activation Succeeded' message is displayed after your new network configurations have been successfully
activated.
Next Steps
Go to CONTROL > Network and verify that the bond0 interface is listed and active (
Copyright © 2015, Barracuda Networks Inc.
).
Barracuda NG Firewall 6.1 Administrator's Guide - Page
146
Advanced Networking in the Azure Cloud
Missing the language English in this article! Please add the language, otherwise this article can not be displayed properly.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
147
How to Configure IP Tunneling
In most cases it is better to use Site-to-Site VPN tunnels instead of IP tunnels.
You can introduce simple point-to-point tunnels with generic routing (GRE) or plain IP in IP encapsulation. IP tunnels are established at the box
level and do not support peer authentication or encryption.
In this article:
Configure an IP Tunnel
IP Tunnel Settings
Configure an IP Tunnel
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, expand Configuration Mode and click Switch to Advanced.
In the left menu, click IP Tunneling.
Click Lock .
In the Tunnel Configuration table, click + to add an IP tunnel.
Enter a Name.
Click OK. The Tunnel Configuration window opens.
Enter the IP tunnel settings. For more information on the settings, see the IP Tunnel Settings section below.
Click OK.
Click Send Changes and then click Activate .
IP Tunnel Settings
Setting
Description
Encapsulation
Mode
The encapsulation mode for the tunnel. You can select:
Tunnel TTL
(Optional) The TTL for encapsulated tunnel traffic. To use the
standard behavior of TTL inherit and Nopmtudisc (no path MTU
discovery), leave this field blank.
Set Multicast Flag
To set the multicast flag for the tunnel interface, select yes.
Source IP Type
The source IP type. You can select:
GRE(47) – Default mode. Generic routing encapsulation.
IPinIP(4) – Plain IP in IP encapsulation.
ServerIP – The source IP address is provided by a server.
BoxIP – A local source IP address is used. You must specify the
local source IP address in the following Source IP field.
Without a local source IP address, the system cannot use
the tunnel for local traffic.
Source IP
If you selected BoxIP from the Source IP Type list, enter a local
source IP address in this field. Specify a routable source IP address if
the box itself will use the tunnel. The IP address is activated on the
tunnel interface.
Source Mask
The netmask for the source IP address. A non-zero mask specifies a
local network.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Route Metric
148
If more than two routes exist for a target, enter a preference number
for the route if one of the following scenarios also applies:
You do not want to use policy routing for tunneling. Thus, the
respective tunnel routes go either into the main or default table
(whenever the target network must be 0.0.0.0/0).
You want to use policy routing but plan to assign the routes to an
existing table.
It is not a good idea to introduce redundant routes to a target network
with a direct route being the preferred path.
Remote End IP
The IP address of the remote tunnel end. Make sure that this IP
address can be accessed from the local tunnel end that is specified
in the following Local End IP field.
Check Reachability
To check the reachability of the remote tunnel end from the local
tunnel end, select yes. If this check fails, the tunnel is not introduced.
If verification is active already, you will not be able to send
configuration changes.
To disable this check, select no. Disable this check when the remote
tunnel end is only accessible via a VPN route.
Local End IP
The IP address of the local tunnel end. Make sure that you have
already introduced this IP address in the network configuration of the
system.
Trust Level
Specifies the IP address type that is counted by the firewall for traffic
on this interface. You can classify the interface as one of the
following:
Unclassified
Trusted
DMZ
Untrusted
Internal01
Internal02
Target Networks
In this table, specify target networks that must be accessible through
the tunnel. Use IP/mask notation. Add the target networks of routes
that rely on the tunnel interface. Each specified target will rely on a
corresponding direct route.
Advertise Route
To advertise this route via dynamic routing protocols when the
OSPF/RIP/BGP service is used, select yes.
Use Policy Routing
To specify a routing table for tunnel routes from specific source
networks, select yes. You can then configure the following policy
routing settings: Table Placement, Use Table, and Source
Networks.
Table Placement
If you are using policy routing, specify where the table should be
placed. You can select postmain (default), premain, or existing.
Select existing if you want to use an existing table and specify the
table in the following Use Table field. The rule preference of this
table will be inherited.
Use Table
If you selected existing from the Table Placement list, specify the
policy routing table in this field. Do not specify the local, main, or
default tables. For each source network defined, an appropriate rule
pointing to this table (with the table's original preference) is also
appended.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Source Networks
149
If the route from a network or single host must be looked up in the
policy routing table specified in the Table Placement setting, add it
to this table.
By default, the policy routing table uses the same name as
the one that you entered for the tunnel configuration entry.
However, you may assign the routes to another table. Use
IP/mask notation. For a single host, you must enter 32 as
the netmask.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
150
How to Configure User Defined Routes in Azure
Missing the language English in this article! Please add the language, otherwise this article can not be displayed properly.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
151
High Availability
A standalone system is typically set up in an HA cluster from one of the following configuration scenarios:
It is an existing standalone Barracuda NG Firewall, to which a second NG Firewall is added for high availability.
It is one of two existing standalone Barracuda NG Firewalls that are to be configured into a single HA pair.
It is part of an HA pair that is to be installed from scratch. In this case, install the new system and then set it up in HA mode.
It is important to configure switches and routers properly to work in conjunction with an HA setup. Most important is the ARP cache time or ARP
timeout of the networking equipment. When the secondary unit starts its services, it uses the same IP addresses (except for the management IP
address) as the primary unit, but with different MAC addresses. With an infinite timeout configured, the secondary unit would never be reached,
because the MAC address would be resolved to the wrong port. With a timeout of 300 seconds, the secondary unit would not be reached for 5
minutes and the HA concept would not fulfill its purpose. The recommended setting lies between 30 and 60 seconds. Also note that the number
of ARP requests will increase with a higher timeout.
In this article:
HA Monitoring without a Private Uplink
HA Monitoring with a Private Uplink
Designing an HA System
HA Monitoring without a Private Uplink
In an HA system with no private uplink, alive packets and status information are transferred over the network that the management IP addresses
belong to. For example, in the following diagram, the HA state is exchanged via the 10.0.8.0/24 network.
When the switch "dies", the connection between the HA partners also breaks, and the secondary unit starts its servers although the
primary unit is still alive. When the switch is reactivated, for around 1 second, both units are up and duplicate IP addresses are online
until the primary unit stops its servers.
HA Monitoring with a Private Uplink
In an HA cluster with a private uplink, one network interface is dedicated for HA purposes. An example of this setup is displayed in the figure
below. There are some routing specialties (host routes) to route the HA traffic via the private uplink. A failover route must also be configured to
make sure that the units can reach each other via both routes. The private uplink should be a direct connection with a crossover cable so that it is
independent from a further hardware component (switch/HUB). The subnet for the uplink should be a 2-bit network.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
152
Designing an HA System
Example IP Addresses
Primary Unit
Secondary Unit
Management IP
10.0.8.112 / eth0
10.0.8.113 / eth0
FW Server IP
10.0.8.100
Further Network (Private Uplink)
192.168.0.1/30 / eth2
192.168.0.2/30 / eth2
The route the heartbeat takes is configured via the parameter group Translated HA IP (CONFIGURATION > Box > Infrastructure Services > C
ontrol). In the example settings, the heartbeat is configured to use both the 10.0.8.0/24 network AND the private uplink to send heartbeats.
Translated HA IP
Alternative HA IP
Usage Policy
Primary Unit
10.0.8.113
192.168.0.2
Use-Both
Secondary Unit
10.0.8.112
192.168.0.1
Use-Both
Configure the Translated HA IP and Alternative HA IP on the primary and secondary unit. These IP addresses are used in the default
firewall rules for HA synchronization that allow HA traffic between both HA partners.
The HA IP address must be a Management IP address. Otherwise, the control daemon does not listen on the alternative HA IP,
causing heartbeat and sync to fail.
If you are running an HA setup with different appliance revisions, ensure that both physical ports of the private uplink are using identical
port labels. Otherwise, HA synchronization may fail.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
153
How to Set Up a High Availability Cluster
Both of the systems that you set up in a high availability (HA) cluster must be the same model and firmware version. For instructions on
how to configure an HA cluster using different revisions of the same appliance model, see How to Restore a Configuration on
Appliances After an RMA.
A high availability (HA) cluster can transparently failover to the secondary unit if your primary unit goes down unexpectedly or requires
maintenance . You can set up an HA cluster on a Barracuda NG Control Center or a standalone HA cluster. A standalone HA cluster includes two
standalone Barracuda NG Firewalls or two Barracuda NG Control Centers.
To protect against failure of network components, you can use a dedicated private link as a secondary HA connection.
In this article:
Standalone Barracuda NG Firewall HA Cluster
Set Up an HA Cluster in the Barracuda NG Control Center
Configure a Private Uplink
Check Virtual Server HA Status
Standalone Barracuda NG Firewall HA Cluster
Before you Begin
Connect the primary unit and secondary unit to a network switch.
Verify the Product Type in the Box Properties and Server Properties match your appliance.
Step 1. (Virtual NG Firewalls only) Verify the Product Type
Set the product type matching your license if you are using a virtual Barracuda NG Firewall. This is not necessary on hardware appliances.
1.
2.
3.
4.
Open the Box Properties page (Configuration > Full Configuration > Box).
Click Lock.
Select the Barracuda NG Firewall Model from the Product Type list. E.g., NG Firewall VF50
Select the Barracuda NG Firewall Model from the Hardware Type list.
5. Click Send Changes and Activate.
Step 2. Create the DHA Unit
On the primary unit, create DHA configuration for the secondary unit.
1. Open the Configuration > Full Configuration page.
2. Right-click Box and select Create DHA box. At the bottom of the Config Tree, the HA Box configuration node is added.
3.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
154
3. Open the HA Network page (Configuration > Full Configuration > Box > HA Box).
4. Enter the Management IP (MIP) for the secondary unit.
5. Click Send Changes and Activate.
Step 3. Create the PAR File for the Secondary Unit
On the primary unit, export the PAR file for the secondary unit.
1.
2.
3.
4.
On the primary unit, create the PAR file:
Go to the Config > Full Config page.
From the Config Tree, right-click Box and select Create PAR file for HA box.
Save the PAR file to your local hard disk drive.
Step 4. Import the PAR File on the Secondary Unit
On the secondary unit, import the boxha.par PAR file created on the primary unit:
1.
2.
3.
4.
5.
Open the Configuration > Full Configuration page.
From the Config Tree, right-click Box and select Restore from PAR file.
Click OK.
Select the boxha.par file created in Step3 and click OK.
Click Activate .
Step 5. Activate the New Network Configuration for the Secondary Unit
On the secondary unit, activate the network configuration.
1.
2.
3.
4.
Go to the Control > Box page.
In the left navigation pane, expand Network and click Activate new network configuration.
Select Failsafe as the activation mode.
In the left menu, expand Operating System and click Reboot.
Step 6. Select the Active and Backup Unit on the Primary Unit
In the virtual server settings of the primary unit, select where the virtual server should be running.
1.
2.
3.
4.
Open the Server Properties page (Configuration > Full Configuration > Box > Virtual Server > your virtual server ).
Click Lock.
Verify that the Product Type matches your license.
To run the virtual server on the primary unit per default:
a. Active Box – Select This-Box.
b. Backup Box – Select Other-Box.
5. To run the virtual server on the secondary unit per default:
From the Active Box list, select HA-Box.
From the Backup Box list, select Other-Box or No-Backup if you do not want this virtual server to be part of the high
availability cluster.
Consider the limitations described in Best Practice - Service Dependencies and Multiple Services of the Same Type
on one Virtual Server before using multiple virtual servers on one NG Firewall.
6. Click Send Changes and Activate.
Step 7. Install Licenses
You must install licenses on both units. For instructions, see How to Activate and License a Barracuda NG High Availability Cluster.
Set Up an HA Cluster in the Barracuda NG Control Center
Before you Begin
Select two Barracuda NG Firewalls in the same cluster.
Set up an HA Cluster
1.
2.
3.
4.
5.
6.
Log into the Barracuda NG Control Center.
Open the Config page.
From the Config Tree, expand Multi-Range and navigate to the cluster that contains your HA units.
Create a virtual server.
Open the Server Properties page.
In the Virtual Server Definition section, define the primary unit and secondary unit.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
155
6.
Primary Box – The active system.
Secondary Box – The HA partner.
7. Click Send Changes and Activate.
The primary and secondary servers are created and configured as HA partners on both units.
Figure 3. Virtual Server Settings for an HA Cluster on the Barracuda NG Control Center
Configure a Private Uplink
After setting up an HA cluster, you can also configure a private uplink for it. For the private uplink, you must configure a 2-bit network as a subnet
and provide exclusive network devices for the private uplink.
To configure a private uplink, complete the following steps on the primary unit:
These steps use the example IP addresses from the following figure:
Figure 4. HA Cluster with Private Uplink
Before You Begin
To avoid any errors when you configure the private uplink, connect the primary unit and secondary unit with a crossover cable.
Step 1. Define Alternative HA IP Addresses
1.
2.
3.
4.
5.
6.
7.
Open the Network page (Config > Full Config > Box > Network).
Click Lock.
From the Configuration Mode menu in the left navigation pane, click Switch to Advanced View.
In the Additional Local IPs section, add the IP address for the unit in the additional subnet. For example, 192.192.192.1.
From the Responds to Ping and Management IP lists, select yes.
Click OK.
Click Send Changes and Activate.
Step 2. Activate the Private Uplink
1. Open the Control page (Config > Full Config > Box > Infrastructure Services).
2. Click Lock.
3. In the HA Monitoring Parameters section, add entries for the primary unit and secondary unit. In each entry, specify these settings:
Translated HA IP – Enter the original management IP address (for example: 10.0.10.20).
Alternative HA IP– Enter the additional local network IP of the unit (for example: 192.192.192.1).
4. Click OK.
5.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
156
5. Click Send Changes and Activate.
Figure 5. HA Monitoring Settings on Both HA Units
Step 3. Add the Alternative HA IP to the ACL List
To grant administrative access rights for alternative HA IP address usage, add the alternative HA IP address to the ACL list:
1.
2.
3.
4.
Open the Administrative Settings page (Config > Full Config > Box > Administrative Settings).
Click Lock.
In the Access Control List section, add the alternative HA IP address.
Click Send Changes and Activate.
Check Virtual Server HA Status
Check the server status on both HA units to verify that the virtual servers have been correctly assigned.
1. On the primary unit:
Go to the Control > Server page.
In the Server Status table, verify that the virtual server is correctly assigned. The Status column must display primary. The Stat
us HA Partner column must display standby.
2. On the secondary unit:
Go to the Control > Server page.
In the Server Status table, verify that the virtual server is correctly assigned. The Status column must display standby. The Stat
us HA Partner column must display primary.
When the primary unit goes down, the secondary unit changes its status to primary and replaces the primary unit with all its functionalities.
Depending on whether your primary unit is running or down, the Control > Server page displays as follows:
Primary Unit State
Secondary Unit State
N/A - Primary unit down
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
157
Transparent Failover for an HA Firewall
An HA system can be used for load balancing to exploit all features that are available through the Barracuda NG Firewall architecture. Use
transparent failover to synchronize the forward packet sessions (inbound and outbound TCP, UDP, ICMP-Echo, and OTHER-IP-Protocols) of the
Firewall server between the two HA partners. Transparent failover is enabled by default and activated per rule.
For transparent failover, both HA partners must have identical network configurations, except for the NICs, which may differ. The assignment of
the interfaces must be identical. For example, if the ISP is connected on eth0 and the DMZ is on eth1, the same interface must be used on the
partner unit to connect to the ISP and DMZ.
Unsynchronized Components
Certain components are not HA-synced. These are listed in the table below:
Module or Component
Sub Components
Firewall
Local sessions
Stream sessions
WANOPT sessions
SSL decryption sessions
Sessions using a box IP address as dynamic bind IP address
Sessions using a box IP address as redirection target
Sessions for which HA synchronization was disabled in the Adv
anced Rule Settings
VPN Service
IPSec tunnels
Access Control Service
All
Eventing
All
Logging
All
Box Statistics
All
Home Directories
(Admins)
All
SMS Messages
All
Synchronizing Procedure
Synchronization can be carried out via dedicated HA uplink or, alternatively, via the LAN connection. Synchronization traffic is transmitted by
AES-encrypted UDP packets, so-called sync packets, on port 689. The AES keys are created by using the BOX RSA Keys and renewed every
60 seconds.
Only a small amount of synchronization traffic is necessary for synchronizing via LAN connection. Sync traffic is kept at a minimum by
synchronizing only sessions and not each packet. Due to the characteristics of the TCP protocol (SYN, SYN-ACK, …), only existing established
TCP connections are synchronized. When the synchronization takes place during the TCP handshake, the handshake must be repeated.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
158
The synchronizing procedure takes place immediately (if possible). If synchronization packets are lost, up to 70 sessions per second are
synchronized.
Depending on the system availability, the behavior differs:
If the partner unit is inactive/rebooted - Sometimes it may happen that the backup unit is not available and, therefore, does not
respond to the sync packets (for example, for maintenance reasons). In this case, the active unit stops synchronizing. As soon as the
partner unit reappears, the active unit checks whether the other one was rebooted or has an obsolete session state and resynchronizes
all necessary sessions.
If the active unit reboots without a takeover - The Firmware Restart button was clicked. The acpf and sockets are gone, but the
unit is not rebooted physically. In this case, the partner unit recognizes that its session state is obsolete and removes all synchronized
sessions.
Takeover Procedure
When the HA unit on which the firewall runs does not respond to the heartbeat (Control UDP 801), takeover is initiated after a delay of 10 to 15
seconds. This delay is necessary because of potentially low network performance.
During this time, no service is available.
When the unit stays inactive, the synchronized sessions on the second unit are activated and all connections are available again. Again, the TCP
protocol must be mentioned separately. The backup unit does not have the current TCP sequence numbers. In case of a takeover, the sequence
number is not checked for correctness. As soon as the connection has traffic, the sequence number is known to the former backup unit, and the
sequence number check is performable again. The missing sequence number on the backup unit also results from the fact that TCP connections
that were taken over but have since had no traffic cannot be reset in a clean way. Terminating the session via the Terminate Session button
removes the connection but does not send a TCP Reset (TCP-RST) signal.
Configuration
In each firewall rule, you can edit a Transparent Failover active/inactive setting that defines whether sessions that are affected by this rule
must be synchronized. For more information, see Advanced Access Rule Settings.
Monitoring
To view the status of sessions, go to the Firewall > Status page.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
159
Monitoring, Managing, and Rebuilding HA Clusters
Manage configuration updates and monitoring for your HA clusters. Configuration changes on the primary firewall are transferred instantly to the
secondary firewall. The sync status can be viewed from Barracuda NG Admin. If the primary firewall fails, configuration changes must be made
on the secondary firewall. After the primary firewall is re-established, synchronization must be started manually.
In this article:
Check Virtual Server HA Status
HA Sync Status Setup
Emergency Override
Manually Synchronize a Stand-alone HA Pair
Manually Synchronize a Stand-alone HA Pair in the NG Control Center
Configure IP Address and Service Monitoring
Check Virtual Server HA Status
Check the server status on both HA firewalls to verify that the virtual server is running on the primary firewall.
1. On the primary firewall:
Go to CONTROL > Server.
In the Server Status table, verify that the Status column displays primary and the Status HA Partner column displays standby
. The virtual server status color must be green.
2. On the secondary firewall:
Go to CONTROL > Server.
In the Server Status table, verify that the Status column displays standby and the Status HA Partner column displays primary
.
If the virtual server is running on the secondary firewall, you must initiate a manual HA failover. For more information, see How to Perform a
Manual High Availability Failover.
HA Sync Status Setup
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
160
1. Go to CONFIGURATION.
2. Expand the State Info drop-down list in the upper right-hand corner and click HA Sync.
3.
In the HA Box Synchronization window, you have the option to trigger the following tasks:
Do Update – Performs an incremental update.
Do Complete Update – Performs a complete update.
Discard Update – Discards the changes. This is needed when the two HA partners are in an inconsistent state.
Refresh – Refreshes the window to see actual changes (completion of update).
This function is deactivated if the HA system is managed by a NG Control Center. You can only trigger HA box synchronization via the
Configuration Update page on the NG Control Center. For more information, see CC Configuration Updates.
Emergency Override
If the primary firewall fails, configuration changes must be made on the secondary firewall using the Emergency Override mode.
1. Log into the secondary firewall.
2. From the Configuration Tree, right-click Box (Backup) and select Emergency Override.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
161
3. When prompted, click Yes to enable the Emergency Override mode. When the Emergency Override mode is active, the box icon is
highlighted in yellow.
The Emergency Override mode is activated only for the current session. It must be reactivated for every new session.
4. Lock and edit your configurations.
5. Click Send Changes and Activate.
Manually Synchronize a Stand-alone HA Pair
After the connection to the primary firewall is re-established, synchronization must be re-started manually. The following steps assume that
services are still active on the secondary firewall.
1. On the primary firewall, go to CONFIGURATION.
2. From the service bar, expand the State Info icon and click HA Sync.
3. Select the Clear Dirty Status button.
A restart of the Control Service or the CC-Conf Service can cause HA synchronization disruption. The synchronization process
stops with the following error message:
HA sync pending PAR ready (13223 kb) COMPLETE update; Can't send PAR file: - SYNC DIRTY: refuse PAR file: box itself
has a pending HA update.
In case of disruption, the .par file used in the synchronization process is not deleted from the file system in the final step. This
disturbs the following synchronization process. Use the button Clear Dirty Status in the HA Sync window to restart HA sync.
4.
5.
6.
7.
8.
9.
10.
11.
Open the Configuration Tree on the secondary firewall and click HA Sync.
Enter the IP addresses of the HA partners into the IP address fields of the HA Box Synchronization window.
Click Do Update to transfer the configuration from the secondary firewall to the primary firewall.
Enter the IP address of the primary firewall into the HA Partner IP field.
Enter the IP address of the secondary firewall into the Sender IP to use field.
Select the Change Address check boxes to the right of both fields.
Click Do Complete Update.
Block services on the secondary firewall so that the primary firewall can regain normal operation status.
Manually Synchronize a Stand-alone HA Pair in the NG Control Center
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
162
Only configuration changes on the primary firewall are transferred instantly to the secondary firewall. In Emergency Override mode, manually
synchronize configurations from the secondary firewall to the primary firewall. (The following steps assume that services are still active on the
secondary firewall.)
1.
2.
3.
4.
5.
6.
7.
8.
9.
On the primary firewall, select the Clear Dirty Status button.
Open the Configuration Tree on the NG Control Center and click HA Sync.
Enter the IP addresses of the HA partners into the IP address fields of the HA Box Synchronization window.
Click Do Update to transfer the configuration from the secondary firewall to the primary firewall.
Enter the IP address of the primary firewall into the HA Partner IP field.
Enter the IP address of the secondary firewall into the Use Sender IP field.
Select the Change Address check boxes to the right of both fields.
Click Do Complete Update.
Block services on the secondary firewall so that the primary firewall can regain normal operation status.
Configure IP Address and Service Monitoring
To enable handling of failure conditions and to guarantee a quick takeover of services when a box or networking component becomes
unavailable, configure the monitoring of IP addresses and services on the Virtual Server layer.
For more information, see Virtual Server Monitoring .
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
163
How to Perform a Manual High Availability Failover
In an HA setup, the primary NG Firewall stays active until a serious problem occurs. If virtual servers and services must be shut down (for
example, for system maintenance), you can do a manual failover to transfer all virtual servers to the secondary (backup) unit. Block the virtual
server on the primary unit to shut down the Control service. The Control service will send a signal to the secondary unit that tells it to start its
virtual server. Then, stop the virtual server on the primary unit to enable the Control service to restart it automatically if the secondary unit goes
down. This mechanism works identically for an HA pair that is managed by a Barracuda NG Control Center and a stand-alone HA pair.
In this article:
Perform a High Availability Failover when the Primary Unit is Active
Before You Begin
Step 1. Block the Virtual Server on the Primary Unit
Step 2. Put the Primary Firewall in Standby
Perform a High Availability Failover when the Secondary Unit is Active
Before You Begin
Step 1. Block the Virtual Server on the Secondary Unit
Step 2. Put the Secondary Firewall in Standby
Perform a High Availability Failover when the Primary Unit is Active
Block the virtual server on the primary unit to shut down the Control service and initiate the failover. After the failover start the control service for
the primary firewall to be able to take over the virtual server in case of failure.
Before You Begin
On the primary firewall, go to the Control > Server page and verify the Status is primary.
On the secondary firewall, go to the Control > Server page and verify the Status is standby. If the Status is blocked, click Stop Server.
Step 1. Block the Virtual Server on the Primary Unit
1.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
164
1. Log into the primary unit.
2. Go to the Control > Server page.
3. In the Server Status section, select the virtual server and click Block Server.
On the primary firewall, the virtual server Status column shows block. On the secondary firewall, the virtual server Status shows secondary.
The virtual server is now running on the secondary firewall.
The primary firewall is blocked and cannot take over the virtual server in case the secondary firewall fails.
Primary Firewall
Secondary Firewall
Step 2. Put the Primary Firewall in Standby
Stop the virtual server on the primary firewall, to be able to take over the virtual server in case the secondary firewall fails.
1. Log into the primary firewall.
2. Go to CONTROL > Server.
3. In the Server Status section, select the virtual server and click Stop Server.
Copyright © 2015, Barracuda Networks Inc.
3.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
165
On the primary firewall, the virtual server Status column shows down. On the secondary firewall, the virtual server Status shows secondary.
The virtual server is still running on the secondary firewall.
The primary firewall is ready to take over the virtual server in case the secondary firewall fails.
Primary Firewall
Secondary Firewall
Perform a High Availability Failover when the Secondary Unit is Active
To perform a manual failover when the secondary unit is active, block and stop the virtual server on the secondary unit.
Before You Begin
On the primary firewall, go to the Control > Server page and verify the Status is down. If the Status is blocked, click Stop Server.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
166
On the secondary firewall, go to the Control > Server page and verify the Status is secondary.
Step 1. Block the Virtual Server on the Secondary Unit
1. Log into the secondary firewall.
2. Go to the Control > Server page.
3. In the Server Status section, select the virtual server and click Block Server.
On the secondary firewall, the virtual server Status column shows block. On the primary firewall, the virtual server Status shows primary.
The virtual server is now running on the primary firewall.
The secondary firewall is blocked and cannot take over the virtual server in case the primary firewall fails.
Primary Firewall
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
167
Secondary Firewall
Step 2. Put the Secondary Firewall in Standby
Stop the virtual server on the secondary firewall, to be able to take over the virtual server in case the primary firewall fails.
1. Log into the secondary firewall.
2. Go to CONTROL > Server.
3. In the Server Status section, select the virtual server and click Stop Server.
On the secondary firewall, the virtual server Status column shows standby. On the primary firewall, the virtual server Status shows primary.
The virtual server is still running on the primary firewall.
The secondary firewall is ready to take over the virtual server in case the primary firewall fails.
Primary Firewall
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Secondary Firewall
Copyright © 2015, Barracuda Networks Inc.
168
Barracuda NG Firewall 6.1 Administrator's Guide - Page
169
How to Configure a High Availability Cluster in Azure
Missing the language English in this article! Please add the language, otherwise this article can not be displayed properly.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
170
How to Configure a High Availability Cluster in Azure via PowerShell
Missing the language English in this article! Please add the language, otherwise this article can not be displayed properly.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
171
Mail Gateway Synchronization with HA
You can configure mail gateway synchronization for a Barracuda NG Firewall in an HA cluster.
In this article:
Automatic Email Synchronization
Manual Email Synchronization after an HA Takeover
Step 1. Connecting
Step 2. Check for Undelivered Mails
Step 3. Copy the Spool Directory
Step 4. Copy the vscan Directory (optional)
Step 5. Initiating Delivery Manually
Step 6. Removing the Obsolete Mails
Step 7. Exit
Automatic Email Synchronization
Automatic email traffic synchronization is quite similar to the transparent failover that is available for the Forwarding Firewall (see Transparent
Failover for an HA Firewall). When mails are spooled, they are synchronized on the HA partner after a maximum of 10 seconds. However, the
synchronization procedure itself is one-way only. That means that changes made to the mail log and envelope on the partner unit are lost when
the primary unit takes back the mail gateway. When synchronized mail is delivered, it is deleted on the HA partner. If a synchronization attempt
fails, it is stored in a transaction log for pending actions and is retried as soon as possible.
Manual Email Synchronization after an HA Takeover
During an HA takeover, the mail gateway service on the server of the secondary unit starts and performs the mail delivery. After successful
recovery of the primary unit, the server of the primary unit takes over mail delivery again and the mail gateway running on the secondary unit
stops delivering mail. If the HA takeover happens during mail delivery, mail delivery might not be finished because some mail could be left in the
mail queue of the secondary HA server. In other words, HA takeover can be initiated while the spooling process of mails is active. This occurs
especially during heavy loads when lots of emails are processed by the mail gateway service.
In this case, you must manually move leftover mail from the secondary unit to the primary HA partner and initiate the delivery so that no mail is
lost after an HA takeover. The following description shows step-by-step what must be done in such a case:
While connected via SSH, do not enter any commands unless you know exactly what you are doing.
Step 1. Connecting
Establish a connection to the secondary HA unit using Barracuda NG Admin. Now select SSH from the unit menu and log into the secondary HA
unit as root. Change to the spool directory of the mail gateway by using the following command line:
cd
/var/phion/spool/mgw/<server_service>/spool/
For <server>, type in the name of the server, and for <service>, type in the name of the mail gateway service you have configured when
introducing the service.
Step 2. Check for Undelivered Mails
This check is done by listing the content of the spool directory. Therefore, enter the following command:
ls -l
If the result of this command is Total 0, there are no undelivered mails left, and it is not necessary to continue. In this case, type "exit" to close
your SSH session. However, if there are files with the extension .body and .env, continue with the next step.
Step 3. Copy the Spool Directory
Copy all files to the mail input directory of the active (primary) mail gateway service. To do so, use the following command line:
scp * IP:/var/phion/spool/mgw/<server>_ <service>/input/
The parameter <IP> indicates the box management IP of the primary HA unit where the mail gateway service is active. You will be prompted to
enter the root password of the primary unit.
Step 4. Copy the vscan Directory (optional)
If the virus scanning for mails is active, it is necessary to copy this directory, too. Therefore, change to the vscan directory of the mail gateway by
using the following command line:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
172
cd ../vscan/
Now copy all files to the mail input directory of the active (primary) mail gateway service. To do so, use the following command line:
scp * <IP>:/var/phion/spool/mgw/<server>_ <service>/input/
Step 5. Initiating Delivery Manually
As soon as Step 3 and Step 4 (optionally) are complete, the manually initiated delivery can be started on the primary HA unit. For this purpose,
you need a SSH session to the active unit. This session is established by using the following command line:
ssh <IP>
For <IP>, type in the box management IP of the primary HA unit where the mail gateway service is active. You will be prompted to enter the root
password of the primary unit. After that, the prompt of the primary unit appears. Now initiate the mail insertion and delivery of the copied mail in
the input directory:
/bin/kill -s SIGUSR2 <server>_<service>
For <server>, type in the name of the server, and for <service>, type in the name of the mail gateway service you have configured at the time you
introduced the service on the unit.
Note that these names are case sensitive.
This command inserts the imported mails from the input directory to spooling process of the active mail gateway, and performs the delivery.
Active mail jobs in the current spooling queue are not affected by this action. In order to verify that the mails have really been inserted, check the
mail gateway logs through Logs > servername > servicename > mailgw. For each newly inserted mail, a log file entry, containing the text
"SPOOLER new mail inserted (id=########-######-########)", is generated. After that, normal delivery of inserted mails is initiated and can be
checked via the operative mail gateway GUI (MailGW).
Step 6. Removing the Obsolete Mails
After successful delivery, remove mails left in the /spool/and /vscan/ directories of the inactive mail gateway on the secondary unit to avoid
duplicate delivery. To do so, terminate the SSH session to the primary unit by entering exit. The system prompt of the secondary unit now
appears displaying the message: Connection to <IP> closed.
Repeat Step 1 if the bash prompt of the secondary unit does not contain the path /var/phion/spool/mgw/<server>_<service>/spool (for
example, in case you changed to a different directory).
Now remove all mails in the current directory by using the following command within the /spool/ directory of the secondary unit:
rm * -f
Using this command permanently removes all files in the current directory. Make sure that you have not changed to another directory
before entering rm * -f.
If Step 4 was performed, it is also necessary to remove obsolete mails from the /vscan/ directory.
Step 7. Exit
Enter the command exit to terminate the SSH session. This concludes the email synchronicity after HA handover.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
173
Licensing
If you are licensing a NextGen Control Center, a managed F-Series Firewall, or are using pool licenses, see Licensing on a NG Control
Center.
Single licenses for the NextGen Firewall F-Series and Control Center are bound to the MAC address of the first network interface.
In this article:
Barracuda NextGen Firewall F-Series Base Licenses
Hardware Appliances
Virtual Systems
Public Cloud Systems
Microsoft Azure and Amazon AWS Pay-As-You-Go Licenses
Cold Standby Licensing
Subscription Licenses
Barracuda Energize Updates
Malware Protection
Advanced Threat Detection
Legacy SSL VPN and Access-Control-Server-Based NAC
Barracuda Remote Access Basic
Barracuda Remote Access Premium
Barracuda NG Web Filter
Barracuda NG Web Security
Instant Replacement Service
Barracuda Web Security Service
NextGen Control Center Licensing
Next Steps
Barracuda NextGen Firewall F-Series Base Licenses
The F-Series Firewall base license gives you a next-generation firewall with the following features:
Application Control reporting
SSL Interception (available on all models, except F10 and F100)
WAN optimizations (compression, Traffic Intelligence, QoS, Data Caching)
Unlimited number of VPN clients (Client-to-Site Barracuda TINA and IPsec VPN)
You can purchase the F-Series Firewall in three different versions:
Base License Type
Installed On
Hardware License
NextGen Firewall F-Series hardware
appliance
License Bound to
MAC licenses
Pool licenses
Virtual License
VMware Hypervisors
Citrix XenServer
Xen Server
KVM Server
Microsoft Hyper-V
vCloudAir
MAC licenses
Pool licenses
Cloud License - Azure
Microsoft Azure
MAC licenses (BYOL)
Pay-As-You-Go Hourly Rate
Cloud License - AWS
Amazon AWS
MAC licenses (BYOL)
Pay-As-You-Go Hourly Rate
Software License
(legacy phion customers only)
Standard Hardware
MAC licenses
Pool licenses
Hardware Appliances
A NextGen F-Series Firewall or Control Center hardware appliance is bound to a license on activation. If the appliance must be replaced (RMA),
the existing license will be transferred to the replacement unit.
There are no capacity restrictions for hardware appliances. The only restriction is the system performance of the hardware itself. An unlimited
number of protected IP addresses, SSL VPN users, and HTTP proxy users (AV+Webfilter) are included. SSL VPN and SSL Interception is
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
174
included with every F-Series Firewall, except for the F10, VF10, F100, and F101 models.
Virtual Systems
Virtual systems are classified by a "capacity" number in the model name, which defines the number of protected Firewall IPs, SSL-VPN users,
VPN users, and HTTP Proxy users (Virus scanning and NG Web Filter). This number is enforced for all smaller models of the virtual appliance
(NextGen Firewall VF10 - VF500). NextGen Firewall VF1000 to VF8000 do not set a software limit to the number of protected IP addresses; the
capacity number still applies as a sizing recommendation. Depending on the model number, they are also limited by the number of CPU cores
that can be used. You must assign the correct number of CPU to your NextGen Firewall or Control Center Vx. If you assign more CPU cores than
covered by the license, the license state will be displayed as expired.
Legacy phion licenses do not distinguish between virtual and hardware licenses and also differ from Barracuda VF licenses. Users behind the
HTTP proxy service and Client-to-Site VPN users are not factored into the capacity number. Legacy phion licenses require an additional license
for Client-to-Site VPN.
If you cannot adjust the number of CPU cores in your hypervisor, it might be necessary to configure the bootloader to use the number of licensed
CPU cores. For more information on how to configure the bootloader, see How to Configure the Bootloader. The following table displays the
capacity and the number of CPU cores for each NextGen Firewall Vx:
Model
Capacity
Licensed Number of CPU Cores
VF10
10
1
VF25
25
2
VF50
50
2
VF100
100
2
VF250
250
2
VF500
500
2
VF1000
unlimited
2
VF2000
unlimited
4
VF4000
unlimited
8
VF8000
unlimited
16
There might be limitations to the number of the network interfaces you can connect to you virtual host, depending on the license of your
virtualization platform. Please check with your platform vendor.
Public Cloud Systems
F-Series Firewalls deployed in the Amazon AWS or Microsoft Azure public clouds are not restricted to a capacity. Performance is only limited by
the performance and number of CPU cores of the virtual instance used. To use any service (Firewall, VPN, etc...), you must have an active
Energize Updates subscription.
Microsoft Azure and Amazon AWS Pay-As-You-Go Licenses
You can choose to pay an hourly rate for the public cloud F-Series Firewall. The pay-as-you-go license is generated and bound to the VM or
Instance on the first boot. The Pay-As-You-Go license includes the following services:
Forwarding Firewall
VPN Service
All services included in the Basic Remote Access Subscription
All services included in the Premium Remote Access Subscription
SSH Proxy
DNS
DHCP
DHCP Relay
FTP Gateway
Dynamic Routing
(If managed by a Control Center) Distributed Firewall
Microsoft Azure Instance sizes:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
175
Level 2 – Small (1 core, 1.75GB memory)
Level 4 – Medium (2 cores, 3.5GB memory)
Level 6 – Large (4 cores, 7GB memory)
Level 8 – Extra Large (8 cores, 14GB memory)
Amazon AWS Instances sizes
Level 2 – m1.small (1 vCPU core)
Level 4 – c1.medium (2 vCPU cores)
Level 6 – m1.xlarge (4 vCPU cores)
Level 8 – c1.xlarge (8 vCPU cores)
Cold Standby Licensing
For redundancy, you can purchase an F-Series Firewall without a license and use it as a cold standby replacement. If the production unit fails,
call Barracuda Networks Technical Support to transfer the license to the stand-by unit and continue normal operations.
Subscription Licenses
In addition to the base license, you can add the following subscriptions to use your firewall to its fullest extent.
Barracuda Energize Updates
This license is mandatory for the first year, for every F-Series Firewall. The following features are included with Barracuda Energize Updates:
24x5 technical support.
Application Control 2.0
Firmware updates
Application Control 2.0 definition updates
IPS/IDS engine and signature updates
Barracuda Web Filter
SSL-VPN Web Forward template updates
File Content definition updates
Malware Protection
Enables the Virus scanner service.This license is available for all F-Series Firewalls except F10 and VF10.
Advanced Threat Detection
Enables ATD. A malware subscription license is required. The number of files you can upload per hour and per month are limited, depending on
your firewall model. The number of files scanned are counted in the Barracuda ATD Cloud. If the local counter on your Firewall is reset, i.e., by
reinstalling the OS, the local counter will be out-of-sync for the rest of the month. Limits still apply.
Model
Burst Limit (files/min)
Files per Month
F18, F80, F180, F200, F201, F300, F301
5
108 000
F280
10
216 000
F380
12
260 000
F400
15
324 000
F600
25
540 000
F800
35
750 000
F900
50
1 000 000
AWS/Azure Level 2
5
108 000
AWS/Azure Level 4
10
216 000
AWS/Azure Level 6
15
324 000
AWS/Azure Level 8
35
750 000
VF25
2
43 200
VF50
5
108 000
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
176
VF100
10
216 000
VF250
15
324 000
VF500
20
432 000
VF1000
25
540 000
VF2000
30
648 000
VF4000
35
750 000
VF8000
50
1 000 000
Legacy SSL VPN and Access-Control-Server-Based NAC
Enables the SSL VPN and classic policy-server-based NAC service. Includes unlimited concurrent SSL VPN sessions and one CudaLaunch
session.
Barracuda Remote Access Basic
Enables the SSL VPN service and NAC support. For F-Series Firewalls deployed in Azure/AWS, this subscription is included in the Energize
Updates subscription. Remote Access subscriptions are available for NextGen Firewall F80 and larger as well as all NextGen Firewall Vx models.
Included SSL-VPN Features
Browser based access via desktop and mobile portals.
SSL-VPN-based server-side NAC
VPN Templates for SSL VPN
Included Network Access Client Features
Windows Personal FW
Windows Health Check via Access Control Service.
User Session Limits
Unlimited concurrent SSL VPN user sessions.
One concurrent Client-to-Site VPN session by the same user.
One CudaLaunch session.
Barracuda Remote Access Premium
A Remote Access Basic Subscription is included in the Remote Access Premium subscription. Remote Access subscriptions are available for
NextGen Firewall F80 and larger as well as all NextGen Firewall Vx and public cloud models. For PAYG F-Series Firewalls in AWS and Azure,
this subscription is automatically included.
Included SSL-VPN Features
Browser based access via desktop and mobile portals.
SSL-VPN-based server-side NAC
VPN Templates for SSL VPN
Included Network Access Client Features
Windows Personal FW
Windows Health Check via Access Control Service.
CudaLaunch
iOS
Android
Central Management of accessible resources and VPN provisioning
User Session Limits
Unlimited concurrent SSL VPN user sessions.
Unlimited concurrent CudaLaunch sessions.
Multiple concurrent Client-to-Site VPN sessions by the same user.
Barracuda NG Web Filter
Enables the Barracuda NG Web Filter service, which can use both online and offline databases.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
177
Barracuda NG Web Security
Enables the Barracuda URL Filter service, and can use both online and offline databases and the antivirus service.
Instant Replacement Service
Instant replacement service includes the following features:
Replacement unit shipped next business day.
24x7 technical support.
Hardware refresh every four years.
Barracuda Web Security Service
To use Barracuda Web Security Service, an additional subscription is required. For more information, see How to Configure the Barracuda Web
Security Service.
NextGen Control Center Licensing
Barracuda NextGen Control Center licenses scale by the number of F-Series Firewalls that can be managed by the Control Center. The High
Availability license is included with the VC820 Global Edition model and can be purchased as an add-on for all other models.
Model
System Type
Number of
Managed
Firewalls
Tenants
(Ranges)
Configuration
Groupings
(Clusters)
HA License
Additional
Tenants
C400
Hardware
Recommendatio
n: 20
1
1
Optional
n/a
VC400
Virtual
Recommendatio
n: 20
1
1
Optional
n/a
C610
Hardware
Recommendatio
n: 200
1
No limit
Optional
n/a
VC610
Virtual
Recommendatio
n: 200
1
No limit
Optional
n/a
VC820
Virtual
Recommendatio
n 1000+
only limited by
hardware
5 (additional
tenants optionally
available)
No limit
Included
Optional
Next Steps
To install the NextGen Firewall F-Series or Control Center licenses, see:
How to License your Barracuda NG Firewall
Licensing on a NG Control Center
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
178
How to License your Barracuda NG Firewall
You must complete licensing during the initial three-day grace period. If unlicensed after three days, the Barracuda NG Firewall or NG Control
Center switches to demo mode and the default root password (ngf1r3wall) is enabled, even if you have already changed the password. Licenses
are bound to the MAC address of the network interface the management IP is on.
For more information on license types, see Licensing.
Barracuda NG Hardware Appliance Licensing
Hardware appliances only need to be activated. Following activation, the licenses are downloaded automatically.
For more information, see How to Activate and License a Standalone Hardware Barracuda NG Appliance
Barracuda NG Vx Licensing
Virtual units are activated by entering the serial number and license token you received from Barracuda Customer Services. After activation, the
licenses are downloaded automatically. Licensing for Barracuda NG Firewalls deployed in one of the public cloud services are also licensed using
a license token and serial number.
For more information, see How to Activate and License a Standalone Virtual Barracuda NG Firewall
Barracuda NG High Availability Cluster Licensing
When licensing units in a high availability cluster, it is important to activate the secondary unit first. The secondary unit will not download any
licenses after activation. Instead, it waits for the primary unit to be activated. The primary unit downloads the licenses for both units and installs
the license on the secondary unit via HA sync.
For more information, see How to Activate and License a Barracuda NG High Availability Cluster
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
179
How to Activate and License a Standalone Hardware Barracuda NG Appliance
To automatically download and install the license on your Barracuda NG hardware unit, connect to the system using Barracuda NG Admin. NG
Admin transmits the serial number of your unit to the Barracuda Licensing service and initiates the activation process. After completing the
customer information form and accepting the EULA, your license is activated and automatically downloaded and installed on your unit.
Before you Begin
NG Admin must be able to connect to the Barracuda Licensing Servers on the Internet.
Automatically Download and Activate your Licenses
1. Log into the Barracuda NG Firewall using NG Admin.
Default Login Credentials
Default User: root
Default Password: ngf1r3wall
2. (optional) Complete the Getting Started Wizard. For more information, see Getting Started.
3. The activation process is initiated automatically after 30 seconds. You can also start the process manually by clicking on the blue arrow.
After downloading the licenses, a browser window with the activation form opens.
4. Fill out the customer form, accept the License Agreement, and then click Activate.
After the activation process successfully completes, you will receive a notification email from Barracuda Networks Customer
Services.
If you are using a high availability setup, your secondary Barracuda NG unit waits for the license to be activated and then
receives the license from the primary unit.
Your Barracuda NG hardware appliance is now licensed and activated. Check Control > Licenses to see which licenses are installed on your
unit.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
180
How to Activate and License a Standalone Virtual Barracuda NG Firewall
After deploying your virtual Barracuda NG Vx, you must license your VM. Licenses are bound to the virtual MAC address assigned to the first
network adapter of your VM. To initiate an activation, you need to enter the license token you received by email after purchasing your license.
In this article:
Before you Begin
Step 1. Enter the License Token
Step 2. Check the License Status
Before you Begin
To license your Barracuda NG Vx system, you need the license token you received by email from Barracuda Network Customer
Services.
NG Admin must be able to connect to the Internet.
Step 1. Enter the License Token
1. Log into the Barracuda NG Vx using NG Admin.
Default Login Credentials
Default User: root
Default Password: ngf1r3wall
2. Click the DASHBOARD tab. In the License section on the General page, the License State is displayed as DEMO mode.
As long as the Barracuda NG Firewall is not licensed, the License State is displayed as DEMO mode.
3. Click the arrow icon next to the Activation State entry and select Activate. The product activation window opens.
4. Fill out the activation form.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
5.
6.
7.
181
(Optional) Choose the option Save your customer data for later activations.
Click Activate. After the activation process successfully completes, you will receive a notification email
from Barracuda Networks.
The Barracuda NG Firewall automatically downloads and installs the purchased licenses. The license
state on the Dashboard > General page displays:
Step 2. Check the License Status
Go to the CONTROL > Licenses page and verify that all your purchased licenses are listed in the Active Licenses table.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
182
How to Activate and License a Barracuda NG High Availability Cluster
For a high availability cluster, each unit must have its own licenses. Both units must be joined in an HA cluster before activating the licenses, and
NG Admin must be able to connect to the Internet. You must activate the licenses for the secondary unit before activating the licenses for the
primary unit.
In this article:
Before You Begin
Step 1. Activate the Secondary Unit
Step 2. Activate and License the Primary Unit
Step 3. Verify the License Status on your High Availability Units
Troubleshooting
Before You Begin
Create an HA cluster by following the instructions described in How to Set Up a High Availability Cluster.
Step 1. Activate the Secondary Unit
Depending on which type of deployment you are using, complete one of the following activation procedures:
Hardware Unit – How to Activate and License a Standalone Hardware Barracuda NG Appliance
Virtual or Cloud Unit – How to Activate and License a Standalone Virtual Barracuda NG Firewall if you are using Barracuda NG Vx
units.
After NG Admin activates the unit, it recognizes its HA partner status and waits for the licenses to be activated and downloaded to the primary
unit. After the licenses have been successfully retrieved, a notification window appears, and the Activation State switches to Current.
Step 2. Activate and License the Primary Unit
Depending on which type of deployment you are using, complete one of the following activation procedures:
Hardware Unit – How to Activate and License a Standalone Hardware Barracuda NG Appliance
Virtual or Cloud Unit – How to Activate and License a Standalone Virtual Barracuda NG Firewall if you are using Barracuda NG Vx
units.
Following activation, licenses for the primary and secondary units are downloaded to the primary unit. The secondary unit automatically receives
its license via HA Sync.
Step 3. Verify the License Status on your High Availability Units
Both units in the HA cluster are now licensed. Verify that all your purchased licenses are listed on the Status > Licenses page and that the
status is Normal box operation.
Troubleshooting
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
183
Activating the primary unit prior to the secondary unit prevents the primary unit from retrieving the secondary unit's licenses. Reboot the primary
unit and perform a complete HA update to download and install the licenses correctly.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
184
Azure Licensing
By default, hardware and virtual NG Firewall licenses are bound to the MAC address of the first network interface. In Azure, MAC addresses may
change either when the VM is moved to a different host due to maintenance work, or when the VM is stopped and, upon restart, is assigned a
new host with a different MAC address. This causes problems for the traditional licensing approach.
As a solution, Microsoft assigns a unique 128bit identifier called Azure Unique ID to each new Azure VM. This ID does not change if the VM is
stopped or moved to a different host. It will change, however, if a snapshot is used to create a new instance. Both the PAYG and BYOL images
bind their licenses to the Azure ID.
In this article
Bring Your Own License Considerations
Hourly or Pay-As-You-Go License Considerations
Bring Your Own License Considerations
To license a BYOL image, you must purchase a license from Barracuda Networks that matches the Azure pricing tier. Upon activation, the
license is bound to the Azure Unique ID and the MAC address at the time of licensing. This MAC address is stored internally. If the physical MAC
address of the VM changes, the stored internal MAC address is used and the license validates as long as the Azure Unique ID does not change.
To see the UUID and MAC address the license is bound to, go to the CONTROL > Licensing page. The MAC addresses in the HostID column
may differ from the MAC in the Host IDs section if the underlying physical MAC address of the host has changed.
Hourly or Pay-As-You-Go License Considerations
The license is generated on first boot and bound to the Azure Unique ID of the Azure VM. License cannot be regenerated if the Azure ID
changes. Once the PAYG license has been generated, it can only be used on this Instance. It is not possible to use the same PAYG license on a
new PAYG image because the Azure IDs will not match. All licenses are included in the base license. The Host ID column of the CONTROL >
Licensing page shows the UUID of the PAYG license that must match with the UUID in the HOST IDs section:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Copyright © 2015, Barracuda Networks Inc.
185
Barracuda NG Firewall 6.1 Administrator's Guide - Page
186
Protected IP Count Policies
Barracuda NG Firewall VF and SF units are licensed based on the number of IP addresses being protected by the gateway. For more
information, see Licensing. This article explains the algorithms that are used to count the protected IP addresses. It also provides instructions on
how to specify counting policies when creating and configuring firewall rules.
In this article:
Viewing the Number of Protected IPs
Counting Policies
General Case
Uncounted IP Addresses
Redirected Destination
Site-to-Site VPN
Client-to-Site VPN
SSL VPN
Specifying Counting Policies
Protected and Unprotected Realms - General Overview:
Viewing the Number of Protected IPs
To view the number of protected IP addresses for a Barracuda NG Firewall, go to the FIREWALL > Dynamic page and click the Protected IPs t
ab. The table on this page provides information on the number of active licensed IP addresses. For more information on the FIREWALL > Dyna
mic page, see Dynamic Page.
Counting Policies
The following sections describe how IP addresses are counted for each type of connection.
General Case
Generally, the protected IP address counted is either the source or destination address, based on a comparison of the classification of incoming
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
187
and outgoing interfaces. The valid preference is the following:
1.
2.
3.
4.
Internal (LAN)
DMZ
Unspecified
External
For example, if the realm weight is the same from Internal01 to Internal02, the source IP address is counted. The same applies, vice versa, from
Internal02 to Internal01.
Classification of Incoming and Outgoing Interfaces:
Incoming
Outgoing
Trusted / Internal01/02
DMZ
Unclassified
Untrusted
Trusted / Internal01/02
Src
Src
Src
Src
DMZ
Dst
Src
Src
Src
Unclassified
Dst
Dst
Src
Src
Untrusted
Dst
Dst
Dst
Src
On the Network page, you can specify the realm category of an IP address:
1. Go to CONFIGURATION > Configuration Tree > Box > Network.
2. Click Lock.
3. In the IP Address Configuration table, double-click the IP address entry and select the realm weight from the Trust Level list.
For more information on configuring IP addresses, see Network.
Uncounted IP Addresses
The following IP addresses are NOT taken into account:
Source AND destination are site-to-site tunnel addresses (VPN relaying - VPN Tunnels in Star-Shaped Topologies).
Destination is a broadcast or multicast address.
Firewall rule results in a Block or Deny action.
Customers with legacy phion SF licenses, VPN users, and HTTP Proxy users are also not counted.
Any communication directed to the services running on the Barracuda NG Firewall gateway itself is not counted:
Mail Gateway
DNS Server/Forwarder
DHCP Server
Redirected Destination
If a redirection of the destination IP address is performed by the firewall rule (Dst NAT or Map), the translated destination IP address is counted
as protected.
Policy for Redirected Destination:
Site-to-Site VPN
The counting preference of protected IP addresses for Site-to-Site VPN tunnels is specified as follows:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
188
Source is counted as a protected IP address if the destination is routed via the tunnel.
Destination is counted as a protected IP address if the source originates from the tunnel.
If both options apply, neither source nor destination is counted. For more information on site-to-site tunnels, see Site-to-Site VPN.
Example Policy for Site-to-Site tunnels:
Client-to-Site VPN
Each client connected to a Client-to-Site VPN counts as one protected IP address.
SSL VPN
The number of protected IP addresses is taken from the client database and from configured resources such as the DMZ network. For more
information, see SSL VPN. Counting is specified as follows:
Source is counted as a protected IP address if the destination is routed via the tunnel.
Destination is counted as a protected IP address if the source originates from the tunnel.
If both options apply, neither source nor destination is counted.
Specifying Counting Policies
When creating or configuring firewall rules, you can also specify IP address counting policies in the Advanced Access Rule Settings.
1. In the left navigation pane of the firewall rule editor window, click Advanced from the Views menu.
2. In the Miscellaneous section, select one of the following options from the Policy list:
Count Source IP – Source is chosen as the protected IP address if the rule explicitly requests it.
Count Destination IP – Destination is chosen as the protected IP address if the rule explicitly requests it.
The source and destination are interchanged if the rule matches on reverse.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Copyright © 2015, Barracuda Networks Inc.
189
Barracuda NG Firewall 6.1 Administrator's Guide - Page
190
How to Manually Install License Files
If automatic license retrieval is not possible or you received the license files (*.lic) directly from Barracuda Networks Technical Support, install
these licenses manually on your Barracuda NG Firewall or Barracuda NG Control Center.
Manual License Installation
Import your licenses from the lic license files. The lic files can also be in a zip archive.
1. Go to CONFIGURATION > Configuration Tree > Box > Box Licenses.
2. Click Lock.
3. In the Licenses section, click + and select Import from Files or Import from zipped Archive.
4.
5.
6.
7.
Select your license files and click Open.
Click OK to close the Certificate View window.
Accept the End User License Agreement and click OK.
Click Send Changes and Activate.
Verify Installed Licenses
Open the CONTROL > Licenses page and verify that all licenses are installed successfully.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
191
Administration
You can use already existing services in your network, such as DNS, NTP or SCEP servers, when deploying the Barracuda NG. The Barracuda
NG Firewall supports multiple administrator accounts and restricting access based on source IP address or network.
Administrators
An administrator account on a Barracuda NG Firewall contains multiple parameters that specify the permissions and restrictions for an
administrator. Administrator rights are split into predefined administrative roles, defining which services an administrator is allowed to use and
which operations the administrator is allowed to perform within the different services.
For more information, see Managing Access for Administrators.
Changing the Root Password and Management ACLs
The Management ACL specifies which IP addresses can access the system. In the system access configuration, you can also change the
password for the root user.
For more information, see How to Change the Root Password and Management ACL.
Administrative Session Time Limits
Session timeouts mitigate the security risk from authenticated, unsupervised connections to the NG Firewall by defining the session time-out for
idle administrative sessions. After the session has been terminated, the admin has to log in again.
For more information, see How to Set Idle Administrative Session Time Limits.
DNS
Introduce either a network DNS server or a DNS server assigned by your ISP on the Barracuda NG Firewall. When resolving DNS requests, the
Barracuda NG Firewall can alter the response (DNS Interception) and redirect or block queries for specific domains by using black and
whitelisting. You can use the same namespace internally and externally and redirect external clients to use one IP address, and internal clients to
use an internal path to the same hostname (Split DNS). DNS queries can be forwarded to or cached from the DNS server.
For more information, see How to Configure DNS Settings and How to Configure DNS Interception.
NTP
You can define one or more NTP server(s) to act as a master clock for the Barracuda NG Firewall. The current time on the system is
synchronized via Network Time Protocol (NTP). Time settings apply to all time-related services on the Barracuda NG Firewall and affect data
accounting, logging, and event notifications. Correct time settings are also important for HA synchronization.
For more information, see How to Configure Time Server (NTP) Settings
Global HTTP Proxy Settings
To configure the Barracuda NG Firewall to connect to the Internet via a proxy server, specify global connection and authentication settings for
your system.
For more information, see How to Configure Global HTTP Proxy.
Email Notifications
Some services, such as the virus scanner, can send email notifications. You can configure the email address and the SMTP server used to for
email notifications.
For more information, see How to Configure the System Email Notification Address.
SCEP
The SCEP (Simple Certificate Enrollment) protocol supports secure certificate issuing. You can configure the NG Firewall to use a SCEP server
to use in TINA or IPsec Site-to-Site VPN tunnels.
For more information, see How to Configure SCEP Settings.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
192
Managing Access for Administrators
On a standalone Barracuda NG Firewall system, the administrative concept offers different administrative roles with special access rights and
restrictions. Initially, every Barracuda NG Firewall is managed by the user root who has unlimited access rights to the entire system when logged
into the interface or serial console.The user root has the ability to grant system access to other administrators who, depending on the assigned
user rights, are allowed or denied to perform certain operations on the Barracuda NG Firewall.
Admin Accounts
Create Administrator accounts on your standalone Barracuda NG Firewall or for the box level of the Barracuda NG Control Center. Every
administrative user is assigned one of the preconfigured admin roles.
For more information, see How to Create a New Admin Account.
Authentication
Root and administrative users are authenticated either through a certificate containing an RSA key or a password. A combination of password
and key is also possible.
For more information, see How to Create a New Admin Account and How to Configure Certificate Based Authentication for the Root User.
Default User Accounts
Every Barracuda NG Firewall has a root and service user by default. The service user is used to grant limited console access to the NG Firewall
for support purposes. The service user is disabled by default.
For more information, see How to Configure System Access for the Service User.
Serial Access
Management and terminal access to the Barracuda NG Firewall is possible, via the serial interface COM1, by using a terminal emulation
program or when connected to a dial-in modem.
For more information, see How to Enable System Access via Serial Console.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
193
How to Create a New Admin Account
Admin profiles specify which configuration areas and tasks administrative users can access and change on a standalone Barracuda NG Firewall
or Barracuda NG Control Center on box level. Admin users can log into the system using the credentials specified in their profile and view or edit
the services and settings defined in the administrative roles assigned to them.
In this article:
Administrative Roles
Create an Administrator Profile
Administrative Roles
Admin users can view or edit settings and services on the Barracuda NG Firewall according to their assigned roles.
Click here for administrative role permissions and restrictions
Box Menu
Software
Item
Mail
Security
Audit
Cleanup
No
No
Yes
No
No
Update
Pattern
Yes
No
No
Yes
No
No
Disable/Enab
le Pattern
Update
Yes
No
No
Yes
No
No
Software
Item
Manager
Operator
Mail
Security
Audit
Cleanup
Yes
No
No
Yes
Yes
No
Create a DHA
box
Yes
No
No
No
No
No
Create a PAR
file
Yes
No
No
No
No
No
Create a
repository
Yes
No
No
No
No
No
Create a
server
Yes
No
No
No
No
No
Create a
service
Yes
No
No
No
No
No
Kill
configuration
sessions
Yes
No
No
No
No
No
HA
synchronizat
ion
Yes
No
No
Yes
No
No
Config
Box Menu
Operator
Yes
Antivirus
Box Menu
Manager
Software
Item
Manager
Operator
Mail
Security
Audit
Cleanup
Yes
Yes
No
Yes
No
No
Activate new
network
configuratio
n
Yes
Yes
No
No
No
No
Block a
server
Yes
Yes
No
No
No
No
Block a
service
Yes
Yes
No
No
No
No
Control
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Box Menu
Time control
Yes
No
No
No
No
No
Delete Wild
Route
Yes
Yes
No
No
No
No
Import
license
Yes
No
No
No
No
No
Kill sessions
Yes
Yes
No
No
No
No
Firmware
Restart
Yes
Yes
No
No
No
No
Reboot/Shut
down Box
Yes
Yes
No
No
No
No
Remove
license
Yes
No
No
No
No
No
Restart
network
configuratio
n
Yes
Yes
No
No
No
No
Show
license
Yes
Yes
No
No
No
No
Start a
server
Yes
Yes
No
No
No
No
Stop a
server
Yes
Yes
No
No
No
No
Software
Item
DHCP
GUI
commands
Box Menu
Software
Item
Manager
Operator
Mail
Security
Audit
Cleanup
Yes
Yes
No
No
No
No
Yes
Yes
No
No
No
No
Manager
Operator
Mail
Security
Audit
Cleanup
Yes
Yes
No
Yes
Yes
Yes
Confirm
events
Yes
Yes
No
No
No
Yes
Delete
events
Yes
No
No
No
No
Yes
Mark events
as read
Yes
Yes
No
No
No
Yes
Set events to
silent
Yes
Yes
No
No
No
Yes
Stop alarm
Yes
Yes
No
No
No
Yes
Events
Box Menu
194
Software
Item
Manager
Operator
Mail
Security
Audit
Cleanup
Yes
Yes
No
Yes
Yes
No
Access to
trace tab
Yes
No
No
Yes
No
No
Remove
entries from
cache
Yes
No
No
Yes
No
No
Firewall
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Box Menu
Terminate
connections
Yes
Yes
No
Yes
No
No
Create
dynamic
rules
Yes
Yes
No
Yes
No
No
Kill a
process
Yes
Yes
No
Yes
No
No
Modify
connections
Yes
Yes
No
Yes
No
No
Modify
traces
Yes
No
No
Yes
No
No
Toggle
traces
Yes
No
No
Yes
No
No
View rules
Yes
No
No
Yes
No
No
Software
Item
Access
Control
Service
Box Menu
Operator
Mail
Security
Audit
Cleanup
No
No
Yes
Yes
Yes
Delete
resource
logs (box_)
Yes
No
No
No
No
Yes
Delete
service logs
Yes
No
No
No
No
Yes
Read
resource
logs (box_)
Yes
No
No
Yes
Yes
Yes
Read service
logs
Yes
No
No
Yes
Yes
Yes
Software
Item
Manager
Operator
Mail
Security
Audit
Cleanup
Yes
No
Yes
No
Yes
No
GUI
commands
Yes
No
Yes
No
No
No
View
Stripped
Attachments
Yes
No
Yes
No
Yes
No
Retrieve
Stripped
Attachments
Yes
No
Yes
No
No
No
Delete
Stripped
Attachments
Yes
No
Yes
No
No
No
Mail
Box Menu
Manager
Yes
Logs
Box Menu
195
Software
Item
Manager
Operator
Mail
Security
Audit
Cleanup
Enable
Commands
Yes
No
No
Yes
No
No
Block Sync
Yes
No
No
Yes
No
No
Software
Item
Manager
Operator
Mail
Copyright © 2015, Barracuda Networks Inc.
Security
Audit
Cleanup
Barracuda NG Firewall 6.1 Administrator's Guide - Page
196
SSL-Proxy
Access
Cache
Management
Yes
No
No
Yes
No
No
Ticket
Management
Yes
No
No
Yes
No
No
Cert
Authorities
Management
Yes
No
No
Yes
No
No
XML
Services
Management
Yes
No
No
Yes
No
No
Create an Administrator Profile
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Administrators.
Click Lock.
In the Administrators section, click + to add an administrator account.
Enter a unique Name for the account and click OK. The Administrators window opens.
Do NOT use the following names because they are reserved by the system: master, ha, root, bin, adm, daemon, lp, system,
sync, shutdown, halt, mail, operator, nobody, support, uucp.
5. Enter the Full Name of the administrator or a description for the account.
6. In the Assigned Roles table, add the appropriate administrative roles for the user. For a description of roles, see the Administrative
Roles section.
7. If you wish to grant permission for shell level access, select an option from the System Level Access list. You can select:
No OS Login – Shell access is denied.
Standard OS Login – Allows access on the OS layer via a default user account (home directory: user/phion/home/username).
Restricted OS Login – Permits access via a restricted shell (rbash) with limitations (e.g., specifying commands containing
slashes, changing directories by entering cd, …). A restricted login confines any saving action to the user's home directory.
8. Select the Authentication Level that is required to access a system.
9. If external authentication is required, select the corresponding method from the External Authentication field.
10. When using a password, select the corresponding scheme from the Password Validation list.
11. Enter the External Login Name for the authentication scheme if it is different than the admin account name.
12. Enter the password for the Barracuda NG Admin login. When creating an account, the new password must be entered in both the Curre
nt and New fields, even though the password has not yet been created. The password must be confirmed by re-entering it in the Confir
m field.
13. Import the Public RSA Key if required.
14. If required, use the Peer IP Restriction table to set an access restriction on IP address and/or subnet level on which Barracuda NG
Admin runs.
15. From the Login Event list, select how a login is recorded. You can select.
Service Default (default) – refers to the settings made within the Barracuda NG Control Center Access Notification (see How to
Configure Access Notifications).
Silent – suppresses any event notification.
16. Click Send Changes and Activate.
Your admin user can now log into the Barracuda NG Firewall or Barracuda NG Control Center box and view or edit the services according to their
assigned roles.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
197
How to Configure Certificate Based Authentication for the Root User
Login and authentication of the administrative user root on a Barracuda NG Firewall are processed using a two-factor authentication mechanism.
The authenticity of the admin workstation is verified using a preferably encrypted certificate. In addition, the administrator has to authenticate
himself or herself using a personal password. When creating new administrator profiles, Barracuda Networks recommends using certificates/keys
instead of passwords whenever possible to avoid the exchange of security-relevant information when authenticating via public-key cryptography.
Certificates in PEM format cannot be used on Barracuda NG Firewall systems.
In this article:
Creating and Importing Certificates
Configure Certificate Based Authentication
Creating and Importing Certificates
Create a certificate on the Barracuda NG Firewall using Barracuda NG Admin:
1.
2.
3.
4.
Open the OPTIONS tab in the top left corner of the screen and select Settings.
Expand the Certificates and Private Keys section.
Click Create New Certificate/Key.
Fill in the certificate details (e.g., Country, State, Name, Expiring date) and click OK.
The certificate is generated by using Microsoft Strong Cryptographic Provider v1.0 and can be imported from the Microsoft Certificate
Management Store. It is displayed in the certificates list and provides key information in the Hash and Public Key column.
Configure Certificate Based Authentication
To configure certificate authentication for the root user, import the root public RSA key. If a key for automated SSH login is required, add it to the
authorized root keys.
1.
2.
3.
4.
5.
6.
7.
8.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
From the Configuration Mode menu, select Switch to Advanced View.
In the left navigation pane, click Advanced System Access.
Click Lock.
Select the Authentication Mode for system access.
Import the Root Public RSA Key for the root user.
In the Authorized Root Keys field, enter the public keys that are assigned to your root user in OpenSSH format, one key per line.
Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
198
How to Configure System Access for the Service User
In some cases, you need to provide console access to an unprivileged administrator. The service user is disabled by default, as long as the
license is valid or within the grace period. The service user is displayed as user phion when logged in.
Configure System Access for the Service User
Enable and set a password for the service user.
1.
2.
3.
4.
5.
6.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
In the left menu, click System Access.
From the Configuration Mode menu, select Switch to Advanced View.
Click Lock.
In the Service Password section, enter the password for the service user.
Uncheck the Disable Service User checkbox.
As long as the service user is enabled, it is possible to log into the console of your Barracuda NG Firewall with the following
credentials: phion / service user password.
7. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
199
How to Enable System Access via Serial Console
You can configure several access types for the serial console of your Barracuda NG Firewall. Access via serial console is enabled for 'console
only' by default.
The following access types are available:
ConsoleOnly (COM1) – Enables system access using a terminal emulation program such as hyperterm via the serial interface COM1
(terminal emulation: ansi; baud rate: 19200).
Management Only – Enables system access with the Barracuda NG Admin application via COM1. The default Mgmt Baud Rate setting
is 57600.
Console (COM1) And Management – Enables serial and management access. The default Mgmt COM Port setting is COM1. The
default Mgmt Baud Rate setting is 57600.
DialinModem – Enables console access via a 56k dial-in modem.
Configure Serial Console Access
To enable system access via serial console,
1.
2.
3.
4.
5.
6.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings page.
In the left menu, click System Access.
Click Lock.
Enable Serial Access if you want to provide console access. To edit serial access settings,
Click Edit in the Serial Settings section.
Select the applicable access type from the Access Types list and adjust the settings if required. For example, enter the modem details
in the Modem Init String field.
7. Click OK.
8. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
200
How to Change Admin Credentials on Stand-alone NG Firewalls
In the NG Admin settings, you can configure the password and key for administrators of stand-alone NG Firewalls.
In this article:
Change Password for Non-Root Admins
Change Administrator Key for Non-Root Admins
Change Password for Non-Root Admins
Change the password used to authenticate when connecting to a stand-alone firewall.
1.
2.
3.
4.
5.
In the top left of NG Admin, click OPTIONS and select Settings.
Expand Admin and CC Settings.
Click the list below the Admin and CC Settings and select Change Admin Credentials for Local Admin (Single Box).
Enter the management IP address as the Box IP Address.
In the Change Administrator Password section enter:
Login Name
Old Password
New Password and Confirm
6. Click Change Password.
Change Administrator Key for Non-Root Admins
Change the client certificate used to authenticate when connecting to a stand-alone firewall.
1.
2.
3.
4.
5.
6.
In the top left of NG Admin, click OPTIONS and select Settings.
Expand Admin and CC Settings.
Click the list below the Admin and CC Settings and select Change Admin Credentials for Local Admin (Single Box).
Enter the management IP address as the Box IP Address.Change the Administrator Key:
In the Change Administrator Key section enter the Login Name and Password.
Click Import Public and upload the new certificate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
7. Click Change Admin Key.
Copyright © 2015, Barracuda Networks Inc.
201
Barracuda NG Firewall 6.1 Administrator's Guide - Page
202
How to Change the Root Password and Management ACL
Restricting access to the management interface of the Barracuda NG Firewall is important for network security. Barracuda Networks strongly
recommends changing the root password after the first login. Use the management access control list to whitelist IP addresses that are allowed to
connect via NG Admin to the Barracuda NG Firewall or NG Control Center.
In this article:
Change the Root Password
Manage the Management Access Control List
Change the Root Password
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
In the left menu, click System Access.
Click Lock.
In the Root Password section, enter the password for the root user.
Passwords can consist of small and capital characters, numbers, and non alpha-num symbols. Barracuda NG Admin rates the
password strengh according to the entered caracters. For more information, see the NG Admin password strength policy in Co
nfiguration Pages - Access and Controls.
5. Click Send Changes and Activate.
Manage the Management Access Control List
Enter the IP addresses or networks for which access to the management IP on TCP ports 22 (secure shell) and 800-820 is granted. Access from
all other addresses to these port/addresses are denied. By default, access is allowed from an arbitrary address. Changing the ACL does not
terminate active admin sessions. To enforce ACL changes, manually terminate active sessions on the FIREWALL > Sessions page.
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
In the left menu, click System Access.
Click Lock.
In the Access Control List section, click + and add the IP addresses from which the Barracuda NG Firewall can be administered.
Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
203
How to Configure DNS Settings
The Barracuda NG Firewall can act as an authoritative DNS server, returning definitive answers to DNS queries about domain names installed in
its configuration. With local DNS caching enabled, DNS queries will be forwarded to or cached from the specified DNS servers and DNS queries
can be logged.
In this article:
Configure Basic DNS Settings
Configure Advanced DNS Settings
Configure Caching DNS Settings
Configure Slave DNS Settings
Configure Basic DNS Settings
1.
2.
3.
4.
5.
6.
7.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
In the left menu, click DNS Settings.
From the Configuration Mode menu, select Switch to Advanced View.
Click Lock.
Enter the Box DNS Domain that the Barracuda NG Firewall belongs to.
In the DNS Server IP table, specify the DNS server's IPv4 and/or IPv6 addresses to be queried by the Barracuda NG Firewall.
Click Send Changes and Activate.
Configure Advanced DNS Settings
1. From the Configuration Mode menu, select Switch to Advanced View.
2. Click Lock.
3. In the DNS Search Domains table, add the names of the domains that should automatically be appended to an alias name when
performing a DNS query. Separate multiple domains with spaces.
4. When using multiple DNS servers,
a. Select if DNS queries should regularly rotate between the servers from the DNS Query Rotation list.
b. Specify the DNS Query Timeout in seconds. When the timeout is exceeded, the next DNS server is queried.
5. To add local hosts,
a. Click + in the Known Hosts section.
b. Enter a Name for the local host and click OK.
c. Enter the Host IP address.
d. Enter Fully Qualified Domain Name (FQDN), with dots as namespace delimiter.
e. Add Aliases if applicable (no dots).
f. Click OK.
6. Click Send Changes and Activate.
The name and IPv4 addresses of local hosts are added to the system /etc/hosts file. By default, this file is consulted first for name resolution.
It is useful to specify address/name pairs of locally known hosts for which no name resolution via DNS is available. The name and alias are used.
Configure Caching DNS Settings
Do not install both the Forwarding/Caching DNS (bdns) service and a running DNS service. The Forwarding/Caching DNS (bdns)
configuration will collide with the DNS service.
1.
2.
3.
4.
5.
6.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
From the Configuration Mode menu, select Switch to Advanced View.
In the left menu, click Caching DNS Service.
Click Lock.
From the Run Forwarding/Caching DNS list, activate the local caching/forwarding DNS service .
From the Run Slave DNS list, activate a local slave DNS service if applicable. Configure the settings as described in Configure Slave
DNS Settings .
7. From the Query Source Address list, select which IP address to use as source address when querying the DNS or Master DNS
servers. You can select one of the following options:
Wildcard (default) – IP selection is accounted for dynamically according to definitions in the routing table.
VIP – (For Barracuda NG Firewalls that are administered by a Barracuda NG Control Center) - Uses the system’s Virtual
Management IP address.
MIP – Uses the system’s management IP address, which is the Main Box IP.
Other – Select this check box to explicitly specify an IPv4 or IPv6 address.
8. In the DNS Query ACL table, add the single IPv4 / IPv6 addresses or netmasks that can access the DNS service via an App Redirect fir
ewall rule.
9.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
204
9. Enable Log DNS Queries to log every DNS query.
10. Click Send Changes and Activate.
Configure Slave DNS Settings
When activated, configure the local slave DNS service. The slave DNS service gets its slave zone configurations from the entries in the DNS
Slave Zones table and the configuration files from the servers specified in the Default Master DNS table.
1. Add the Default Master DNS servers that the slave can query for zone files. You can enter a single DNS server or a list of DNS servers
(IPv4).
2. In the DNS Slave Zones table, click + to add an entry for the slave zone.
3. Enter the fully qualified domain name of the zone in the Name field and click OK. The DNS Slave Zone window opens.
4. Specify the DNS Zone Type. You can select:
Forward (default) – Provides IP addresses for known hostnames.
Reverse – Provides hostnames for known IP addresses.
Specify the network and netmask that the specified zone resides in in the Reverse Lookup Net and Reverse Lookup
Netmask fields.
Both – Provides both.
Specify the network and netmask that the specified zone resides in in the Reverse Lookup Net and Reverse Lookup
Netmask fields.
5. In the DNS Master IP table, add the DNS servers that the local slave DNS service queries for this zone. You can enter a single DNS
server or a list of DNS servers (IPv4). If specified, this setting overrides the globally defined DNS Master IP address. If left empty, the
field is ignored.
6. From the Transfer Source Address list, select which IPv4 address to use as source address when querying the master DNS servers.
This IP address will override the globally defined value. You can select:
Wildcard (default) – IP address selection is accounted for dynamically according to definitions in the routing table.
Query-Source – Uses the IP address of the client that initiates the query.
VIP – (For Barracuda NG Firewalls that are administered by a Barracuda NG Control Center) Uses the system’s virtual
management IP address.
MIP – Uses the system’s management IP address, which is the main box IP address.
Other – Select this check box to explicitly specify an IPv4 or IPv6 address.
7. Click OK.
8. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
205
How to Configure DNS Interception
With the DNS Interception feature, you can configure a policy to redirect or block queries for specific domains. You can also configure a whitelist
to create exceptions for queries to subdomains of the intercepted domains. Whitelisting always takes precedence over the DNS Interception
policies. Follow the instructions in this article to add domains to the DNS Interception whitelist and policy. The DNS Interception feature requires a
running Caching DNS.
In this article:
DNS Interception Process
Add Domains to the Whitelist
Add Domains to the DNS Interception Policy
DNS Interception Process
The DNS Interception feature handles DNS requests as follows:
1. A host behind the Barracuda NG Firewall sends a DNS query to the DNS server.
2. If the DNS request is for a domain that is in the DNS Interception whitelist, the request is not intercepted by the Barracuda NG Firewall,
even if it is listed in the DNS Interception policy.
3. If the DNS request is for a domain that is listed in the DNS Interception policy, the Barracuda NG Firewall intercepts the request.
According to the policy settings, the Barracuda NG Firewall then answers the request with one of the following actions:
Blackhole (NXDOMAIN reply) – Returns a non-existent domain message (NXDOMAIN) to the client indicating that the
requested hostname does not exist.
No Data – Returns the information that, although the domain exists, there is no IP (no data) assigned to it.
Return Other Domain (CNAME) – Returns the hostname that is specified in the policy settings.
Return IP Address – Returns the IP address that is specified in the policy settings.
Add Domains to the Whitelist
To add a domain to the DNS Interception whitelist:
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
From the left Configuration menu, select DNS Interception.
Click Lock.
In the DNS Interception Exceptions section, click the plus sign (+).
In the Whitelisted Domains window, enter the Matched Domain that must be allowed. For example, if you blocked the google domain
but want to allow the Google mail service, enter mail.google.com.
6. Click OK.
7. Click Send Changes and Activate.
Add Domains to the DNS Interception Policy
To add a domain to the DNS Interception policy:
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
From the left Configuration pane, select DNS Interception.
Click Lock.
In the DNS Interception Policy section, click the plus sign (+).
In the Intercept Domains window, specify the following settings:
Matched Domain – Enter the domain that must intercepted. You can use the asterisk (*) or question mark (?) as wildcard
characters. For example, if you want to intercept queries for the www.google.com domain, you can enter *.google.com or *
.google.?om.
Action – Select how the intercepted queries are answered. Depending on which action you select, you might also have to
specify these settings:
Returned IP – If you select the Return IP Address action, enter the IP address that is returned to the user.
Returned Domain – If you select the Return Other Domain (CNAME) action, enter the domain that the queries are
redirected to.
6. Click OK.
7. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
206
How to Configure Time Server (NTP) Settings
Precise timekeeping is very important for the Barracuda NG Firewall and NG Control Center. HA synchronization, data accounting, NG Control
Center configuration updates, logging, event notification, and other time-based services rely on a correct time system. The NTP daemon listens
on port UDP/123 of the management IP address and, if remotely managed, the VIP address of the NG Firewall. The Barracuda NG Firewall
supports two methods to synchronize the time:
NTP Servers – The Barracuda NG Firewall acts as a client and retrieves and sets the time according to the time retrieved from the NTP
server. You can use multiple NTP servers. The time deviation between the NTP server and the Barracuda NG Firewall must be less than
1000 seconds for the synchronization to succeed. To continuously synchronize the time with a NTP server, you must enable the NTP
daemon on the NG Firewall. If multiple time servers are used, the time server with the lower stratum value is preferred.
NTP Peers – To keep the time in your network synchronized when the NTP servers are unavailable, use the two-way NTP peer
synchronization. NTP peers will converge toward a median time in multiple steps. No synchronization step can exceed two minutes. This
means that two systems might take some time to synchronize. You can use MD5, SHA, SHA1, Ripe-MD160 and autokey authentication.
When you run the NTPd, your system becomes vulnerable to NTP exploits and UDP-based DoS attacks. Never use untrusted
reference time servers or run a time server in a hostile environment.
In this article:
Step 1. Configure Time Settings
Step 2. Configure the Time Server
Step 3. (optional) Configure NTP Peers
Event Processing
NTP Troubleshooting
Step 1. Configure Time Settings
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
In the left menu, click Time Settings / NTP.
Click Lock.
Select your Timezone in the form country/city.
You can use Etc/GMT time, or UTC. Etc/GMT times do not support daylight saving time (DST). When using a Barracuda NG
Control Center for multiple systems in different time zones, consider using UTC for all your systems.
5. Enable Set HW Clock to UTC to protect your system against unexpected time lapses caused by daylight saving time (DST).
6. Click Send Changes and Activate.
Step 2. Configure the Time Server
Configure the NTP servers you are using to set and synchronize the time for your Barracuda NG Firewall. NTP servers must be reachable from
the management IP address of the NG Firewall or NG Control Center.
1.
2.
3.
4.
5.
6.
7.
8.
9.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
In the left menu, click Time Settings / NTP.
Click Lock.
Enable NTP sync on Startup to synchronize with an NTP server via ntpdate when starting. (You can also run an NTP daemon on the
system for continuous time synchronization.)
In the Time Server IP table, add the IP address of the NTP time server(s). A remote, managed NG Firewall as an NTP server can be
used by entering its VIP address.
Enable Start NTPd to synchronize the NTP daemon with the NTP time server(s).
Set the Local Clock Stratum value for the NTPd. If you are configuring an NG Control Center, make sure to use a stratum value lower
than the default stratum (10) of the NG Firewall.
(optional) Select the events that you want to be notified about (Event-IDs 2070-2073) in Event on NTPd:
start-failure (default)
+stop-failure
++start-success
+++stop-success
The list is additive. Events further down the list automatically include all the events that are listed before them.
Click Send Changes and Activate.
Step 3. (optional) Configure NTP Peers
Configure the NTP peers in your network. NTP peers should be on the same stratum. To authenticate NTP peers, you can choose between
passphrase/MD5 and NTP autokey authentication. NTP peers must be reachable from the management IP address of the NG Firewall.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
207
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
In the left menu, click Time Settings / NTP.
Click Lock.
In the Time Peers section, click + to add your NTP peers. The Time Peers window opens.
Specify the following settings for each peer:
Peer IP Address – Enter the IP address for the NTP peer.
Peer Authentication Type – Select None, MD5, SHA, SHA1, Ripe-MD160 or Autokey authentication.
(MD5,SHA,SHA1, RipeMD160 authentication only) Peer Authentication ID – Enter a number between 0 and 1000000. You
must use the same Peer Authentication ID on all peers.
(MD5,SHA,SHA1, RipeMD160 authentication only) Peer Authentication – Enter the NTP peer authentication string.
(Autokey authentication only) Peer Host Name – Enter the FQDN for the trusted NTP peer.
(Autokey authentication only) Trusted Public Key – Import the public key for the NTP peer.
6. Click OK.
7. If you are using NTP autokey authentication, click Set next to NTP Autokey Configuration. The NTP Autokey Configuration window
opens.
a. Enter the NTP Key Password which is used to encrypt the private key.
b. Click Create New NTP Key.
c. Click OK. The NTP certificate is created.
d. Click Ex/Import and select Export to File. Use the public key to authenticate to other NTP peers.
8. Click Send Changes and Activate.
Event Processing
The event setting only pertains to NTPd behavior during controlled start or stop sequences. You will not be notified when NTPd is killed manually
or just dies unexpectedly. Events are also triggered when the NTPd is restarted on the Box page with the following options:
Restart NTP – The control daemon restarts the NTPd.
Sync – Starts the synchronization processes with the ctrltime script, which stops the NTPd and then executes ntpdate on port 123.
NTP Troubleshooting
On the command line, enter: ntpq -p to check which NTP servers and peers your Barracuda NG Firewall is using. See below for an example of
an NG Firewall using one NTP server (10.0.10.44) and three NTP peers. For more information, see http://ntp.org
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
208
How to Set Idle Administrative Session Time Limits
Limit the length of idle sessions for administrators to specify login password and session timeout behavior of the Barracuda NG Firewall. After the
initial login with password, certificate, smartcard, or eToken, a session password is dynamically created and used for subsequent access. The
session timeout sets the time until the session password is discarded and the user must log in again.
Configure Session Limits
1.
2.
3.
4.
5.
6.
7.
8.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Control.
In the left menu, select Administrative Sessions.
Click Lock.
In the NG Admin Max. Idle field, specify the maximum number of minutes that a Barracuda NG Admin session can be idle before it is
closed (default: 60). After the session is closed, you must log back in.
In the NG Admin Max. Idle field, specify the maximum number of minutes that a Barracuda NextGen Admin session can be idle before it
is closed. After the session is closed, you must log back in.
In the Console Max. Idle field, specify the maximum number of minutes that a shell/SSH session can be idle before it is closed.
(optional) To use session passwords, set Disable Session Passwords to yes. This will generate a session password after successful
authentication. Recommended for smartcard or eToken authentication.
Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
209
How to Configure Global HTTP Proxy
Configure the global HTTP proxy settings for the Barracuda NG Firewall. Select the unit's Internet connection and specify the connection details
and authentication settings.
Configure HTTP Proxy Settings
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
Click Lock.
In the left navigation pane, select HTTP Proxy.
Select the Internet Connection Type for the system. If you are using a proxy server to connect, select HTTP/S. Only select Direct
Access if the system is directly connected to the Internet.
5. Enter the IP address of your proxy server and specify
the listening port for the proxy.
6. In the Proxy User and Password sections, enter the HTTP/S proxy user credentials for proxy authentication.
7. In the Proxy User Domain field, enter the domain for the HTTP proxy user.
8. To join a domain, go to the Control > Box page. From the Domain Control menu in the left navigation pane, click Register Proxy at
Domain.
Note: Not all services use NTLM or MS-CHAPv2 authentication.
9. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
210
How to Configure the System Email Notification Address
Some services on the F-Series Firewall can be configured to send email notifications. The configured email address is used for both the sender
(to) and the source (from) in the notification emails.
Services using system email notifications
Advanced Threat Detection (ATD)
Configure Email Notification
1. Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
2. Click Lock.
3.
4.
5.
6.
In the left navigation, select Email Notifications.
In the Email Address section, enter the address where all email notifications should be sent to.
In the SMTP Server field, enter the hostname or IP address of the SMTP server that should be used wh
en sending email notifications.
Click Send Changes and Activate.
All services that are configured to send notifications will now send emails to the specified address if required.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
211
How to Configure SCEP Settings
SCEP (Simple Certificate Enrollment Protocol) supports the secure issuing of certificates to network devices in
a scalable manner, using existing technology whenever possible. After configuring SCEP on the Barracuda
NG Firewall, you can configure TINA and IPsec VPN tunnels to use SCEP with X.509 certificates.
The SCEP protocol supports the following operations:
CA and RA public key distribution
Certificate enrollment
Certificate query
CRL query
For more information about the SCEP protocol, see http://tools.ietf.org/html/draft-nourse-scep-17.
In this article:
Before you Begin
Configure SCEP
Configure VPN Tunnels with SCEP
Before you Begin
When sending SCEP requests to a DNS hostname instead of a server IP address, verify that the DNS resolver of the gateway has been
configured and is able to resolve it.
Configure SCEP
Connect the SCEP server to the Barracuda NG Firewall and configure the settings for your certificate requests.
Step 1. Configure SCEP Server Settings
1.
2.
3.
4.
5.
6.
7.
Go to CONFIGURATION > Configuration Tree > Box > Administrative Settings.
In the left menu, expand Configuration Mode and click Switch to Advanced.
In the left menu, click SCEP.
Click Lock.
Enable SCEP.
Next to SCEP Settings, click Set/Edit. The SCEP Settings window opens.
In the SCEP Server IP or Hostname field, enter the IP address or hostname of the SCEP server where the SCEP requests will be sent
to.
8. In the SCEP URL path field, enter the complete URL path of the SCEP server destination.
9. To configure HTTP Authentication for the SCEP server, click Set or Edit. The SCEP HTTP Server Authentication windows opens.
10. Specify the Authentication
Type. You can select:
None – Only a password is used.
Enter a Password.
Basic-Authentication
– No external authentication, only username and password.
Enter Username and Password.
NTLM-Authentication – NTLM authentication is used.
a. Enter Username and Password.
b. Set the Domain where the user is located.
11. Click OK.
Step 2. Configure X509 Request Settings
1.
Specify the Common Name (CN) of the certificate (default: $BOXNAME). This value will be replaced
with the real hostname of the box when the request is created.
2.
In the Alternative Name field, specify the alternative name of the certificate (default: IP:$BOXIP). This value
will be replaced with the real IP address of the box when the request is created.
3.
Add any applicable information to the certificate request fields.
The X509 Key Usage table defines specific key usage. Leave blank for general purpose key usage. Key pairs may be
intended for particular purposes, such as encryption only, or signing only. The usage of any associated certificate can be
restricted by adding key usage and extended key usage attributes to the PKCS#10.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
4.
212
Specify the SCEP Password Policy. You can select:
No-Password – No challenge password will be included in the certificate request.
Password-from-Configuration – The challenge password is statically configured on the Barracuda NG Control Center and will
be included in the certificate request.
Enter the static challenge SCEP Password.
Enter-Password-at-Box – The challenge password will be prompted at the box when the certificate request is created.
Get-Password-From-Website – The challenge password is fetched from a website (typically the CA itself).
a. In the SCEP Password URL Path field, enter the search path required when requesting the password from the CA
website.
b. In the SCEP Password Search Pattern field, enter the text to search for when requesting the password from the CA
website.
5. Click OK.
Step 3. Configure Connection Details
Use the systems HTTP proxy settings or configure an explicit proxy connection.
1.
From the Proxy Settings list, select whether to use the system settings or define explicit settings.
2. When using an explicit proxy, click Set/Edit. The SCEP HTTP Proxy Settings window opens.
a. Enter the Proxy IP Address of the proxy server.
b. In the Proxy Port Number field, enter the TCP port number on which the proxy server listens for requests (default: 3128).
c. Select the Proxy Authentication Type used at the proxy server and fill in the
credentials required for
authentication.
3. Click OK.
4. Import the SCEP HTTPS client key and certificate.
Step 4. Configure Encoding Parameters
Specify the format in which the transaction ID field should be sent to the SCEP server and specify encryption
settings.
1.
From the Transaction ID Encoding list, specify the format for the transaction ID field:
Binary – The transaction ID field is sent in a binary format.
Text – The transaction ID field is sent in base64 encoded text format.
Some SCEP servers support both binary and text format for the transaction ID. When experiencing
problems with the binary format, switching to text format might help.
2.
From the PKCS7 Cipher list, select the encoding cipher for use when communicating with the CA, accordin
gly to the CA settings.
3.
From the PKCS7 Hash list, select the hashing method for use when communicating with the CA, accordingl
y to the CA settings.
4.
Enable PKCS7 Replay Protection to protect your system from replay attacks.
5.
From the Select Encryption Certificate list, select the certificate encryption method.
6.
Click Send Changes and Activate.
SCEP is now configured. Unless the SCEP password policy was set to Enter-Password-at-Box, no further intervention is required for successful
operation. However, Barracuda NG Admin offers options to interact with the SCEP subsystem in order to display
SCEP status, re-initiat
e pending requests, force SCEP update or retry and set the SCEP password.
The SCEP status and control menus are available on the CONTROL > Box page under the SCEP Control menu, when connected to the
Barracuda NG Firewall unit. The files held by the SCEP subsystem are stored in the /opt/phion/certs/scep-* directory on the box.
Configure VPN Tunnels with SCEP
Configure your TINA and IPsec VPN tunnels to use SCEP with X.509 certificates. Import
the root certificate and configure your
VPN tunnel to accept SCEP as an identification type. For general information about configuring VPN tunnels
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
213
with the GTI editor, see How to Create a VPN Tunnel with the VPN GTI Editor.
Step 1. Import the Certificate
1.
2.
3.
4.
5.
Open to the VPN GTI Editor page for your range or cluster.
Click Lock.
Click the Root Certificates tab.
Right-click the table and select Import PEM from File.
Import the root certificate used by the CA for signing the SCEP certificates.
To specify the SCEP authentication method at the GTI level, GTI group level, or individually per tunnel, select the Just like any other VPN
tunnel setting authentication method.
Step 2. Configure the VPN Tunnel
To configure your VPN tunnel to accept SCEP as an identification type:
1.
2.
3.
4.
Click the TINA or IPSec tab.
From the Accept Identification Type list, select Box SCEP Certificate (CA signed).
Click OK.
Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
214
Authentication
Beyond its powerful network firewall and VPN technologies, the Barracuda NG Firewall provides seamless integration with all authentication
methods (e.g., Active Directory, RADIUS, LDAP/s, etc.) to facilitate policy configuration based on the actual user and group information and not
just IP addresses. User visibility and control is a significant factor for handling network traffic and creating policies. If you do not have an external
authentication server available, you can create and maintain a list of local users and groups on the Barracuda NG Firewall. The Barracuda NG
Firewall can also use the Barracuda DC Agents on the MSAD server and the Barracuda Terminal Server Agents on the Microsoft Terminal server
to provide fully transparent user authentication.
You can use local and external authentication for the following services and features:
Forwarding Firewall and Firewall Authentication
HTTP Proxy
URL Filter
VPN Service (C2S VPN and SSL VPN)
Access Control Service
FTP Gateway
SSH Proxy
Mail Gateway
Administrator Accounts
External Authentication
By integrating the Barracuda NG Firewall with your authentication server, you can configure policies that apply to specific users and groups. The
Barracuda NG Firewall lets you configure a range of external authentication schemes, such as
Microsoft Active Directory (MSAD)
Barracuda DC Agent
MS-CHAP
Lightweight Directory Access Protocol (LDAP)
Remote Access Dial In User Service (RADIUS)
Terminal Access Controller Access Control System (TACACS+)
RSA-ACE SecurID
MSNT
Barracuda Web Filter Authentication
Barracuda Terminal Server Agent
WiFi AP Authentication
Online Certificate Status Protocol (OCSP)
Kerberos
Local Authentication
If no external authentication service is available, NGF Local Authentication locally manages users and groups on your Barracuda NG Firewall.
For more information, see: How to Configure NGF Local Authentication.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
215
How to Configure MSAD Authentication
Microsoft Active Directory (MSAD) is a directory service that allows authentication and authorization of network users. On the Barracuda NG
Firewall you can configure MSAD as an external authentication scheme. MSAD is included with all Windows Server operating systems since
Windows 2000 Server. For MSAD authentication, you can also configure the Barracuda DC Agent, which allows transparent authentication
monitoring with the Barracuda NG Firewall and Microsoft® domain controllers.
In this article:
Before you Begin
Configure MSAD Authentication
MSAD Authentication through the Remote Management Tunnel
Before you Begin
If MSAD is running in native mode on a Windows 2003 Server domain, you must deactivate Kerberos pre-authentication for each user.
To use services such FTP, URL Filter, VPN, or Firewall Authentication and Guest Access, you might need to gather group information. The
distinguished name (DN) containing the group information is needed for external authentication using MSAD and LDAP (see also How to
Configure LDAP Authentication). To gather group information from MSAD:
1.
2.
3.
4.
Go to My Network Places > Search Active Directory.
Select the searching domain.
Enter the name of the user you are searching for and click Find Now.
After you have found the user, add the X500 Distinguished Name column.
Select View > Choose columns.
Select X500 Distinguished Name.
Click Add.
The DN is displayed in the search results.
Configure MSAD Authentication
1.
2.
3.
4.
5.
6.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left navigation pane, select MSAD Authentication.
Click Lock.
Enable MS Active Directory as external directory service.
In the Basic table, add an entry for the domain controller.
Enter the name and IP address of the primary domain controller, without the domain suffix. The name must be DNS-resolvable. The IP
address is optional. If given, the IP address is used instead of the hostname.
7. In the Active directory searching user / password fields, enter the Distinguished Name (DN) and password of a user with permission
to search the Active Directory and to view group information. For example: CN=search,OU=development,DC=domain,DC=local
8. In the Base DN field, specify where to search for user information. Define the Base DN as specific as possible in order to increase the
speed of the lookup and avoid timeouts.
If you enter the domain in this field (e.g.: DC=xyz,DC=com ), Active Directory may refuse the BaseDN lookup. If possible, add
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
216
an OU= entry to your BaseDN.
9. When using NTLM authentication, enable Use MSAD-groups with NTLM to periodically synchronize user groups from MSAD and let
the Barracuda NG Firewall handle them offline .
10. When using MSAD-groups with NTLM, enable Cache MSAD-groups to reduce network traffic and load on the MSAD server.
11. To search additional LDAP attributes for mail addresses, enter a comma separated list of LDAP attributes in the Additional Mail Fields.
Specify a comma-separated list of meta-directory field names that should also be searched for a mail address. Only LDAP
attributes are allowed, no spaces and no GUI description fields. If you are not sure, use an LDAP browser. All additional fields
are searched via a pattern search (prepended * and appended *).
12.
13.
14.
15.
16.
Select Use SSL when establishing the connection to the LDAP directory using SSL.
Select Follow referrals to search the MSAD global catalog and follow LDAP referrals.
Click OK.
If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list.
In the Group Filter Patterns table, you can add patterns to filter group information from the directory service.
Example:
Group Filter Pattern: *SSL*
User01: CN=foo, OU=bar, DC=foo-bar, DC=foo
User02: CN=SSL VPN, DC=foo-bar, DC=foo
In this example, User01 does not have the *SSL* pattern in its group membership string and will not match in group-based limitations.
17. Click OK.
18. Click Send Changes and Activate.
MSAD Authentication through the Remote Management Tunnel
To allow remote NG Firewalls to connect to the authentication server through the remote management tunnel, you must activate the outbound B
OX-AUTH-MGMT-NAT host firewall rule. Per default this rule is disabled.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
217
How to Configure MS-CHAP Authentication
Use the Microsoft Challenge Handshake Authentication Protocol Version 2 (MS-CHAP V2) to authenticate VPN clients over L2TP/PPTP (mutual
authentication between peers) or to authenticate HTTP Proxy users.
In this article:
Before you Begin
Connecting to Read Only Domain Controllers
Step 1. Configure MS-CHAP Authentication
Step 2. Add the Barracuda NG Firewall to a Windows Domain
Before you Begin
Before using MS-CHAP authentication, you must add the Barracuda NG Firewall to a Windows (NT4, 2000, or 2003) domain.
Connecting to Read Only Domain Controllers
In addition to the adding the hostname for the Barracuda NG Firewall, you must verify that the password for the user account used in the Helper
Scheme is cached on the read-only domain controller.
Step 1. Configure MS-CHAP Authentication
1.
2.
3.
4.
5.
6.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left navigation pane, select MS-CHAP Authentication.
From the Configuration Mode menu on the left, select Switch to Advanced View.
Click Lock.
Enable MS CHAP as external directory service.
Choose the NTLM protocol version supported by your authentication service.
When changing the protocol version, a restart of the authentication daemon (phibs) is necessary. Restart the service in CONT
ROL > Server > Service Status > box.
7. In the Domain Realm field, enter the name of the Windows domain that is queried by the authenticator.
8. If the NetBIOS domain name differs from the MS Active Directory domain name, specify the NetBIOS Domain Name.
The NetBIOS domain name is important for user group synchronization. It is required for NTLM authentication and URL Filter
configuration when user group filters apply. For more information, see How to Configure Web Filtering.
9. Enter the MS Active Directory Workgroup Name if the workgroup name is different from the MS Active Directory domain name (Domain
Realm).
10. In the Domain Controller field, enter the IP address of the domain controller.
If you also configured the MSAD authentication scheme with the Use MSAD-groups with NTLM setting enabled, the
Barracuda NG Firewall must be able to resolve the DNS name of the domain controller. (This also applies for the WINS Server
IP address.)
11. In the WINS Server field, enter the IP address of the domain’s Windows Internet Name Service (WINS) server.
12. If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list. For
example, select MSAD if MS-CHAP is used for identity verification but group information must be queried from MSAD.
13. Click Send Changes and Activate.
Step 2. Add the Barracuda NG Firewall to a Windows Domain
1. Go to CONTROL > Box.
2. In the left navigation, expand Domain Control and click Register at Domain.
Verify that the Barracuda NG Firewall is joined to the domain by clicking Show Registration Status in CONTROL > Box > Domain Control.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Copyright © 2015, Barracuda Networks Inc.
218
Barracuda NG Firewall 6.1 Administrator's Guide - Page
219
How to Configure LDAP Authentication
Lightweight Directory Access Protocol (LDAP) is used for storing and managing distributed information services in a network. LDAP is mainly
used to provide single sign-on solutions. It follows the same X.500 directory structure as Microsoft Active Directory.
In this article:
Before you Begin
Configure LDAP Authentication
LDAP Authentication through the Remote Management Tunnel
Before you Begin
To use services such FTP, URL Filter, VPN, or Firewall Authentication and Guest Access, you may need to gather group information. The
distinguished name (DN) containing the group information is needed for external authentication using LDAP. With an arbitrary LDAP browser, you
can gather DNs for the LDAP authentication scheme. Open the LDAP browser and connect to your domain controller to retrieve the distinguished
name.
Configure LDAP Authentication
To configure LDAP for external authentication with the Barracuda NG Firewall, complete the following steps:
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left navigation pane, select LDAP Authentication.
Click Lock.
Enable LDAP as external directory service.
In the Basic table, add a new entry for each Base DN. You can configure the following settings:
LDAP Base DN – Distinguished name for the user organizational unit.
LDAP Server / Port – IP address and port of the LDAP server (default: port 389 ).
LDAP User / Password Field – Name of the user identification and password attribute in the LDAP directory.
Anonymous – If authentication is not required, set to Yes.
LDAP Admin DN / Password – Name and password of the administrator who is authorized to perform LDAP queries.
Group Attribute – Name of the attribute field on the LDAP server that contains group information. The attribute fields on the
LDAP server are customizable. If you are unsure about the required field name, ask the LDAP server administrator to provide
the correct information.
Services that process group information (for example, URL Filter) require group attribute specification. If not set, they
will not be able to match group conditions.
Cache LDAP Groups – Enabling caching for selected LDAP group objects to reduce network traffic and server load on the
LDAP server.
The local LDAP group cache contains the following objects: memberof attributes in person objects, memberUid in p
osixGroup objects (NIS or RFC2307 schema) and member attributes in groupOfNames objects.
Offline sync (every min./hour) – Select how often the local LDAP group cache is refreshed.
Additional Mail Fields – Allows definition of comma-separated additional fields to 'mail'.
Use SSL – If the authenticator must use SSL for connections to the authentication server, select this checkbox.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
220
Logon to Authenticate – Select this checkbox if the authenticator must log directly into the LDAP server to verify user
authentication data. When selected, the LDAP server does not expose user passwords. Instead, the server hides user
passwords, even from administrators.
6. Click OK.
7. If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list.
8. In the Group Filter Patterns table, you can add patterns to filter group information from the directory service.
Example:
Group Filter Pattern: *SSL*
User01: CN=foo, OU=bar, DC=foo-bar, DC=foo
User02: CN=SSL VPN, DC=foo-bar, DC=foo
In this example, User01 does not have the *SSL* pattern in its group membership string and will not match in group-based limitations.
9. Click Send Changes and Activate.
LDAP Authentication through the Remote Management Tunnel
To allow remote NG Firewalls to connect to the authentication server through the remote management tunnel, you must activate the outbound B
OX-AUTH-MGMT-NAT Host Firewall rule. By default, this rule is disabled.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
221
How to Configure LDAP Authentication for Mac OS X Directory Services
To retrieve authentication information from a Mac OS X Directory server, configure it as an external LDAP authentication server.
Configure LDAP Authentication for Mac OS X Directory Services
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service
In the left menu, select LDAP Authentication.
Click Lock.
Enable LDAP as external directory service.
In the Basic table, add a new entry for each Base DN. Configure the following settings:
LDAP Base DN – Enter the distinguished name for the user organizational unit.
LDAP Server / Port – Enter the IP address and port for the Mac OS x Directory server (default: port 389).
Anonymous – Select No.
LDAP Admin DN / Password – Name and password of the administrator authorized to perform LDAP queries.
Group Attribute – Enter gidNumber.
Cache LDAP Groups – Enable checkbox to display groups by name.
Logon to Authenticate – Enable checkbox.
6. Click OK.
7. Click Send Changes and Activate.
You can now retrieve authentication information from your Mac OS X Directory server.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
OS X osx OSXLDAP ldap
Copyright © 2015, Barracuda Networks Inc.
222
Barracuda NG Firewall 6.1 Administrator's Guide - Page
223
How to Configure RADIUS Authentication
Remote Access Dial-In User Service (RADIUS) is a networking protocol providing authentication, authorization, and accounting. The Barracuda
NG Firewall can use RADIUS authentication for IPsec, Client-to-Site, and SSL VPN.
Configure RADIUS Authentication
To configure RADIUS for external authentication with the Barracuda NG Firewall,
1.
2.
3.
4.
5.
6.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left navigation pane, select RADIUS Authentication.
Click Lock.
From the Configuration Mode menu on the left, select Advanced View.
Enable RADIUS as external directory service.
In the Radius Server Address / Port fields, enter the IP address and port of the RADIUS server (default: port 1812).
7. In the Radius Server Key section, define the pre-shared secret to authorize requests. (Do not use backslashes.)
8. From the Group Attribute Delimiter list, you can select how groups are delimited in a list. To explicitly specify a delimiter character,
select the Other checkbox and enter the character in the Group Attribute Delimiter field.
9. From the Group Attribute Usage list, you can select the group information that is used (e.g.: CN=…, OU=…, DC=…). You can select:
10.
11.
12.
13.
All (default) – Complete string.
First – Only the first group.
Last – Only the last group.
If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list.
Enter the NAS identifier, IP address, and port if your RADIUS servers requires you to set NAS credentials.
Enable OTP preserves State if a One-Time Password server (e.g., Symantec VIP Enterprise Gateway 9.0) requires the RADIUS
response to contain the 'State' attribute.
Click Send Changes and Activate.
RADIUS Authentication through the Remote Management Tunnel
To allow remote NG Firewalls to connect to the authentication server through the remote management tunnel, you must activate the outbound B
OX-AUTH-MGMT-NAT Host Firewall rule. By default, this rule is disabled.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
224
How to Configure TACACS+ Authentication
Terminal Access Controller Access-Control System Plus (TACACS+) is an access control network protocol (TCP) for routers, network access
servers, and devices. Unlike RADIUS, TACACS+ uses separate authentication and authorization. TACACS+ provides centralized user and group
management and offers extended logging options. TACACS+ supports multiple protocols, e.g., IP and AppleTalk .
Configure TACACS+
To configure TACACS+ for external authentication with the Barracuda NG Firewall,
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left navigation pane, select TACACS+ Authentication.
Click Lock.
Enable TACACS+ as external directory service.
In the TACACS+ IP Address table, add an entry for each TACACS+ server. You can edit the following settings:
TAC+ IP Address – IP address of the TACACS+ server.
TAC+ ID Port – ID Port information. E.g.: tty10
TAC+ Server Port – TCP port of the TACACS+ server.
TAC+ Key – DES encryption key.
Timeout (s) – Authentication timeout in seconds.
TAC+ Login Type – TACACS+ login type (inbound).
6. Click OK.
7. If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list.
8. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
225
How to Configure RSA-ACE SercurID Authentication
RSA-ACE is a commonly used two-factor authentication method for the authentication of network and VPN users. When authenticating with an
RSA-ACE server, users can sign in with the username and password, consisting of PIN and RSA SecurID provided by a token.
In this article:
Before you Begin
Step 1. Configure the RSA-ACE Server
Step 2. Configure RSA-ACE Authentication
RSA-ACE SecurID Authentication through the Remote Management Tunnel
Before you Begin
RSA-ACE does not provide group information. If you want to create groups, follow the instructions given in How to Configure Explicit Groups .
For authentication against the Barracuda NG Firewall using an RSA-ACE authentication server, verify that the Clear Node Secret is properly set:
Step 1. Configure the RSA-ACE Server
Before configuring RSA-ACE authentication, you must prepare the RSA-ACE server:
1. Create an Agent Host and add the users who want to authenticate over the Barracuda NG Firewall.
The hostname must be DNS resolvable (Box IP address of the Barracuda NG Firewall and ACE-Server IP address). Time on
the Barracuda NG Firewall must be the same as on the ACE server.
Encryption = DES
Type = Unix Agent
2. Assign Acting Server.
3. Export the configuration to insert it in the RSA-ACE Authentication configuration as explained in Step 2.
Users who want to authenticate over proxy must be authenticated for the first time not over the Barracuda NG Firewall because the PIN
number validation is not supported.
Step 2. Configure RSA-ACE Authentication
1.
2.
3.
4.
5.
6.
7.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left navigation pane, select RSA-ACE Authentication.
Click Lock.
Enable RSA-ACE as external directory service.
In the RSA Configuration File section, import the configuration file that is provided by the RSA SecurID server (sdconf.rec).
Enter the IP address of the RSA server.
In the DNS Resolved IP field, enter the IP address that is used to connect to the RSA server. This IP address must match the configured
client IP address that the server has; otherwise, the connection is refused.
8. If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list.
9. Click Send Changes and Activate.
RSA-ACE SecurID Authentication through the Remote Management Tunnel
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
226
To allow remote NG Firewalls to connect to the authentication server through the remote management tunnel, you must activate the outbound B
OX-AUTH-MGMT-NAT Host Firewall rule. By default, this rule is disabled.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
227
How to Configure MSNT Authentication
Windows NT (MSNT) is used as external directory service, e.g., to authenticate Client-to-Site VPN users. MSNT validates user accounts and
authorizes access to local or remote systems or domains at log-on of type local, domain, or trusted domain. On the Barracuda NG Firewall, you
can configure MSNT as an external authentication scheme.
Before you Begin
MSNT does not provide group information. If you want to create groups, follow the instructions given in How to Configure Explicit Groups.
Configure MSNT
To configure MSNT for external authentication with the Barracuda NG Firewall:
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left navigation pane, select MSNT Authentication.
Click Lock.
Enable MSNT as external directory service.
In the Domain Controller Name table, add an entry for each domain controller. You can edit the following settings:
Domain Controller Name – Name of the primary domain controller, without the domain suffix. The name must be
DNS-resolvable.
Domain Name – Name of the domain.
Domain Controller IP – IP address of the domain controller. If given, the IP address is used instead of the hostname.
6. Click OK.
7. If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list.
8. Click Send Changes and Activate.
MSNT Authentication through the Remote Management Tunnel
To allow remote NG Firewalls to connect to the authentication server through the remote management tunnel, you must activate the outbound B
OX-AUTH-MGMT-NAT Host Firewall rule. By default, this rule is disabled.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
228
How to Configure Barracuda Web Filter Authentication
This article refers to the Barracuda Web Security Gateway appliance, not the URL Filter service on the Barracuda NG Firewall. For
more information on the URL Filter, see URL Filter.
The Barracuda Web Security Gateway appliance provides content filtering with HTTP/HTTPS support and URL filtering by category for various
types of users and groups. For authentication of users and groups from the Barracuda Web Security Gateway on the Barracuda NG Firewall,
configure Web Filter authentication as external authentication scheme.
Before you Begin
Before configuring Web Filter authentication, verify that you have properly configured your user groups on the Barracuda Web Security Gateway.
For more information, see Managing Users and Groups in the Web Security Gateway TechLibrary.
Configure Web Filter Authentication
To configure Web Filter Authentication for the Barracuda NG Firewall,
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left navigation pane, select Webfilter Authentication.
Click Lock.
Enable the Webfilter Authentication query scheme.
In the Server Setting table, add an entry for each Webfilter server. Specify the following settings:
IP Address – IP Address of the Web Security Gateway server.
Passphrase – The authentication passphrase on the Web Security Gateway.
Sync Interval (s) – Synchronization interval in seconds between NG Firewall and Web Security Gateway.
6. Click OK.
7. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
229
How to Configure WiFi AP Authentication
The Barracuda NG Firewall can parse authentication information contained in the syslog stream of supported wireless access points. WiFi access
points typically use authentication services such as RADIUS servers to authenticate users before allowing them to connect. The Barracuda NG
Firewall monitors the syslog files sent by the WiFi access points for usernames and the associated IP address of logged-in users. Depending on
the access point the Barracuda NG Firewall receives login and/or logout information.
Supported WiFi Access Points
Aerohive (login only)
Ruckus (login and logout)
Aruba (login only)
In this article
Video
Before you Begin
Step 1. Configure a Box Level IP Address
Step 2. Configure WiFi AP Authentication
Video
Watch the following video to see the Barracuda NG Firewall receive user information via WiFi Access Point authentication from a Aerohive
Access Point:
Videos are not visible in the PDF export.
Before you Begin
Configure the WiFi Access point to stream the syslog to the Barracuda NG Firewall. For more information, see:
WiFi AP Authentication Aerohive Configuration
WiFi AP Authentication Ruckus Wireless Configuration
Step 1. Configure a Box Level IP Address
Add an IP address to the box level that can be reached by the wireless access point.
1.
2.
3.
4.
5.
6.
7.
8.
Go to CONFIGURATION > Configuration Tree > Box > Network.
Click Lock.
Click + to add an Additional Local IP.
Enter a Name.
Select the interface from the Interface Name dropdown.
Enter the IP Address and Associated Netmask.
Click OK.
Click Send Changes and Activate.
Step 2. Configure WiFi AP Authentication
If the WiFi access point is using an SSL encrypted connection, the certificate can be imported from a PEM or PKCS12 file.
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication.
Click Lock.
In the left menu, click WiFi AP Authentication.
Set Activate Scheme to yes.
Click + to add an WiFi AP Endpoint. The WiFi AP Endpoints window opens.
6.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
230
6. Enter the Source IP. This is the IP address of your WiFi access point.
7. Select the Protocol used by the WiFi access point to send the syslog.
UDP
TCP
SSL
8. (SSL only) Enter the Certificate Subject Alternative Name for the SSL certificate.
9. (SSL only) Click Ex/Import and import the Certificate File.
10. Select the manufacturer of your WiFi access point from the WiFi AP Model dropdown.
11. Click OK.
12. Click Send Changes and Activate.
You can now use the authentication information from your WiFi access point. Go to Firewall > Users. All users with WiFi-AP in the Origin colum
n are authenticated via the WiFi access point.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
231
WiFi AP Authentication Aerohive Configuration
To authenticate users connected to Aerohive access points, you must stream the syslog containing the authentication data to the Barracuda NG
Firewall.
Reference Devices/Versions:
Aerohive AP230 802.11ac Wireless AP Version 6.4r1a
Aerohive Networks HiveManager Online 6.4r1
Enable Syslog Streaming on the Aerohive AP
1. Log into the Aerohive Networks HiveManager.
2. Go to Configuration > Advanced Configuration > Management Services > Syslog Assignments.
3. Click New and configure syslog streaming:
Syslog Server – Select the IP address of the Barracuda NG Firewall from the dropdown.
Severity – Select Info from the dropdown.
4. Click Apply.
5. Click Save.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
232
Add Syslog Configuration to Network Policy
Add the syslog configuration to the Network Policy you are using for your access points.
Verify that the Barracuda NG Firewall is receiving the Syslog Data
On the Barracuda NG Firewall, go to LOGS and open the Box > Control > AuthService_wifiap.log. After a successful authentication, you will
see a logged in user <username> with IP <IP address> line in the log. The WiFi access point name is also listed.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
233
WiFi AP Authentication Ruckus Wireless Configuration
To authenticate users connected to Ruckus access points, you must stream the syslog containing the authentication data to the Barracuda NG
Firewall.
Reference Devices/Versions:
ZoneDirector 1100 (ZD1106) Version 9.10.0.0 build 21
ZoneFlex zf7321-u Access Point):
Step 1. Enable Syslog Streaming on the Ruckus Wireless AP
Enable Client Association in the debug log settings.
1. Go to Administer > Diagnostics.
2. In the Debug Logs section, enable Client Association.
3. Click Apply.
Step 2. Enable Syslog Streaming on the Ruckus Wireless AP
1. Go to Configure > System Log Settings.
2. Enable the Remote Syslog.
3. Enter the IP address of the Barracuda NG Firewall.
4. Click Apply.
Verify that the Barracuda NG Firewall is receiving the Syslog Data
On the Barracuda NG Firewall, go to LOGS and open the Box > Control > AuthService_wifiap.log. After a successful authentication, you will
see a logged in user <username> with IP <IP address> line in the log.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
234
WiFi AP Authentication Aruba Configuration
To authenticate users connected to Aruba access points, you must stream the syslog containing the authentication data to the Barracuda NG
Firewall.
Reference Devices/Versions:
Aruba Controller 651 Version 6.4.1.0
Aruba AP 105
Enable Syslog Streaming on the Aruba AP
1.
2.
3.
4.
Log into the Aruba Mobility Controller.
Click on the Configuration tab.
In the MANAGEMENT section of the left menu, click on Logging.
In the Logging Servers section, click New:
IP Address – Enter the management IP address of the Barracuda NG Firewall .
Category – Select user.
Logging Facility – Select the logging facility to be able to differentiate between multiple Aruba APs.
Severity – Select notifications.
5. Click Add.
6. Click Apply
7. Click on the Levels tab.
8. Set the Logging Levels in the User logs section to notifications.
9. Click Apply.
Verify that the Barracuda NG Firewall is Receiving the Syslog Data
On the Barracuda NG Firewall, go to LOGS and open Box > Control > AuthService_wifiap.log . After a successful authentication, you will see
a logged in user <username> with IP <IP address> line in the log. The Wi-Fi access point name is also listed.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Copyright © 2015, Barracuda Networks Inc.
235
Barracuda NG Firewall 6.1 Administrator's Guide - Page
236
How to Configure Kerberos Authentication
Kerberos works as a request-based authentication scheme and provides authentication and authorization on a single sign-on basis. The
Kerberos authentication protocol provides mutual authentication, which means that both the user and the server verify each other's
identity. Implementing Kerberos-based authentication within your network will allow the Barracuda NG Firewall to associate outgoing web
requests with Active Directory users, to log user activity, and to apply user-specific or group-specific policies to outgoing connections.
In this article:
Implementation
Advantages
Requirements for Using a Kerberos Authentication Server
Configure Kerberos
Step 1. Configure Kerberos for the HTTP Proxy Service
Step 2. Join the Domain
Step 3. Create ACLs
Step 4. Configure your Web Browser
Kerberos Authentication through the Remote Management Tunnel
Troubleshooting
Implementation
You can use Kerberos with the Barracuda NG Firewall in any of the following scenarios:
Clients are behind a NAT-enabled router – Requests from users on client machines behind a NAT-enabled router would appear to the
Barracuda NG Firewall to be sent from the same reusable NAT router IP address.
Windows Terminal Services – Requests from users using Windows Terminal Services to access remote data and applications on
another client machine would appear to the Barracuda NG Firewall to be sent from the Windows terminal IP address.
Citrix Presentation Services – Requests from users accessing remote data and applications on a Citrix Presentation Server would
appear to the Barracuda NG Firewall to be sent from the Citrix Presentation Server.
Advantages
Kerberos is useful when a Microsoft domain controller is running in native mode. It is a forward proxy authentication scheme, and each
authentication request against a domain controller does not need to be verified by the Barracuda NG Firewall.
All users are transparently identified so that rendering DC Agents becomes unnecessary.
All clients can use the same IP address (for example, in a terminal server environment).
Kerberos uses a ticketing system. The user submits an initial request and afterwards has the possibility of submitting more tickets to the
Kerberos ticketing system. Users do not continuously receive pop-up authentication messages when the initial authentication is
processed.
Usage of unique Service Principal Names (SPNs) makes automatic transparent authentication possible with network resources
(each resource has its own SPN).
Requirements for Using a Kerberos Authentication Server
Before you integrate with a Kerberos authentication server, verify that the following requirements have been met:
MSAD authentication is configured. Kerberos requires the MSAD authentication scheme.
MS-CHAP authentication is configured.
A forward proxy is deployed on the Barracuda NG Firewall. For more information, see How to Set Up and Configure the HTTP Proxy.
The management IP address, hostname, domain, and proxy are DNS-resolvable. Check your settings on the following pages:
IP Configuration page (CONFIGURATION > Configuration Tree > Box > Network).
DNS Settings page (CONFIGURATION > Configuration Tree > Box > Administrative Settings).
The DNS server can resolve IP addresses in both forward and reverse.
Use type A DNS records for the Kerberos Key Distribution Center (KDC). There are known issues with some clients forming an incorrect
SPN request when CNAME DNS records are used.
Configure all host machines to use NTP. All clocks must be synchronized within 5 minutes of the Kerberos server clock for authentication
to succeed.
Time server settings must be configured on the Barracuda NG Firewall. For more information, see How to Configure Time Server (NTP)
Settings.
Configure Kerberos
After verifying that the requirements for using a Kerberos authentication server have been met, complete the steps in the following sections to
implement Kerberos on the Barracuda NG Firewall:
Step 1. Configure Kerberos for the HTTP Proxy Service
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
237
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > HTTP-Proxy >
HTTP Proxy Settings.
2. Click Lock.
3. In the left navigation pane, select User Authentication.
4. Next to Authentication Settings, click Set.
5. From the Use Kerberos list, enable Kerberos.
6. In the Kerberos Service Name field, enter a name for the Kerberos service. This name represents the IP address of the HTTP Proxy
service and is used for joining the Kerberos service to MS Active Directory. The name must also be present in the DNS Settings section
(CONFIGURATION > Configuration Tree > Box > Administrative Settings).
7. In the Authentication Worker Kerberos field, enter the number of workers started for authentication if required (default: 5).
For proxy servers with a high load, you can enter up to 48.
8. In the Authentication Service Settings, select MS Active Directory from the Authentication Scheme list.
9. Click OK.
10. Click Send Changes and Activate.
All configured services and service names must be fully DNS-resolvable within the configured domain.
Step 2. Join the Domain
After you configure the Kerberos authentication scheme and the HTTP Proxy service, register the Barracuda NG Firewall and the HTTP Proxy
service at the domain.
1. Go to CONTROL > Box.
2. In the left navigation pane, expand Domain Control and click Register at Domain.
3. From the Domain Control menu, select Register Proxy at Domain.
If the Kerberos service name is changed later, you must rejoin the Barracuda NG Firewall to the domain in order to successfully use
MS-CHAP v2 authentication again. If you want to use Kerberos with the new service name, you must re-register and restart the proxy.
Step 3. Create ACLs
To specify administration rights, you can implement access control for specific users. The Kerberos access control list (ACL) file, kadm5.acl
allows you to specify individual privileges. You can also use the '*' wildcard in the principal name to specify group privileges. For more
information, see Access Control.
Step 4. Configure your Web Browser
To use Kerberos authentication, you must specify the proxy settings in your web browser.
In the HTTP proxy settings for your web browser, enter the Kerberos service name (fully qualified domain name). For example: 01ha.domain.c
om
Do not enter an IP address in your HTTP proxy settings.
Kerberos Authentication through the Remote Management Tunnel
To allow remote NG Firewalls to connect to the authentication server through the remote management tunnel, you must activate the outbound B
OX-AUTH-MGMT-NAT Host Firewall rule. By default, this rule is disabled.
Troubleshooting
To troubleshoot any issues with your Kerberos authentication settings, consider the following:
Hostnames must be DNS-resolvable in both directions.
Clock synchronization is crucial. The maximum allowed clock skew is 300 seconds.
The Kerberos Constraint Delegation (KCD) service must be reachable for the system and the authenticating user.
Service Principal Names (SPNs) are unique and available in the KDC´s database. If not, the KDC will not issue the TGS.
To look up the ticketing process from your Windows client, you can use the klist command.
To view log files, click the Logs tab on your Barracuda NG Firewall.
If you see an error message containing "BH hostname error" in the HTTP Proxy service cache.log, check if the hostname is
DNS-resolvable.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
helperStatefulHandleRead:unexpected read from
bytes 'BH hostname error'
238
negotiateauthenticator #1, 18
If you are using CNAME DNS records for your KDC and you see the following error message in the HTTP Proxy service cache.log. Use
A DNS records instead.
ERROR: Negotiate Authentication validating user. Error returned 'BH received type
1 NTLM token'
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
239
How to Configure Explicit Groups
Explicit groups are a way to organize users into groups for authentication schemes that do not provide group information, such as MSNT or RSAACE.
Configure Explicit Groups
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left menu, click Explicit Groups.
Click Lock.
In the Explicit Groups table, click + to add a group:
Group Name – Enter the name of the group.
Login Name – In this table, add users that belong to the group.
5. In the External DB Files table, add references to the Berkley DB files containing already existing group and user information.
6. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
240
How to Configure NGF Local Authentication
Configure NGF local authentication to locally administer users and groups on the Barracuda NG Firewall. With NGF local authentication, you can
refer to local users and groups when creating firewall rules, VPN tunnels, and services.
Configure NGF Local Authentication
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left navigation pane, select NGF Local Authentication.
Click Lock.
Enable NGF Local Scheme as authentication scheme.
In the Users table, add an entry for each user that you are administrating with the local authentication scheme. For each entry, you can
configure the following settings:
Username – Authentication name of the user.
Password – Initial user password.
Mail address – Email address for the user.
6. If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list. For
example, select LDAP if group information must be queried from an LDAP directory.
7. Click Send Changes and Activate.
Changing User Passwords
When using NGF local authentication, you can also provide users the option of managing and changing their passwords. This is done by creating
an access rule to redirect HTTP/S requests (port 80/443) to the local web server of the system.
Create an App Redirect firewall rule with the following settings:
Action – App Redirect
Source – Trusted LAN (LAN network users)
Service – HTTP+S
Destination – Choose a custom IP address to be entered by the user to access the web interface. For example: 1.1.1.1
Redirection – IP address of the local web server, together with the HTTP/S port. For example: 127.0.0.1:80
The Redirection IP address must also be configured on the Barracuda NG Firewall.
After you create and activate this firewall rule, users can enter http://1.1.1.1/cgi-bin/ngflocalpasswd into a web browser to change
their password.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
241
How to Configure MSAD DC Client Authentication
The Barracuda DC Client receives user authentication information from Barracuda DC Agents installed on Microsoft domain controllers.
Before you Begin
Before you configure MSAD DC Client authentication, you must install the Barracuda DC Agent on the Microsoft Active Directory server. For
more information, see Barracuda DC Agent for User Authentication.
Configure the MSAD DC Client
Configure MSAD DC Client settings on the Barracuda NG Firewall:
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left menu, click MSAD DC Client.
Click Lock.
Set Activate Scheme to Yes.
In the Server Setting table, add all Microsoft Active Directory servers running the Barracuda DC Agent.
6. For each entry, specify the IP
7. Enter the
Address of the Active Directory server running the DC Agent.
TCP Port of the Active Directory server running the DC Agent (default: port 5049).
8. If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list.
9. Click OK.
10. In the Group Filter Patterns table, you can add patterns to filter group information from the directory service.
Example:
Group Filter Pattern: *SSL*
User01: CN=foo, OU=bar, DC=foo-bar, DC=foo
User02: CN=SSL VPN, DC=foo-bar, DC=foo
In this example, User01 does not have the *SSL* pattern
in its group membership string and will not match in
group-based limitations.
11. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
242
How to Configure TS Agent Authentication
Use the Barracuda TS Agent to authenticate users on a Microsoft Terminal Server. The TS Agent is installed as a service on the Microsoft
Terminal Server. Each user is assigned a dedicated port range that is transmitted over an SSL encrypted connection to the Barracuda NG
Firewall. This information enables the Barracuda NG Firewall to identify individual users even though the traffic is coming from the same source
IP address. The TS Agent detects both login and logout events. Citrix Desktop deployments on Windows Terminal Servers are also supported.
You can use SSL client certificates to authenticate the remote TS Agent on the Terminal Server, or if no SSL certificates are configured, allow all
incoming SSL connections.
Before You Begin
Install the Barracuda TS Agent on the Microsoft Terminal Server(s). For instructions, see How to Set Up the Barracuda Terminal Server
Agent.
(Optional) Create SSL client certificates.
Verify that the Host Firewall rule BOX-AUTH-TSAGENT-SYNC-IN (TCP Port 5050) is present in the Host Firewall Inbound rulelist (Conf
ig > Full Config > Infrastructure Services > Host Firewall Rules). You can find the default Host Firewall rules, here: Default Host
Firewall Rules .
Configure TS Agent Authentication
On the Barracuda NG Firewall, enable and configure connections with the Barracuda TS Agent.
1.
2.
3.
4.
5.
6.
Open the Authentication Service page (Config > Full Config > Infrastructure Services > Authentication Service).
In the left pane, click TS Agent Authentication.
Click Lock.
Set Activate Scheme to Yes.
Enter Auto Logout After [d] to automatically log out users after a certain number of days.
(Optional)In the TS Agent Certificates section, click +. The TS Agent Certificates window opens.
a. Enter the Subject Alternative Name of the SSL client certificate.
b. Upload the SSL client certificate.
c. Click OK.
7. (optional) Set Strip Domain Name to Yes. E.g., MYDOMAIN\myuser will become myuser.
8. In the TS Agent IP Addresses section, add the IP addresses for the Microsoft Terminal Server the TS Agent is running on.
9. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
243
How to Configure Additional Authentication Schemes
On the Barracuda NG Firewall, you can introduce additional authentication schemes, for example, to configure a second proxy server in your
network with an alternative authentication server. There is no limit to the number of authentication schemes that you can add.
References to additional schemes are not checked for integrity. Keep in mind that schemes may be deleted even though they are used
by VPN users.
Configure an Additional Authentication Scheme
1.
2.
3.
4.
5.
6.
7.
8.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
Click Lock.
In the left menu, click Additional Schemes.
In the Schemes section, click + to add an entry for the additional authentication scheme.
Enter a Name for the additional authentication scheme.
Enable the scheme to start the authentication processes.
Select the scheme from the Method list.
Configure the settings applicable to the selected scheme:
MSNT Settings – For information on the settings in this section, see How to Configure MSNT Authentication .
MSAD Settings – For information on the settings in this section, see How to Configure MSAD Authentication .
RADIUS Settings – For information on the settings in this section, see How to Configure RADIUS Authentication .
LDAP Settings – For information on the settings in this section, see How to Configure LDAP Authentication .
RSA-ACE Settings – For information on the settings in this section, see How to Configure RSA-ACE SercurID Authentication .
NG Firewall Local Authentication Settings – For information on the settings in this section, see: How to Configure NGF Local
Authentication .
TACACS+ Settings – For information on the settings in this section, see How to Configure TACACS+ Authentication .
OSCP Settings – For information on the settings in this section, see How to Configure OCSP Validation .
9. In the Filter Settings section, select the scheme from the User Info Helper Scheme list if group information is queried from a different
authentication scheme. For example, select LDAP if RADIUS is used for identity verification but group information must be queried from
an LDAP directory.
10. In the Group Filter Patterns table, you can add patterns to filter group information from the directory service.
Example:
Group Filter Pattern: *SSL*
User01: CN=foo, OU=bar, DC=foo-bar, DC=foo
User02: CN=SSL VPN, DC=foo-bar, DC=foo
In this example, User01 does not have the *SSL* pattern in its group membership string and will not match in group-based limitations.
11. Click OK.
12. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
244
How to Configure Authentication Service Timeouts and Logging
Configure timeout and logging settings to manage login processes and to log user group information related to your configured authentication
schemes.
Configure Timeout and Logging
To configure timeout and logging settings for authentication services:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
In the left navigation pane, select Timeouts and Logging.
From the Configuration Mode menu in the left, select Switch to Advanced View.
Click Lock.
Enable Log Groups to log user group information.
If desired, enable Log Add. Meta-directory Fields to log additional meta-directory fields.
In the Timeout Settings, you can adjust the setting according to your requirements.
If required, configure the Expert Settings, e.g., Client Codepage.
Click Send Changes and Activate.
With timeout and logging settings configured, user group information is logged and the logfiles will be dispayed on the Barracuda NG Firewall Lo
gs page.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
245
Virtual Servers and Services
Virtual servers represent the main operative instance on the Barracuda NG Firewall next to global settings and box configuration objects. The
virtual server layer manages all IP addresses that are required for the services running on the virtual servers. It introduces all IP addresses that
are needed for proper operation except remote management and HA IP addresses. Depending on your requirements, you can create multiple
virtual servers on a standalone box or on a system within a Barracuda NG Control Center cluster.
Virtual Servers
The virtual server layer runs on the box layer of the Barracuda NG Firewall. It is a purely logical layer whose most important function is to make IP
addresses available for the services (service layer). By default, the virtual server S1 is already created on every Barracuda NG Firewall except
the larger hardware models. When a virtual server is started, it assigns IP addresses to its services, causing the box layer to automatically
activate pending routes of directly attached network routes.
On a virtual server you must introduce all IP addresses that should be managed by the server and assigned to the services under it. These IP
addresses must be in one of the networks for which a directly attached network route exists on box level. Do not use the IP addresses configured
on the box layer, such as the management IP address or additional local IP addresses, because this causes problems in HA setups. The
encryption level is also configured at the virtual service level. If your Barracuda NG Firewall is running without a valid license (demo mode) or in
an export-restricted country, you can only use export-restricted encryption until your system gets licensed. Virtual servers are bound to the
product type and name. Once created, they cannot be renamed.
For more information, see How to Configure Virtual Servers.
HA Monitoring and Transparent Failover
A virtual server is transferable between members of a high availability cluster. If the primary unit fails, the virtual server, including its assigned IP
addresses and all services, is instantly transferred to the secondary unit. You can also create virtual servers with services to run only on a
secondary unit that, in case of a failover, are transferred to the primary unit and vice versa.
For HA failover, the management IP address and the 1st virtual server IP address are monitored by default. To configure transparent monitoring
for HA clusters, create monitoring policies for interfaces and IP addresses. The virtual server stays up as long as these health check targets are
reachable.
For more information, see Virtual Server Monitoring and High Availability.
Virtual Servers in the NG Control Center
On the Barracuda NG Control Center, virtual servers are created in the NG Control Center cluster. The setup procedure is very similar to the
procedure on a Barracuda NG Firewall, which means that you can create a server and assign the network IP addresses and services. Virtual
servers act as separate configuration entities, so you can copy them from one to another cluster. For example, you can assign the virtual server
S1 once per cluster. When assigning virtual servers to different clusters, the setup requires the matching product type. For example, you cannot
assign a VF25 virtual server to a Barracuda NG Firewall F10.
For more information, see How to Configure Virtual Servers.
Services
The service layer runs on the virtual server layer of the Barracuda NG Firewall. It introduces the services such as firewall, HTTP proxy, VPN, and
DHCP. The services use the configured IP addresses of the virtual server on which they are running. If the virtual server shuts down, all of the
assigned services and IP addresses are also shut down and made unavailable. If the Barracuda NG Firewall is deployed in a high availability
cluster, the services and necessary IP addresses transparently failover to the other HA unit.
For more information, see How to Configure Services, NG Firewall Services or NG Control Center Shared Services
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
246
How to Configure Virtual Servers
To manage networking and services on the Barracuda NG Firewall, you can use the virtual server S1 that is already present on the unit. To
extend firewalling and networking capabilities, introduce additional servers with IP addresses that can be adapted and used by networks and
services created under them. If a Barracuda NG Firewall system hosting virtual servers is running in a high availability (HA) cluster, the virtual
servers are also present on the HA unit. If the primary unit fails, the virtual server, IP addresses, and all services are taken over instantly by the
secondary unit.
In this article:
Create a Virtual Server on a Standalone Barracuda NG Firewall
Create a Virtual Server on a Barracuda Control Center
Deleting a Virtual Server
Moving/Copying Virtual Servers (NG Control Center only)
Before you Begin
Verify that direct routes exist on the box layer for the network the virtual server IPs are in. If you are using a HA cluster, the routes must be
configured on both units.
Create a Virtual Server on a Standalone Barracuda NG Firewall
1. Go to CONFIGURATION > Multi-Range > your range > your cluster.
2. Right-click on Virtual Servers in your cluster and select Create Server. The Create Server windows opens.
3. Configure the following settings:
Server Name – Enter a unique name up to six characters long for the virtual server.
Product Type – Select the model of your Barracuda NG Firewall. The product type of the virtual server and the NG Firewall the
virtual server is running on must match.
Active Box – Select This-Box.
Backup Box (optional) – Select Other-Box if you are using a high availability cluster, or No-Backup if you are using a
standalone Barracuda NG Firewall.
Encryption Level – Select Full Featured Encryption unless you are running in demo mode or are located in an
export-restricted country.
First-IP – Enter the first IP address for the virtual server.
Reply to Ping – Select yes for the virtual server to answer ICMP pings on the first IP address.
Second-IP (optional) – Enter the second IP address for the virtual server.
Reply to Ping – Select yes for the virtual server to answer ICMP pings on the second IP address.
Additional IP (optional) – Enter as many additional IP addresses as needed.
4. Click Next
5. (optional) Configure monitoring settings for the virtual server. For more information, see Virtual Server Monitoring.
6. Click Next.
7. (optional) Enter custom command-line scripts that are executed when the virtual server is started or stopped. For more information, see
Command-Line Interface
8. Click Finish.
9. Click Activate.
Create a Virtual Server on a Barracuda Control Center
Create a virtual server in a cluster on the Barracuda NG Control Center. The virtual server can be used for every managed NG Firewall of the
same product type in the cluster.
1. Go to CONFIGURATION > Multi-Range > your range > your cluster.
2. Right-click on Virtual Servers in your cluster and select Create Server. The Create Server windows opens.
3. Configure the following settings:
Server Name – Enter a unique name up to six characters long for the virtual server.
Product Type – Select the model of your Barracuda NG Firewall. The product type of the virtual server and the NG Firewall the
virtual server is running on must match.
Encryption Level – Select Full Featured Encryption unless you are running in demo mode or are located in an
export-restricted country.
Primary Box – Select the NG Firewall the virtual server runs on. The box must be in the same cluster as the virtual server.
Secondary Box (optional) – Select the secondary NG Firewall
First-IP – Enter the first IP address for the virtual server.
Reply to Ping – Select yes for the virtual server to answer ICMP pings on the first IP address.
Second-IP (optional) – Enter the second IP address for the virtual server.
Reply to Ping – Select yes for the virtual server to answer ICMP pings on the second IP address.
Additional IP (optional) – Enter as many additional IP addresses as needed.
4. Click Next.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
247
4.
5.
6.
7.
8.
9.
10.
11.
12.
(optional) Create or import the Server Private Key.
(optional) Import the Server Certificate.
Click Next.
(optional) If you are planning to use GTI, add the local networks for the VPN tunnels. For more information, see CC VPN GTI Editor.
Click Next.
(optional) Configure monitoring settings for the virtual server. For more information, see Virtual Server Monitoring.
Click Next.
(optional) Enter custom command-line scripts that are executed when the virtual server is started or stopped. For more information, see
Command-Line Interface
Click Finish.
Click Activate.
Deleting a Virtual Server
If you delete a virtual server, all of its assigned services are also deleted. Before changing server and service settings, back up your system
configuration. For more information, see Backups and Recovery.
1.
2.
3.
4.
Right-click on the virtual server you want to delete and click Lock.
Right-click on the virtual server and click Remove Server.
Click Yes. The virtual server and all its services are now marked with a red "x".
Click Activate.
Moving/Copying Virtual Servers (NG Control Center only)
You can move or copy virtual servers on the NG Control Center between different clusters. It is not possible to create a copy of a virtual server in
the same cluster it is currently in. The clusters must use at least the same release version. For example, you cannot move a 6.0 virtual server to a
5.2 cluster.
1.
2.
3.
4.
5.
6.
Right-click on the virtual server you want to move or copy and click Lock.
Right-click on the virtual server and click Move Server or Copy Server.
Select the destination in the Range/cluster tree.
Enter the new name of the virtual server.
Click OK.
Click Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
248
Virtual Server Monitoring
To ensure and maintain the connectivity of a virtual server, you can define pools of IP addresses and/or network interfaces that are continuously
monitored by the Barracuda NG Firewall. If the health check of a monitored IP address or the link state of a network interface fails, the virtual
server is automatically shut down. As soon as the health check target is successful, the virtual server is started again. Monitoring policies define
which requirements must be met for the virtual server to remain active, or to be shut down. If you are using an HA cluster, you can use monitoring
policies to define the behavior of the secondary HA unit. If necessary, you can use custom scripts which are executed when the virtual server is
started or stopped.
In this article:
Layer 3 Monitoring
Layer 2 Monitoring
Server Monitoring in HA Clusters
Step 1. Configure the Operation Mode
Step 2. Configure the Monitoring Policy
Configure Custom Scripts
Layer 3 Monitoring
The Layer 3 monitoring policy defines the settings for IP address monitoring. The policy configuration provides two address pool tables. Add the
target addresses to the tables. These IP addresses must be reachable for the virtual server to stay up. The following Layer 3 monitoring policies
are available:
all-OR-all-present – All of the IP addresses from at least one IP address pool, e.g., from the Monitored IPs I table, must be reachable.
If you enter IP addresses in both the Monitored IPs I and II tables, the IP addresses from at least one of these tables must be available.
Otherwise, the virtual server is deactivated.
one-AND-one-present – At least one IP address from each monitoring pool must be reachable. If you only enter IP addresses in the Mo
nitored IPs I table, at least one IP address from this table must be available. If you enter IP addresses in both tables, at least one IP
address in each table must be available.
The control service runs an ICMP check on all IP addresses in 10-second intervals. If no answer is received, the IP addresses are probed every
second for a 10-second period. If no response is received from a valid health check target during the 10-second period, the virtual server shuts
down. The server is reactivated as soon as an answer is received for the subsequent probes.
Example Setup:
Layer 3 monitoring is configured for the virtual server S2, using both address pools with the following IP addresses and statuses:
Monitored IPs I
Status
Monitored IPs II
Status
10.0.10.110
up
10.0.10.88
up
10.0.10.68
down
10.0.10.99
down
The status of the virtual server is displayed on Control > Server page:
If the monitoring policy one-AND-one-present is used, the server stays up because one IP address of each address pool is available.
If the all-OR-all-present policy is used, the server shuts down because at least no IP pool is fully available.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
249
Layer 2 Monitoring
The Layer 2 monitoring policy defines the settings for interface monitoring. Add the interfaces that should be checked according to the policy in
the Monitored Interfaces I and II tables. Layer 2 monitoring is available in the following modes:
all-OR-all-present – All of the interfaces from at least one interface pool, e.g. from the Monitored Interfaces I table, must be available.
one-AND-one-present – At least one interface from each interface pool table must be available. If you have added interfaces in one
table, at least one IP address from this table must be available. If you have added interfaces in both tables, at least one interface from
each table must be available.
The control service checks the link status of each interface on a regular basis. Depending on the selected policy, the server is shut down if the
links on the monitored interfaces are unavailable. The server is restarted when the links of the monitored interfaces are up again.
Server Monitoring in HA Clusters
If your Barracuda NG Firewall is part of an HA cluster, you can extend the monitoring policy to both units. For HA monitoring, you can select the
following options:
Monitoring on Backup Box – If set to No (default), server monitoring on box and HA box is processed only by the primary unit. In case
of failover, the non-availability of health check targets is ignored by the HA box and the server stays up on the secondary unit. If set to Ye
s, the monitoring policy will also be enforced by the backup box. In case of a failover, the virtual server is then also deactivated on the
second unit if the monitoring also fails on the secondary unit.
Shared-HA-Probing – Shared HA probing combines the IP address and interface information of both units. Both sets of IP addresses or
interfaces must be available on both units. An IP address or interface that is not operational on both HA peers will be excluded from the
HA logic decision. If a server is active on a unit and blocked on the peer unit, any probing results will be ignored. The probing decision
will only be made if a situation persists over two probing cycles. This gives the system time to account for the delay between detection
and synchronization and avoids aliasing effects.
Local-HA-Probing – (default) Only local health check target resources are probed. This means every HA partner performs its own
monitoring procedure.
Step 1. Configure the Operation Mode
Configure the monitoring policies for IP addresses and interfaces that must be reachable in order for the virtual server to stay up. When your
Barracuda NG Firewall unit resides in an HA cluster, specify the monitoring policy for the case of HA failover:
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Server Properties.
In the left menu, select Monitoring Policy.
Click Lock.
From the Monitoring on Backup Box list, select whether monitoring should be performed and, in case of failover, adapted by a
secondary HA unit.
5. Select the Probing Policy. For more information, see Server Monitoring in HA Clusters.
Step 2. Configure the Monitoring Policy
Specify the monitoring policy for IP addresses and interfaces.
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Server Properties.
In the left menu, select Monitoring Policy.
Click Lock.
In the Layer 3 Monitoring section, specify the IP address monitoring policy. For more information, see Layer 3 Monitoring.
In the Monitored IPs I / II tables, add the IP addresses that must be reachable via the ICMP protocol by the system that is hosting the
server.
6. In the Layer 2 Monitoring section, specify the interface monitoring policy. For more information, see Layer 2 Monitoring.
7.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
250
7. In the Monitored Interfaces I / II tables, add the physical interfaces that must have a link in order for the server to stay up.
8. Click Send Changes and Activate.
Configure Custom Scripts
Configure custom scripts for use with your monitoring policies. These scripts are run after the server starts or before the server shuts down due to
unreachable IP addresses or interfaces.
Do not use phionctrl in your custom scripts; this might cause a deadlock.
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Server Properties.
In the left menu, select Custom Scripts.
Click Lock.
In the Start and Stop Script fields, enter the commands that should be executed when the server is started up or shut down (7-bit ASCII
characters and standard Bash version 2-compliant).
5. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
251
How to Configure Services
The Barracuda NG Firewall has two types of services. Box services provide functionality required to run the Barracuda NG Firewall system. They
are factory-defined and cannot be created or removed by the user. Server services are created and run in a virtual server. Services relying on
other services for certain functionality (i.e., firewall and virus scanner service) must be created on the same virtual server. Although possible, it is
recommended to only create one service type per virtual server. You can create the following services:
Barracuda NG Firewall Services
Depending on your model, some services may not be available. Consult the datasheet for your appliance for more information on which services
are available for your model.
Click here to view a list of services available on the Barracuda NG Firewall ...
DHCP Service
DHCP Relay
DNS
Firewall
FTP Gateway
HTTP Proxy
URL Filter
Mail Gateway
OSPF/RIP/BGP Service
SNMP Service (Server Layer)
SPAM Filter
SSH Proxy
Virus Scanner
VPN Service
Access Control Service
Barracuda NG Control Center Services
Click here to view a list of services available on the Barracuda NG Control Center ...
CC DNS
CC Firewall
CC Configuration Service
CC Event Service
CC Syslog Service
CC FW Audit Log Service
CC Reporter
CC Statistics Collector
CC VPN Service
CC Access Control Service
CC PKI Service
In this article:
Create a Service
Remove a Service
Enable or Disable a Service
Move a Service
Create a Service
Step 1. Add a Service to a Virtual Server
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services.
Right-click Assigned Services and select Create Service.
Enter a Service Name. The name must be unique and no longer than six characters. The service name cannot be changed later.
In the Software Module field, select the type of service that you are creating. You cannot change the service type after the service is
created.
The types of services that you can create are dependent on your license and system model. Verify the product type and
appliance model in the Box Properties if services are missing.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
252
Step 2. Service IPs and Type of Service
Assign the IP addresses the service listens on.
1. In the Service IPs section, enter the IP addresses for the service.
2. Select the IP addresses the service listens on from theService Availability list.
All IPs – Some services (i.e., firewall) will automatically listen on all available Server IP addresses.
First + Second-IP – Listen on the first and second virtual server IP address.
First-IP – Listen on the first virtual server IP address.
Second-IP – Listen on the second virtual server IP address.
Explicit – Add the IP addresses you want to use to the Explicit Service IPs table. Explicit IP addresses must also be added to
the Additional IP table in the Server Properties of the virtual server. For more information, see How to Configure Virtual
Servers.
3. Click Next .
Step 3. Statistics (optional)
Enable statistics settings for the service. By default, all settings are enabled for the service:
1. In the Statistics Settings section set Generate Statistics to yes.
2. Edit the following settings according to your requirements:
Src Statistics – Generates IP source-based statistical data for the service. Only the number of connections from IP addresses
is recorded. The times at which the connections were made are not recorded.
Src Time-Statistics – Generates IP source-based statistical data for the service. Both the number of connections made from IP
addresses and the times at which the connections were made are recorded.
Dst Statistics – Generates IP destination-based statistical data for the service. Only the number of connections to IP addresses
is recorded. The times at which the connections were made are not recorded.
Dst Time-Statistics – Generates IP destination-based statistical data for the service. Both the number of connections made to
IP addresses and the times at which the connections were made are recorded.
Src-Dst Statistics – Generates IP source/destination pair based-statistical data for the service. Only the number of connections
to and from IP addresses is recorded. The times at which the connections were made are not recorded.
3. Click Next.
Step 4. Access Notification (optional)
Configure which events are created for successful and unsuccessful logins. On standalone Barracuda NG Firewalls and on the box level of the
NG Control Center, this setting can only be configured for all administrators. On the Barracuda NG Control Center, each type of administrator (Mu
lti-Range > Global Settings > CC Access Notification) can be handled separately: Access notifications are only available for DHCP Server,
Firewall, VPN Service and the Mail Gateway service.
The following events are used for login attempts:
The User Unknown event is generated when the admin ID is unknown to the underlying Barracuda Networks authentication module.
The Authentication Failure event type is used when the password or key do not match or the admin is not authorized to access the
service (multi-admin environment, only in conjunction with a Barracuda NG Control Center).
To configure which events are created, complete the following steps:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
1. In the Notification section, edit
253
the following settings according to your requirements:
a. Success – Select the notification level for a successful login:
Silent – No event.
Notice – NGFW Subsystem Login Notice [2420].
Warning – NGFW Subsystem Login Warning [2421].
Alert – NGFW Subsystem Login Alert [2422].
b. Failure – Select the notification level for an unsuccessful login:
Silent – No event.
Notice – NGFW Subsystem Login Notice [2420].
Warning – NGFW Subsystem Login Warning [2421].
Alert – NGFW Subsystem Login Alert [2422].
2.
3.
Click Finish.
Click Activate to create the service.
The service is now displayed as active (
) on the CONTROL > Server page.
Remove a Service
Removing a service is permanent and cannot be undone.
1.
2.
3.
4.
5.
Expand the Assigned Services node (Configuration > Configuration Tree > Box > Virtual Servers > your virtual server).
Right-click the service you want to delete and click Lock.
Right-click the service you want to delete and click Remove Service. A verification popup opens.
Click Yes.
Click Activate.
Enable or Disable a Service
1. Go to the Service Properties node (CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server >
Assigned Services > your service).
2. Click Lock.
3. To disable the service set Enable Service to No.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
254
4. To enable the service set Enable Service to Yes.
5. Click Send Changes and Activate.
Move a Service
You can move services between virtual servers. If you are moving a service on a Barracuda NG Control Center, verify that the name of the
service is unique in the cluster.
1.
2.
3.
4.
5.
6.
Expand the Assigned Services node (CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server).
Right-click the service you want to move and click Lock.
Right-click the service you want to move and click Move Service. The Select Destination window opens.
Select the destination virtual server.
Enter the Name for the New Object.
Click OK
7. Click Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
255
NG Firewall Services
Services are software modules running on the service layer of the Barracuda NG Firewall. Each service provides a piece of network functionality.
Depending on which service you start, it might require additional services or be limited to one service per virtual server or NG Firewall. The
following services are available on standalone and managed Barracuda NG Firewalls:
Access Control Service
The Barracuda NG Firewall Access Control service defines security policies for network users (e.g., VPN clients) and provides a range of
features, such as registry checks and repairs on a client. Create access control objects with policy rulesets specifying required system and
service settings to let the Barracuda NG Firewall perform identity and health checks on connecting clients and groups.
For more information, see Access Control Service.
DHCP
The DHCP service automatically assigns IP addresses to clients in the same network. For clients requiring special DHCP options, combine the
DHCP server with the DHCP Relay service to share a DHCP server across multiple network segments.
For more information, see DHCP.
DNS
The Barracuda NG Firewall can act as an authoritative DNS server. The DNS service returns definitive answers to DNS queries for domain
names and IP addresses. Use split DNS to return different answers depending on the source IP of the DNS query. This allows you to redirect
internal clients to an internal IP address of a server.
For more information, see DNS.
Dynamic Routing Protocols
Dynamic Routing enables the NG Firewall to learn and select the optimal route to a destination IP address, detects changes to the network
topology, and advertises these changes to other neighboring routers. The Barracuda NG Firewall supports three Dynamic Routing protocols OSPF, RIP (V1 and V2), and BGP.
For more information, see Dynamic Routing Protocols (OSPF/RIP/BGP).
Forwarding Firewall
The Forwarding Firewall handles all traffic for which the destination does not match with a listening socket on the Barracuda NG Firewall - in other
words, all traffic passing through the NG Firewall. The firewall service in the NG Firewall offers Application Detection 2.0, integrated Virus
Scanning, URL Filtering, and an integrated Intrusion Prevention System.
For more information, see Firewall.
FTP Gateway
The FTP Gateway service of the Barracuda NG Firewall acts as a proxy for an internal FTP server. Policies including authentication settings,
permissions, and restrictions for server access and file handling are defined per gateway. You can also create user and group specific profiles.
For more information, see FTP Gateway.
HTTP Proxy
The Barracuda NG Firewall HTTP Proxy service provides content filtering and caching, antivirus, malware protection, and access control. You
can configure the HTTP Proxy in forward, reverse and transparent mode.
For more information, see HTTP Proxy.
Mail Gateway
The Mail Gateway service handles mail traffic according to delivery policies and scans incoming and outgoing mail for viruses and malware. The
Mail Gateway also supports extended domains, POP3 scanning, and group patterns for recipient verification. The Mail Gateway interface displays
the mail queue from where you can perform operations such as showing processes, logfiles etc.
For more information, see Mail Gateway.
SSH Proxy
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
256
The SSH Proxy service of the Barracuda NG Firewall allows regulating SSH connections. Based on OpenSSH, the SSH Proxy service provides
DoS protection, public key support, and configurable SSH protocol support for accessing target systems.
For more information, see SSH Proxy.
SIP Proxy
To correctly forward SIP traffic, the Barracuda NG Firewall includes a SIP Proxy service. This service will act as a (transparent) proxy for SIP and
RTP connections.
For more information, see SIP Proxy.
Spam Filtering
The Barracuda NG Firewall Spam Filter service identifies spam by using mechanisms such as text analysis, DNS blacklists, and collaborative
filtering databases. The spam filter examines the mail header and body against a configured ruleset and a Bayesian filter. To improve the filter
mechanisms, the mail filter also regularly collects and processes mail from configured training environments.
For more information, see Spam Filter.
URL Filter
The Barracuda NG Firewall offers the choice between two different web filter engines: the Barracuda Web Filter (CFDEF) or the Barracuda NG
Web Filter (IBM/ISS). Both engines can be used by the Barracuda NG Firewall HTTP Proxy service, but only the Barracuda Web Filter can be
used in combination with Application Control 2.0. URLs are categorized according to content.
For more information, see URL Filter.
Virus Scanner
The Virus Scanner service of the Barracuda NG Firewall provides virus protection, archive scanning, malware detection, and HTTP multimedia
streaming. The Virus Scanner service can be configured using the integrated Avira or ClamAV virus scanning engine. Using the Virus Scanner
service requires a subscription that can be renewed annually.
For more information, see Virus Scanner.
VPN
The VPN service supports site-to-site, client-to-site, and SSL-VPN VPN connections. The Barracuda NG Firewall supports multiple encryption
methods, traffic intelligence, and WAN optimization when using the TINA protocol. IPsec client-to-site connections also support authentication
using pre-shared keys, which is used by iOS and Android clients.
For more information, see VPN.
Wi-Fi
For administration of Wi-Fi networks, the Wi-Fi service provides configuration settings for the local access point. The service also supports user
authentication in large networks via RADIUS and EAP.
For more information, see Wi-Fi.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
257
Access Control Service
The Barracuda NG Firewall Access Control service defines security policies for network users (e.g., VPN clients) and enables the Barracuda NG
Firewall to perform identity and health checks on clients. The Access Control service of the Barracuda NG Firewall interacts with the Barracuda
Network Access Client and needs to be set up simultaneously. For proper operation, all components of the Barracuda Network Access Client
framework, the Access Control service on the Barracuda NG Firewall, and the client software require up-to-date virus and spam protection.
Access Control Service Trustzones
Access Control services within the same trust zone share the same set of security policies that are defined in access control objects. If you are
using the Access Control service on a managed NG Firewall, the Barracuda NG Control Center provides Access Control Service Trustzones as
global objects. Access Control Service Trustzones can be configured on a range, cluster, or virtual server basis.
For more information, see Configuring Access Control Service Trustzones.
Access Control Objects
Access control objects are assigned to clients according to access control policies and enable administrators to perform certain actions such as
registry checks and repairs on a client. Create access control objects with policy rulesets specifying required system and service settings to let
the Barracuda NG Firewall perform identity and health checks on connecting clients and groups. Access control objects permit access only to
administrators with appropriate administrative scope and appropriate permission.
For more information, see Configuring Access Control Objects.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
258
Configuring Access Control Objects
Access Control Policy rulesets can reference so-called Access Control Objects. Access Control Objects are attributes assigned to the client
according to the policies configured in the Access Control Service Trustzone and work similarly to the objects available for Client-to-Site VPN
in the Barracuda Network Access Client.
Welcome Messages
Welcome messages can be used to display customized messages to welcome users to the corporate network, inform them about security
policies, or display administrator contact details. For each policy rule, a different Welcome Message can be displayed to individual groups of
users. In addition, Welcome Messages can be used to display localized messages. Each message is assigned to a language. According to the
client's language settings, the localized message is displayed. The client will display the English-language message as a fallback.
Pictures
Pictures assigned to clients are usually small bitmaps displaying the corporate logo. Sometimes they are also used to notify the users about
special events.
Assigned pictures are displayed in the client after successfully connecting to the Access Control service.
Keep the size of your picture small because the picture will be transferred to all clients. Pictures larger than 167x90 pixels are
automatically scaled down on the Barracuda NAC
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
259
Personal Firewall Rules
Barracuda Personal Firewall rules are explained in detail on the Configuring Personal Firewall Rules on the Barracuda NG Control Center page.
Registry Check Objects
These objects enable administrators to define registry checks to be performed on the client. This allows registry keys and values to be
validated, just like taking action in case of failed validation.
Available actions are Repair, Notify, or Fail. In case of a Fail, the Access Control service health validation will fail if the specified registry keys
are not set appropriately. Notify generates appropriate log messages on the Barracuda NG Firewall.
Important registry changes (e.g., the introduction of a new registry key) are only done for local machine authentication. Thus, users
need to log off or reboot the client to activate these changes.
Registry values can also be verified and changed for user authentication.
To import a registry file, click the Clipboard icon on the right, top side of the Registry Check Rules table, select Replace With Registry
Import... and import the respective file.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
260
Access Control Objects provide a hierarchical override mechanism. Objects on cluster level that share the same name as global or
range objects override the global definition(s). This mechanism works like the one using global firewall objects for the Barracuda NG
Firewall.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
261
Configuring Access Control Service Trustzones
Each Access Control Service belongs to a so-called trustzone. To enforce security policies across multiple F-Series Firewalls, the Control Center
provides Access Control Service Trustzones as global objects (see also: Configuring Access Control Objects). This advanced feature allows all
Access Control services within the same trustzone to share the same set of security policies. In addition, they share a signing key, so that a
mutual trust relationship can be established.
In this article:
Rules
Identity Matching - Basic
Identity Matching - Advanced
Required Health State - Basic
Required Health State > Advanced Health State
Policy Assignments
Settings
Support Chart
On stand-alone firewalls, configuration of the trustzone is located in the CONFIGURATION > Configuration Tree > Box > Virtual Servers > you
r virtual server > Assigned Services > Access Control Service > Access Control Service Trustzones.
The Control Center provides Access Control Service Trustzones either within the Global Settings, Range Settings or the Cluster Settings.
The predefined Access Control Service Trustzones can be referenced by navigating to CONFIGURATION > Configuration Tree > Box > Virtual
Servers > your virtual server > Assigned Services > Access Control Service > Access Control Service Settings > System
Health-Validator > Trustzone.
The NextGen Control Center automatically links the trustzone to the appropriate global / range / cluster object.
Each trustzone contains three policy rulesets. There is a local machine policy ruleset that is used to determine a policy for a connecting machine
if no user is currently logged in. As soon as user authentication is requested by the connecting client, the current user policy ruleset is used for
policy matching.
User authentication can be skipped by setting Access Control Service Settings > User Authentication > User Authentication
Required to No. In addition, local machine rulesets allow user authentication to be skipped for a specific policy rule (Policy
Assignments > Exception > User Authentication Required).
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
262
If the connection attempt is mediated by an intermittent VPN service, the VPN policy ruleset is adopted.
Create an Access Control Server service within CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server >
Assigned Services > Access Control Service. Click Access Control Service Trustzone to open the configuration dialogue.
Rules
The main window of an Access Control Service Trustzone is split up into a navigation bar on the left and policy rulesets on the right (if some are
already defined).
Identity Matching - Basic
The first step when processing a policy ruleset (either local machine, current user, or VPN) is to determine the client's identity.
Depending on the value of Basic Matching > Policy Matching, either all or one of the specified criteria must match to determine the client's
identity. If the identity match fails, the next rule is considered.
Access Control Service Trustzone > Rules > Identity Matching Basic > Basic Identity Matching
Policy Name
The name of the policy. This name is visible in the log file and in the
access cache.
Deactivate Policy
Disables the configured policy.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Client Connection
263
External
Ignore
Internal
External effects that this policy rule is ignored for internal connection
(connections to an IP address not defined in External IPs)
Internal effects that this policy rule is ignored for external
connections (connection to an IP address defined in External IPs).
Ignore means that the policy rule is ignored neither for internal nor
external connections.
Time Restriction
Each policy rule can be assigned with a date and time restriction. The
date restriction consists of a Start Date and an End Date. Outside
that time period, this policy rule will be ignored.
The granularity of the time restriction is 1 hour per week?
A rule is allowed at all times by default; that is, all check boxes in the
Time Interval window are cleared. Selecting a check box denies a
rule for the given time.
Click the respective icon to configure allowed and disallowed time
intervals simultaneously.
Click the respective icon to clear selected check boxes.
Click the respective icon to configure disallowed time intervals.
Select Continue if mismatch to proceed with the health evaluation
process within the policy ruleset of the next rule (default).
Select Block if mismatch to stop the health evaluation process and
set the client to "unhealthy" immediately.
Access Control Service Trustzone > Rules > Identity Matching Basic > Basic Matching
Policy Matching
All-of-following
One-of-following
Set this to All-of-following if all of the identity matching parameters
(basic and advanced), except the empty ones, must match for a
successful identity verification. If just one field does not match, the
identity is not verified successfully within this policy rule and the
health match process will proceed with the next policy rule in the
policy ruleset.
Set this to One-of-following to let the identity verification succeed if
just one field matches.
Empty fields will be ignored in both cases.
String comparison is case insensitive.
For the pattern to match, at least one user group must match at least
one defined group pattern.
Group Patterns
At least one user group must match at least one of these patterns for
successful identity verification.
Ensure that you are using the accurate syntax for the group patterns.
For example, MSAD groups must be entered as follows:
CN=group-*, OU=my-unit,CD=mycompany,DC=at
Net Bios Domain
A NetBIOS domain to match only users belonging to a specific
domain.
This is only available for the Current User and VPN rulese
ts.
User [Login Name]
Username patterns consist of the login name (without leading DOMAI
N\).
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Networks
Allowed OS Versions
264
The user's peer address must be part of at least one of these
networks.
Name
OS Versions
Service Pack Major Number
Service Pack Minor Number
Minimum Build Number
Policy on OS
Allowed or explicitly denied client OS versions.
OS Versions must be one of the listed Microsoft Windows Versions.
Service Pack Major Number and Service Pack Minor Number are
the service pack numbers of the client OS.
Minimum Build Number needs to be the OS build number and is
checked only if Policy on OS is set to This-One-Or-Newer.
Possible values for Policy on OS are:
Exact-This-One
The client OS must match OS Versions, Service Pack Major
Number, and Service Pack Minor Number.
Explicit-Deny
If the client OS matches OS Versions, Service Pack Major
Number, and Service Pack Minor Number, then the current
policy rule will be ignored for the current match, and health
evaluation processing proceeds with the next policy rule in the
policy ruleset.
This-One-Or-Newer
The client OS must be identically equal to OS Versions. The
client Service Pack Major Number and Service Pack Minor
Number need to be equal or greater than those defined here.
Hostnames
Enter hostnames here. Patterns may be used.
Identity Matching - Advanced
Access Control Service Trustzone > Rules > Identity Matching Advanced > Advanced Identity Matching
MAC Addresses
Patterns may be used.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Microsoft Machine SIDs
265
A SID is a globally unique machine identifier generated by Microsoft
operating systems. It is visualized in the Access Control Server’s
access cache. Patterns may be used.
Access Control Service Trustzone > Rules > Identity Matching Advanced > Certificate Conditions
x509 Subject
The X.509 subject of the client's authentication certificate must match
at least one of these patterns. For example: CN=name-*,
O=my-company.
Certificate authentication is only possible in local machine
and basic user authentication.
x509 Issuer
The subject of the issuer of the client's certificate must match at least
one of these patterns. For example: CN=name-*, O=my-company.
Certificate authentication is only possible in local machine
and basic user authentication.
x509 Altnames
The subject alternative name of the client's authentication certificate
must match at least one of these patterns. For example: IP:10.0.10.*.
Certificate authentication is only possible in local machine
and basic user authentication.
The subject alternative name must be prefixed with its type
(for example, email: or IP:)
Required Health State - Basic
After successful verification of the client’s identity, this configuration entity is used for determining the client’s health state. Some of the
parameters provide the following options:
Not required
The result of the health evaluation does not depend on this parameter.
Required
If a Required parameter does not match, the user is notified and manual action is required. In addition, the client's health state changes
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
266
to Probation.
Required <Auto-Remediation>
Notifies the client as well, but tries to automatically execute the necessary actions to fulfill the health requirements. During this period, the client's
health state changes to Probation.
For third-party products (e.g., a Virus Scanner), Auto-Remediation may not work with all available engine versions. As a fallback, the
client always requests manual action.
Access Control Service Trustzone > Rules > Required Health State Basic > Service Settings
Personal Firewall On
Required
Required <Auto-Remediation>
Not Required (default)
Set to Required if a client must have the Personal Firewall up
and running to be healthy.
If the client does not meet this requirement, the user will be
advised to turn on the firewall.
Antivirus Scanner On
Required
Required <Auto-Remediation>
Not Required (default)
Set to Required if a client must have the Virus Scanner up and
running to be healthy.
If the client does not meet this requirement, the user will be
advised to turn on the Virus Scanner.
The Required option only takes effect as long as the Antiv
irus check box is activated (see the figure above).
Antispyware Scanner On
Required
Required <Auto-Remediation>
Not Required (default)
Set to Required if a client must have the Spyware Scanner up
and running to be healthy.
If the client does not meet this requirement, the user will be
advised to turn on the Spyware Scanner.
The Required option only takes effect as long as the Antis
pyware check box is activated (see the figure above).
Access Control Service Trustzone > Rules > Required Health State Basic > Miscellaneous
Continue Match
Registry Check Rules
STOP on Health Mismatch (default)
Continue on Health Mismatch
Set this to Continue on Health Mismatch if the health
validation should continue with the next policy rule in the policy
ruleset in cases where the health evaluation in the current
rule stated that the client is not healthy.
Set this to STOP on Health Mismatch if health validation should
not continue with the next policy rule in the policy ruleset if the
client is not healthy. In this case, the policy attributes of the
current rule are assigned to the client and the client is advised to
heal itself.
Select a registry check object. To be healthy, the client’s registry
entries must match those of the selected registry check object.
Access Control Service Trustzone > Rules > Required Health State Basic
Antivirus
Enable or disable the Antivirus settings parameters. For the
parameter description, see the next list. Default: not selected.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Antispyware
267
Enable or disable the Antispyware settings parameters. For the
parameter description, see the next list. Default: not selected.
Access Control Service Trustzone > Rules > Required Health State Basic > Antivirus
AV Real Time Protection
Required
Required <Auto-Remediation>
Not Required (default)
Set to Required if a client must have enabled the real-time
protection of the Virus Scanner to be healthy. If the client does
not meet this requirement, it will be advised to turn on the
real-time protection of the Virus Scanner.
Last AV Scan Not Older Than
Ignore
6-Hours > 1-Month
24-Hours (default)
Set to a value other than Ignore to ensure that the client’s last
full virus scan is not older than <value> to be healthy. If the
client does not meet this requirement, it will be advised to
perform a full virus scan.
Last AV Scan Action
Manual
Auto Remediation
Depending on this parameter, either the user gets informed to
manually perform a full virus scan, or the client tries to execute a
full system scan automatically.
AV Engine Required
Ignore
Latest (default)
Previous
Last-2
Set to Ignore if the client’s Virus Scanner version should not be
checked.
Set to Latest if the client must not have an older version of the
Virus Scanner to return a healthy state.
Set to Previous if the latest and the previous version of the
Virus Scanner are accepted to return a healthy state.
Set to Last-2 if the latest, the previous, and the second-to-last
Virus Scanner versions are accepted to return a healthy state.
If the client does not meet the chosen requirement, it will be
advised to perform a Virus Scanner engine update.
AV Patterns Not Older Than (h)
Ignore
6-Hours > 1-Month
24-Hours (default)
Set this to a value other than Ignore to require Virus Scanner
patterns to be not older than <value> to be healthy. This value
will be ignored if the latest Virus Scanner pattern is older than <v
alue>.
For example, if this option is set to 6-Hours but the latest pattern
was released 8 hours ago, the client will be set to unhealthy stat
e due to this option. Release cycles of Virus Scanner patterns
depend on the Virus Scanner vendor.
AV Engine/Pattern Action
Manual
Auto Remediation
Depending on this parameter, either the user gets informed to
manually update the AV system, or the client tries to trigger AV
updates automatically.
Allowed Vendors
Choose one or more out of this list of Virus Scanner vendors in order
to enforce a specific Virus Scanner product to be installed on the
client. Virus Scanner products not listed here are ignored in the
health validation process. This option is helpful especially to exclude
certain Virus Scanner products from the health validation process.
The list of available Virus Scanner vendors is created dynamically.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
268
Access Control Service Trustzone > Rules > Required Health State Basic > Antispyware
AS Real Time Protection
Required
Required <Auto-Remediation>
Not Required (default)
Set to Required if a client must have enabled the real-time
protection of the Spyware Scanner to be healthy. If the client
does not meet this requirement, it will be advised to turn on the
real-time protection of the Spyware Scanner.
Last AS Scan Action
Manual
Auto Remediation
Depending on this, the user either gets informed to manually
perform a full spyware scan, or the client tries to execute a full
system scan automatically.
Last AS Scan Not Older Than
Ignore
6-Hours > 1-Month
24-Hours (default)
Set to a value other than Ignore to ensure that the client's last
full spyware scan is not older than <value> for validly returning
the healthy state. If the client does not meet this requirement, it
will be advised to perform a full spyware scan.
AS Engine Required
Ignore
Latest (default)
Previous
Last-2
Set to Ignore if the client's anti-spyware engine version should
not be checked.
Set to Latest if the client must not have an older version of the
Spyware Scanner engine to validly return the healthy state.
Set to Previous if the latest and the previous version of the
Spyware Scanner engine can validly return the healthy state.
Set to Last-2 if the latest, the previous, and the second-to-last
Spyware Scanner engine versions are allowed to validly return
the healthy state.
If the client does not meet the chosen requirement, it will be
advised to perform a Spyware Scanner engine update.
AS Pattern Definitions Required
Ignore
Latest (default)
Previous
Last-2
Set to Ignore if the client's spyware pattern definitions should
not be verified. Be aware that, in this case, the client may be
healthy without having any spyware patterns installed.
Set to Latest if the client’s spyware patterns must be up-to-date
to validly return the healthy state.
Set to Previous if the client’s spyware patterns must either be
up-to-date or of the previous version to validly return the healthy
state.
Set to Last-2 if the client’s spyware patterns must either be
up-to-date or of the previous or the second-to-last versions to
validly return the healthy state.
If the client does not meet the chosen requirement, it will be
advised to perform a spyware patterns update.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
269
AS Patterns Not Older Than (h)
Ignore
6-Hours > 1-Month
24-Hours (default)
Set this to a value other than Ignore to require spyware patterns
to be not older than <value> to validly return the healthy state.
The setting will be ignored if the latest spyware pattern is older
than <value>.
For instance, if the value is set to 6-Hours but the latest spyware
pattern was released 8 hours ago, the client will be set to the un
healthy state due to this setting.
Release cycles of spyware patterns depend on the Spyware
Scanner product vendor.
AV Engine/Pattern Action
Manual
Auto Remediation
Depending on this setting, the user either gets informed to
manually update the Spyware Scanner, or the client tries to
trigger such an update automatically.
Allowed Vendors
Choose one or multiple entries from the list of Spyware Scanner
vendors in order to enforce specific Spyware Scanner vendor
products to be installed on the client. Spyware Scanner products not
listed here are ignored during the health validation process. This
setting is helpful especially for excluding certain Spyware Scanner
products from the health validation process.
The list of available Spyware Scanner vendors is dynamically
created.
Required Health State > Advanced Health State
Select New from the context menu to create a new entry. The configuration dialog provides the following entries:
Access Control Service Trustzone > Rules > Required Health State > Advanced > Allowed Health Suite Versions
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
270
Name
Specify a name.
Major Release
The client's health suite major release version number must match M
ajor Release.
Minor Release
The client's health suite minor release version number must match Mi
nor Release.
Service Pack Number
The Service Pack Number must match the service pack number of
the client's health suite.
Policy on OS
Exact-This-On
The client's health suite version must match all three number
values.
Explicit-Deny
If the client’s health suite version matches all three number
values, the health state will be set to a value different than healt
hy and the clients will be advised to update the health suite.
This-One-Or-Newer
The client’s health suite major version must equal Major
Version. The minor release version number and the service
pack number need to be equal or greater than those defined
here.
Health suite updates are always performed on an equal major release version number. For instance, a client’s health suite version
4.0.2 can be updated to 4.1.0 but not to 5.0.0.
It is also possible to include a validation of the currently installed Microsoft hotfixes on the client computer:
1. Right-click into the Required Security Updates field
2. Click New..., then enter the ID of the Microsoft hotfix. For example: KB936929.
Policy Assignments
Access Control Service Trustzone > Rules > Policy Assignments > Attributes
Personal Firewall Settings
Ruleset Name
Select one of the created Personal Firewall Rule objects. If the
client does not already have this ruleset installed, the health
state will be set to a value other than healthy and the client will
be advised to update the personal firewall rule set from the
remediation server.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Message of the Day
Limit Access
271
Select one of the created Welcome Message objects. If the client
does not already have this message, it will be advised to get the
message from the remediation server.
Ruleset Name
Message
Client Emerg. Quarantine Time (s)
Configure the quarantine ruleset. Assignment of Limited
Access rulesets and messages is only available for the Local
Machine ruleset.
The quarantine ruleset (Limited Access) is stored on
the local machine. This means that the quarantine
ruleset can only be updated if the current user logs off
or the client is rebooted. If a client changes its state to
unhealthy, the local machine quarantine ruleset is
activated.
Access Control Service Trustzone > Rules > Policy Assignments > Exceptions
Software Update Required
Yes
No (default)
Yes-Even-Major
Change this to Yes for the client to automatically perform
software updates if a new software minor version is available on
the CC.
Yes-Even-Major will cause the client to also perform major
version updates.
User Authentication Required
Yes
No
Like Service Settings (default)
Only available for the local machine ruleset. If this is set to No,
user authentication is not performed even if a user logs in.
Access Control Service Trustzone > Rules > Policy Assignments > Radius Attributes
Healthy Attribute Assignments
RADIUS attribute assignments passed to a RADIUS server as
key-and-value pairs if the client meets the health requirements.
Unhealthy Attribute Assignments
RADIUS attribute assignments passed to a RADIUS server as
key-and-value pairs if the client does not meet the health
requirements.
Settings
If no policy rule matched the identity for a client, or at least one matched but the Continue Match parameter was set on that/those policy rule(s),
the client's state will be untrusted and it will be assigned the No Rule Exception attributes.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
272
Access Control Service Trustzone > Settings > Identity
The RSA key for digital passport signing.
The Health Validator returns a digital passport to the client as result
of the health validation. The passport contains all information
required for the remediation server. To ensure authenticity,
the passport is digitally signed.
Health Passport Signing Key
Since all Access Control services of the same trustzone
share the same credentials, the remediation server
instances can verify whether a passport was issued by a
health validator of the same trustzone.
Health Passport Verification Key
The RSA public key for verifying a digital passport signature.
If one Access Control Server instance acts exclusively as a
remediation server, it is not necessary to set the Health Passport
Signing Key. However, the Health Passport Verification Key must
be set.
Client Shutdown Passphrase
If a passphrase is set here, the Access Control service will lock the A
dvanced Settings locally on the clients unless the local user enters
the correct passphrase. In addition, the client can only be terminated
on the workstation after the passphrase has been entered.
The default setting <not-required> disables these restrictions and
enables the local user to administer and terminate the client.
Access Control Service Trustzone > Settings > No Rule Exception
Bitmap
Select one of the Picture objects. The client will then be advised to
get the respective bitmap from the remediation server.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Limited Access Ruleset Name
Limited Access Message
273
For more information on these two parameters, see Limit Access in
the Access Control Service Trustzone > Rules > Policy
Assignments > Attributes list.
Access Control Service Trustzone > Settings > Limited Access Defaults
Client Emergency Quarantine Time (s)
If the Access Control Server is not reachable anymore for the client, it
switches automatically to the Unhealthy restricted state.
Entering a value of 0 disables this.
For more information, see Limit Access in the Access Control
Service Trustzone > Rules > Policy Assignments > Attributes list.
If no Access Control Server IP address is available, this
parameter does not have any effect.
For more information, see The Barracuda Access Monitor,
Access Control Server IPs from Registry and Access
Control Server IPs from DHCP sections.
Quarantine Ruleset Name
Select one of the Personal Firewall Rules objects. The client will be
advised to get the respective bitmap from the remediation server.
Quarantine Message
Select one of the Welcome Messages objects. The client will be
advised to get the respective bitmap from the remediation server.
Health Validation Mode
Moderate
Health checks are executed after connection establishment.
Offensive
Health checks are executed during connection establishment.
The Health Validation Mode parameter can also be configured on the client via the following registry key:
Path
.DEFAULT\Software\Phion\phionha\settings\
Key
SpeedVPNValidation
Moderate
Offensive
Value
The Client Emergency Quarantine Time (s) parameter can also be configured on the client using the following registry key:
Path
.DEFAULT\Software\Phion\phionha\settings\
Key
QuarantineCountDown
Value
[Default: 3600000 ( = 1 hour in milliseconds)]
Access Control Service Trustzone > Settings > Radius Attribute Assignments
With this feature, it is possible to send additional attributes to the switch, depending on the health state of the client. VLAN Change attributes
are already hardcoded.
Healthy
Unhealthy
For a description of these two parameters, see the Access Control
Service Trustzone > Rules > Policy Assignments > Radius
Attributes list.
Support Chart
This view provides information concerning the supported Virus Scanner and Spyware Scanner vendors and versions.
The Support Chart is automatically downloaded from the Barracuda Networks update service and distributed to Barracuda NextGen Admin upon
connecting. Thus, the Support Chart reflects the current capabilities of the Access Control service.
The following restrictions appear on Microsoft Windows Vista and Windows 7 64-bit:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
274
The supported features listed in the support chart may differ from the technically executed actions. For example, regarding automatic
updating of Windows Defender 1.x, the chart states Implemented although it may not work on the 64-bit client. The reason is that the
released version of the 64-bit client contains a 32-bit compatible COM+ server for integrated OPSWAT modules (health check).
Therefore, this component is not yet implemented as native 64-bit.
This leads to some restrictions regarding auto-remediation features of the health agent system:
Enabling and disabling of Virus and Spyware Scanner functionality cannot be done automatically for some vendors (see
support charts).
Auto-remediation for Virus Scanner and Spyware Scanner engine and pattern updates is disabled in the 64-bit client.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
275
DHCP
DHCP Service
The DHCP service automatically assigns IP addresses to clients that reside in a defined subnet. In the DHCP server configuration, you can define
address pools and explicitly map MAC addresses to a reserved IP address. You can also define additional parameters that are passed to the
client when an IP address is requested.
For configuration instructions, see How to Configure the DHCP Service and Advanced DHCP Settings.
DHCP Relay
The DHCP Relay service forwards DHCP broadcast messages to other network segments. DHCP relaying allows you to share a single DHCP
server across logical network segments that are separated by a firewall.
For more information, see How to Configure the DHCP Relay Agent.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
276
How to Configure the DHCP Service
Configure the DHCP service and specify a network range from which the IP address for the clients will be assigned. In the advanced settings for
DHCP, you can configure additional service availability settings,and set up HA synchronization.
In this article:
Before you Begin
Configure the DHCP Service
Check the DHCP Server Status
Configure Advanced DHCP Settings
Before you Begin
Add a Virtual Server IP for each subnet you want to use for the DHCP server. For more information, see Virtual Servers and Services.
Configure the DHCP Service
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. Click Lock.
3. In the left menu, select Operational Setup IPv4 or 6.
4. In the Address Pool Configuration window, enable DHCP.
5. Click + to add an entry to the Subnets table.
6. Enter a descriptive name for the subnet and click OK. The Subnets configuration window opens.
7. From the Used Subnet list, select one of the available IPv4 subnets or select explicit and enter the IP address in the Network Address f
ield.
When using IPv6 select any (stateless dhcp) to use DHCPv6 to extend IPv6 with DHCP capabilities (assigning domain name
or DNS servers).
8. In the DHCP Server Identifier field, enter the name of the server. This name is provided to the client.
9. Click + to add a new entry to the Pool Ranges table.
10. Specify the following for each range:
IP Begin – The first IP address in the network range. E.g.: 10.10.10.20
IP End – The last IP address in the network range. E.g.: 10.10.10.40
11. Click OK.
12. (optional) Add MAC to IP address mappings to the Reservations table:
a. Enter the Reserved IP for the client.
b. Enter the MAC Address of the client.
13. Click OK.
14. In the Router table, add the default gateway IP address. E.g.: 10.10.10.100
15. In the DNS Servers table, add the DNS server IP address. E.g.: 10.10.10.100
16. Enter the Domain Name if the client range is part of a domain.
17. Enter the NIS Domain Name and specify the details required for all servers that should be assigned.
18. In the Static Route Net table, click + to add static routes that the client should install in its routing cache. If there are multiple routes to
the same destination, list them in descending order of priority.
a. In the Static
b.
c.
19.
20.
21.
22.
Route Net field, enter the destination IP address.
In the Static Route GW field, enter the IP address of the router.
Click OK.
Enter the TFTP Server Name if the 'sname' field in the DHCP header has been used for DHCP options.
Enter the TFTP Server IP Address for Cisco CallManager devices. In this field, you can enter a comma-delimited list of addresses.
Enter the Boot File Name if the 'file' field in the DHCP header has been used for DHCP options.
If you set the Barracuda Network Access Clients Policy of an Address Pool to Barracuda Network Access Clients or guests, add the
required info to the Access Control Service IPs/Names table for a client to receive valid policy server information.
You can add vendor IDs, policy server IP addresses, or DNS resolvable policy server names. If the Barracuda Network
Access Clients Policy field is set to none, the information in the Access Control Service IPs/Names table is ignored.
23.
24.
25.
26.
For information on dynamic DNS configuration, refer to How to Configure DHCP with Dynamic DNS.
For information on lease configuration, refer to How to Configure DHCP Parameter Templates.
Click OK.
Click Send Changes and Activate.
Check the DHCP Server Status
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
277
Click the DHCP Tab to check the real-time status of the configured DHCP server.
Configure Advanced DHCP Settings
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. From the left Configuration Mode menu, select Switch to Advanced View.
3. Click Lock.
4. In the left pane, select Operational Setup IPv4 or 6.
5.
In the Address Pool Configuration window, enable DHCP.
6. Enable Use Advanced Pool Configuration. This disables the Subnets section and allows configuration of address pools.
7.
In the DHCP Server Identifier field, enter the name of the server. This name is provided to the client.
8. Enable Server Is Authoritative.
When the DHCP server receives a DHCPREQUEST message from a DHCP client requesting a specific IP address, the DHCP
protocol requires that the server determines whether the IP address is valid for the network to which the client is attached. If
the address is not valid, the DHCP server should respond with a DHCPNAK message, forcing the client to acquire a new IP
address. To make this determination for IP addresses on a particular network segment, the DHCP server must have complete
configuration information for that network segment. Unfortunately, it is not safe to assume that DHCP servers are configured
with complete information. Therefore, the DHCP server normally assumes that it does not have complete information and,
thus, is not sufficiently authoritative to safely send DHCPNAK messages as required by the protocol.
9. Select the UDP Listen Port on which the DHCP server listens for DHCP requests. By default, the server listens on port 67.
10. For an HA setup, edit the settings in the HA Synchronization Setup section to synchronize the DHCP database between both units:
a. Enable HA Synchronization to synchronize the DHCP database between the HA units.
b. Specify the HA synchronization interval if required (default: 300 seconds).
11. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
278
Advanced DHCP Settings
In the advanced DHCP service settings, you can configure address pools, specify additional service availability settings, and set up HA
synchronization behavior. Before configuring the advanced settings for DHCP, verify that the DHCP service has been properly created on the
Barracuda NG Firewall. For more information, see How to Configure Services.
With advanced pool configuration enabled in the DHCP service settings, you can configure the following features:
Subnets and Address Pools
DHCP Templates
Known Clients
DHCP Classes
Dynamic DNS
Text-Based Configuration
For more information, see How to Configure Advanced DHCP Settings.
Subnets and Address Pools
Use advanced pool configuration and configure DHCP and DNS settings for subnets and address pools.
For more information, see How to Configure DHCP Subnets and Address Pools.
DHCP Templates
Configure DHCP option and parameter templates for subnets and shared network devices.
For more information, see How to Configure DHCP Option Templates.
For more information, see How to Configure DHCP Parameter Templates.
Known Clients
Configure known clients and specify the settings for IP address assignment for client groups.
For more information, see How to Configure Known Clients.
DHCP Classes
Define DHCP classes and subclasses that are allowed or denied to get leases from the DHCP address pool.
For more information, see How to Configure DHCP Classes.
Dynamic DNS
Configure DHCP with dynamic DNS, add DNS zones, and specify update settings.
For more information, see How to Configure DHCP with Dynamic DNS.
Text-Based Configuration
View and configure the DHCP server using a text configuration file.
For more information, see How to Activate Text-Based Configuration.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
279
How to Configure Advanced DHCP Settings
In the advanced settings of the DHCP service, you can enable address pool configuration for subnets, specify additional service availability
settings, set up HA synchronization, and add DHCP options.
Configure Advanced DHCP Settings
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. In the left menu, expand the Configuration Mode section, and click Switch to Advanced View.
3. Click Lock.
4. In the left menu, select Operational Setup IPv4 or 6.
5. In the Address Pool Configuration window, enable DHCP.
6. Enable Use Advanced Pool Configuration. This disables the Subnets section and allows configuration of address pools.
7. Enter the name of the DHCP server in the DHCP Server Identifier textbox. This name allows clients to distinguish between different
DHCP servers.
8. Select the UDP Listen Port on which the DHCP server listens for DHCP requests. By default, the server listens on port 67.
9. Click Send Changes and Activate.
You can now configure advanced DHCP settings such as subnets and address pools, templates, classes, and known clients.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
280
How to Configure DHCP Subnets and Address Pools
With advanced DHCP service settings enabled, you can configure DHCP subnets and address pools and assign policies for handling DHCP
client groups and Barracuda Network Access Clients .
In this article:
Before You Begin
Step 1. Configure Advanced Subnets
Step 2. Configure Address Pools
Step 3. Configure Shared/Multihomed Subnets
Before You Begin
Before configuring DHCP address pools, enable advanced pool configuration in the DHCP service setup. For more information, see How to
Configure Advanced DHCP Settings.
Step 1. Configure Advanced Subnets
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. From the left Configuration Mode, select Switch to Advanced View.
3. From the left Configuration menu, select Address Pools.
4. Click Lock.
5. In the Advanced Subnets section, click + and add a subnet.
6. Enter a Name for the subnet and click OK. The Advanced Subnets window opens.
7. From the Used Subnet field, select a network that is configured on the Barracuda NG Firewall. When configuring a relayed network,
select explicit and enter the network address and mask in the Network Address field.
8. Enter the DHCP Server Identifier that should be included in DHCPOFFER messages to let clients distinguish between multiple lease
offers.
9. From the Perform DDNS Update list, enable or deactivate DNS setting updates for subnets. You can select:
true – Enables DNS setting updates for subnets (The DNS Zone setting is activated) and enter the updating DNS Zone (configu
red within dynamic DNS).
false – Disables DNS setting updates for subnets.
not-set – (default) Enforces global DNS parameters to be used for subnets.
10. From the Subnet Parameters list, select the DHCP parameter template if configured, which settings should be used for this subnet. For
more information, see How to Configure DHCP Parameter Templates.
11. From the Subnet DHCP Options list, select the DHCP options template for the subnet if configured. For more information, see How to
Configure DHCP Option Templates.
Step 2. Configure Address Pools
Configure your address pools and define client policies.
1.
2.
3.
4.
5.
6.
7.
8.
In the Address Pools section, click + to add an entry.
Enter a Name for the address pool and click OK. The Address Pools window opens.
Enter the first and last IP address of the pool range in the IP Begin and IP End fields.
From the All Clients Policy list, select a policy for handling DHCP clients. You can select:
none – (Default) A global policy is not used. Instead, the policies that are specified by the Known Clients, Unknown Clients, Al
lowed Classes, and Denied Classes settings are used.
allow – All clients are allowed IP addresses from this pool.
deny – All clients are denied IP addresses from this pool.
From the Network Access Clients Policy list, select the policy for handling Barracuda Network Access clients. You can select:
none – (Default) No Barracuda Network Access Clients policy is not used.
Network Access Clients – Barracuda Network Access Clients are allowed to receive IP addresses from the pool.
guests – Barracuda Network Access Clients are denied IP addresses from the pool.
In the Allowed / Denied Classes tables, add the DHCP classes that are allowed or denied to get leases from the address pool. For
more information, see How to Configure DHCP Classes .
From the Known / Unknown Clients list, select the policy for handling known and unknown clients if a global policy is not selected from
the All Clients Policy list. You can select:
allow – (Default for known clients) Clients are allowed leases from the address pool.
deny – (Default for unknown clients) Clients are not allowed leases from the address pool.
not-set – This setting is deactivated.
For more information on specifying known clients, see How to Configure Known Clients.
From the BOOTP Clients Policy list, select the dynamic-bootp flag that specifies if the DHCP server dynamically assigns addresses to
bootp clients if a global policy is not selected from the All Clients Policy list. You can select:
allow_dynamic – Dynamic BOOTP for IP addresses are allowed.
deny_dynamic – Dynamic BOOTP for IP addresses are denied.
not-set – This setting is deactivated.
9.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
281
9. Click OK.
10. If the subnet is shared, complete Step 3.
11. Click Send Changes and Activate.
Step 3. Configure Shared/Multihomed Subnets
If multiple subnets have to be hosted on a single network interface, configure and specify additional subnets in the Multi Subnet Configuration s
ection:
1.
2.
3.
4.
Enable Shared Network Device if the interface must host multiple subnets. This enables Further Subnets.
Select the desired parameter template from the Shared Parameters list.
From the Shared DHCP Options list, select the DHCP options for the additional network.
In the Further Subnets table, add any additional subnets. For each entry, you can specify settings that are similar to those in the Subne
t Configuration section.
5. Click OK.
6. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
282
How to Configure DHCP Option Templates
Create DHCP option templates to simplify the configuration of multiple DHCP subnets and apply them to your configured address pools. Extende
d template settings allow you to integrate vendor details to exchange vendor-specific information and provides the option of configuring additional
server settings.
In this article:
Before You Begin
Configure DHCP Option Templates
Extended Options
Before You Begin
Before configuring DHCP option templates, enable advanced pool configuration in the DHCP service setup. For more information, see How to
Configure Advanced DHCP Settings.
Configure DHCP Option Templates
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. From the left Configuration Mode menu, select Switch to Advanced View.
3. In the left pane, select DHCP Option Templates.
4. Click Lock.
5. In the DHCP Options table, click + to add an option template.
6. Enter a Name for the template and click OK. The DHCP Options window opens.
7. Select the required Subnetmask.
8. In the Router table, add the IP addresses of the default gateways.
9. In the DNS Servers table, add the IP addresses of the domain name servers.
10. Enter the Domain Name.
11. In the Access Control Service IPs/Names table, add the required info for a client to receive valid policy server information if you set the
Barracuda Network Access Clients Policy of an Address Pool to Barracuda Network Access Clients or guests. You can add vendor
IDs, policy server IP addresses, or DNS resolvable policy server names.
12. You can also edit the settings in the Extended Options section.
13. Click OK.
14. Click Send Changes and Activate.
Now you can apply your configured template to your DHCP subnets. Fore more information, see How to Configure DHCP Subnets and Address
Pools.
Extended Options
Vendor ID / Raw Vendor ID – Enter one vendor ID or a semicolon-separated list of two or more vendor IDs. Use ASCII encoded
characters (Vendor ID) or hexadecimal string (Raw Vendor ID) if required.
Configuring Access Control Service IPs/Names (see above) and Vendor ID simultaneously is not valid. The client will
receive any policy server information. Only one of the settings can be configured at a time. To provide policy server IP
addresses to clients, configure Access Control Service IPs/Names instead.
Broadcast Address – The broadcast address.
NIS Domain Name – Enter the domain of the NIS in this field.
NIS Server – In this table, add the IP addresses of the NIS servers.
NTP Server – To enable synchronized times, enter the IP addresses of the NTP servers in this table.
WINS Server – If you are using WINS servers, enter the IP addresses of the servers in this table.
NBDD Server – If you are using NBDD servers, enter the IP addresses of the servers in this table.
Netbios Node Type – If
you are using a Linux client, select not-set from this list. Otherwise, you can select
one of the following options to allow NetBIOS to configure TCP/IP clients:
b-node - Broadcast; like clients use broadcast for name registration/resolution. Do not select this option for use with large
networks because broadcasts use lots of bandwidth.
p-node - Point; like client registers itself at the NetBIOS server (point-to-point).
m-node - Multi; like client first uses b-node. If it fails, p-node is used. Do not select this option for use with large networks
because broadcasts use lots of bandwidth.
h-node - Hybrid; like m-node, but uses p-node first and then b-node (as a last resort).
Netbios Scope Id – If you are using a Linux client, leave this field blank. If you are using NetBIOS Scope IDs (e.g., for isolating NetBIOS
traffic or for giving the same name to different computers), enter the ID in this field. The NetBIOS Scope ID is case-sensitive.
LPR Server – If you are using the LPR protocol for Unix systems, enter the IP address of the printer in this field.
Log Server – If you are using a standalone log server, enter the IP address of the server in this field.
Time Server – If you are using a time server according to RFC868, enter the IP address of the server in this field.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
283
Time Offset – In this field, enter the client's time offset (in seconds) from UTC.
IEN Name Server – If you are using an IEN name server, add the IP address of the server to this table.
Cookie Server – If you are using a standalone cookie server, add the IP address of the server to this table.
Swap Server – If you are using a separate swap server, enter the IP address of the server in this field.
Local Subnets – To use local subnets, select true. Default: not-set.
Impress Server – If you are using an image impress server, add the IP address of the server to this table.
Resource Location Server – In this table, add the RFC 887 Resource Location servers that are available to the client. List the servers
in order of preference.
Perform Mask Discovery – (not supported with Linux clients) Specifies
if a subnet mask discovery is performed. From
this list, you can select:
true - Client uses ICMP for subnet mask discovery.
false - No subnet mask discovery is to be performed.
not-set (default) - Deactivates the setting.
Perform Router Discovery – (not supported with Linux clients) Specifies
if a router discovery is performed. From this
list, you can select:
true - Client performs ICMP router discovery (according to RFC1256).
false - No router discovery is to be performed.
not-set (default) - Deactivates the setting.
Static Route Net – In this table, add static routes that the client should install in its routing cache. If there are multiple routes to the same
destination, list them in descending order of priority. The routes are made up of IP address pairs. The first address is the destination
address. The second address is the router for the destination. The default route (0.0.0.0) is an illegal destination for a static route.
In the Router field, specify the default route. The following options are available:
Static Route Net – Enter the
destination IP address.
Static Route GW – Enter the gateway IP address.
TFTP Server Name – If the 'name' field in the DHCP header has been used for DHCP options, enter the TFTP server name in this field.
TFTP Server IP Address – The TFTP server IP addresses for Cisco CallManager devices. In this field, you can enter a
comma-delimited list of IP addresses.
Proxy Automatic Discovery – This field lets you specify a Web Proxy Automatic Discovery (WPAD) URL, for example http://foo.com/pr
oxy.pac
Boot File Name – If the 'file' field in the DHCP header has been used for DHCP options, enter the boot file name in this field.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
284
How to Configure DHCP Parameter Templates
Create DHCP parameter templates to simplify the configuration of multiple DHCP subnets. Specify time settings for leases and updates,
configure networking settings, and apply them to your client address pools.
In this article:
Before You Begin
Step 1. Configure Lease Constraints
Step 2. Configure Dynamic DNS Parameters
Step 3. Configure Miscellaneous Parameters
Before You Begin
Before configuring DHCP parameter templates, enable advanced pool configuration in the DHCP service setup. For more information, see How
to Configure Advanced DHCP Settings.
Step 1. Configure Lease Constraints
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. From the left Configuration Mode menu, select Advanced View.
3. In the left navigation pane, select Parameter Templates.
4. Click Lock.
5. In the Parameters table, click + to add a parameter template.
6. Enter a Name for the template and click OK. The Parameters window opens.
7. In the Lease Constraints table, configure the following settings:
Max Lease Time – The maximum length of time in seconds that will be assigned to a lease. The only exceptions to this setting
are Dynamic BOOTP lease lengths, which are not specified by the client.
Def Lease Time – The default length in seconds that is assigned to a lease.
Min Lease Time – The minimum length in seconds that is assigned to a lease.
Reply Delay – The minimum number of seconds since a client began trying to acquire a new lease before the DHCP server will
respond to its request. The number of seconds is based on what the client reports, and the maximum value that the client can
report is 255 seconds. If you specify 1 second, the DHCP server will not respond to the client's first request but will always
respond to its second request. This setting can be used to set up a secondary DHCP server which never offers an address to a
client until the primary server has been given a chance to do so. If the primary server is down, the client will bind to the
secondary server, but otherwise clients should always bind to the primary.
This does not, by itself, permit a primary server and a secondary server to share a pool of dynamically-allocatable
addresses.
Step 2. Configure Dynamic DNS Parameters
Configure dynamic DNS settings if DNS updates are enabled and ddns-update (see How to Configure DHCP with Dynamic DNS) is set to interi
m.
1. From the Do Fwd Updates list, select whether the DHCP server should attempt to update a DHCP client's A record if the client acquires
or renews a lease.
true – Forward updates are enabled, and the DHCP server will also honor the setting of the client-updates flag.
false – The DHCP server only attempts to update the client's PTR record if the client supplies an FQDN that should be placed in
the PTR record using the 'fqdn' option.
2. From the Optimized Updates list, select one of the following options:
true – The DHCP server will only update when the client information changes, the client gets a different lease, or the client's
lease expires.
false / not-set – If set for a given client, the server will attempt a DNS update for that client each time the client renews its lease,
rather than only attempting an update when necessary. This allows the DNS to heal from database inconsistencies more easily,
but the DHCP server must do many more DNS updates.
3. Leave Update Static Leases as default (false) unless instructed otherwise.
DNS updates for static IP addresses are not recommended because the DHCP server will not tell that the update has been
done, and therefore will not delete the record when it is not in use. Also, the server must attempt the update each time the
client renews its lease, which could have a significant performance impact in environments that place heavy demands on the
DHCP server.
4. Enter the DDNS Domainname that should be appended to the client's hostname to form a FQDN.
5. In the Rev DDNS Domainname field, you can change the domain name (default= in-addr.arpa.) for use in the client's PTR record, that
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
285
5.
should be appended to the client's reversed IP address (e.g. 74.92.17.10.in-addr.arpa. for client 10.17.92.74).
6. In the Dynamic BOOTP Lease Time field, you can specify the length in seconds of leases dynamically assigned to BOOTP clients. At
some sites, it may be possible to assume that a lease is no longer in use if its holder has not used BOOTP or DHCP to get its address
within a certain time period. If a client reboots using BOOTP during the timeout period, the lease duration is reset to this length, so a
BOOTP client that boots frequently enough will never lose its lease.
Use this setting with extreme caution!
7. In the Boot File Server field, enter the host IP address of the server from which the initial boot file (specified in the file name statement)
is to be loaded. If this setting does not apply to a given client, the IP address of the DHCP server is used.
8. In the Boot File field, you can enter the name of the initial boot file which is to be loaded by a client. The file name should be
recognizable to the file transfer protocol used to load the file.
Step 3. Configure Miscellaneous Parameters
Configure address assignment for clients without host declaration, and specify domain lookup and ping
checking behavior. Some BOOTP clients expect RFC1048-style responses, but do not follow RFC1048 when
sending their requests. In this case, the client is not getting the options that you have configured for it and the
server log the message '(non-rfc1048)' is printed with each BOOTREQUEST that is logged. To send RFC1048
options to such a client, you can set the always-reply-rfc1048 option (RFC1048 Conformance) in that client's
host declaration and the DHCP server will respond with an RFC-1048-style vendor options field.
1. From the Boot Unknown Clients list, select one of the following options:
true / not-set – Clients without host declaration are allowed to obtain IP addresses, as long as those addresses are not restricted
by 'allow' and 'deny' statements within their pool declarations.
false - Clients without host declaration will not be allowed to obtain IP addresses.
2. From the RFC1048 Conformance list, select one of the following options:
true – Response in RFC 1048-style. This flag affects all clients that are covered by the respective scope.
false – Response NOT in RFC 1048-style.
3. From the Hostname via Rev-DNS list, select whether or not DHCP looks up the domain name corresponding to the IP address of each
address in the lease pool and uses that address for the DHCP hostname option:
true – Lookup is done for all addresses in the current scope.
false – No lookups are done.
4. From the Ping Check list, select whether or not an ICMP echo request is sent to the address being assigned.
If the DHCP server dynamically allocates an IP address to a client, it first sends an ICMP echo request (ping) to the address
being assigned. It waits for a second, and if no response is heard, it assigns the address. If a response is heard, the lease is
abandoned, and the server does not respond to the client. This setting introduces a default one-second delay in responding to
DHCPDISCOVER messages, which can be a problem for some clients.
true – Ping check is done for all addresses in the current scope.
In the Ping Timeout field, specify how many seconds the DHCP server should wait for an ICMP echo response. If a
response is not received before the timeout expires, it assigns the address. If a response is heard, the server does not
respond to the client.
false – No ping checks are done.
not-set (default) – Deactivates the setting.
5. Click OK.
6. Click Send Changes and Activate.
Now you can apply your configured template to your DHCP subnets. Fore more information, see How to Configure DHCP Subnets and Address
Pools.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
286
How to Configure Known Clients
Configure DHCP client groups and assign hostnames and option templates. Host declarations are matched to actual DHCP or BOOTP clients by
matching the dhcp-client-identifier option specified in the host declaration to the one supplied by the client, or, if the host declaration or the client
does not provide a dhcp-client-identifier option, by matching the hardware parameter in the host declaration to the network hardware address
supplied by the client. BOOTP clients do not normally provide a dhcp-client-identifier, so the hardware address must be used for all clients that
may boot using the BOOTP protocol.
In this article:
Before You Begin
Configure Known Client
Advanced Client Assignments
Before You Begin
Before configuring known clients for use with the DHCP service, enable advanced pool configuration in the DHCP service setup. For more
information, see How to Configure Advanced DHCP Settings.
Configure Known Client
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. In the left menu expand the Configuration Mode section, select Advanced View.
3. In the left menu, select Known Clients.
4. Click Lock.
5. In the Client Groups table, click + and add a client group.
6. Enter a Name for the group and click OK. The Client Groups window opens.
7. From the Group DHCP Options list, select the DHCP options template which settings should be used for the group. For more
information, see How to Configure DHCP Option Templates.
8. From the Group Parameters list, select the DHCP parameter template which settings should be used for the group. For more
information, see How to Configure DHCP Parameter Templates.
9. Enable or disable Automatic Hostname Assignment. You can select:
true – For every host declaration of this group of known clients, the name provided for host declaration will be supplied to the
client as its hostname.
false – (default) The setting is disabled.
10. In the Clients table, click + and add the client group members.
11. Enter a Name for the client and click OK. The Clients window opens.
12. Enter the DHCP Client Identifier that identifies the host client when requesting an IP address.
Only the DHCP Client Identifier setting and hardware address can be used to match a host declaration. E.g., it is not possible
to match a host declaration to a host-name option. This is because the host-name option cannot be guaranteed to be unique
for any given client, whereas both, hardware address and DHCP Client Identifier option, are at least theoretically guaranteed to
be unique to a given client.
13.
14.
15.
16.
17.
18.
Enter the MAC Address of the client required for identification.
From the Match Type list, select the type of network card requesting a lease.
If required, enter the static IP address(es) that are sent to the client in the Fixed IP Addresses field.
For advanced configuration settings, see the following Advanced Client Assignments section.
Click OK.
Click Send Changes and Activate.
Advanced Client Assignments
In the Advanced Client Assignments section you can apply templates to be used for your clients and configure advanced settings for server
responses and host declaration.
For each client entry, you can edit the following settings:
Client DHCP Options – From this list, select the DHCP options template which settings should be used for the client. For more
information, see How to Configure DHCP Option Templates.
Client Parameters – From this list, select the DHCP parameter template which settings should be used for the client. For more
information, see How to Configure DHCP Parameter Templates.
Allowed Broadcast Reply – DHCP and BOOTP protocols both require DHCP and BOOTP clients to set the broadcast bit in the flags
field of the BOOTP message header. Unfortunately, some DHCP and BOOTP clients do not do this, and therefore may not receive
responses from the DHCP server. The DHCP server can be configured to always broadcast its responses to clients by setting this flag to
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
287
yes for the relevant scope; relevant scopes would be inside a conditional statement, as a parameter for a class or as a parameter for a
host declaration. In order to avoid creating excessive broadcast traffic on your network, Barracuda Networks recommends that you
restrict the use of this option to as few clients as possible.
Duplicates Policy – From
this list, you can select either allow or deny. Host declarations can match client
messages based on the DHCP Client Identifier option or on the client's network hardware type and
MAC address. If the MAC address is used, the host declaration will match any client with that MAC
address – even clients with different client identifiers. This is possible when one computer has more
than one operating system installed on it. For example, Microsoft Windows and NetBSD or Linux.
This setting tells the DHCP server that if a request is received from a client matching the MAC address of a host declaration or
any other lease matching that MAC address, it should be discarded by the server even if the UID is not the same. This does
not adhere to the DHCP standard but can prevent clients whose client identifiers change regularly from holding too many
leases at the same time.
Client Hostname – If a name is entered, the statement within a host declaration will override the use of the name in the host declaration.
DDNS Hostname – Defines the hostname to be used in setting up the client's A and PTR records; if not specified, the server will derive
the hostname automatically, using an algorithm that varies for each of the different update methods.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
288
How to Configure DHCP Classes
Define classes for use by DHCP clients and servers and specify the lease behavior. With DHCP classes configured the server identifies different
client types and provides the corresponding IP addresses depending on the match statement in the class definition. Spawn subclasses define the
parameters for each match value within the class they belong to, which simplifies the class lookup.
In this article:
Before You Begin
Configure DHCP Classes
Before You Begin
Before configuring DHCP classes, enable advanced pool configuration in the DHCP service setup. For more information, see How to Configure
Advanced DHCP Settings.
Configure DHCP Classes
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. From the left Configuration Mode menu, select Advanced View.
3. In the left navigation pane, select Classes.
4. Click Lock.
5. Click + to add an entry for a DHCP class.
6. Enter a Name for the class and click OK. The Classes configuration window opens.
7. Enable or disable Spawn Subclasses depending on your requirements. If
a.
enabled,
Select the spawn subclass from the Spawn Parameter field.
b. Enter the maximum number of parallel active leases in the Lease Limit field.
8. Specify the Match Parameter.
Exact – Indicates ONE client.
List – Allows multiple clients.
9. From the Match Type list, select the desired option.
When selecting exact, enter the match value for one client (for example, MAC, store agent ID, …) in the Match Value field.
When selecting list, enter
the match values for multiple clients in the Match Value List field.
The way MAC addresses are entered depends on the used type of interface:
Ethernet requires a 1: prior to the MAC address (e.g.: 1:00:01:f3:34:44:2g)
Tokenring requires a 6: prior to the MAC address (e.g.: 6:00:01:f3:34:44:2g)
10. Click OK.
11. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
289
How to Configure DHCP with Dynamic DNS
Configure dynamic DNS updates for the Barracuda NG Firewall DHCP service. The DDNS update style is evaluated once after reading the
dhcpd.conf file, not each time a client is assigned an IP address, so the same DNS update style is used for all clients.
Before You Begin
Before configuring dynamic DNS, enable advanced pool configuration in the DHCP service setup. For more information, see How to Configure
Advanced DHCP Settings.
Configure Dynamic DNS
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. In the left menu, expand the Configuration Mode section and click Advanced View.
3. In the left menu, select Dynamic DNS.
4. Click Lock.
5. Select whether or not to use a
DNS Update Scheme.
When selecting interim choose an option from the Client Updates list.
The DHCP server does not necessarily always update both the A and the PTR records. The FQDN (fully qualified
domain name) option includes a flag which, when sent by the client, indicates that the client wishes to update its own
A record. In that case, the server can be configured either to honor the client's intentions or ignore them. This is done
with the statement allow client-updates; or the statement ignore client-updates. By default, client updates are ignored.
6. In the Zone Keys table, click + and add the HMAC-MD5 keys for the DNS zones.
7. In the DNS Zones table, click + and add the DNS zones.
8. Specify the Zone
Type. You can select:
Forward (default) – The hostname is looked up.
Enter the network of the forward lookup in the Forward Zone Name field.
Reverse – The IP address is looked up.
Enter the network of the reverse lookup in the Reverse Lookup Net/Netmask fields.
Both – IP address and hostname are looked up.
Enter the network of the forward and reverse lookup in the Forward Zone Name and Reverse Lookup Net/Netmask fi
elds.
9. Enter the DNS Server IP address.
10. Select the Authentication Key for the zone that was entered in the Zone Keys table.
11.
Click OK.
12. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
290
How to Activate Text-Based Configuration
You can view and configure the DHCP server settings in a text configuration file. Note that if you manually configure the DHCP server in a text
configuration file, all of the settings that have been made in the user interface are disabled.
Before You Begin
Before you can view and configure the DHCP server in a text configuration file, enable advanced pool configuration in the DHCP service setup.
For more information, see How to Configure Advanced DHCP Settings.
View the Configuration File
To view the DHCP server configuration in read-only text:
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. From the left Configuration Mode menu, select Advanced View.
3. In the left navigation pane, select GUI as Text.
4. Click Lock.
5. Enable Show GUI as Text.
6. Click Send Changes and Activate.
In the GUI Corresponding Text table, the DHCP server configuration is displayed in read-only text.
Configure the DHCP Server Text Configuration File
The DHCP server text configuration file must be created directly on the Barracuda NG Firewall when configuring a managed NG
Firewall.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. From the left Configuration Mode menu, select Advanced View.
3. In the left navigation pane, select Text Based Configuration.
4. Click Lock.
5. Enable Use Free Format.
When you enable this setting, all of the settings that have been made in the user interface are disabled. To re-enable the
settings that are made in the user interface, disable Use Free Format.
6. In the Free Format Text table, enter the configurations for the DHCP server. Use the following syntax:
option <option-name> <parameter>
7. For more information on the commands and syntax that can be used, see http://www.daemon-systems.org/man/dhcp-options.5.html.
8. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
291
How to Configure Additional DHCP Options
Some clients may need specific DHCP options to be set in the DHCP server configuration. To set options that are not directly configurable, you
must use Advanced Pool Configuration and enter the necessary options as freetext-based configuration. In this example, a server requires the
DHCP options 176 and 242 to be set to custom strings.
In this article:
Before you Begin
Step 1. Define a Variable for Each Additional DHCP Option
Step 2. Set Values for Each Additional DHCP Option
Before you Begin
Enable Use Advanced Pool Configuration in the advanced DHCP Settings. For more information, see How to Configure Advanced
DHCP Settings.
Configure an Address Pool and DHCP Option Template. For more information, see How to Configure DHCP Subnets and Address
Pools and How to Configure DHCP Option Templates.
Step 1. Define a Variable for Each Additional DHCP Option
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. Click Lock.
3. In the left menu, expand Configuration Mode and click Switch to Advanced View.
4. In the left menu, click Operational Setup.
5. For each DHCP option you want to add, click + in the Additional Global Definitions table and define a variable for the DHCP option in
the following format:
option VARIABLE_NAME code OPTION_NUMBER=VARIABLE_TYPE E.g., option hbcs-avaya-176 code 176 = text
6. Click Send Changes and Activate.
Step 2. Set Values for Each Additional DHCP Option
The variables set in step 1 can be set to different values for each DHCP Option Template.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Service
> DHCP Enterprise Configuration.
2. Click Lock.
3. In the left menu, expand Configuration Mode and click Switch to Advanced View.
4. In the left menu, click DHCP Option Templates.
5. Double-click on the DHCP Options template used for the address pool. The DHCP Options window opens.
6. For each DHCP Option you defined in step 1, click + in the ISC DHCP Option Freetext Field and set the value for each entry in the
following format (including the quotation marks):
option VARIABLE_NAME-OPTION_NUMBER "ENTER_YOUR_STRING_HERE"
E.g., option hbcs-avaya-176 "MCIPADD=10.10.10.10,MCPORT=1719,TFTPSRVR=10.10.10.10"
7. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
292
Example - DHCP Configuration for Two Networks
The following article provides an overview of how to configure DHCP for an example environment. It provides steps and example settings to
configure a DHCP service for an environment that contains two networks with three different IP pools.
In this article:
Example Environment
Example Environment Configuration
Example Environment
For the example environment that is displayed in the following figure, a DHCP service must configured for two networks with three different IP
pools:
Network 1 (10.0.8.0/24) – Contains two address pools: one pool for unknown clients and one pool for known clients (identified via their
MAC addresses).
Network 2 (10.0.4.0/24) – Contains one address pool for unknown clients and two known clients.
Example Environment Configuration
The DHCP service for the example environment can be configured with the following steps and settings:
Step
Settings for Example Environment
Step 1: Create a virtual server.
The virtual server is created with the following settings:
First-IP: 10.0.8.35
Second-IP: 10.0.4.44
Step 2: Create the DHCP service.
By default, Service Availability for the DHCP service is set to All-IPs
.
Step 3: Enable advanced DHCP settings.
To enable the advanced DHCP settings, you must be in the
Advanced Configuration Mode. On the DHCP Enterprise
Configuration - Operational Setup page, click Switch to Advance
d View from the Configuration Mode menu in the left navigation pane
. Make sure that you select yes from the Use Advanced Pool
Configuration list.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Step 4: Configure DHCP classes.
293
A DHCP class named testclass is created with the following settings:
Match Type: MAC
Match Value List: 1:00:01:f3:34:44:2g and 1:00:01:f3:34:44:2e
For Ethernet interfaces, you must enter 1: before the
MAC address
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Step 5: Configure subnets and address pools.
294
Two separate subnets are created for Network 1 (10.0.8.0/24) and
Network 2 (10.0.4.0/24).
1. A subnet named Subnet1 for 10.0.8.0/24 is created with the
following settings:
Subnet Type: explicit
Network Address: 10.0.8.0/24
Address Pools: The two address pools for Subnet1 are
configured with the following settings:
Address Pool
Description
Address Pool 1 Unknown
From the first address
pool, only unknown clients
may receive IP addresses.
This address pool is
configured with the
following settings:
IP Begin: 10.0.8.10
IP End: 10.0.8.15
Denied Classes: test
class
Known Clients: deny
Unknown Clients: all
ow
Address Pool 2 Classpool
From the second address
pool, only allowed classes
may receive IP addresses.
This address pool is
configured with the
following settings:
IP Begin: 10.0.8.20
IP End: 10.0.8.30
Allowed Classes: tes
tclass
Known Clients: not-s
et
BOOTP ClientsPolic
y: not-set
2. A subnet named Subnet2 for 10.0.4.0/24 is created with the
following settings:
Subnet Type: explicit
Network Address: 10.0.4.0/24
Address Pools: The subnet has one address pool which is
configured with the following settings:
Address Pool
Description
Address Pool 1 Unknown
From the address pool,
only unknown clients may
receive IP addresses. This
address pool is configured
with the following settings:
IP Begin: 10.0.4.10
IP End: 10.0.4.15
Known Clients: deny
Unknown Clients: all
ow
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Step 6: Configure known clients.
295
Two client groups are created:
Client Group
Step 7: View real-time information for the DHCP service.
Settings
Known Client 1
MAC Address: 00:01:f3:3
4:44:2g
Fixed IP Address: 10.0.4.
31 (Optional)
Known Client 2
MAC Address: 00:01:f3:3
4:44:2e
Fixed IP Address: 10.0.4.
32 (Optional)
To view and modify lease and IP range information for the DHCP
service, click the DHCP tab.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
296
How to Configure the DHCP Relay Agent
The DHCP relay service allows to pass DHCP broadcast messages to network segments a client computer is not directly attached to. DHCP
relaying can be used to share a single DHCP server across logical network segments that are separated by a firewall. The DHCP relay service
does not handle IP addresses. It sends unicast messages instead of broadcast messages.
In this article:
Before You Begin
Configure the DHCP Relay Agent for IPv4
Configure the DHCP Relay Agent for IPv6
Cascading DHCP Relay Agents
Figure 1. DHCP relay agent between two LANs.
Before You Begin
If you are using both a DHCP and a DHCP Relay service on the same Barracuda NG Firewall, verify that both services are not using the same
interface.
Configure the DHCP Relay Agent for IPv4
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Relay.
Click Lock.
Select Enable Relay for IPv4.
Enter the UDP Port the relay agent is listening on (default: 67).
5.
In the Relay Interfaces section, click + and add the network interfaces that are used by the DHCP relay
agent to connect to the DHCP server and client networks. To specify an explicit interface (e.g., a virtual
interface), enter its name in the Other field.
If you must configure multiple relay agents in a cascaded environment, do not specify the server-side interface of the cascaded
('border') relay agent. For more information, read the following section.
6. In the DHCP Server IPs field, enter the IP addresses of the DHCP servers.
7. Enable Add Agent ID (AID) if you want the DHCP relay agent to add an Agent ID (AID) to the transmitted packets. An AID indicates that
the data has been relayed.
8. Enter the maximum DHCP Packet Size in bytes (default: 1400).
9. From the AID Relay Policy list, select how your DHCP relay agent handles DHCP packets that are already flagged by an AID from
another agent:
Append (default) - Attaches your AID to the existing AID.
Replace - Replaces the existing AID with your AID.
Forward - Passes DHCP packets without any modification.
Discard - Discards DHCP packets that are already flagged by an AID.
10. From the Reply AID Mismatch Policy list, select how
your DHCP relay agent handles DHCP server replies that do
not contain its AID:
Discard - Default. Discards the DHCP packet.
Forward - Forwards the DHCP packet to the DHCP client.
The Reply AID Mismatch Policy setting is important when multiple relay agents serve the DHCP server.
11.
12.
13.
14.
Specify the maximum Packet Hop Count to avoid infinite packet loops (default: 10).
Select Forward unicast packets if Bootstrap/BOOTP unicast messages should be forwarded by the DHCP relay.
Click OK.
Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
297
Configure the DHCP Relay Agent for IPv6
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP-Relay >
DHCP-Relay Settings.
2. Click Lock.
3. Select Enable Relay for IPv6
4. Enter the UDP Port the relay agent is listening on (default: 547).
5. Specify the maximum Packet Hop Count to avoid infinite packet loops (default: 10).
6. Select Interface ID to force use of the DHCPv6 Interface-ID option. This option is automatically sent when there are two or more
downstream interfaces in use, to disambiguate between them.
7. In the Lower Network Interfaces list, specify the network interface and link address on which queries will be received from clients or
other relay agents. If no link address is specified, the first non-link-local address is used.
8. In the Upper Network Interfaces list, specify the network interface and destination unicast or multicast address to which queries will be
forwarded. If no destination address is specified, requests are forwarded to the FF02::1:2 multicast address
(All_DHCP_Relay_Agents_and_Servers)
9. Click OK.
10. Click Send Changes and Activate.
Cascading DHCP Relay Agents
Only use cascading DHCP relay agents if a client subnet is connected to the server-side DHCP relay agent.
The DHCP Relay Agent is not designed for cascaded use. If you must configure multiple relay agents in a cascaded environment, do not specify
the server-side interface of the cascaded ("border") relay agent in the configuration or this will lead to conflicts. In Figure 2, two client subnets are
connected to DHCP relay agents 1 and 2. When you configure the relay agents, the interfaces listening to broadcast requests from the clients
(eth1 and eth4) must be specified as relay interfaces. The server-side interface of relay agent 2 (eth5), which is connected to the DHCP server,
must NOT be specified.
Figure 2. Cascading DHCP relay agents with interfaces to be configured.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
298
How to Configure a DHCP Relay over a VPN Tunnel
To use the same DHCP server in two different networks that are connected by a VPN tunnel, configure DHCP relays on both the local and
remote NG Firewalls.
In this article:
Before you Begin
Step 1. Create an Access Rule on the Local NG Firewall
Step 2. Create a DHCP Relay on the Remote NG Firewall
Step 3. Create a Host Firewall Rule on the Remote NG Firewall
Before you Begin
Create a Site-to-Site VPN tunnel between both locations.
Use a separate DHCP server, such as the DHCP server on Windows Servers in your network. It is not possible to use the DHCP service
on the NG Firewall in this scenario.
Step 1. Create an Access Rule on the Local NG Firewall
Create an PASS access rule allowing the management IP address of the remote NG Firewall access to the DHCP server.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Fo
rwarding Rules .
2. Click Lock.
3. Right-click in the main are and select New and Rule. The Edit Rule window opens.
4. Create the following access rule:
Action – Select PASS.
Source – Enter the management IP address of the remote NG Firewall.
Service – Create and select a Service object for UDP Port 67.
Destination – Enter the IP address of the DHCP server.
Connection – Select No SNAT.
5. Click OK.
6. Click Send Changes and Activate.
Step 2. Create a DHCP Relay on the Remote NG Firewall
Configure DHCP Relay on the remote NG Firewall to pass along
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DHCP Relay
> DHCP Relay Settings .
2. Click Lock.
3. Check the Enable Relay for IPv4 checkbox.
4. Click + for each Relay Interface the DHCP Relay listens on:
a. Select the internal interface used to connect to the DHCP server from the list. E.g., eth0
b. Enter the VPN interface used for the Site-to-Site tunnel in the Other textbox. E.g., vpn0
5. Click + and add the DHCP Server IPs. E.g., 10.0.10.100
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
299
5.
6. Click Send Changes and Activate.
Step 3. Create a Host Firewall Rule on the Remote NG Firewall
Create an access rule to allow the traffic of the DHCP Relay service into the VPN tunnel.
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Host Firewall Rules.
Click Lock.
Click on the Outbound rule set.
Create a new PASS access rule. The Edit Rule window opens.
Enter the Name of the rule. E.g., BOX-DHCP-OUT-RELAY-VPN
6. Use the following settings for the access rule:
Action – Select PASS.
Source – Select Any.
Service – Select DHCP-S.
Destination – Select World.
7. Select <explicit-conn> from the Connection Method list.
8. Double-click on Std Explicit in the Connection Method section. The Edit / Create a Connection Object window opens.
9. From the NAT Address list select Explicit.
10. Enter the management IP address of the NG Firewall as the Explicit IP.
Copyright © 2015, Barracuda Networks Inc.
10.
11.
12.
13.
14.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
300
Click OK.
Click OK.
Place the access rule above the BOX-DHCP-OUT rule.
Click Send Changes and Activate.
Clients in the remote network can now receive DHCP leases from the DHCP server in the local network.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
301
DNS
The Barracuda NG Firewall can act as an authoritative DNS server, returning definitive answers to DNS queries about domain names specified in
its configuration. The Barracuda NG Firewall DNS service specifies DNS zones such as hosts, domains, mail-exchangers etc. Each of the
available zones can be defined as forward or reverse lookup zone. You can use the the same namespace internally and externally. You can
return different IP addresses based on the source IP address of the DNS query (split DNS).
Configure the DNS Service
The DNS service provides the following configuration instances:
DNS Hint Lookup Zone – The hint zone contains information on the initial set of root servers.
DNS Template Zone – Use the template zone to build templates for the creation of new zones.
DNS Configuration – This node contains the Forward Lookup configuration area. Sub-items of Forward Lookup are the already
existing zones, including the hint and template zones.
For more information, see How to Configure the DNS Service.
DNS Zones
The DNS server stores information about parts of the domain name space in so-called zones. All names in a given zone share the same domain
suffix. For example, if barracuda.com is the domain suffix, mail.barracuda.com and eng.barracuda.com are possible subdomains. These can all
be served by one domain name server or some of the subdomains can be delegated to other domain name servers. Every domain or subdomain
is in exactly one zone. Rather than make a distinction between a zone and a domain, the Barracuda NG Firewall offers the possibility to create a
domain.
The Barracuda NG Firewall DNS configuration contains two predefined zones:
Zone 1: _template – This zone contains the general template, which is used as model for all newly created zones. Here, you can create
or modify settings for Start Of Authority (SOA), primary server, Name Server (NS), etc.
Zone 2: '.'– The initial set of root-servers is defined using a hint zone. When the server starts up, it uses the hint zone file to find a root
name server and get the most recent list of root name servers. The "." zone is short for this root zone and means any zone for which
there is no locally defined zone (slave or master) or cached answer.
Do NOT modify the root server settings in zone 2 ('.') unless you know exactly what you are doing.
When creating additional zones, you can configure the following zone types:
Master – Every domain configuration change takes place on the master. From here, the information is propagated to the secondary
servers. A master zone requires at least a Start of Authority (SOA) record and a Name Server (NS) record.
Slave – A slave zone is a replica of a master zone. The masters list specifies one or more IP addresses that the slave contacts to update
its copy of the zone. DNS slave zones do not require much configuration; just enter the IP addresses of the master server (or servers)
and examine the security settings.
Forward – A forward zone is used to direct all queries in it to other servers. The specification of options in such a zone will override any
global options declared in the options statement. A forward zone does not need a transfer-source-IP.
Hint – The initial set of root name servers is specified using a hint zone. When the server starts up, it uses the root hints to find a root
name server and get the most recent list of root name servers. The Barracuda NG Firewall DNS server already has a hint zone (Zone ".")
preconfigured, so normally there is no need to introduce another hint zone.
For information on how to configure DNS zones, see How to Configure DNS Zones.
DNS Interception
DNS Interception allows redirection or blocking of DNS queries for specific domains. This is achieved by applying policies. When creating a
policy, you can also specify whitelisting for certain domains.
For more information, see How to Configure DNS Interception.
Debug Logging
You can also enable debug logging for the DNS service via the Command-Line Interface.
When you enable debug logging for DNS:
The log file may increase, depending on the number of requests.
With every change in the service configuration, the debug-logging is disabled.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
For information on how to enable debug logging, see How to Configure DNS Zones.
Copyright © 2015, Barracuda Networks Inc.
302
Barracuda NG Firewall 6.1 Administrator's Guide - Page
303
How to Configure the DNS Service
The Barracuda NG Firewall can act as a authoritative DNS server for your domains.
In this article:
Before you Begin
Configure the DNS Service
Before you Begin
Before modifying the server settings, you must create a DNS service. For more information, see How to Configure Services.
Configure the DNS Service
To configure zone-independent DNS server settings,
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DNS-Service.
Double-click DNS Configuration.
Right click the server name in the DNS configuration area (e.g.: S1_dns) and select Lock Server.
Right click the server name and select Properties.
5. In the Interface section, configure the forwarding behavior of the DNS service.
forward – This menu offers the following settings:
<blank> – The default settings of BIND are used.
first – The server forwards the DNS query first. Only in case no entry is found the local database is queried.
only – The server forwards all DNS queries.
forwarders – Enter the IP addresses of the DNS servers to which DNS queries are forwarded. Separate multiple entries with a
semicolon and space (e.g. 10.0.0.53; 10.0.0.67).
recursion– Define the allowance of recursive queries. The following options are available:
<blank> – The default settings of BIND are used.
yes – The server allows recursive queries.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
304
no – The server does not allow recursive queries.
notify - Define whether the DNS server should actively notify its slaves about settings updates.
forward source-ip – This field offers various options to select the IPv4 or IPv6 address to be used for contacting other
DNS servers.
<blank> – The default settings of BIND are used.
server-first – The DNS service uses the first server IP for connecting.
server-second– The DNS service uses the second server IP for connecting.
explicit – The DNS service uses an explicit IP address for connecting. This IP address must be configured as a server
IP.
Separate multiple IP addresses or address ranges using semicolon and whitespace characters (e.g. 10.0.0.
53; 10.0.0.67; 192.168.0.10; 10.17.0.0/16). Use CIDR notation.
6.
In the Security section, configure security options for the DNS service (when selecting any, you can
optionally define one or more further IPv4 or IPv6 addresses):
allow notify – Hosts that are allowed to notify the DNS server about zone changes.
allow query – Hosts that are allowed to query the DNS server. By default all hosts are allowed to query the DNS server.
allow recursion – Hosts that are allowed to make recursive queries on this server.
allow transfer – Hosts that are allowed to fetch the DNS database from the DNS server.
blackhole – Addresses that the server will not accept queries from and not use to resolve a query.
In each pull-down field, one of the following values can be filled in:
none
any (one or more IPv4 or IPv6 addresses) – These entries can optionally be complemented with further IP addresses.
7. Click OK.
8. Click Send Changes and Activate.
Continue with How to Configure DNS Zones.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
305
How to Configure DNS Zones
Configure DNS zones for use with the DNS service of the Barracuda NG Firewall. Modify the
DNS zone template by adding hosts,
subdomains, mail exchangers, etc. You can also create new DNS zones. When adding new zones, they will
inherit all the settings specified in the template zone. The procedure for creating and modifying zone template
settings is identical to the procedure for creating and editing settings in a new zone. Each zone can be defined
as forward or reverse lookup zone.
In this article:
Before you Begin
Configure a DNS Zone
Add a New Name Server
Add a New Host
Add a New Mail Exchanger
Add a New Domain
Add New Others
Add a New Zone
Troubleshooting
Add a New Start of Authority (SOA)
Enable Debug Logging
Before you Begin
Before starting the configuration, you must create a DNS service. For more information, see How to Configure Services.
Make sure that you DNS server is properly configured. For more information, see How to Configure the DNS Service.
Configure a DNS Zone
Configure zone 1 (_template), by modifying the Start of Authority (SOA). Then, you can add and configure further zones that will inherit the
template settings.
Every DNS record has a Time to Live (TTL) value, which is the length of time that the DNS record can be cached. For most DNS
records, two days is a typical and acceptable value. However, A records should have a very short TTL, such as 30 seconds.
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DNS-Service.
Double-click DNS Template Zone.
Right click the zone entry (e.g. _template) in the left navigation tree and select Lock Zone.
In the main table, double click the zone entry (e.g. _template). The Properties of window opens.
5. Define a Serial number. Update will increase the serial number by one.
The serial number of the master has to be higher than the serial number saved on a slave, otherwise the slave will stop
fetching information updates from its master.
6.
In the Primary Server field, define the primary name server of the domain. Click Pick up to select already created entries.
person field, define a person responsible for this host/zone. The syntax that has to be used is username.dom
7. In the Responsible
ain (e.g. ernestexample.test.org).
8. Adjust the following settings according to your needs:
Refresh after – This interval tells the slave how often it has to check whether its data is up to date.
Retry after – When the slave fails to reach the master server after the refresh period (Refresh after), then it starts trying again
after this set time interval.
Expire after – When the slave fails to contact the master server for the expire period, the slave expires its data. Expiring means
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
306
that the slave stops giving out answers about the data because the data is too old to be useful.
Minimum TTL – (standard) This value sets the Time To Live of cached database entries of this zone (format: days:hours:minute
s:seconds).
Expire (TTL) – This value sets the Time To Live of cached database entries of this zone until it is considered as expired.
9. Click OK.
10. Click Send Changes and Activate.
The Start of Authority (SOA) for the zone is now configured and you can add Name Server (NS), host, Mail-Exchanger and sub-domains,
depending on your requirements. Each added entry generates an additional tab in the Properties of window for the SOA from where you can
edit the settings.
Add a New Name Server
Introduce a Name Server (NS) to the zone.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DNS-Service.
2. Double-click DNS Template Zone.
3. Right click the zone entry (e.g.: _template) in the left navigation tree and select Lock Zone.
4. Right
5.
6.
7.
8.
click in the table and select New Name Server (NS).
Click Add. The Properties of window opens.
Enter the Servername. To select existing entries, click Pick up.
Enter the IPv4 or IPv6 address of the name server and click Add.
In the Expire (TTL) field, set the globally defined length of life, future name server records are expected to
have (format: days:hours:minutes:seconds), and click OK.
9. Click OK.
10. Click Send Changes and Activate.
An entry for the new name server is now displayed in a separate row within the main table and can be selected for further modification.
Add a New Host
Introduce a host to the zone (e.g.: _template).
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DNS-Service.
Double-click DNS Template Zone.
Right click the zone entry (e.g.:_template) in the left navigation tree and select Lock Zone.
Right click in the table and select New Host.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
5. In the Host field, enter
307
the name of the host.
6. Enter the host IPv4 address and click Add.
7.
8.
Define the Expire (TTL) (format: days:hours:minutes:seconds).
Select Add corresponding reverse lookup entry (PTR) to automatically create a pointer record when
creating the A-Record.
Entries made in the individual tabs will be saved in separate rows of type A, TXT, HINFO and WKS within the main
configuration window. Each configuration tab allows specification of the Expire (TTL) (format: days:hours:minutes:seconds).
9. Open the Text (TXT) tab.
10. In the Text field, enter an optional description of the system to simplify maintenance of the DNS database.
11. Under the Host
Information (HINFO) tab, add information on the hardware and operating system of the
host if applicable.
12. Under the Well-Known
Services (WKS) tab, specify the IPv4 address and the used protocol in the
appropriate fields. The services must be entered in plain text and separated with blanks (e.g. telnet
ssh smtp ftp).
13.
Click OK.
14. Click Send Changes and Activate.
An entry for the new host is now displayed in a separate row within the main table and can be selected for further modification.
Add a New Mail Exchanger
Introduce a mail exchanger to handle
mail-traffic for the domain.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DNS-Service.
2. Double-click DNS Template Zone.
3. Right click the zone entry (_template) in the left navigation tree and select Lock Zone.
4. Right click in the table and select
New Mail-Exchanger.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
5.
308
In the Host field, specify the following values according to your needs:
Mail-exchanger is responsible for @domain.com any_text
Mail-exchanger is responsible for @any_text.domain.com
6. Specify the Mailserver name. To select existing entries, click Pick up.
7. If required, set the values for Mailserver priority and Expire
8.
(TTL) (format: days:hours:minutes:seconds).
Open the Mailbox information (MINFO) tab.
9. Specify the name of the Mailbox (MB). To select existing entries, click Pick up.
10. Specify the name of the Error Mailbox (MB) and Expire (TTL) (format: days:hours:minutes:seconds).
11.
12.
Under the Well-Known Services (WKS) tab, enter the IPv4 address and the used protocol in the
appropriate fields.
Enter the services (e.g. telnet ssh smtp ftp). The services must be entered in plain text and
separated with blanks.
13. Click OK.
14. Click Send Changes and Activate.
An entry for the mail exchanger is now displayed in a separate row within the main table and can be selected for further modification.
Add a New Domain
Introduce a new subdomain to the zone (e.g.: _template).
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DNS-Service.
Double-click DNS Template Zone.
Right click the zone entry (_template) in the left navigation tree and select Lock Zone.
Right click in the table and select New Domain.
5. Enter a name for the new sub-domain and click OK.
After clicking OK, the new subdomain displays in the DNS tree. Within the new sub-domain, you can perform the same operations as
described above.
Completely set up new subdomains before clicking Send Changes and Activate. Otherwise, incompletely configured
subdomains are deleted.
6. Click Send Changes and Activate.
Add New Others
There are several other objects you can add to your DNS configuration. These objects can be introduced by right clicking in the DNS config table
and selecting New Others. The
following objects can be added to the DNS configuration:
Parameter Overview
Click here to expand...
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
309
A
New host.
AAAA
IPv6 address.
AFSDB
AFSDB records specify the hosts that provide a style of distributed
service advertised under this domain name. A subtype value
(analogous to the preference value in the MX record) indicates
which style of distributed service is provided with the given name.
Subtype 1 indicates that the named host is an AFS® database
server for the AFS cell of the given domain name. Subtype 2
indicates that the named host provides intra-cell name service for
the DCE cell named by the given domain name.
CNAME
CNAME specifies an alias or nickname for the official or canonical
name. An alias should be the only record associated with the alias;
all other resource records should be associated with the canonical
name and not with the alias. Any resource records that include a
zone name as their value (for example, NS or MX) must list the
canonical name, not the alias. This resource record is especially
useful when changing machine names.
DNAME
DNAME specifies an alias for one or more subdomains of a
domain. The effect of this is that the entire subtree of DNS
identified by the domain name can be mapped onto the target
domain.
HINFO
HINFO records contain host-specific data. They list the hardware
and operating system that are running on the listed host. If you
want to include a space in the machine name, you must quote the
name. Host information is not specific to any address class, so
ANY may be used for the address class. There should be one
HINFO record for each host. For security reasons, many sites do
not include the HINFO record, and no applications depend on this
record.
ISDN
Representation of ISDN addresses.
MB
MB lists the machine where a user wants to receive mail. The
"name" field is the user's login; the machine field denotes the
machine to which mail is to be delivered. Mail box names should
be unique to the zone.
MG
The mail group record (MG) lists members of a mail group.
MINFO
MINFO creates a mail group for a mailing list. This resource record
is usually associated with a mail group, but it can be used with a
mailbox record. The "name" specifies the name of the mailbox. The
"requests" field is where mail such, as requests to be added to a
mail group, should be sent. The "maintainer" is a mailbox that
should receive error messages. This is particularly appropriate for
mailing lists when errors in members' names should be reported to
a person different to the sender.
MR
MR records lists aliases for a user. The "name" field lists the alias
for the name listed in the fourth field, which should have a
corresponding MB record.
MX
MX records specify a list of hosts that are configured to receive
mail sent to this domain name. Every host that receives mail
should have an MX record, since if one is not found at the time the
mail is delivered, an MX value will be imputed with a cost of 0 and
a destination of the host itself.
NAPTR
NAPTR records map between sets of URNs, URLs and plain
domain names and suggest to clients what protocol should be used
to talk to the mapped resource. For example NAPTR is used in
SIP. The SIP URN for the US telephone number 1-800-555-1234
would be tel:+1-800-555-1234 and its domain name
sipcalls.sip.com
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
310
NS
NS lists a name server responsible for a given zone. The first
"name'' field lists the zone that is serviced by the listed name
server. There should be one NS record for each name server of the
zone, and every zone should have at least two name servers,
preferably on separate networks.
PTR
PTR allows special names to point to some other location in the
domain. The following example of a PTR record is used in setting
up reverse pointers for the special in addr.arpa domain. This line is
from the example mynet.rev file. In this record, the "name'' field is
the network number of the host in reverse order. You only need to
specify enough octets to make the name unique.
RP
RP identifies the name (or group name) of the responsible
person(s) for a host. This information is useful in troubleshooting
problems over the network.
RT
Route-through binding for hosts that do not have their own direct
wide area network addresses (experimental).
SRV
Information on well known network services (replaces WKS).
TXT
A TXT record contains free-form textual data. The syntax of the
text depends on the domain in which it appears; several systems
use TXT records to encode user databases and other
administrative data.
WKS
WKS records describe the well-known services supported by a
particular protocol at a specified address. The list of services and
port numbers comes from the list of services specified in
/etc/services. There should be only one WKS record per protocol
and address. Because the WKS record is not widely used
throughout the Internet, applications should not rely on the
existence of this record to recognize the presence or absence of a
service. Instead, the application should simply attempt to use the
service.
X25
Representation of X.25 network addresses (experimental).
Add a New Zone
Create an additional zone and configure the settings according to your requirements. This new zone will inherit the settings configured in the
template zone. (Note that only template settings will be inherited that already existed before the zone was created.)
1.
2.
3.
4.
5.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DNS-Service.
Double-click DNS Template Zone.
Right click your DNS server and select Lock Server.
Right click your DNS server and select Add New Zone. The Properties of window opens.
Select the Type of the zone from the list. (For more information, see DNS)
6.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
311
6. Enter the Origin Domain Name you wish to create here (e.g. barracuda.com).
7. Define whether the zone should perform DNS Forward or Reverse lookup:
Forward – Provides IP addresses for known host names.
Reverse – Provides host names for known IP addresses (provided only for 8-bit networks, e.g. 213.47.10.0/24).
8. When type Slave is selected, add the master IP addresses.
9. When type Forward is selected, add the forward IP addresses.
10. Clicking advanced and configure
the following settings in the Interface section:
notify – Allows the administrator to select whether the DNS server should notify slave DNS servers about zone changes. If expli
cit is selected, enter the explicit IP address in the also notify field.
also notify – Here you may enter a list of IPv4 or IPv6 hosts that should be notified about zone changes although these
machines are not registered slaves of the DNS server. Separate multiple entries with a semicolon and space (e.g. 10.0.0.53;
10.0.0.67; 192.168.0.10; 2001:db8:85a3:0:0:8a2e:370:73341).
transfer-source-ip – (only
available for type Slave) The IP address the slave has to use when
contacting its master DNS server.
Be sure to set the transfer-source-IP when configuring a slave zone, otherwise the slave zone will not be accepted by
the DNS server.
11.
In the Security section, configure detailed security options for the DNS service (These settings are very
important for type Master and Forward).:
allow notify – (only available for type Slave). Defines if the slave accepts notifications about updates from its master.
allow query – Lists the IPv4 or IPv6 hosts that are allowed to query the DNS server. By default all hosts are allowed.
allow update – Lists the hosts that are allowed to update the database of the DNS server.
allow transfer – Lists the hosts that are allowed to fetch the DNS database from the DNS server.
12. Click OK.
13. Click Send Changes and Activate.
The new zone is now displayed in the left configuration tree. Clicking on this entry displays the zone details in the main table, from where you can
add Name Servers, hosts, subdomains, mail exchangers, etc.
Troubleshooting
Add a New Start of Authority (SOA)
In case if you have deleted the standard template which is automatically inherited by newly generated zones and have thereafter created a new
zone, you must create a new Start of Authority (SOA).
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > DNS-Service.
Double-click DNS Template Zone.
Right click your DNS server and select Lock Server.
Locate the newly created domain lacking an SOA record in the tree view.
5. Right click in the table and select Add a New Start of Authority (SOA), or, if
6.
7.
the SOA record already exists, double-click
an existing entry with type NS or SOA and select the Start of Authority (SOA) tab.
Specify the settings as described in Configure DNS Zones.
Click Send Changes and Activate.
In order to function, the reverse zone as described in Define
Reverse Lookup Zones must have already been
created.
Enable Debug Logging
To enable debug logging for the DNS service, edit its named.conf file. Then restart the service.
1. Edit the named.conf file.
vi /opt/phion/config/active/servers/<servername>/services/<dns-servicename>/named.conf
2. Replace these lines:
logging {
category "default" { "default_syslog"; };
};
3. with the following lines:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
3.
logging {
category "default" { "default_syslog"; };
category "general" { "default_syslog"; };
category "database" { "default_syslog"; };
category "security" { "default_syslog"; };
category "config" { "default_syslog"; };
category "resolver" { "default_syslog"; };
category "xfer-in" { "default_syslog"; };
category "xfer-out" { "default_syslog"; };
category "notify" { "default_syslog"; };
category "client" { "default_syslog"; };
category "unmatched" { "default_syslog"; };
category "network" { "default_syslog"; };
category "update" { "default_syslog"; };
category "queries" { "default_syslog"; };
category "dispatch" { "default_syslog"; };
category "dnssec" { "default_syslog"; };
category "lame-servers" { "default_syslog"; };
};
4. Restart the DNS service. Enter:
phionctrl module restart dns
Copyright © 2015, Barracuda Networks Inc.
312
Barracuda NG Firewall 6.1 Administrator's Guide - Page
313
Dynamic Routing Protocols (OSPF/RIP/BGP)
The Barracuda NextGen Firewall F-Series supports three dynamic routing protocols - Open Shortest Path First (OSPF), Routing Information
Protocol (RIP Version 1 and RIP Version 2), and Border Gateway Protocol (BGP). OSPF and RIP are Interior Gateway Protocols (IGP) and
distribute routing information within an autonomous system, whereas BGP is a Exterior Gateway Protocol. The routes learned via the dynamic
routing protocols are applies to the kernel routing table. Set the route metric instead of the administrative distance to prioritize one route over the
other.
OSPF
The F-Series Firewall supports OSPFv2 and OSPFv3 versions of the OSPF protocol. OSPF is a link state protocol and uses Dijkstra algorithm to
calculate the shortest path tree. A router's interface is the "link". The "state" of this interface is summed up by its IP address, subnet mask,
interface type, neighbor state … Every router keeps track of all connected interfaces and states and sends this information with multicasts to its
neighbors. These packets are known as LSAs (Link State Advertisements). The router builds its link state database with the information provided
by the LSAs. Every time a network change occurs, LSAs containing the new information are sent, thus triggering every router to update its
database. After having received all LSAs, the router calculates the loop-free topology. LSAs cannot be filtered within an area because all routers
in an area must have the same link state database. If some information is missing, routing loops can occur.
OSPF is a hierarchical IGP - it uses Areas to achieve this. The top-level Area is known as Backbone Area, and the number of this Area must
always be 0 or 0.0.0.0. All other Areas must be physically connected to this Backbone Area. One very important aspect of OSPF is that Areas
must not be split (If this cannot be avoided, a virtual link has to be used to expand Area 0 over any other area.). Routers within an area are known
as Area Routers. Routers connected to two or more areas are known as Area Border Routers (ABR) and routers connected to other autonomous
systems are called Autonomous System Boundary Routers (ASBR). Routing information can be summarized on ABRs and ASBRs. It is not
possible to summarize routing information within an area.
The metric used by OSPF is cost. Every link has an associated cost value, derived from the link bandwidth. The metric to a destination is
calculated by adding up all costs. If there are more possible paths to a destination, the route with the lowest cost is chosen as the best route. To
advertise LSAs, the router has to live in OSPF neighborship with other routers. When this neighborship is fully established, the interfaces begin
sending the updates (LSAs). To build an adjacency, hello packets are continuously exchanged between neighboring routers. This also keeps
track of the existence of the connected OSPF neighbors. To lower the number of updates exchanged on a Broadcast Medium (for example,
Ethernet), LSAs are only sent to a so called Designated Router (DR). This interface advertises the information to all other routers on the shared
medium. Without a DR, an any-to-any neighborship between all OSPF routers on this segment would be needed. For backup reasons, a Backup
DR (BDR) is elected. Each other router establishes neighborship only with the DR and BDR.
Areas can be configured as stub areas, where external routes are not advertised by ABRs to the Area Routers. Instead, a default route is injected
to the area. Area 0 cannot be stub.
OSPF is very CPU and memory intensive. Therefore, be careful when enabling OSPF on low-end interfaces in a large network.
For more information, see
How to Install and Configure the OSPF/RIP/BGP Service
How to Configure OSPF Routers and Areas
How to Configure Filter Setup for OSPF and RIP
How to Enable Debugging for OSPF
Example for OSPF and RIP Configuration
RIP
The F-Series Firewall supports RIPv1, RIPv2, and RIPng versions of the RIP protocol. RIP is a distance-vector protocol. The expression
"distance-vector" can be defined as follows: The vector is the direction to the destination (next hop); the distance is treated as a metric type.
Example: Destination A is a distance of 3 hops away and the direction is via router AA. RIP uses Hop Count as metric. A maximum of 15 hops
are possible; metric 16 means that a network is unreachable. All RIP routers periodically send routing updates. Every update includes the whole
routing table. The following techniques have been introduced to prevent routing loops:
Split Horizon - When sending Updates out a particular interface, the routes learned from this interface are not included in the update.
Split Horizon with Poison reverse - This method is an extension to Split Horizon. The router includes learned routes in the update but
marks these routes as unreachable.
Counting to infinity - To recognize unreachable networks on link failures. Infinity in RIP is defined as 16 hops. Every time a routing
update passes a router, the hop count is increased by 1. When the counter reaches 16, the network is considered unreachable.
RIPv1 is classful, which means that subnet information cannot be distributed. RIPv2, on the other hand, is classless. This means the subnet mask
is included in the routing update. The maximum route metric for RIP routes is 255. This means it is not possible to use RIP routes as fallback
routes if other OSPF or BGP route metrics are over 255.
For more information, see
How to Install and Configure the OSPF/RIP/BGP Service
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
314
How to Configure RIP Router Setup
How to Configure Filter Setup for OSPF and RIP
Example for OSPF and RIP Configuration
BGP
The F-Series Firewall supports BGP4 and BGP4+ versions of the BGP protocol. BGP is an Exterior Gateway Protocol (EGP) and is typically used
to connect autonomous systems (AS) of Internet service providers. BGP calculates routing paths based on several pieces of information, such
as AS Path, IGP-Metric, Multi-Exit Discriminator, Communities, Local Preferences, Next Hop, Weight and Origin. AS communicate with each
other through TCP sessions on port 179. BGP can run between peers in the same AS as well as peers on the border to other AS. It thus acts as
an IBGP ( Interior Border Gateway Protocol) as well as an Exterior Gateway Protocol (EGP).
How to Install and Configure the OSPF/RIP/BGP Service
How to Configure BGP Router Setup
How to Configure BGP for Inbound Link Failover
Protocol Comparison
The following table summarizes the feature differences between the supported dynamic routing protocols.
Attribute
OSPF
RIP
BGP
Convergence
Fast
Slow
Slow
Network size
For large and small networks.
Only for small to medium
networks due to the fact that
max. metric is 15 hops.
For large networks.
Need of device resources
Memory and CPU intensive.
Much less memory and CPU
intensive than OSPF.
Depends on the size of the
routing table but scales better
than OSPF.
Need of network resources
Less than RIP; only small
updates are sent.
Bandwidth consuming; Whole
Routing table is sent (default:
every 90 seconds).
Bandwidth consuming while
learning network routes from
connected AS or while update
bursts.
Metric
Is based on bandwidth.
Is based on hop count, no matter
how fast the connections are.
Is based on AS Path,
IGP-Metric, Multi-Exit
Discriminator, Communities,
Local Preferences, Next Hop,
Weight and Origin.
Design
Hierarchical network possible.
Flat network.
Fully meshed.
HA Operation
The OSPF/RIP service synchronizes externally learned routes with its HA partner. Routes cannot be introduced on the partner while this is
"passive" because network routes required to do so are missing. The external routes HA information is thus stored in a file and introduced on the
HA system during startup of the OSPF/RIP service. Take-over and startup of the OSPF/RIP service usually take a few seconds. The HA routes
are introduced as protocol "extha" (number 245). These routes are then either replaced by newly learned external OSPF or RIP routes (protocols
"ospfext" or "ripext") or removed with the HA garbage collection after five minutes.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
315
How to Install and Configure the OSPF/RIP/BGP Service
This article provides step-by-step information on how to install and configure dynamic routing protocols.
Configure OSPF/RIP/BGP
To configure OSPF/RIP/BGP settings, proceed with the following steps:
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service.
2. Click Lock.
3. In the left menu, click Operational Setup. General parameters of the dynamic routing protocols, like enabling/disabling the protocol and
handling of dynamic routes are configured.
On a Barracuda NG Firewall, route selection is directly dependent of the metric of a route; routes with a lower metric are preferred to
routes with a higher metric. Static routes have a metric of 1 by default. RIP routes can have a maximum metric of 15 hops and OSPF
routes will mostly have a cost of more than 20. As it is desirable that OSPF routes be preferred to RIP routes, metrics can be increased
artificially through defining administrative distances. The corresponding parameter Administrative Distance for RIP is set to 120 and
Admin Distance related to OSPF is left empty by default. The value specified for the administrative distance is going to be added to
every route learned through OSPF or RIP respectively.
Operational Setup
Idle Mode
If this parameter is set to yes, the OSPF/RIP/BGP wrapper gets
started by the control daemon but does not start up the actual
OSPF/RIP/BGP routing service.
Run OSPF Router
By setting this value the OSPF routing functionality can be enabled or
disabled.
Run RIP Router
By setting this value the RIP routing functionality can be enabled or
disabled.
Run BGP Router
By setting this value the BGP routing functionality can be enabled or
disabled.
Hostname
Allows overriding the propagated hostname, which by default is the
box hostname.
Operation Mode
The operation mode defines handling of route learning and
propagation. The following settings are possible:
advertise-only – Routes are only advertised.
learn-only – Networks are not propagated, except those
networks living on the interfaces configured for OSPF/RIP/BGP
themselves; learned routes from other systems are still
advertised.
advertise-learn – OSPF/BGP routes are learned and
propagated.
Router ID
Every OSPF/BGP router is identified by its Router ID. This ID is
defined by an IP address explicitly configured for this router.
Note that the router ID must also be set if the routing
service only provides a RIP service, although not used by
RIP, you must enter any IP address.
OSPF Preferences
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
316
Log Level
Specifies the verbosity of the OSPF routing
service:
Use Special Routing Table
By setting this parameter to yes and selecting a table name below, routes learned by the
OSPF service are introduced into an own routing table. Note that the routing table is not
automatically introduced but has to be configured manually by introducing Policy Routes.
Table Names
A list of policy routing names can be specified here. Routes learned by the routing daemon
are introduced into each of the enlisted routing tables.
Multipath Handling
ignore
critical
debugging
emergencies
errors
informational (default)
notifications
warnings
alerts
Multipath routes will be discarded.
OSPF summarizes routes to
multipath routes automatically if
more than one next hop to a prefix
exists. Use setting "ignore" with
caution.
Ignore default route (Advanced Mode)
assign-internal-preferences
Multipath routes will be translated to several
routes with different metrics (preferences).
accept-on-same-device
Multipath routes will be introduced as
multipath if all nexthops are reachable on the
same interface.
accept-all (default)
Multipath routes will be introduced.
If enabled, the learned default route is not inserted into the routing table of the Barracuda NG
Firewall, but at the same time is still propagated via OSPF. If you do not want the default
route to be propagated, use an OSPF filter.
For more detailed information on OSPF Router configuration, see How to Configure OSPF Routers and Areas.
RIP Preferences
This section, accessible via the link in the Configuration menu, can be specified the same way.
For more detailed information on RIP Router configuration, see How to Configure RIP Router Setup.
For a setup example including screenshots, see Example for OSPF and RIP Configuration.
BGP Router Setup
Setting
Description
AS Number
Number of the autonomous system this router belongs to.
Confederation Parent AS
Number of the autonomous system that internally includes multiple sub-autonomous systems
(aka confederation).
Confederation Partners
Sub-autonomous system numbers belonging to same confederation.
Terminal Password
Password to connect to the BGP router through telnet. The system is reachable on loopback
TCP port 2605.
Privileged Terminal Password
Password to enable configuration through a telnet connection.
Networks
Enter all networks the BGP router should run on. When running a Exterior Gateway Protocol
BGP router, enter your WAN network.
Make sure to enter an IP address including netmask. For example:
210.80.90.100/26
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
317
Route Aggregations
Enter network addresses to perform route aggregation to decrease the size of routing tables.
Advanced settings
Configuration of advanced BGP Settings.
External Distance Definition – Adminis
trative distance for BGP external routes.
External routes are the best path
learned from a neighbor that is external
to the AS. (default 20)
Internal Distance Definition – Administ
rative distance for BGP internal routes.
Internal routes are the best path learned
from other BGP speakers within the
same AS. (default 200)
Local Distance Definition – Administra
tive distance for BGP local routes. Local
routes are networks configured with the
network command. (default 200)
Keep Alive Timer – Number of seconds
this BGP speaker waits for a keepalive
message before deciding that the
connection is down. Recommended
value is 1/3 of of Hold Time.
Administrative Distance – Number of
seconds this BGP speaker waits for a
keepalive, update, or notification
message before deciding that the
connection is down. Recommended
value is 3 times of Keep Alive Timer.
BGP Preferences
Setting
Description
Log Level
Logging level of the BGP routing daemon.
Use Special Routing Table
Routes learned via BGP will not be introduced in main table, but in
tables given below.
Table Names
Tables must exist in network configuration.
Multipath Handling
ignore – Multipath routes will be discarded.
assign-internal-preferences – Multipath routes will be
translated to several routes with different metrics (preferences).
accept-on-same-device – Multipath routes will be introduced as
multipath, if all nexthops are reachable on the same device.
For more detailed information on BGP Router configuration, see How to Configure BGP Router Setup.
GUI as Text
This parameter set is only available in Advanced View mode. The configuration done with the GUI is displayed here in quagga/Cisco
commands.
Show as Text – Set this to yes to show created OSPF syntax configuration after Send Changes.
OSPF Text – Created OSPF syntax configuration. Shown, if Show as Text is set to yes.
RIP Text – Created RIP syntax configuration. Shown, if Show as Text is set to yes.
BGP Text – Created BGP syntax configuration. Shown, if Show as Text is set to yes.
Text Based Configuration
Configure dynamic routing here, if you do not want to configure it with the GUI. Already done GUI configuration will be replaced. Syntax as used
for quagga or Cisco applies.
OSPF Configuration / Free Format RIP Configuration:
Use Free Format – Set this to yes to use free OSPF/RIP syntax configuration.
Free Format Text – OSPF/RIP/BGP syntax configuration. This field applies when parameter Use Free Format is set to yes.
Routing Configuration Example
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
318
Network routes which are required for an OSPF/RIP network prefix must NOT be a subset of another route (see below for an
explanation).
OSPF network prefix: 10.0.66.0/24
Server IP: 10.0.66.98
Box network route:10.0.66.0/24 via dev eth1
Additional box network route: 10.0.0.0/8 via dev eth0
In this configuration example, the required box network route "10.0.66.0/24 via dev eth1" is completely included in the additional box network
route (bold). This will lead to a mismatch in the OSPF configuration. OSPF will neither detect eth0 nor eth1 as OSPF enabled and therefore not
work.
HA Operation
The OSPF/RIP service synchronizes externally learned routes with its HA partner. Routes cannot be introduced on the partner, while this is
"passive" because network routes required to do so are missing. The external routes HA information is thus stored in a file and introduced on the
HA system during startup of the OSPF/RIP service. Take over and startup of the OSPF/RIP service usually take a few seconds. The HA routes
are introduced as protocol "extha" (number 245). These routes are then either replaced by newly learned external OSPF or RIP routes (protocols
"ospfext" or "ripext") or removed with the HA garbage collection after five minutes.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
319
How to Configure BGP Router Setup
In this article:
Requirements
Step 1. Configure Basic Settings
Step 2. Configure Operational Settings
Step 3. Configure BGP Preferences
Step 4. Add an IP Prefix Filter
Step 5. Configure Neighbor Settings
Step 6. Add the IP Address of the BGP Router
Step 7. Create a Firewall Rule for BGP Router Communication
Administrating BGP Routers from the Command Line
Requirements
Request your own or use an unique ARIN registered autonomous system (AS) number for your BGP site.
Know the AS numbers of BGP sites to be connected.
Create an OSPF/RIP/BGP service on the Barracuda NG Firewall.
Step 1. Configure Basic Settings
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. Enable BGP (If you are not using OSPF and RIP, disable them).
3. From the Operation Mode drop down field, select one of the following options according to your requirements:
advertise-only – Networks are only advertised.
learn-only – Only networks on the interfaces that are configured for OSPF/RIP/BGP are propagated; learned routes from other
systems are still advertised.
advertise-learn – Networks are learned and propagated.
4. In the Hostname field, enter the hostname of the BGP router.
5. In the Router ID field, enter the IP address of the BGP router. You can enter any address from your ARIN range. Usually, the first or last
IP address in the subnet is used.
You must also add this IP address as an additional IP address in the Virtual Server Properties on the Barracuda NG Firewall,
as described later in Step 6 of the configuration.
6. Click Send Changes and Activate.
Step 2. Configure Operational Settings
In the settings for network routes that should be propagated by the BGP router, make sure that you enable the Advertise Route settin
g. See How to Add a Direct Attached Route or How to Configure Gateway Routes.
1. On the OSPF/RIP/BGP Settings page, click BGP Router Setup from the Configuration menu in the left navigation pane.
2. In the AS Number field, enter the AS number that you received from the ARIN. (This is the number of the autonomous system that the
BGP router belongs to).
3. In the Terminal Password field, specify the password for the connection to the BGP routing daemon through the command-line
interface.
4. In the Networks table, add an entry for the ARIN network and any other network that you want to advertise.
a. Enter a name for the network and click OK. The Network window opens.
b. In the Network Prefix field, enter the network and subnet mask in CIDR notation for the autonomous system of the BGP router.
c. Click OK.
5. In the Route Distribution Configuration section, enable the network route types to be redistributed by this BGP router according to
your requirements. You can enable the following network routes:
a. Kernel Routes – Kernel network routes will be redistributed.
b. Static Routes – Gateway network routes will be redistributed.
c. Connected Routes – Network routes of directly attached networks will be redistributed.
d. RIP Routes – Network routes learned by the RIP router will be redistributed.
e. OSPF Routes – Network routes learned by the OSPF router will be redistributed.
6. Click Send Changes and Activate.
Step 3. Configure BGP Preferences
In most cases, the default BGP preferences are sufficient and do not have to be configured. If you want, you can configure more detailed logging,
special routing tables, and multipath handling.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
320
1. On the OSPF/RIP/BGP Settings page, click BGP Preferences from the Configuration menu in the left navigation pane.
2. Specify the logging details according to your requirements.
3. Click Send Changes and Activate.
Step 4. Add an IP Prefix Filter
1. On the OSPF/RIP/BGP Settings page, click Filter Setup IPv4 from the Configuration menu in the left navigation pane.
The Barracuda NG Firewall does also provide this configuration area for IPv6 addresses. When using IPv6, specify all settings
described in the sections designated for IPv6. Note, that IPv6 has to be enabled in Quagga too. For general information on the
implementation of IPv6 on the Barracuda NG Firewall, see How to Use IPv6.
2. In the IPv4 Prefix Filter table, add an entry for the IP prefix filter. Enter a descriptive name, for example ARIN, and then click OK.
3. In the IPv4 Prefix Filter configuration, enter an optional description. For example, ARIN Range.
4. In the Sequence Number section, click + to add a Sequence Number configuration and specify a unique identifier number for the prefix
list item in the Sequence Number field. For example, 01.
5. In the Network Prefix field, enter the network IP range that you received from the ARIN (in this example 198.200.200.0/24 ). Then click
OK.
6. Click OK.
7. Click Send Changes and Activate.
Step 5. Configure Neighbor Settings
Before you configure the neighbor settings, the network for each provider that participates in BGP routing must be configured properly. Obtain
and carefully verify the default gateway IP address for each provider.
You must only start configuring the neighbor settings on the provider side after you have completed the previous sections for enabling
BGP , configuring the BGP router and adding an IP prefix filter . Otherwise, the BGP routing infrastructure will dampen any ICMP
request and response, and the BGP service will have to be restarted on the ISP side. This ping dampening will occur whenever the
BGP service goes up and down numerous times over a small period of time.
1. On the OSPF/RIP/BGP Settings page, click Neighbor Setup IPv4 from the Configuration menu in the left navigation pane.
2. In the Neighbors table, add an entry for each provider network:
a. Enter a descriptive name for the network and then click OK. The Neighbors window opens.
b. In the Neighbor IP field, enter the default gateway IP address of the existing provider.
c. From the Enable BGP Routing Protocol Usage list, select yes.
d. In the BGP Parameters section, enter the BGP AS number of the ISP. (Do not enter the customer AS number that was
specified in the BGP router settings.)
e. In the Neighbor Password field, enter the password that should be used to connect to the neighbor peer.
f. Select yes from the Update Source drop down list to enable the Update Source Interface setting.
g. In the Update Source Interface field, enter an IP address from your network that should be used for the BGP session to this
neighbor.
If you only advertise the ARIN route to go to providers (and not the network IP ranges or the ranges of other ISPs), it
is highly recommended that you configure the Peer Filtering for Output settings. Select the Peer Filter from the IP
filter list that you created in the previous section (Add an IP Prefix Filter).
h. Click OK.
3. Click Send Changes and Activate.
Step 6. Add the IP Address of the BGP Router
You must add the IP address of the BGP router as an additional IP address in the Virtual Server Properties on the Barracuda NG Firewall. To
add the IP address of the BGP router:
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Server Properties.
2. Click Lock.
3. In the Virtual Server IP Addresses section, add an entry to the Additional IP table.
a. In the Additional IP field, enter the IP address of the BGP Router.
b. From the Reply to Ping list, select yes.
c. You can enter an optional description.
d. Click OK.
4. Click Send Changes and Activate.
Step 7. Create a Firewall Rule for BGP Router Communication
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
321
To allow communication with other BGP routers, introduce a host firewall rule that allows network traffic through TCP port 179. For more
information on creating firewall rules, see Firewall Rules.
Administrating BGP Routers from the Command Line
The BGP routing daemon for the Barracuda NG Firewall is based on the Quagga Software Routing Suite. You can configure and administrate the
BGP router from the Barracuda NG Firewall command-line interface.
1. Open the Command-Line Interface.
2. Enter vtysh to launch the configuration tool.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
322
How to Configure EBGP Multihop Routing
To allow connections between BGP neighbors that are not directly connected to each other, you can configure EBGP multihop routing with either
a route map or static routes. This article provides example scenarios and step-by-step instructions for configuring EBGP.
In this article:
Choosing to Use a Routing Map or Static Routes
Configuring EBGP with a Route Map
Step 1. Introduce a Route Map
Step 2. Configure Neighbor Settings
Configuring EBGP with Static Routes
Step 1. Configure Neighbor Settings
Step 2. Execute a Next Hop Lookup
Step 3. Configure a Static Route
Step 4. Configure a Device Route
Choosing to Use a Routing Map or Static Routes
There are different scenarios which may require the implementation of EBGP multihop routing - for example, as illustrated in the following
diagrams:
Scenario 1 – A BGP peer runs on a loopback address that is externally unreachable. This can be required if the other IP addresses of
the system are dynamically changeable.
Scenario 2 – The BGP peer (router R1) is located in an external network.
For both scenarios, you can configure EBGP multihop routing with either a route map or static routes:
Route Map – If you do not require load balancing over more than one router, using a route map is the simplest way of configuring EBGP.
You only need to configure the BGP neighbor and do not need to introduce additional routes. All routes learned by router R1 (as
configured in Scenario 2) are directed over one gateway. However, this setup can prolong traffic from routes whose next hop would
initially have been directly reachable from router R0, and load balancing over more than one router is no more possible.
Static Routes – For arriving routes without a directly reachable next hop, configure static routes. You only need to configure the
neighbor once for EBGP multihop routing and do not need to change any other BGP configurations. Routes received via next hop can be
analyzed. However, you must also set up a new next hop, and the routing table for the kernel becomes more complicated.
Complete the steps in the following sections to configure EBGP multihop routing with either a route map or static routes, depending on your
network architecture. The sections provide examples of how to configure EBGP multihop routing for Scenario 2, as illustrated in the above
diagram. BGP peer R1 in an external network is configured on router R0.
Configuring EBGP with a Route Map
This example procedure configures a route map to modify all routes arriving from router R1 so that the next hop is changed to the IP address of
the gateway for router R0. This gateway is always directly reachable from R0 and then autonomously forwards data traffic to router R1.
Step 1. Introduce a Route Map
Introduce a route map to modify routes arriving from R1 so that the next hop is set to the gateway of R0.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
323
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. From the Configuration menu in the left navigation pane, click Filter Setup IPv4.
3. Click Lock.
4. In the Route Maps IPv4 table, click + to add an entry for the route map.
5. Enter a name for the route map and then click OK.
6. In the BGP Specific Conditions table, click + to add an entry for the BGP settings.
7. In the Route Map Entry window, specify the following settings and then click OK:
Sequence Number – Enter a unique number for the route map entry.
Type – Select permit.
Match Condition – Select None to specify that all routes must be modified.
Set Action – Select Next_Hop.
Set Next-Hop IP – Enter 10.0.0.1, the gateway address.
8. In the Route Maps window, click OK.
9. Click Send Changes and Activate.
Step 2. Configure Neighbor Settings
Configure EBGP in the neighbor settings for R1.
1.
2.
3.
4.
5.
On the OSPF/RIP/BGP Settings page, click Neighbor Setup IPv4 from the Configuration menu in the left navigation pane.
Click Lock.
In the Neighbors table, click + to add an entry for the neighbor settings.
Enter a name for the neighbor settings and then click OK.
In the Usage and IP section of the Neighbors window, specify the following settings:
Neighbor IPv4 – Enter 10.1.0.2.
BGP Routing Protocol Usage – Select yes.
6. In the BGP Parameters section, specify the following settings:
AS Number – Enter 200.
Update Source – Select Address.
Update Source IPv4 Address – Enter 10.0.0.2.
7. To add a new route map, click Set next to Peer Filtering For Inputs.
8. In the EBGP MultiHop field, you can specify the maximum allowed next hop distance to the neighbor. For example, 20.
9. After you specify all of the required settings in the Neighbors window, click OK.
10. Click Send Changes and Activate.
Configuring EBGP with Static Routes
This example procedure configures the neighbor settings for router R1 and introduces two routes:
A static route over the gateway of router R0 to the network of router R1.
A direct route to the network of router R1.
Step 1. Configure Neighbor Settings
Configure EBGP in the neighbor settings for R1.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. From the Configuration menu in the left navigation pane, click Neighbor Setup IPv4.
3. Click Lock.
4. In the Neighbors table, click + to add an entry for the neighbor settings.
5. Enter a name for the neighbor settings and then click OK.
6. In the Usage and IP section of the Neighbors window, specify the following settings:
Neighbor IPv4 – Enter 10.1.0.2.
BGP Routing Protocol Usage – Select yes.
7. In the BGP Parameters section, specify the following settings:
AS Number – Enter 200.
Update Source – Select Address.
Update Source IPv4 Address – Enter 10.0.0.2.
8. In the EBGP MultiHop field, you can specify the maximum allowed next hop distance to the neighbor. For example, 20.
9. After you specify all of the required settings in the Neighbors window, click OK.
10. Click Send Changes and Activate.
Step 2. Execute a Next Hop Lookup
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
324
Assuming that a route arrives at 192.168.0.0/24 with the next hop 10.1.0.2, execute a next hop lookup for R1 (10.1.0.2). The lookup should
provide the IP address of the gateway for R0 (10.0.0.1) and the interface port1.
Step 3. Configure a Static Route
Introduce a static route over the gateway of R0 to the network of R1. Use the following settings:
Target Network Address: 10.1.0.2/32
Route Type: gateway
Gateway: 10.0.0.1
For more information, see How to Configure Gateway Routes.
Step 4. Configure a Device Route
To introduce the route that was learned over BGP, you must configure a direct -route with the following settings:
Target Network Address: 10.1.0.2/32
Route Type: directly attached network
Interface Name: port1
For more information, see How to Add a Direct Attached Route.
Whenever a route with an unknown next hop is received, you must execute a next hop lookup, configure a static route, and then
configure a device route. Use the example steps from above.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
325
How to Configure BGP for Inbound Link Failover
BGP is used to announce routes to the neighboring networks. If you are using two or more ISPs to connect to the Internet, you can configure
BGP to propagate routes for both ISPs to the neighboring networks. The remote BGP service monitors the neighboring connections and
automatically chooses the other link when one link goes down. All traffic for your network is then routed over the remaining link.
In this article:
Before You Begin
Step 1. Enable the BGP Service
Step 2. Configure the BGP Service
Step 3. Create a BGP Neighbors for ISP 1 and ISP 2
Monitoring BGP Routes
Before You Begin
Before you configure the BGP service, you need an AS number for your network. AS numbers from 64512 to 65534 and 4,200,000,000 to
4,294,967,295 are reserved for private use.
Step 1. Enable the BGP Service
Create and configure the BGP service.
1. Create a OSPF/RIP/BGP Service. For more information on how to create a service, see How to Configure Services.
2. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
3. Click Lock.
4. From the Run BGP Router list, select yes.
5. From the Operation Mode list, select advertise-learn.
6. In the Router ID field, enter the IP address of the router.
7. Click Send Changes and Activate.
Step 2. Configure the BGP Service
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. In the left menu, click on BGP Router Setup.
3. Enter the AS Number for your network.
4. In the Terminal Password fields, specify a password for connecting to the BGP router service via telnet from the shell of the Barracuda
NG Firewall.
5. In the Networks table, add the local subnet (e.g., 10.0.0.0/24).
a. Click the plus sign (+).
b. Enter a Name for the network and click OK.
c. In the Network Prefix field, enter the subnet. This is the subnet which is propagated via BGP (e.g., 10.0.0.0/24).
d. Click OK.
6. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
326
Step 3. Create a BGP Neighbors for ISP 1 and ISP 2
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. In the left menu, click Neighbor Setup IPv4.
3. Click Lock.
4. In the Neighbors table, create a BGP neighbor for each ISP:
a. Click the plus sign (+).
b. Enter a Name for the ISP (e.g., ISP1bgpNeighbor or ISP2bgpNeighbor).
c. In the Neighbors window, specify the following settings:
Neighbor IPv4 – Enter the IP address of the BGP neighbor (e.g., 192.168.0.1 or 192.168.1.1).
OSPF Routing Protocol Usage – Select no.
RIP Routing Protocol Usage – Select no.
BGP Routing Protocol Usage – Select yes.
AS Number – Enter the AS number that is assigned to the BGP neighbor (e.g., 64513 or 64515).
Update Source – Select Address.
Update Source IPv4 Address – Enter the IP address that is assigned to the ISP WAN interface.
d. Click OK.
5. Click Send Changes and Activate.
Monitoring BGP Routes
To monitor the routes that are learned and propagated by BGP, go to the CONTROL > Network page and click the BGP tab.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
327
How to Configure BGP Routing over IPsec VPN
Follow the instructions in this article to configure the BGP service with an intermediary /30 network between a local and remote VPN gateway.
The BGP service uses the IPsec tunnel to dynamically learn the routes of the remote network. You must configure both the local and remote NG
Firewalls.
Example Values for the Local Barracuda
NG Firewall
Example Values for the Remote
Barracuda NG Firewall
VPN Next Hop Interface Index
13
13
VPN Next Hop Interface IP Address
192.168.22.1/24
192.168.22.2/24
Virtual Server Additional IP
192.168.22.1
192.168.22.2
VPN Local Networks
192.168.22.0/30
192.168.22.0/30
VPN Remote Networks
192.168.22.0/30
192.168.22.0/30
VPN Interface Index
13
13
VPN Next Hop Routing
192.168.22.2
192.168.22.1
ASN
64577
64579
Router ID
192.168.22.1
192.168.22.2
Neighbor IPv4
192.168.22.2
192.168.22.1
Neighbor AS Number
64579
64577
Neighbor Update Source Interface
vpnr13
vpnr13
In this article:
Before You Begin
Step 1. Add a VPN Next Hop Interface
Step 2. Add the VPN Interface IP to the Virtual Server Addresses
Step 3. Configure the Site-to-Site VPN Settings
Step 4. Configure the BGP Service
Step 4.1 Configure which Routes to Propagate into BGP
Step 4.2 Configure the BGP Router
Step 4.3. Add a BGP Neighbor
Step 5. Verify the BGP Service Configuration
Before You Begin
Before you configure BGP over an IPsec VPN, obtain the following:
A free /30 subnet. E.g., 192.168.22.0/30
Autonomous system numbers (ASNs) for the remote and local networks. The ASNs can be private or public, because the VPN is not
directly connected to the Internet.
Step 1. Add a VPN Next Hop Interface
Add a VPN next hop interface using a /30 subnet.
1.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
328
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
VPN-Service > VPN Settings.
2. Click Lock.
3. In the Settings tab, click the Click here for Server Settings link.
4. In the Server Settings window, click the Advanced tab.
5. Next to the VPN Next Hop Interface Configuration table, click Add.
6. Configure the VPN next hop interface settings:
In the VPN Interface Index field, enter a number between 0 and 999. E.g., 13
In the IP Addresses field, enter an the VPN interface IP address. E.g., 192.168.22.1/30 for the local NG Firewall or 192.
168.22.2/30 for the remote NG Firewall.
Click OK. The VPN next hop interface is listed in the VPN Next Hop Interface Configuration table.
7. Click OK.
8. Click Send Changes and Activate.
Step 2. Add the VPN Interface IP to the Virtual Server Addresses
Add the IP address of the virtual interface to the list of IP addresses that the virtual server listens on.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Server Properties.
2. Click Lock.
3. In the Additional IP table, add the intermediary VPN IP address of the local VPN interface. E.g., 192.168.22.1 for the local NG
Firewall or 192.168.22.2 for the remote NG Firewall.
4. Click Send Changes and Activate.
Step 3. Configure the Site-to-Site VPN Settings
Configure a site-to-site VPN IPsec tunnel including the VPN next hop interface.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
VPN-Service > Site to Site.
2.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
2.
3.
4.
5.
329
Click Lock.
Click the IPSEC Tunnels tab.
Right-click the table under the IPSEC Tunnels tab and then select New IPsec tunnel.
In the IPsec Tunnel window:
a. In the Local Networks tab, enter:
Local IKE Gateway: Enter the local public IP address the VPN service is listening on.
Network Address: Add the intermediary VPN subnet. E.g., 192.168.22.0/30
b. In the Remote Networks tab, enter:
Remote IKE Gateway: Enter the remote public IP address the remote VPN service is listening on.
Network Address: Add the intermediary VPN subnet. E.g., 192.168.22.0/30
c. Click the Peer Identification tab and then enter a passphrase the Shared Secret
d. Click the Advanced tab and enter:
VPN Next Hop Routing: Enter the IP address of the remote VPN next hop interface. E.g., 192.168.22.2 for the
local NG Firewall or 192.168.22.1 for the remote NG Firewall
Interface Index: Enter the interface number of the VPN next hop interface configured in step1. E.g. 13
e. Click OK.
6. Click Send Changes and Activate.
Step 4. Configure the BGP Service
Enable and configure the BGP service. Configure the remote VPN interface IP address as a BGP neighbor to dynamically learn the routes of the
neighboring network.
Step 4.1 Configure which Routes to Propagate into BGP
You can either enter the networks you want to propagate manually or set the Advertise Route parameter to yes for routes you want propagated.
1. Go to CONFIGURATION > Configuration Tree > Box > Network.
2. Click Lock.
3. To propagate the management network, set Advertise Route to yes in the Management IP and Network section.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
330
4. In the left menu click on Routing.
5. Double click on the direct attached and gateway routes you want to propagate. The Routes window opens.
6. Set Advertise Route to yes and click OK.
7. Click Send Changes and Activate.
Step 4.2 Configure the BGP Router
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. Set Run BGP Router to Yes.
3. (optional)To learn routes from the remote ASN set Operation Mode to advertise-learn.
4. Enter the Router ID. Typically the local VPN next hop interface IP address is used. E.g., 192.168.22.2 for the local NG Firewall 192.
168.22.1 for the remote NG Firewall.
5. In the left menu, click BGP Router Setup.
6. Enter the AS Number. E.g., 64577 for the local NG Firewall or 64579 for the remote NG Firewall
7. Enter the Terminal Password. Use this password if you must directly connect to the dynamic routing daemon via command line for
debugging purposes.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
331
8. To propagate the directly attached and gateway routes configured in Step 1 set Connected Routes to yes.
9. (alternative) To manually enter the networks you want to propagate, click + in the Networks table and enter the network. E.g., 172.16.
0.0/24
10. Click Send Changes and Activate.
Step 4.3. Add a BGP Neighbor
To dynamically learn the routing of the neighboring network, set up a BGP neighbor for the remote VPN next hop interface.
1.
2.
3.
4.
5.
In the left menu of the OSPF/RIP/BGP Settings page, click Neighbor Setup IPv4.
Click Lock.
Next to the Neighbors table, click the plus sign (+) to add a new neighbor.
Enter a Name for the neighbor and click OK. The Neighbors window opens.
Configure the following settings in the Usage and IP section:
Neighbor IPv4: Enter the remote address for the VPN next hop interface. E.g., 192.168.22.2 for the local NG Firewall 192.
168.22.1 for the remote NG Firewall.
OSPF Routing Protocol Usage: Select no.
RIP Routing Protocol Usage: Select no.
BGP Routing Protocol Usage: Select yes.
6. In the BGP Parameters section, configure the following settings:
AS Number: Enter the ASN for the remote network. E.g., 64579 for the local NG Firewall 64577 for the remote NG Firewall.
Update Source: Select Interface.
Update Source Interface: Enter the VPN next hop interface in the format: vpnr<interface number>. E.g., vpnr13
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
332
7. Click OK.
8. Click Send Changes and Activate.
Step 5. Verify the BGP Service Configuration
On the CONTROL > Network page, verify that BGP routes are learned. Click the BGP tab and expand the relevant AS tree. It can take up to
three minutes for new routes to be learned.
Local Firewall Network > BGP page:
Remote Firewall Network > BGP page:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Copyright © 2015, Barracuda Networks Inc.
333
Barracuda NG Firewall 6.1 Administrator's Guide - Page
334
How to Configure BGP Routing over TINA VPN
To dynamically learn BGP propagated routes from a remote location connected via TINA VPN tunnel, VPN next hop interfaces are used to create
an intermediary network. The BGP service is configured to use the remote IP address in the intermediary network as a BGP neighbor.
You must complete this configuration on both the local and the remote Barracuda NG Firewall using the respective values below:
Example Values for the Local Barracuda
NG Firewall
Example Values for the Remote
Barracuda NG Firewall
VPN Next Hop Interface Index
11
11
VPN Next Hop Interface IP Address
192.168.21.16/24
192.168.21.17/24
Virtual Server Additional IP
192.168.21.16
192.168.21.17
VPN Local Networks
192.168.21.16
192.168.21.17
VPN Remote Networks
192.168.21.17
192.168.21.16
VPN Interface Index
11
11
ASN
64577
64578
Router ID
192.168.21.16
192.168.21.17
Neighbor IPv4
192.168.21.17
192.168.21.16
Neighbor AS Number
64578
64577
Neighbor Update Source Interface
vpnr11
vpnr11
In this article:
Before You Begin
Step 1. Add a VPN Next Hop Interface
Step 2. Add the VPN Next Hop Interface IP Address to the Virtual Server Listening IP Addresses
Step 3. Configure the TINA Site-to-Site VPN Tunnel
Step 4. Configure the BGP Service
Step 4.1 Configure which Routes to Propagate into BGP
Step 4.2 Configure the BGP Router
Step 4.3. Add a BGP Neighbor
Step 4.4. (optional) Adjust Keep Alive and Hold Timer
Step 5. Verify the BGP Service Configuration
Step 6. Create Access Rules for VPN Traffic
Before You Begin
A free /24 subnet (e.g., 192.168.21.0/24) for the intermediary network is needed.
You must have or assign private Autonomous system numbers (ASNs) for the remote and local networks. The ASNs can be private if
you are not propagating these networks to other public networks.
Step 1. Add a VPN Next Hop Interface
Add a VPN next hop interface using a /24 subnet (e.g., 192.168.21.0/24).
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
335
1.
2.
3.
4.
5.
6.
VPN-Service > VPN Settings.
Click Lock.
In the Settings tab, click the Click here for Server Settings link. The Server Settings window opens.
In the Server Settings window, click the Advanced tab.
Next to the VPN Next Hop Interface Configuration table, click Add.
In the VPN Interface Properties window, configure the following settings and then click OK.
In the VPN Interface Index field, enter a number between 0 and 999. E.g., 11
In the IP Addresses field, enter the VPN interface IP address including the subnet. E.g., 192.168.21.16/24 for the local
or 192.168.21.17/24 for the remote NG Firewall.
Click OK. The interface is now listed in the VPN Next Hop Interface Configuration table.
7. In the Server Settings window, click OK.
8. Click Send Changes and Activate.
Step 2. Add the VPN Next Hop Interface IP Address to the Virtual Server Listening IP Addresses
Introduce the IP address of the VPN next hop interface as a virtual server -IP address.
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Server Properties.
Click Lock.
In the Additional IP table, add the IP address of the VPN interface.
Click Send Changes and Activate.
Step 3. Configure the TINA Site-to-Site VPN Tunnel
Configure a TINA VPN tunnel using the local next hop interface IP address and the VPN next hop interface.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > VPN-Service >
Site to Site.
2. Click Lock.
3. Right-click In the TINA Tunnels tab and select New TINA tunnel. The TINA tunnel window opens.
4. Enter a Name.
5. Configure the Transport, Encryption and Authentication settings as well as the Local and Remote public IP addresses. For more
information, see How to Create a TINA VPN Tunnel between Barracuda NG Firewalls.
6. Use a free IP address or network as Local and Remote Network. To avoid multiple tunnels using the same local an remote network it is
recommended to use the next hop interface IP addresses. E.g., 192.168.21.16 and 192.168.21.17
In the Local Networks tab, enter the local next hop interface IP address, as Network Address and click Add. E.g., 192.168.2
1.16 for the local and 192.168.21.17 for the remote NG Firewall.
In the Remote Networks tab, enter the remote next hop interface IP address, as Network Address and click Add. E.g., 192.1
68.21.17 for the local and 192.168.21.16 for the remote NG Firewall.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
336
If used for multiple NG Firewalls connecting to a VPN hub, it is recommended to use the IP address of the local and
remote VPN next hop interface to avoid using the same Remote and Local networks for multiple VPN tunnels.
7. In the Remote Networks tab, enter the VPN Interface Index number that you created in the VPN Interface Configuration in step 1.
E.g. 11
8. Click OK.
9. Click Send Changes and Activate.
Step 4. Configure the BGP Service
Enable and configure the BGP service. Configure the remote VPN interface IP address as a BGP neighbor to dynamically learn the routes of the
neighboring network.
Step 4.1 Configure which Routes to Propagate into BGP
You can either enter the networks you want to propagate manually or set the Advertise Route parameter to yes for routes you want propagated.
1. Go to CONFIGURATION > Configuration Tree > Box > Network.
2. Click Lock.
3. To propagate the management network, set Advertise Route to yes in the Management IP and Network section.
4. In the left menu click on Routing.
5. Double click on the direct attached and gateway routes you want to propagate. The Routes window opens.
6. Set Advertise Route to yes and click OK.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
337
6.
7. Click Send Changes and Activate.
Step 4.2 Configure the BGP Router
Enable BGP and use the VPN next hop interface IP address as the Router ID.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. Click Lock.
3. Set Run BGP Router to Yes.
4. (optional)To learn routes from the remote ASN set Operation Mode to advertise-learn.
5. Enter the Router ID. Typically the VPN next hop interface IP address is used. E.g., 192.168.21.16 for the local or 192.168.21.17 fo
r the remote NG Firewall.
6. In the left menu, click BGP Router Setup.
7. Enter the AS Number. E.g., 64577 for the local NG Firewall or 64578 for the remote NG Firewall.
8. Enter the Terminal Password. Use this password if you must directly connect to the dynamic routing daemon via command line for
debugging purposes.
9. To propagate the directly attached and gateway routes configured in Step 1 set Connected Routes to yes.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
338
10. (alternative) To manually enter the networks you want to propagate click + in the Networks table and enter the network. E.g., 172.16.
0.0/24
11. Click Send Changes and Activate.
Step 4.3. Add a BGP Neighbor
To dynamically learn the routing of the neighboring network, set up a BGP neighbor for the VPN next hop interface.
1.
2.
3.
4.
5.
In the left menu of the OSPF/RIP/BGP Settings page, click Neighbor Setup IPv4.
Click Lock.
Next to the Neighbors table, click the plus sign (+) to add a new neighbor.
Enter a Name for the neighbor and click OK. The Neighbors window opens.
Configure the following settings in the Usage and IP section:
Neighbor IPv4: Enter the remote address for the VPN next hop interface. E.g.,192.168.21.17 for the local NG Firewall or 192
.168.21.16 for the remote NG Firewall.
OSPF Routing Protocol Usage – Select no.
RIP Routing Protocol Usage – Select no.
BGP Routing Protocol Usage – Select yes.
6. In the BGP Parameters section, configure the following settings:
AS Number – Enter the ASN for the remote network. E.g., 64578 for the local NG Firewall or 64577 for the remote NG Firewall.
Update Source – Select Interface.
Update Source Interface – Enter the VPN next hop interface in the format: vpnr<interface number>. E.g., vpnr11
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
339
7. Click OK.
8. Click Send Changes and Activate.
Step 4.4. (optional) Adjust Keep Alive and Hold Timer
Speed up BGP updates by adjusting the keep alive and hold timer.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. Click Lock.
3. In the left menu, click on BGP Router Setup.
4. In the left menu, expand the Configuration Mode section and click on Switch to Advanced View.
5. Click the Edit button for the Advanced Settings. The Advanced Settings window opens.
6. Adjust the following parameters to influence how fast BGP reacts to connections which are down:
Keep Alive Timer – Default: 60 Recommended: 10
Hold Timer – Set to three times the Keep Alive Timer. Default: 180 Recommended: 30
7. Click OK.
8. Click Send Changes and Activate.
Step 5. Verify the BGP Service Configuration
On the CONTROL > Network page, verify that BGP routes are learned. Click the BGP tab and expand the relevant AS tree. It can take up to
three minutes for new routes to be learned.The Origin column lists incomplete for direct attached or gateway routes or IGP routes learned via
BGP including manually entered networks.
Local Firewall CONTROL > Network > BGP page:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
340
Remote Firewall CONTROL > Network > BGP page:
Step 6. Create Access Rules for VPN Traffic
Create access rules on both local and remote NG Firewalls to allow traffic from the learned networks through the VPN tunnel.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
341
How to Configure Inbound Load Balancing and Link Failover with BGP
BGP is used to announce routes to the neighboring networks. If you are using two or more ISPs to connect to the Internet, you can use BGP to
assign a preferred link to each propagated subnet. To make your preferred route more attractive to the remote router, you can make the
secondary link appear longer by artificially lengthening its AS-Path. Because BGP neighbors are continuously monitored by the remote router,
inbound link failover is achieved because the secondary link is automatically chosen if the preferred link becomes unavailable.
In this article:
Before You Begin
Step 1. Enable the BGP Service
Step 2. Configure the BGP Service
Step 3. Create BGP Neighbors
Step 4. Create IPv4 Prefix List Filters
Step 5. Create Route Map IPv4 Filters
Monitoring BGP Routes
Before You Begin
Before you configure the BGP service, get an AS number for your network. AS numbers from 64512 to 65534 and 4,200,000,000 to
4,294,967,295 are reserved for private networks.
Step 1. Enable the BGP Service
Create and configure the BGP service.
1. Create an OSPF/RIP/BGP Service.
2. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
3. Click Lock.
4. From the Run BGP Router list, select yes.
5. From the Operation Mode list, select advertise-learn.
6. In the Router ID field, enter the IP address of the router.
7. Click Send Changes and Activate.
Step 2. Configure the BGP Service
Configure the BGP service and propagate the local subnets (e.g., 10.0.0.0/24 and 172.16.16.0/24).
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. In the left pane, click BGP Router Setup.
3. Enter the AS Number for your network.
4. In the Terminal Password fields, specify a password for connecting to the BGP router service via telnet from the shell of the Barracuda
NG Firewall.
5. In the Networks table, add the local subnets (e.g., 10.0.0.0/24 and 172.16.16.0/24). For each subnet:
a. Click the plus sign (+).
b. Enter a Name for the network and click OK.
c. In the Network Prefix field, enter the subnet. This is the subnet which is propagated via BGP (e.g., 10.0.0.0/24 or 172.16.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
342
c.
16.0/24).
d. Click OK.
6. Click Send Changes and Activate.
Step 3. Create BGP Neighbors
Specify the IP addresses of the BGP neighbors that the BGP routing information should be propagated to. Normally, the ISP's router is the BGP
neighbor.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. In the left pane, click Neighbor Setup IPv4.
3. Click Lock.
4. In the Neighbors table, create a BGP neighbor for each ISP. For each BGP neighbor:
a. Click the plus sign (+).
b. Enter a Name for the ISP (e.g., ISP1bgpNeighbor).
c. In the Neighbors window, specify the following settings:
Neighbor IPv4 – Enter the IP address of the BGP neighbor (e.g., 192.168.0.1 or 192.168.1.1).
OSPF Routing Protocol Usage – Select no.
RIP Routing Protocol Usage – Select no.
BGP Routing Protocol Usage – Select yes.
AS Number – Enter the AS number that is assigned to the BGP neighbors (e.g., 64513 or 64515).
Update Source – Select Address.
Update Source IPv4 Address – Enter the IP address that is assigned to the interface of the BGP neighbor (e.g., 192.
168.0.254 or 192.168.1.254).
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
343
d. Click OK.
5. Click Send Changes and Activate.
Step 4. Create IPv4 Prefix List Filters
Create prefix list filters for each local subnet.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. In the left pane, click Filter Setup IPv4.
3. Click Lock.
4. In the IPv4 Prefix List Filters table, create a filter for the local subnets (e.g., 10.0.0.0/24 and 172.16.16.0/24). For each local subnet:
a. Click the plus sign (+).
b. Enter a Name.
c. In the Sequence Number section, click the plus sign (+).
d. In the Sequence Number window, specify the following settings:
Sequence Number – Enter the sequence number (e.g., 1). For additional networks to the prefix list, iterate the
sequence number.
Network Prefix – Enter the subnet (e.g., 10.0.0.0/24 or 172.16.16.0/24).
Type – Select permit.
Extent Type – Select none.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
344
e. Click OK to close the Sequence Number window with your settings.
f. Click OK to close the IPv4 Prefix Lists window with your settings.
5. Click Send Changes and Activate.
Step 5. Create Route Map IPv4 Filters
For each BGP neighbor, create a route map to propagate your preferences on how you want the remote router to route traffic to your network.
The route maps add the AS number a second time to the BGP entries, to influence the remote router's decision on which network route is more
direct.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. In the left pane, click Filter Setup IPv4.
3. Click Lock.
4. In the Route Maps IPv4 Filters table, add a filter for each BGP neighbor that you created in Step 3. For each neighbor:
a. Click the plus sign (+).
b. Enter a Name and click OK.
c. In the Route Map Entry section, click the plus sign (+).
d. In the Route Map Entry window, specify the following settings:
Sequence Number – Enter a unique sequence number (e.g., 1). This sequence number must be unique across all
route maps. For additional entries iterate the sequence numbers.
Type – Select permit.
Match Condition – Select IP_Prefix_List.
IP Prefix List – Select the IP prefix list that contains the subnet using this connection as the preferred incoming route (e
.g., 10.0.0.0/24 via 64515 or 172.16.16.0/24 via 64513).
Set Action – Select None.
e. Click OK.
f. In the Route Map Entry section, click +.
g. In the Route Map Entry window, specify the following settings:
Sequence Number – Enter a unique sequence number (e.g., 1). This sequence number must be unique across all
route maps. Iterate the sequence number for further
Type – Select permit.
Match Condition – Select IP_Prefix_List.
IP Prefix List – Select the IP prefix list that contains the subnet using this connection as a backup (e.g., 10.0.0.0/24
via 64513 or 172.16.16.0/24 via 64515).
Set Action – Select AS_Path.
Set addition to AS-Path – Enter your AS number (e.g., 64514).
h. Click OK to close the Route Map Entry window with your settings.
i. Click OK to close the Route Maps IPv4 window with your settings.
5. Click Send Changes and Activate.
Monitoring BGP Routes
To monitor the routes that are learned and propagated by BGP go to the CONTROL > Network page and click the BGP tab.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Copyright © 2015, Barracuda Networks Inc.
345
Barracuda NG Firewall 6.1 Administrator's Guide - Page
346
How to Configure OSPF Routers and Areas
After enabling OSPF, set up your OSPF router and areas. This article provides instructions on configuring global settings and network definitions
that are used by OSPF to build relationships with neighbors and advertise routes.
In this article:
Configure OSPF Routers
Configure OSPF Areas
Configure OSPF Routers
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. Click Lock.
3. In the left menu, click OSPF Router Setup.
4. Edit the following settings:
Setting
Description
ABR Type
Specifies the area border router (ABR) behavior of the OSPF
routing daemon. You can select:
Not an ABR
Cisco Type
Standard RFC 2328 Type
IBM Type
Terminal Password
The password to connect via telnet. The OSPF router is
reachable on TCP port 2604 (loopback only).
Privileged Terminal Password
The password to enable configuration via Telnet.
RFC1583 Compatibility
Specifies if the router is compatible with RFC 1583 standards.
Auto-Cost Ref Bwidth [MBit/s]
The OSPF metric. This metric is calculated as reference
bandwidth divided by bandwidth. The default setting is 10000.
This value is overwritten by explicit cost statements.
This setting should be used equally with all OSPF
routers in an autonomous system. Otherwise, the
metric calculation will be incorrect.
Network Prefix
Defines the interfaces on which OSPF runs and the networks
that are propagated as OSPF intra-area or inter-area routes.
Enter a network address including the network mask.
Network Area
Enter an existing area ID.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Advanced Settings
347
To specify the following advanced settings, click Set or Edit:
Support Opaque LSA – To enable Opaque LSA, select yes
.
SPF Delay Timer – The length of time in seconds to wait
before running an SPF after receiving a database change.
SPF Hold Timer – The length of time in seconds to wait
between consecutive SPF runs.
Refresh Timer – You can enter values from 10 to 1800.
Default Metric – Defines the default metric for the OSPF
protocol. Use if other protocols are also used for
metric-translation.
Admin Distance – To determine which routing protocol to
use if two protocols provide routing information for the same
destination, the administrative distance is used as the first
criterion. Higher distance values imply lower trust ratings.
The admin distance setting is used to increase the metric of
routes that are introduced to the system. For instance, an
externally learned RIP route with metric 2 and administrative
distance of 100 is introduced with metric 102. As a result,
the OSPF route is favored over the RIP route.
Remember that administrative distance is not
advertised and thus only has local impact.
Default Route Distribution
The default route distribution settings. To edit the following
settings, click Edit:
OSPF Metric – Set the metric in the router’s link state
advertisement. The SPF algorithm uses this value to
calculate the cost for each route. Routes with lower costs
are preferred over routes with higher costs.
OSPF External Metric – Select an external metric type:
Type1 – Type 1 external routes have a cost that is the
sum of the cost of this external route plus the cost to
reach the ASBR.
Type2 – The cost of Type 2 external routes is defined
similarly to the cost of Type 1 routes but without the
cost to reach the ASBR.
Route Maps - Filter definitions. Reference the Route Map
Filters settings on the Filter Setup page. For more
information, see How to Configure Filter Setup for OSPF
and RIP.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Route Redistribution
348
In this table, add route redistribution settings. For each entry, you
can edit the following settings:
Route Types – The route type. You can select connected,
RIP, or BGP.
OSPF Metric – Set the metric in the router’s link state
advertisement. The SPF algorithm uses this value to
calculate the cost for each route. Routes with lower costs
are preferred over routes with higher costs.
OSPF External Metric – If required, select an external
metric type:
Type1 – Type 1 external routes have a cost that is the
sum of the cost of this external route plus the cost to
reach the ASBR.
Type2 – The cost of Type 2 external routes is defined
similarly to the cost of Type 1 routes but without the
cost to reach the ASBR.
Otherwise, select NOT-SET if an external metric setting is
not required.
Route Maps – Filter definitions. Reference the Route Map
Filters settings on the Filter Setup page. For more
information, see How to Configure Filter Setup for OSPF
and RIP.
5. Click Send Changes and Activate.
Configure OSPF Areas
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. Click Lock.
3. In the left menu, select OSPF Area Setup.
4. In the Areas table, add your OSPF areas. For each entry, you can edit the following settings:
Setting
Description
Enable Configuration
Enables or disables the area:
To enable the area, select yes.
To disable the area, select no.
Area ID Format
Specifies which format is used to enter the area ID. You can
select:
Integer (default) – Enter your area ID as an integer in the A
rea ID [Int] field.
Quad-IP – Enter your area ID as a Quad IP address in the A
rea ID [IP] field.
Area ID [IP]
The area ID in Quad IP address format. For example, 0.0.0.1.
Area ID [Int]
The area ID as a number. For example, 0. The ID for the first
area must be 0.
Authentication Type
The authentication method for the area (default: Digest-MD5).
Simple Authentication Key
The OSPF area authentication credentials for simple
authentication.
Digest Authentication Key
The OSPF area authentication credentials for digest
authentication.
Message Digest Key ID
The key for digest authentication.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Special Type
349
Specifies if the area is a Stub or Not-So-Stubby Area. You can
select:
NONE – Default setting. The area is not a special type.
stub – Stub areas do not import or originate external LSAs.
nssa – The OSPF Not-So-Stubby Area where an ASBR can
be located in a stub area (see RFC 3101).
NSSA-ABR Translate Election
This setting option is defined by RFC 3101.
Disable Summary
Disables summary LSAs.
Virtual Link ID (ABR)
The virtual link ID for this area. This setting is only available in A
dvanced View mode.
Virtual Link Params
To edit the settings for the virtual link, click Edit. For more
information on these settings, see the "Template Configuration"
section of How to Configure Network Interfaces for OSPF and
RIP. This setting is only available in Advanced View mode.
Area Default Cost
The cost for the default route injected in an attached stub area.
Summary Range IP/Mask
In this table, configure special actions for a summary range. For
each entry, you can edit the following settings:
Summary Range IP/Mask – The IP address/mask of the
summary range.
Range Action – The special action for the range. You can
select:
advertise (default)
non-advertise
substitute
Range Cost – Cost for a range.
Advertised Range – Advertise configured range to.
Area Export Filters
In this table, create an export ACL.
Area Import Filters
In this table, create an import ACL.
Area in Filters
In this table, create an import prefix list.
Area out Filters
In this table, create an export prefix list.
5. Click OK.
6. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
350
How to Configure Network Interfaces for OSPF and RIP
This article provides information on how to configure the parameters for the Network Interfaces Configuration section within the OSPF/RIP
Settings of the Barracuda NG Firewall.
In the Network Interfaces Configuration section, interface specific parameters of the routing protocols are configured (This applies to OSPF an
d RIP):
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. Click Lock.
3. In the left menu, click Network Interfaces. In this section, the parameters can be specified as follows:
Section Network Interfaces Configuration
Load Interface Info – If set to yes, the list of available interfaces is loaded after execution of Send Changes.
Interfaces – See Interface list (Available Interfaces).
Shared Interfaces Configuration
Shared interfaces can be edited by double clicking or added by using the + icon.
Interface Description – Informational text field.
Apply to Interface – Specifies the network interface to which the following settings apply.
Activate Config for – Specifies the routing protocols for which the settings should be activated on this interface. Possible settings are
OSPF, RIP or OSPF+RIP.
Passive Interface – On a passive interface the routing protocol does not send Hello packets. The network configured for this interface is
still advertised. An interface is active by default (setting: No).
Parameter Template – References templates for this interface.
OSPF Specific Parameters
Network Type – Type of network. Ethernet is normally broadcast. Sometimes there may be a need to use point-to-point for
Ethernet-Links, for example when there is only a /30 subnet. Type non-broadcast is needed to propagate OSPF over a VPN tunnel.
Bandwidth [kBit/s] – Bandwidth of the interface. Configuration is highly recommended since this information can not be determined
automatically. This setting is used by OSPF to calculate the metric.
Interface Addresses – By specifying an Interface Address the configuration only applies for a single OSPF network. This parameter can
be useful in multinet environments. Otherwise the parameters applies to all OSPF networks on the given interface.
Parameter Template for Address – References templates for this interface.
RIP Specific Parameters
Enable Split Horizon – Split Horizon is a mechanism used by RIP to reduce the possibility of routing loops. By enabling this parameter
(default: yes), routes learned from a specific interface, are not re-advertised on this interface.
Enable Poisoned Reverse – This technology is an extension to Split Horizon. By enabling this setting (default: no), routes learned from
a specific interface are re-advertised on this interface but the metric is set to infinity (16).
Section Available Interfaces
This section displays a read-only list of the available network interfaces. Available interfaces can be edited by double clicking or added by using
+.
Section Parameter Template Configuration
Shared interfaces can be edited by double clicking or added by using the + icon.
OSPF Parameters
Authentication Type – Authentication for neighbors on specified interface. Either no authentication (default: null), simple authentication
as specified in RFC1583 or the cryptographic authentication digest-MD5 (RFC2328) can be used.
Simple Authentication Key – Password for simple authentication. This value only has to be specified with Authentication type set to s
imple.
Digest Authentication Key – Password for digest authentication. This value only has to be specified with Authentication type set to di
gest-MD5.
Message Digest Key ID – Key for digest authentication. This value only has to be specified with Authentication type set to digest-MD5
.
OSPF Cost – Set to a higher value, the router will be more eligible to become a Designated Router or a Backup Designated Router. Set
to 0, the router is no longer eligible to become a Designated Router. Default: 1.
OSPF Dead Interval – Seconds for timer value used for Wait Timer and Inactivity Timer. This value must be the same for all routers
attached to a common network.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
351
OSPF Hello Interval – Time to wait between OSPF "hello" messages to neighbors (sec). This value must be the same for all routers
attached to a common network.
OSPF Retransmit Interval – Minimum time waited between retransmissions (sec).
OSPF Transmit Delay – Sets number of seconds for InfTransDelay value. The InfTransDelay parameter defines the estimated time
required to send a link-state update packet on the interface.
RIP Parameters
Authentication Type – Authentication for neighbors on specified interface. Either no authentication (default: null), text authentication or
the cryptographic authentication digest-MD5 (RFC2082) can be used.
RIP Key Chain – The pull-down menu displays the configured key chains (see: ) and allows selection of a key chain which is used for
authentication.
RIP Text Secret – Specifies the text secret used for authentication purposes. Note that the value specified here always takes
precedence over the RIP keychains settings.
Send Protocol – Configures protocol types for transmission. Possible values are Version_1, Version_2 or Version_1+2.
Receive Protocol – Configures protocol types for reception. Possible values are Version_1, Version_2 or Version_1+2.
Neighbor Setup
For connectivity issues it is sometimes recommended to set the neighbors statically.
1. In the left menu, click Neighbor Setup IPv4 or Neighbor Setup IPv6 if you are using IPv6 addresses.
Note: IPv6 has to be enabled in Quagga too.
2. To add an entry, click +.
3. Enter a descriptive name and click OK to open the configuration window.
4. In this section, the parameters can be specified as follows:
Neighbor IPv4 – IP address of the neighbor to exchange routing information with.
Active – Set to no if you want to disable this neighbor configuration.
Routing Protocols – Specifies which routing protocols should be exchanged with this neighbor. Possible values are OSPF, RIP
or BGP.
Neighbor Priority – This parameter influences the Designated Router election. Set to a higher value, the router will be more
eligible to become a Designated Router. Set to 0 , the router is no longer eligible to become a Designated Router or a Backup
Designated Router. Default: 1.
Dead Neighbor Poll Interval – Seconds between two neighbor probings.
5. Click OK.
6. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
352
How to Configure Filter Setup for OSPF and RIP
This article explains how to configure filter setup for OSPF and RIP. A filter is required for example when redistributing routes from one protocol to
another. Route maps can be used to modify routing information. In route maps, the filter is applied to match the routes. Some set actions can be
applied to the matching routes.
Example: The RIP learned route 10.0.0.0 /24 with metric 4 hops should have metric 6 instead. The match condition in the route map must be a
filter matching 10.0.0.0/24 and the set condition must be metric 6.
When applying route filters in the RIP or OSPF section, only ACLs or Prefix-lists but no route maps are needed.
This dialog is restricted to basic ACLs. Extended ACLs must be be configured in tab Text Based Configuration.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. Click Lock.
3. In the left menu, click Filter Setup IPv4 (when using IPv6 addresses, select Filter Setup IPv6 and configure the settings for IPv6).
Access List IPv4 Filters
This section allows the definition of filters which can be referenced within the OSPF Area Setup (see: How to Configure OSPF Routers
and Areas) and within the RIP Route Update Filtering section (see: How to Configure RIP Router Setup).
Setting
Description
Name
This is the ACL name / ID.
Description
A short description of the ACL.
Network Prefix
Enter the network prefix.
Type
Specifies if the traffic is allowed or
blocked:
permit (default) / deny
Route Map IPv4 Filters
Route maps are used to control and modify routing information that is exchanged between routing domains.
Setting
Description
Name
This is the Route Map Name.
Route Map IPv4 Configuration
A short description of the route map.
OSPF Specific Conditions
Sequence Number
Unique identifier for a route map entry.
Type
Action for route map: permit (default) /
deny
Match Condition
The route map entry matches when the
route matches the configured criteria or
filter:
ACL (default)
PREFIXLIST
Gateway-IP
Interface-Name
ACL Name – Name of ACL defined in the Access-Lists section above.
IP Prefix List – Name of IP prefix list defined in OSPF/RIP Settings - Filter Setup
- IPv4 Prefix List Filters.
Gateway IP – IP address of the next hop in the route.
Out Interface Name – See interfaces to gain available interface names.
Set Action – Defines action to set: Metric / Metric-Type
Set OSPF Metric – Set metric for route map.
Set OSPF External Metric – Set external metric-type for route map.
RIP Specific Conditions
Sequence Number
Unique identifier for a route map entry.
Type
Action for route map: permit (default) /
deny
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Match Condition
The route map entry matches when the
route matches the configured criteria or
filter:
353
ACL (default)
PREFIXLIST
Gateway-IP
Interface-Name
Metric
ACL Name – Name of ACL defined in the Access-Lists section above.
IP Prefix List – Name of IP prefix list defined in OSPF/RIP Settings - Filter Setup
- IP Prefix List Filters.
Gateway IP – IP of the Next Hop in the route.
Out Interface Name – See interfaces to gain available interface names.
Match Metric – Defines when a route map is used.
Set Action – Defines action to set: Next Hop / Metric
Set RIP Metric – Set metric for route map.
Set RIP Next-Hop IP – Set next-hop IP address.
IPv4 Prefix List Filters
Prefix lists are easier to understand for route-filters than ACLs. Example for IP prefix list filter usage:
Network Prefix
Type
Extent Type
Deny default route 0.0.0.0/32
0.0.0.0/32
deny
none
permit prefix 10.0.0.0/24
10.0.0.0/24
permit
none
Setting
Description
Name
This is the name of the IP prefix list.
IPv4 Prefix List Configuration
Description
A short description of the IP prefix list.
Sequence Number
Unique identifier for a prefixlist item.
Network Prefix
Network/Netmask
Type
Action for prefixterm: permit / deny
Extent Type
Matching condition:
Prefix Length
4. Click OK to confirm your settings.
5. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
none (default)
greater-than
less-than
Minimum or maximum prefix length to be
matched.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
354
How to Configure OSPF Routing over TINA VPN
To dynamically learn OSPF-propagated routes from a remote location connected via TINA VPN tunnel, VPN Next Hop interfaces are used to
create an intermediary network.
Limitations
Currently only available for NG Firewalls managed by an NG Control Center because the VPN Tunnel configuration requires the GTI
Editor.
It is not possible to use both OSPF and BGP over the same VPN tunnel.
You must complete this configuration on both the local and the remote Barracuda NG Firewall by using the respective values below:
Example Values for the Local Barracuda
NG Firewall
Example Values for the Remote
Barracuda NG Firewall
VPNR Next Hop Interface Index
1
1
VPN Next Hop Interface IP Address
192.168.20.1/24
192.168.20.2/24
Virtual Server Additional IP
192.168.20.1
192.168.20.2
VPN Local Networks
empty
empty
VPN Remote Networks
empty
empty
Router ID
192.168.20.1
192.168.20.2
In this article:
Before You Begin
Step 1. Add a VPN Next Hop Interface
Step 2. Add the VPN Next Hop Interface IP Address to the Virtual Server Listening IP Addresses
Step 3. Configure the TINA Site-to-Site VPN Tunnel in the GTI Editor
Step 4. Configure the OSPF Service
Step 4.1 Configure which Routes to Propagate into OSPF
Step 4.2 Configure the OSPF Router
Step 4.3. Create an OSPF Area Setup
Step 6. Verify the OSPF Service Configuration
Step 6. Create Access Rules for VPN Traffic
Before You Begin
A free /24 subnet (e.g., 192.168.20.0/24) for the intermediary network is required.
Step 1. Add a VPN Next Hop Interface
Add a VPN Next Hop interface using a /24 subnet (e.g., 192.168.20.0/24).
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
VPN-Service > VPN Settings .
2. Click Lock.
3. In the Settings tab, click the Click here for Server Settings link. The Server Settings window opens.
4. In the Server Settings window, click the Advanced tab.
5. Next to the VPN Next Hop Interface Configuration table, click Add.
6. In the VPN Interface Properties window, configure the following settings and then click OK.
In the VPN Interface Index field, enter a number between 0 and 999. E.g., 11
In the IP Addresses field, enter the VPN interface IP address including the subnet. E.g., 192.168.20.1/24 for the local
NG Firewall, or 192.168.20.2/24 for the remote NG Firewall.
In the Multicast Addresses field, enter the OSPF Multicast Addresses: 224.0.0.5 224.0.0.6
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
355
Click OK. The interface is now listed in the VPN Next Hop Interface Configuration table.
7. In the Server Settings window, click OK.
8. Click Send Changes and Activate.
Step 2. Add the VPN Next Hop Interface IP Address to the Virtual Server Listening IP Addresses
Introduce the IP address of the VPN Next Hop interface as a virtual server -IP address.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Server Properties .
2. Click Lock .
3. In the Additional IP table, add the IP address of the VPN Next Hop interface.
4. Click Send Changes and Activate .
Step 3. Configure the TINA Site-to-Site VPN Tunnel in the GTI Editor
Edit the VPN tunnel to remove the local and remote networks and add the VPN Next Hop interface ID.
1. Go to the global/range/cluster GTI Editor.
2. Click Lock.
3. Click on the VPN tunnel and click on the first Transport to edit the VPN tunnel configuration. For more information, see How to Create a
VPN Tunnel with the VPN GTI Editor.
4. Remove all Local Networks from the remote and local VPN services.
5.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
356
5. Enter the VPN Next Hop interface ID for the remote and local VPN services. E.g., 11
6. Click OK.
7. Click Send Changes and Activate.
Step 4. Configure the OSPF Service
The OSPF setup must be completed on both the local and remote NG Firewalls. The configuration steps and values are the same except for the
Router ID and propagated networks.
Step 4.1 Configure which Routes to Propagate into OSPF
Select the routes you want to propagate.
1. Go to CONFIGURATION > Configuration Tree > Box > Network.
2. Click Lock.
3. To propagate the management network, set Advertise Route to yes in the Management IP and Network section.
4. In the left menu, click on Routing.
5. Double-click on the direct attached and gateway routes you want to propagate. The Routes window opens.
6. Set Advertise Route to yes and click OK.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
357
7. Click Send Changes and Activate.
Step 4.2 Configure the OSPF Router
Enable OSPF and use the VPN Next Hop interface IP address as the Router ID.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings .
2. Click Lock.
3. Set Run OSPF Router to Yes.
4. Set Operation Mode to advertise-learn.
5. Enter the Router ID. Typically the VPN Next Hop interface IP address is used. E.g., 192.168.20.1 for the local NG Firewall, or 192.1
68.20.2 for the remote NG Firewall.
6. In the left menu, click OSPF Router Setup.
7. Select Cisco Type from the ABR Type dropdown.
8. Enter the Terminal Password. Use this password if you must directly connect to the dynamic routing daemon via command line for
debugging purposes.
9. Click + to add an entry to the Network Prefix table. The Network Prefix windows opens.
10. Enter the VPN Next Hop interface network as the Network Prefix. E..g, 192.168.20.0/24
11. Enter the Network Area. E.g., 0 because we are using OSPF area 0 for our example. This value must match with the OSPF Area
configured below.
12. Click OK.
13. Click Send Changes and Activate.
Step 4.3. Create an OSPF Area Setup
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings .
2.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
2.
3.
4.
5.
6.
7.
8.
358
Click Lock.
In the left menu click OSPF Area Setup.
In the OSPF Area Configuration, click + to add Areas.
Enter the OSPF area Name.
Click OK. The Areas window opens.
From the Area ID Format dropdown, select Integer.
Enter the Area ID[Int]. Use the same Area ID you used for the Network Area in Step 4.2. E.g., 0
9. (optional) Select the Authentication Type and configure the necessary parameters.
10. Click OK.
11. Click Send Changes and Activate.
Step 6. Verify the OSPF Service Configuration
On the CONTROL > Network page, verify that OSPF is active on the VPN Next Hop interface and that the remote NG Firewall is listed as an
OSPF neighbor. The routes learned via OSPF are listed with a type of gateway-ospf in the routing table. The Interface is the VPN Next Hop
interface and the Gateway the IP address of the remote VPN Next Hop interface IP address.
Local Firewall CONTROL > Network > OSPF page:
Remote Firewall CONTROL > Network > OSPF page:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
359
Step 6. Create Access Rules for VPN Traffic
Create access rules on both local and remote NG Firewalls to allow traffic from the learned networks through the VPN tunnel. For more
information, see How to Create Access Rules for Site-to-Site VPN Access.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
360
How to Enable Debugging for OSPF
Missing the language English in this article! Please add the language, otherwise this article can not be displayed properly.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
361
How to Configure RIP Router Setup
After enabling and configuring RIP, set up your RIP router. This article provides instructions on configuring global settings and network definitions
that are used by RIP to advertise routes.
This tab only has to be configured when RIP has been activated in the Operational Setup tab through setting the Run RIP Router para
meter to yes. Specification of global RIP settings such as version, timers and authentication, and definition of interfaces on which the
RIP process is to run, is done in this place.
Configure RIP Router Setup
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >
OSPF-RIP-BGP-Service > OSPF/RIP/BGP Settings.
2. Click Lock.
3. In the left menu, select RIP Router Setup. In this section, the parameters can be specified as follows:
Parameter
Description
To enable RIP authentication, so-called
key chains must be introduced. A key
chain can consist of several keys, where
each key is identified by a number and a
key string (password).
RIP Keychains
Key/Key String
RIP Version
The Barracuda NG Firewall routing
service allows usage of both standardized
RIP versions RIPv1 or RIPv2. The
following values are thus available for
selection:
RIP Terminal Password
Password to connect via telnet and query status information of the RIP router. The RIP
router is reachable on TCP port 2604 (loopback only). This is mainly useful for
debugging purposes. Note that remote connection to the RIP terminal is not possible.
Privileged RIP Terminal Password
Password to connect via telnet and change configuration of the RIP router (not
recommended since changes made via the terminal are not persistent). Note that
remote connection to the RIP terminal is not possible.
Networks
Route Update Filtering is used to provide Access Control Mechanisms and mechanisms
to fine-tune RIP metrics.
Version_1 (classful)
Version_2 (classless)
Metric Offsets
Configuring Metric Offsets adds an offset
to incoming and outgoing metrics to
routes learned via RIP.
Update Direction
Enforced Metric
ACLs Devices
Route In/Out Filters
Route Filters are used to control the
advertising and learning of routes in
routing updates. Filters with the parameter
Update Direction set to "in" apply to routes
processed in incoming routing updates.
The filter is matched against the content
of the update, not against the source or
destination of the routing update packets.
Update Direction
Object Type
ACLs
IP Prefix List
Devices
4. In the RIP Preferences section, accessible from the Configuration menu, the settings can be specified as follows:
Parameter
Log Level
Description
Specifies the verbosity of the RIP routing
service. Available values are:
Copyright © 2015, Barracuda Networks Inc.
critical
debugging
emergencies
errors
informational (default)
notifications
warnings
alerts
Barracuda NG Firewall 6.1 Administrator's Guide - Page
362
Use Special Routing Table
By setting this parameter to yes and selecting a table name below, routes learned by
the RIP service are introduced into an own routing table. Note that the routing table is
not automatically introduced, but has to be configured manually by introducing Policy
Routes.
Table Names
A list of policy routing names can be specified here. Routes learned by the routing
daemon are introduced into each of the enlisted routing tables.
Multipath Handling
ignore - multipath routes will be discarded.
RIP summarizes routes to multipath routes automatically if more than one
next hop to a prefix exists. Use setting ignore with caution.
assign-internal-preferences - multipath routes will be translated to several routes
with different metrics (preferences).
accept-on-same-device - multipath routes will be introduced as multipath if all
nexthops are reachable on the same interface.
accept-all (default) - multipath routes will be introduced.
5. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
363
Example for OSPF and RIP Configuration
Missing the language English in this article! Please add the language, otherwise this article can not be displayed properly.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
364
Firewall
The Barracuda NG Firewall comes with two firewall services, one for handling local inbound/outbound traffic and the other for handling all
forwarding traffic. The Host Firewall service runs on the box layer and cannot be removed. The Forwarding Firewall service can be added to one
virtual server on every NG Firewall.
The Host and Forwarding Firewall can handle only IP protocols. Non-IP traffic (such as Spanning Tree Protocol or IPX/SPX) is not
forwarded.
Forwarding Firewall
The Forwarding Firewall handles all traffic for which the destination does not match with a listening socket on the Barracuda NG Firewall. You can
create one (forwarding) Firewall service on each NG Firewall. This service listens to all IP addresses configured for the virtual server and is
responsible for all connections that must be transferred over the Barracuda NG Firewall to a remote host. The firewall rules for the Forwarding
Firewall are maintained in the forwarding ruleset. The Forwarding Firewall is tightly integrated with Application Control 2.0, Virus Scanners,
Advanced Threat Detection (ATD), Intrusion Prevention System (IPS), and the URL Filter. Examples of connections that use the Forwarding
Firewall are:
A web browser that connects to an external web server without using the HTTP Proxy service on the Barracuda NG Firewall
The administrator pings an external Linux server
Incoming and outgoing traffic coming out of a VPN tunnel
For more information, see Forwarding Firewall.
Host Firewall
There is one Host Firewall service running on the box layer of every Barracuda NG Firewall and Barracuda NG Control Center. Host Firewall
rules are applied to connections where the target IP address and port number match a listening socket of a service on the Barracuda NG Firewall.
The boxfw service manages this ruleset and additional traffic handlers such as SIP, RPC, Timer, Audit, Trace, and Sync. Restarting the boxfw s
ervice reinitializes the service handlers and reloads the ruleset. The boxfw service is automatically activated on the Barracuda NG Firewall. You
can have only one Host Firewall on a system. Examples of connections that are handled by the Host Firewall are:
An incoming connection from a web browser to the HTTP Proxy service running on the Barracuda NG Firewall
An outgoing connection from the HTTP Proxy service running on the Barracuda NG Firewall to a web server on the Internet
Outgoing and incoming VPN traffic from the Barracuda NG Firewall VPN service to the tunnel endpoint
Outgoing NTP or DNS queries
For more information, see Host Firewall.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
365
Forwarding Firewall
The forwarding firewall service provides a policy framework to direct and manage traffic passing through the Barracuda NG Firewall:
Firewall Policies:
Firewall Access Rule Set – The access rule set contains a list of access rules. Incoming traffic is compared against the
matching criteria set within each access rule. When a match is found, the action set in the access rule is executed. You can
enable advanced features (Application Control, QoS, IPS) on a per-rule basis.
Application Rule Set – If application control is enabled in an access rule that is executed, the application rule set is called.
Applications and (if applicable) URL categories are detected and compared to the list of application rules. Upon a match, the
application traffic is either passed or blocked depending on the action set in the application rule.
IPS Policies – Detect and block network attacks, by comparing incoming traffic with predefined, constantly updated patterns.
Traffic Shaping (QoS) Policies – Shape traffic to improve use of the available bandwidth, by prioritizing connections that are important
for your business.
User Policies – Allow or block access to network resources based on user information.
Schedule (Time) Policies – Allow or block access to network resources based on time or date.
Traditional packet forwarding capabilities are handled by the access rule set while next generation application-aware policies are applied in the
dedicated application rule set.
Access Rules
The basic job of the firewall is to manage traffic between various trusted and untrusted network segments. Incoming network traffic is compared
to the first access rule in the rule set. If the traffic does not match the criteria set in the rule, the next rule is evaluated, continuing from top to
bottom until a matching rule is found. The first matching access rule is executed. If none of the rules match, the default BLOCKALL rule blocks
the traffic.
For more information, see Firewall Access Rules.
Next Generation Firewall Capabilities
Application Control 2.0 (with or without SSL Interception), a tightly integrated Intrusion Prevention System (IPS), URL filtering for content security,
and Virus Scanning in the firewall offer granular control over your network traffic.
Application Detection – For each access rule, you can enable Application Control. Application Control detects applications and
subapplications. Detected application traffic can then be manipulated by the application rule set. By using custom application-based link
selection connection objects, you can route traffic based on application type.
For more information, see Application Control 2.0
SSL Interception – Most application traffic is SSL encrypted. SSL Interception transparently decrypts the SSL connections and
re-encrypts the connection before it is forwarded it to its destination. SSL Interception enables Application Control to better detect
sub-applications, making it possible to block single features such as Facebook games, while still allowing access to the rest of the site.
URL Filter – If you want to block inappropriate web-based content from your network, use the Barracuda Webfilter to filter a large
number of websites based on categories. With the URL filter, you can create either a whitelist (blocking everything except for selected
sites) or a blacklist (blocking known unwanted content). If a site is not in the URL database, you can define a custom URL policy for it.
The URL Filter can only filter based on the URL of the website. It does not offer the more granular control over sub-applications that
Application Control does.
For more information, see URL Filter.
Virus Scanning – To protect against malware and viruses, enable antivirus (AV) scanning in the firewall. If a user downloads a file
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
366
containing malware, the Barracuda NG Firewall detects and discards the infected file and then redirects the user to a warning page. You
can use the Avira and/or the ClamAV antivirus engines and specify the MIME types of all files that are to be scanned.
For more information, see How to Configure Virus Scanning in the Firewall.
ATD – Barracuda Advanced Threat Detection secures your network against zero day exploits and other malware not recognized by the
IPS or Virus Scanner. You can choose between two policies which either scan the files after the user has downloaded them and if
perceived to be a threat quarantine the user, or scan the file first and then let the user download the file after it is known to be safe.
For more information, see Advanced Threat Detection (ATD).
Traffic Shaping (QoS)
You can adjust the QoS band traffic to prioritize business-critical traffic over less important traffic:
Traffic shaping protects the available overall bandwidth of a connection. Network traffic is classified and throttled or prioritized within
each access rule.
Traffic shaping for application traffic can be configured in the application policy rules. For more information, see Application Control 2.0.
For more information, see Traffic Shaping.
Intrusion Prevention System (IPS)
The tightly integrated Intrusion Prevention System (IPS) monitors the network for malicious activities and blocks detected network attacks. The
IPS engine analyzes network traffic and continuously compares the bitstream with its internal signature database for known attack patterns. IPS
must be globally enabled on a Barracuda NG Firewall. However, you can enable or disable IPS for each firewall rule.
For more information, see Intrusion Prevention System (IPS).
Users/Time
For more granular control, you can configure access rules that are only applied to specific users or during specific times.
Users can be used as a criteria for a rule. To enable the Barracuda NG Firewall to be aware of which connection belongs to a specific
user, use the Barracuda DC Agent, Barracuda TS Agent, or the The Barracuda NG Firewall Authentication Client.
For more information, see User Objects.
You can create access rules that are only active for specific times or dates. For example, you can create a time object that only includes
Mondays and the hours of 8:00 am to 9:00 am. A access rule including this time object allows traffic only during the time span defined in
the time object.
For more information, see Schedule Objects.
Firewall Objects
Use firewall objects to reference specific networks, services, time and dates, user groups, or connections when creating firewall rules. You can
use firewall objects that are preconfigured on the Barracuda NG Firewall or create custom objects to fit your needs. The main purpose for firewall
objects is to simplify the creation and maintenance of firewall rules. Firewall objects are re-usable, which means that you can use one firewall
object in as many rules as required. Each firewall object has a unique name that is more easily referenced than an IP address or a network
range.
For more information, see Firewall Objects.
Layer 7 Application Control (Legacy)
Barracuda Networks recommends using Application Control 2.0.
Layer 7 Application Control is a legacy feature using Deep Packet Inspection (DPI) and behavioral traffic analysis to detect and classify network
traffic based on Layer 7 applications and protocols.
For more information, see Layer 7 Application Control.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
367
Firewall Access Rules
The firewall service compares the incoming traffic to the access rules until it has found a match and then executes the policy defined in the
matching rule. The following article explains the configuration and interaction of access rules on the Barracuda NG Firewall.
Access Rule Settings
For each access rule you can configure the following settings:
Name – The name of the access rule. This name is displayed on the Firewall > Live and History pages.
Description – An additional field in which you can enter a description of the access rule, to help you and others determine the purpose
of the access rule in case the rule must be edited it later.
Action – Specifies how the Barracuda NG Firewall handles network traffic that matches the criteria of the rule. The following actions are
available:
Pass – The Barracuda NG Firewall passes all network traffic that matches the access rule.
Block – The Barracuda NG Firewall ignores all network traffic that matches the access rule and does not answer to any packet
from this particular network session.
Deny – The Barracuda NG Firewall dismisses all network traffic that matches the access rule. Matching network sessions are
terminated by replying TCP-RST for TCP requests, ICMP Port Unreachable for UDP requests, and ICMP Denied by Filter for
other IP protocols.
Dst NAT – The Barracuda NG Firewall rewrites the destination IP address, network, or port to a predefined network address.
Map – The Barracuda NG Firewall rewrites IP ranges or networks to a predefined network or IP range.
App Redirect – The Barracuda NG Firewall redirects the traffic locally to one of the services running on the Barracuda NG
Firewall.
Broad Multicast – The Barracuda NG Firewall forwards broadcasts for bridged networks.
Cascade – Jump and evaluate a different rule list.
Cascade Back – Jump back to the global rule list and resume evaluation the access rules below the cascade rule.
Service – The protocol and protocol/port range of the matching traffic. You can define one or more services for the access rule. You can
select a predefined service object or create your own service objects (see: Service Objects).
Source – The source IP address/netmask of the connection to be handled by the rule. You can select a network object or explicitly enter
a specific IP address/netmask.
Destination – The destination IP address/netmask of the connection that is affected by the rule. You can select a network object or
explicitly enter a specific IP address/netmask.
Connection Method – The outgoing interface and source (NAT) IP address for traffic matching the access rule, using connection
objects (see below).
Connection Objects
The following table lists the five default connection objects.
Predefined Connection Object
Outgoing Interface and IP Address Determined by
Dynamic SNAT (Source-based NAT)
Change the source IP address of network packets to the IP address
to that of the matching interface with the lowest metric according to
the routing table.
No SNAT (No Src NAT - Client)
Connection is established using the original source IP address.
SNAT with DSL IP
Source NAT with the IP address of the ppp1 device
SNAT with 3G IP
Source NAT with the IP address of the ppp5 device (3G uplink)
SNAT with DHCP IP
Source NAT with the IP address of the dhcp device (DHCP uplink)
NAT Tables
Source NAT for networks or IP ranges. Multiple rewrite conditions
can be configured per connection object.
Application Based Link selection Connection Objects
Source NAT based on application type.
You can also create custom connection objects. For more information, see Connection Objects.
Troubleshooting Blocked Connections Video
To get a feel for how to use access rules, and how NG Admin allows you to determine which rules to create, watch the following video:
Videos are not visible in the PDF export.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
368
How to Edit, Copy, Clone, Deactivate, or Delete Access Rules
You can perform various basic tasks when working with access rules in the host and forwarding rule sets:
Edit Access Rules
Inline Editing
Edit Multiple Access Rules
Clone Access Rules
Copy, Cut, and Paste Access Rules
Delete Access Rules
Deactivate Access Rules
Move Access Rules Up or Down
Edit Access Rules
Edit access rules by either double-clicking the rule or right-clicking the rule and selecting Edit. In the Edit Rule window, you can configure all
possible configuration settings for the access rule. Toggle the Object Viewer check box in the left navigation display or hide the Object Viewer a
ccording to your preferences.
Inline Editing
You can change a setting for an access rule without opening the Edit Rule window. Click the rule, hover your mouse pointer over the value that
you want to change, and then click the edit icon (
or
) that appears.
Edit Multiple Access Rules
Use caution when you edit multiple access rules simultaneously because you can introduce a severe misconfiguration.
For a basic setting such as source or destination that is used in multiple access rules, you can use a firewall object. When you change the object,
the change is automatically updated in every rule that refers to this object.
If you must change Advanced or ICMP Handling settings for more than one access rule, you can edit multiple access rules simultaneously.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Hold the Ctrl key and select the access rules that you want to edit.
4. Right-click the selected access rules and select Edit.
5. In the Edit Multiple Rules window, change Advanced, or ICMP Handling settings as needed. The settings are color-coded:
Yellow – This setting differs from the default value and is the same for all selected access rules.
Red – One or more of the selected access rules use differing settings for this parameter. Changing the parameter overwrites the
settings for all selected access rules.
6. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
369
Clone Access Rules
If you want to duplicate an access rule, click Lock. Then right-click the access rule that you want to duplicate and select Clone. A copy of the rule
is inserted below the original rule, with COPY appended to the rule name.
Copy, Cut, and Paste Access Rules
If you want to copy or cut an access rule from one rule set to another, click Lock. Then right-click the rule and select Copy or Cut. To paste the a
ccess rule into a rule set, right-click the rule above the location that you want the new rule to be inserted and select Paste.
Delete Access Rules
To delete an access rule, click Lock. Then right-click the rule that you want to delete and select Delete.
Deactivate Access Rules
If you want to temporarily disable an access rule, click Lock. Then right-click the rule that you want to deactivate and select Deactivate. Until the
rule is reactivated, it is not evaluated by the Firewall service. If you want to create temporary rules (e.g., for administrative SSH access), use dyn
amic firewall rules.
Move Access Rules Up or Down
To change the order in which the access rules are evaluated, you can either drag and drop rules to the desired location or right-click the rule and
select Move Up or Move Down to move the rule up or down one line.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
370
How to Create a Pass Access Rule
A Pass access rule permits traffic for a specific Service coming from the Source to access the selected Destination. For the Source and Destin
ation, you can specify network objects, IP addresses, networks, or geolocation objects.
Create a Pass Access Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Either click the plus icon (+) at the top right of the rule set, or right-click the rule set and select New > Rule.
4. Select Pass as the action.
5. Enter a name for the rule. For example, LAN-DMZ.
6. Specify the following settings that must be matched by the traffic to be handled by the access rule:
Source – The source addresses of the traffic.
Destination – The destination addresses of the traffic.
Service – Select a service object, or select Any for this rule to match for all services.
For the example access rule displayed in the figure above, a network object named HQ-DMZ containing the IP address of the
DMZ server has been created. For more information, see How to Create Network Objects.
7. Click OK.
8. Drag and drop the access rule so that it is the first rule that matches the traffic that you want it to forward. Ensure that the rule is located
above the BLOCKALL rule; rules located below the BLOCKALL rule are never executed.
9. Click Send Changes and Activate.
Additional Matching Criteria
Authenticated User – For more information, see User Objects.
Schedule Objects – For more information, see Schedule Objects.
Connection Method – For more information, see Connection Objects.
Additional Policies
IPS Policy – For more information, see Intrusion Prevention System (IPS).
Application Control – For more information, see Application Control 2.0.
SSL Interception – For more information, see How to Enable Application Control 2.0.
URL Filter – For more information, see URL Filter.
AV Scan – For more information, see How to Configure Virus Scanning in the Firewall.
ATD – For more information, see How to Configure ATD in the Firewall.
Safe Search – For more information, see How to Enforce Safe Search in the Firewall.
YouTube For Schools – For more information, see How to Enforce YouTube for Schools in the Firewall.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
QoS Band (Fwd) or QoS Band (Reply) – For more information, see Traffic Shaping.
Copyright © 2015, Barracuda Networks Inc.
371
Barracuda NG Firewall 6.1 Administrator's Guide - Page
372
How to Create a Block Access Rule
A Block access rule prevents traffic from passing through the Barracuda NG Firewall. The sender is not notified that the traffic was blocked.
Create a Block Access Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Either click the plus icon (+) in the top right of the rule set, or right-click the rule set and select New > Rule.
4. Select Block as the action.
5. Enter a Name for the rule. For example, ExampleBlockRule.
6. Specify the following settings that must be matched by the traffic to be handled by the access rule:
Source – The source addresses.
Destination – The destination addresses of the traffic.
Service – Select a service object, or select Any for this rule to match for all services.
7. Click OK.
8. Drag and drop the access rule so that it is the first rule that matches the traffic that you want it to block. Ensure that the rule is located ab
ove the BLOCKALL rule; rules located below the BLOCKALL rule are never executed.
9. Click Send Changes and Activate.
Additional Matching Criteria
Authenticated User – For more information, see User Objects.
Additional Policy
Schedule Objects – For more information, see Schedule Objects.
Returning a Block Page for HTTP Traffic
BLOCK and DENY access rules can return a block page if the user was blocked using the HTTP protocol on port 80. All other protocols and ports
covered by the access rule will be blocked at TCP SYN level.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Edit a Block access rule. The Edit Rule window opens.
4. In the left menu click Advanced.
5. In the Miscellaneous section, set Block Page for TCP 80 to Access Block Page or Quarantine Block Page.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
373
6. Click OK.
7. Click Send Changes and Activate.
When a user is blocked by this access rule while using HTTP on port 80, the customizable Access Block Page is displayed. For more
information, see How to Configure Custom Block Pages.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
374
How to Create a Deny Access Rule
A Deny access rule terminates matching network sessions by replying TCP-RST for TCP requests, ICMP Port Unreachable for UDP requests,
or ICMP Denied by Filter for other IP protocols. Because the remote host receives a reply, it knows that your system is up and running and
protected by a firewall.
Create a Deny Access Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Either click the plus icon (+) in the top right of the rule set, or right-click the rule set and select New > Rule.
4. Select Deny as the action.
5. Enter a Name for the rule. For example, ExampleDenyRule.
6. Specify the following settings that must be matched by the traffic to be handled by the access rule:
Source – The source addresses.
Destination – The destination addresses of the traffic.
Service – Select a service object, or select Any for this rule to match for all services.
7. Click OK.
8. Drag and drop the access rule so that it is the first rule that matches the traffic that you want it to deny. Ensure that the rule is located ab
ove the BLOCKALL rule; rules located below the BLOCKALL rule are never executed.
9. Click Send Changes and Activate.
Additional Matching Criteria
Authenticated User – For more information, see User Objects.
Additional Policy
Schedule Objects – For more information, see Time Objects.
Returning a Block Page for HTTP Traffic
BLOCK and DENY access rules can return a block page if the user was blocked using the HTTP protocol on port 80. All other protocols and ports
covered by the access rule will be blocked at TCP SYN level.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Edit a Block access rule. The Edit Rule window opens.
4. In the left menu click Advanced.
5. In the Miscellaneous section, set Block Page for TCP 80 to Access Block Page or Quarantine Block Page.
Copyright © 2015, Barracuda Networks Inc.
5.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
375
6. Click OK.
7. Click Send Changes and Activate.
When a user is blocked by this access rule while using HTTP on port 80, the customizable Access Block Page is displayed. For more
information, see How to Configure Custom Block Pages.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
376
How to Create a Destination NAT Access Rule
A Dst NAT access rule redirects traffic sent to an external IP address to a destination in the internal network. The following example shows a Dst
NAT rule allowing HTTP and HTTPS access from the Internet to a server in the DMZ (172.16.0.10).
Create a Dst NAT Access Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Either click the plus icon (+) in the top right of the rule set, or right-click the rule set and select New > Rule.
4. Select Dst NAT as the action.
5. Enter a Name for the rule. For example, Internet-2-DMZ-HTTPS-Server.
6. Specify the following settings that must be matched by the traffic to be handled by the access rule:
Source – The source addresses of the traffic.
Destination – The destination addresses of the traffic.
Service – Select a service object, or select Any for this rule to match for all services.
Target List – The redirection target. You have the following options to define the target:
Enter one IP address with or without a specific port. If you append a port to the IP address, the Barracuda NG Firewall
maps the external port to that of the internal server (port 80 to port 8080). For example, 172.16.0.10 or 172.16.0.1
0:8080.
Enter a space-delimited list of IP addresses.
Click the Reference check box, and select a network object from the drop-down list that appears. If the network objects
contains multiple IP addresses, only the first IP address is used.
Do not use network objects containing host names (DNS objects). The firewall does not redirect traffic to a
hostname or FQDN.
(TCP only) Fallback/Cycle – The firewall can distribute TCP traffic over multiple IP addresses in two ways:
Fallback – The connection is redirected to the first available IP address in the list.
Cycle – New incoming TCP connections are distributed evenly over the available IP addresses in the list on a
per source IP address basis. The same redirection target is used for all subsequent connections of the source
IP address. UDP connections are redirected to the first IP address and not cycled.
(TCP only) List of Critical Ports – Enter a space-delimited list of the used TCP ports.
Connection Method – Select No SNAT.
7. Click OK.
8. Drag and drop the access rule so that it is the first rule that matches the traffic that you want it to forward. Ensure that the rule is located
above the BLOCKALL rule; rules located below the BLOCKALL rule are never executed.
9. Click Send Changes and Activate.
Additional Matching Criteria
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
377
Authenticated User – For more information, see User Objects.
Connection Method – For more information, see Connection Objects.
Additional Policies
IPS Policy– For more information, see Intrusion Prevention System (IPS).
Application Control – For more information, see Application Control 2.0.
SSL Interception – For more information, see How to Enable Application Control 2.0.
URL Filter – For more information, see URL Filter.
AV Scan – For more information, see How to Configure Virus Scanning in the Firewall.
Schedule Objects – For more information, see Schedule Objects.
QoS Band (Fwd) or QoS Band (Reply) – For more information, see Traffic Shaping.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
378
How to Create an App Redirect Access Rule
The App Redirect access rule rewrites the destination IP address and forwards the traffic to service running on a local IP address of the
Barracuda NG Firewall. For example, you can use an app redirect rule transparently redirect all web traffic over the HTTP proxy service.
Create an App Redirect Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Either click the plus icon (+) in the top right of the rule set, or right-click the rule set and select New > Rule.
4. Select App Redirect as the action.
5. Enter a Name for the rule. For example, Transparent-Proxy-LAN2INTERNET.
6. Specify the following settings that must be matched by the traffic to be handled by the access rule:
Source – The source addresses of the traffic.
Destination – The destination addresses of the traffic.
Service – Select a service object, or select Any for this rule to match for all services.
7. Enter the Redirection IP address and optional port as the Local Address. For example, 127.0.0.9:3128 for the HTTP proxy service.
8. Click OK.
9. Drag and drop the access rule so that it is the first rule that matches the traffic that you want it to forward. Ensure that the rule is located
above the BLOCKALL rule; rules located below the BLOCKALL rule are never executed.
10. Click Send Changes and Activate.
Additional Matching Criteria
Authenticated User – For more information, see User Objects.
Additional Policies
IPS Policy– For more information, see Intrusion Prevention System (IPS).
Application Control – For more information, see Application Control 2.0.
URL Filter – For more information, see URL Filter.
Schedule Objects – For more information, see Schedule Objects.
QoS Band (Fwd) or QoS Band (Reply) – For more information, see Traffic Shaping.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
379
How to Create a Map Access Rule
A Map access rule rewrites incoming network ranges or IP address to destination networks or IP ranges, just like a Dst NAT rule does for a single
IP address. You can use a NAT Table as an object for the Destination and/or Connection settings.
Ensure that the Destination network is the same size or smaller than the network used to redirect the request. Otherwise, the firewall
wraps the larger source network into the smaller redirection network.
Create a Map Access Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Either click the plus icon (+) in the top right of the rule set, or right-click the rule set and select New > Rule.
4. Select Map as the action.
5. Enter a Name for the rule. For example, ExampleMapRule.
6. Select the the Bi-Directional check box.
7. Specify the following settings that must be matched by the traffic that to be handled by the access rule:
Source – The source addresses of the traffic. For example, select Internet.
Destination – Enter the destination network, or select a NAT table Connection object.
Service – Select a service object, or select Any for this rule to match for all services.
8. Enter the Redirection IP address or network. This is the network range that the connections will be rewritten to.
9. If the redirection IP network is not physically present on a network interface, select the Create Proxy ARP check box. For the example
above, proxy ARP is not needed.
10. From the Connection Method list, select Client (No Translation).
11. Click OK.
12. Drag and drop the access rule so that it is the first rule that matches the traffic that you want it to forward. Ensure that the rule is located
above the BLOCKALL rule; rules located below the BLOCKALL rule are never executed.
13. Click Send Changes and Activate.
Additional Matching Criteria
Authenticated User – For more information, see User Objects.
Connection Method – For more information, see Connection Objects.
Additional Policies
IPS Policy– For more information, see Intrusion Prevention System (IPS).
Application Control – For more information, see Application Control 2.0.
SSL Interception – For more information, see How to Enable Application Control 2.0.
URL Filter – For more information, see URL Filter.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
380
AV Scan – For more information, see How to Configure Virus Scanning in the Firewall.
Schedule Objects – For more information, see Schedule Objects.
QoS Band (Fwd) or QoS Band (Reply) – For more information, see Traffic Shaping - MORE INFO OVERVIEW.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
381
How to Create a Broad-Multicast Access Rule
A Broad-Multicast access rule propagates broadcasts between multiple bridged network interfaces.
Create a Broad-Multicast Access Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Either click the plus icon (+) in the top right of the rule set, or right-click the rule set and select New > Rule.
4. Select Broad-Multicast as the action.
5. Enter a name for the rule. For example, EnableDeviceShare.
6. Specify the following settings that must be matched by the traffic to be handled by the access rule:
Source – The bridged network.
Destination – The broadcast addresses that you want to propagate in the network.
Service – Select a service object, or select Any for this rule to match for all services.
7. In the Broad- Multicast - Propagation List field, enter the propagation interface or IP address(es). You can also enter a
comma-delimited array of (bridged) network interfaces or existing IP addresses.
Propagation List Content
Example
Operation
Mixed list of IP addresses and interfaces
port2,port3,192.168.200.10
IP packets are propagated through the
specified interface and in case of IP
addresses, the outgoing interface is
determined by performing a routing
lookup.
Network interface(s)
port2,port3,vpnr0,brid01
The IP packets are transmitted
unchanged through the specified
interface(s).
IP address(es)
192.168.200.10,10.10.0.100
The target of IP packets is changed
according to the specified IP address(es)
and packets are delivered after performing
a routing lookup.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
382
<interface>:<IP address>
port2:192.168.200.10
The IP packets are transmitted through
the specified interface and the target is
changed according to the specified IP
address. For a standard IP address, a
layer 2 broadcast is triggered. For a
multicast IP address, a corresponding
layer 2 multicast MAC is created.
<interface>:<IP address>!
192.168.200.10!
Forces a layer 2 broadcast and the target
MAC address is changed to ff:ff:ff:ff:ff:ff.
This will also work if the destination is a
multicast address.
8. Click OK.
9. Drag and drop the access rule so that it is the first rule that matches the traffic that you want it to forward. Ensure that the rule is located
above the BLOCKALL rule; rules located below the BLOCKALL rule are never executed.
10. Click Send Changes and Activate.
Additional Matching Criteria
Authenticated User – For more information, see User Objects.
Connection Method – For more information, see Connection Objects.
Additional Policies
Time Objects – For more information, see Schedule Objects.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
383
How to Create Cascade and Cascade Back Access Rules
To better organize the access rule set, you can create additional rule lists. At the point in the rule list where you want to evaluate another rule list
create a Cascade access rule. If none of the rules in the additional rule list you cascaded to matched, create a Cascade Back access rule to
continue evaluating the rules in the main rule list. If you do not define a Cascade-Back rule in the additional rule list and none of the rules match,
the default policy (BLOCK or ALLOW) is executed at the end of the rule list.
Before You Begin
Create one or more rule lists. For more information, see How to Create New Rule Lists.
Create a Cascade Access Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Either click the plus icon (+) in the top right of the rule set, or right-click the rule set and select New > Rule.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
384
3.
4. Select Cascade as the action.
5. Enter a Name for the rule. For example, CascadetoDMZRuleList.
6. Specify the following settings that must be matched by the traffic to be handled by the access rule:
Source – The source addresses of the traffic.
Destination – The destination addresses of the traffic.
Service – Select a service object, or select Any for this rule to match for all services.
7. Select the Rulelist that you want to also evaluate the traffic. E.g., DMZRuleList.
8. Click OK.
9. Drag and drop the access rule so that it is the first rule that matches the traffic that you want it to forward. Ensure that the rule is located
above the BLOCKALL rule; rules located below the BLOCKALL rule are never executed.
10. Click Send Changes and Activate.
Create a Cascade Back Access
Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Either click the plus icon (+) in the top right of the rule set, or right-click the rule set and select New > Rule.
4. Select Cascade Back as the action.
5. Enter a Name for the rule. For example, CascadeBack.
6. Specify the following settings that must be matched by the traffic that will be handled by the access rule:
Source – The source addresses of the traffic.
Destination – The destination addresses of the traffic.
Service – Select a service object, or select Any for this rule to match for all services.
7. Click OK.
8. Drag and drop the access rule to the order that you want. Usually this rule is placed last in the rule list, but you can drag it further up the
rule list as well.
9. Click Send Changes and Activate.
Additional Matching Criteria
Authenticated User – For more information, see User Objects.
Additional Policies
Time Objects – For more information, see Schedule Objects.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
385
How to Create and Activate a Dynamic Rule
Dynamically activated rules are flagged by the clock icon. Dynamic access rules prevent the security vulnerabilities caused by forgetting to
revoking service access that is needed only temporarily. If you create a dynamic rule, it is inactive by default and can be enabled on demand for a
configured time span.
Create a Dynamic Access Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Edit the access rule you want to make dynamic.
4. Enable Dynamic Rule.
5. Click OK.
6. Click Send Changes and Activate.
Create a Dynamic Application Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. In the left menu, click Application Rules.
4. Edit the application rule you want to make dynamic.
5. Enable Dynamic Rule.
6. Click OK.
7. Click Send Changes and Activate.
Enable and Disable Dynamic Rules via NG Admin
1. Open the FIREWALL > Dynamic page.
2. Double click a dynamic rule to open the Change Dynamic Rule dialog.
3. Select Enable to enable the rule.
4. If you want the rule to be enabled temporarily enter the time span in the Timer section.
5. Select an action from the Action on expiry drop down list.
Enable – Enables the access rule.
Disable – Disables the access rule.
Disable & Terminate – Disables the rule and terminates all existing connections based on this rule.
Block – Blocks all traffic matching this rule explicitly.
Block & Terminate – Blocks all traffic matching this rule and terminates all existing connections based on this rule explicitly.
None – None.
7. Click OK.
8. Click Send Changes and Activate.
Enable and Disable Dynamic Rules via SSL VPN Desktop and Mobile Portal
Create a dynamic access rule resource to be able to use the web interface to enable or disable dynamic access rules on the SSL VPN desktop or
mobile portal.
For more information, see How to Create and Activate a Dynamic Rule and Mobile Portal User Guide.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
386
How to Create New Rule Lists
For a better overview and organization of your access rule set, you can create additional rule lists to assigning rules a main or sub-priority within
the forwarding rule set. You can apply the additional rule lists to traffic by creating a Cascade access rule. (see How to Create Cascade and
Cascade Back Access Rules).
Create a Rule List
To create a new rule list:
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. On the Access Rules page, click the yellow table icon in the top left of the rule set (next to Main Rules).
4. Enter a name for the rule list and click OK.
5. Click Send Changes and Activate.
After the rule list is created, a tab for it appears next to the Main Rules tab on top of the list.
In the new rule list, you can now specify a range of access rules. To switch between rule lists, click the tabs. You can also copy a rule from the
main rule list by right-clicking the rule and selecting Copy and then right-clicking the additional rule list and selecting Paste.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
387
Firewall Rule Tester and Test Reports
The Barracuda NG Firewall provides you with a few tools to test your firewall rule set:
Check for Overlapping Rules – Highlights firewall rules with criteria that matches those of a selected firewall rule and helps you
determine the best order for your firewall rules.
Rule Tester – Tests the firewall rule set with the specified connection settings. Also verifies the consistency of your firewall rule set.
Test Report – Contains settings and results that are saved from a rule test. Notifies you if any later changes to the firewall rule set result
in an unsuccessful connection request with the saved settings.
In this article:
Check for Overlapping Rules
Test the Firewall Rule Set
Save the Rule Test to a Test Report
Test Reports
Check for Overlapping Rules
Because a connection request can match the criteria of multiple firewall rules, the order of the rules is important. To help you identify firewall rules
with criteria that matches those of a selected rule, use the overlap checker.
1. Open the Forwarding Rules page (CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server >
Assigned Services > Firewall).
2. Right-click a firewall rule and select Select Overlapping.
Any firewall rules with matching criteria are highlighted. In most cases, the overlap is a harmless outcome of a very openly defined firewall object
such as Any.
Test the Firewall Rule Set
To test your firewall rule set, you can simulate a specific connection by entering the network data in the rule tester. The rule tester then
determines which firewall rule would match this connection attempt.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left menu, expand the Rule List Verification section and click Rule Tester.
3. In the TEST CONNECTION section, enter the network parameters you want to test:
Proto – Protocol
Day/Hour – (Optional) Day of week and time
Date – (Optional) Month, day, and year
From – Source IP address
Port – Source port (default is 2048)
To – Destination IP address
Port – Destination port
SMAC – (optional) Source MAC address
Input-IF – (optional) Incoming interface
Output-IF – (optional) Outgoing interface
Srv – Service
4. Click Test. The test result is displayed in the TEST RESULT section.
Save the Rule Test to a Test Report
To save your firewall rule test settings and result, click LOCK, enter a name in the Save Result to field and click Save Result to.
Your test is saved as a test report.
To view your saved test results, expand Rule List Verification and click Test Report in the left pane of the rule set page.
Test Reports
On the Test Report page, successful test results are indicated by a green icon. Unsuccessful test results are indicated by a red icon. If you make
changes to the firewall rule set that would cause an unsuccessful test connection for a test report (such as renaming objects or changing the
order of firewall rules), the green icon turns into a red icon.
The new results are added to the test report while the old results are displayed in brackets. You can validate or edit the settings for the failed
connection request. If the new results for a failed connection request are correct, you can validate the test report by right-clicking it and selecting
Rectify. The red icon for the test report turns into a green icon. If the new results for a failed connection request are incorrect, you can edit the
firewall rule or the test report settings.
To edit the test report, right-click it and select Edit.
To edit the firewall rule, double-click the test report. In the TEST RESULT section, click Edit next to the Rule field.
While editing the test report, you can also use it as a template and save the new settings as a new test report.
Test reports are only saved temporarily. If you want to save test reports, click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Copyright © 2015, Barracuda Networks Inc.
388
Barracuda NG Firewall 6.1 Administrator's Guide - Page
389
Advanced Access Rule Settings
In some specific situations, you may have to modify the default behavior of your firewall by changing the advanced access rule parameters. Some
of these parameters can be used to increase the security level while others provide rarely needed exceptions to the strict default security policy of
the Barracuda NG Firewall.
The advanced parameters of an access rule can impact security if not properly configured. Ensure that you fully understand the
functionality of a parameter before you change it.
Advanced Access Rule Settings
Rule Mismatch Policy
TCP Policy
Resource Protection
Counting / Eventing / Audit Trail
Miscellaneous
Quarantine Policy
Dynamic Interface Handling
Rule Mismatch Policy
Usually, a connection request is required to match the source, service, and destination of a rule. By default, the firewall continues to the
subsequent rule in the rule set if one of the three conditions is not met. If you do not want a rule to be bypassed, you can change the policy for
mismatches to the rule conditions.
The following policies are available for Source, Destination, Service, User, and MAC address condition mismatch:
CONTINUE on Mismatch (default) – Continues processing the next access rules.
BLOCK on Mismatch – Ignores all traffic and does not answer to any matching packet (= silent drop).
DENY on Mismatch – Dismisses all traffic and sends TCP-RST (for TCP requests), ICMP Port Unreachable (for UDP requests), or
ICMP Denied by Filter (for other IP protocols) to the source.
If you want the session to be re–evaluated when the rule set or authentication settings are changed, enable the Persistence setting.
Example Use Case
Two machines in your LAN have access to a database server on a critical port (for example, telnet). You want to ensure that no other rule
accidentally allows access for a source other than these two clients. In this case, select Block on Mismatch from the Source list in the Rule
Mismatch Policy section of the Advanced Rule Parameters window.
The effect of these options is cumulative. If you check two options, you blank out the remaining values for all subsequent rules.
TCP Policy
In the TCP Policy section, you can edit the following TCP policy settings for traffic that is handled by the access rule:
Setting
Description
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Generic TCP Proxy
390
The firewall engine is capable of two TCP forwarding methods:
Application Controlled Packet Forwarding (ACPF) / Generic
TCP Proxy OFF – (Default) The firewall does not terminate the
TCP connection. The TCP connection is directly established
between the source and destination. Malformed packets are
filtered by ACPF.
Generic TCP Proxy ON – Also called Stream Forwarding. If you
want to avoid any direct TCP connection between two TCP
partners traversing the firewall, use stream forwarding to build
two distinct TCP connections. The destination will not get any
packets that are not generated by the firewall TCP stack itself,
making it impossible for a potential attacker to exploit a security
flaw in the destination servers TCP stack. Selecting this option
reduces the performance of the firewall (400 - 500 MBit
maximum). The security advantage of stream forwarding is not
as important today as it was when firewall engines were less
powerful. For detailed performance data, contact Barracuda
Networks Technical Support.
Features not available when using the Generic TCP Proxy:
Application Detection
High availability (HA) synchronization
Intrusion Prevention System (IPS)
Network Address Translation (NAT)
Plug-ins
TCP State Detection
Syn Flood Protection (Forward/Reverse)
Defines the behavior of the firewall with regard to the TCP
three-way-handshake. You can select the following options:
Server Default – Uses the default configuration.
Outbound – Passes the SYN untouched through to the target
address.
Inbound – The firewall completes the handshake and only then
performs a handshake with the actual target. This helps to
protect the target from SYN flood attacks. Disabling this option
may speed up interactive protocols like SSH.
For more information, see Best Practice - Protect Against TCP SYN
Flooding Attacks with TCP Accept Policies.
Accept Timeout (s)
Length of time that the firewall waits until the destination has to
answer. After this timeout, the firewall sends a TCP RST packet to
both partners (default: 10).
Last ACK Timeout (s)
Length of time in seconds that the firewall waits after an ACK to
terminate the connection (default: 10).
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
391
Retransmission Timeout (s)
Length of time in seconds that the firewall waits until the source has
to retransmit packets. If nothing happens, the firewall registers the
session as a hijacking attempt (default: 300 seconds).
Halfside Close Timeout (s)
Length of time in seconds that the firewall waits after conscious
termination of the connection to close the socket (default: 30).
Disable Nagle Algorithm
Enables TCP_NODELAY. This option is only available when the Gen
eric TCP Proxy is enabled.
Force MSS (Maximum Segment Size)
Checks the SYN and SYN–ACK TCP packets for an MSS that is
larger than the configured MSS. If the MSS TCP attribute is smaller,
the packet is rewritten with the configured MSS. Use this feature for
VPNs to force a TCP MSS that fits the MTU of the VPN tunnel
device. For IPv4, the maximum transmission size must be at least 40
bytes smaller than the MTU.
Raw TCP mode
Handles sole chunks of TCP traffic without analyzing the entire
contiguous TCP stream to allow routing loops. However, this mode is
limited in terms of intrusion prevention, application detection, overall
TCP state tracking, and other aspects.
Raw TCP mode must be explicitly enabled in a forwarding firewall
rule. Raw TCP sessions are not synchronized.
You must only use this feature when it is absolutely
necessary. It does not replace Traffic Intelligence or the
Graphical Tunnel Interface. Raw TCP mode can also
decrease the overall performance of the system.
The following features are not available in Raw TCP mode:
Application Control 2.0
Legacy Level 7 Application Detection
High Availability (HA) Synchronization
Intrusion Prevention System (IPS)
Network Address Translation (NAT)
Firewall Plugin Modules
TCP State Detection
WAN Optimization
Resource Protection
In the Resource Protection section, you can specify the following session limits to conserve your system resources:
Setting
Description
Allow to exceed global session limits
Allow this access rule to override the global session limits defined in
the General Firewall Configuration.
Max Number of Sessions
Maximum number of accepted concurrent connections for this rule on
a global basis (default: 0 = unlimited).
If the Rule Limit Exceeded setting is enabled in your
event monitor settings, the FW Rule Connection Limit
Exceeded [4016] event is generated when the Max
Number of Sessions limit is exceeded.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Max Number of Sessions per Source
392
Maximum number of accepted concurrent connections per source
address (default: 0 = unlimited).
You must only specify this limit if your system is
susceptible to Denial of Service (DoS) attacks.
If the Source/Rule Limit Exceeded setting is enabled in
your event monitor settings, the FW Rule Connection per
Source Limit Exceeded [4018] event is generated when the
Max. Number of Sessions per Source limit is exceeded.
Session Duration Limit (s)
Maximum length of time in seconds that the session can stay active.
By default, there is no duration limit for the session.
This setting is only executable in the forwarding firewall; it
does not affect the local firewall.
Counting / Eventing / Audit Trail
In the Counting / Eventing / Audit Trail section, define when events are logged or written to the access cache.
Setting
Description
Firewall History Entry
Save the connection information to the firewall history. (default: Yes).
Log File and FW Audit Entry
Obtains log file entries (default: Yes).
Transparent Failover State Sync
Synchronizes the session on a high availability system (default: Yes).
Statistics Entry
Obtains statistics (default: Yes).
If you select No, global firewall statistics are not generated and
information is not displayed in the firewall dashboard.
Log Session State Changed
Logs changes of session states (default: No).
Own Log File
Saves all log events in an extra log file (default: No).
Service Statistics
Generates service statistics for this rule (default: No).
Eventing
The severity level of the rule's event messages. Host firewall rules
are not affected by this setting. You can select the following event
levels to be generated if a forwarding firewall rule matches:
None (default) – No events are generated.
Normal – Generates the FW Rule Notice [4020] event.
Notice – Generates the FW Rule Warning [4021] event.
Alert – Generates the FW Rule Alert [4022] event.
In the event settings, you can specify actions for these event
messages. For more information, see How to Configure Event
Settings.
Regardless of this setting, forwarding as well as host
firewall rules will generate event messages if BLOCK on
Mismatch is selected for any of the Rule Mismatch Policy
settings.
Application Log Policy
Default – No detected applications are logged.
Log Blocked Applications – Only blocked applications are
logged.
Log Allowed Applications – Allowed applications are logged.
Log All Applications – All detected applications are logged.
Miscellaneous
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
393
In the Miscellaneous section, you can edit the following settings:
Setting
Description
Authentication
The required user authentication method for HTTP and HTTPS
connections. You can select the following authentication methods:
No Inline Authentication (default)
Login+Password Authentication
X509 Certificate Authentication
X509 Certificate & Login+Password Authentication
For more information about authentication, see Firewall
Authentication and Guest Access.
IP Counting Policy
You can select the following policies:
Default Policy – Uses the interface realm settings that are
assigned in the network configuration for the local networks and
interface routes. Depending on the specified realm, the source
or destination IP counts.
The Default Policy is hard-coded and cannot be
changed in the Barracuda NG Firewall configuration.
Count Source IP – Counts source IP addresses towards license
limits.
Count Destination IP – Counts destination IP addresses
towards license limits.
Time Restriction
Applies a time restriction to rules that are configured with a feature
level that is equal to or lower than 3.2.
Clear DF Bit
The DF bit determines whether a packet can be fragmented or not. In
networks where packet size is limited to an MTU, packet
fragmentation may become vital when packets sent to this network
exceed the MTU (for example, as may frequently occur with SAP
applications).
Because the firewall must not override the DF bit setting,
fragmentation is up to the client. When the DF bit is set and the target
network's MTU specification requires fragmentation, the firewall
responds with an ICMP Destination Unreachable message (C
ode 4: Packet too large. Fragmentation required but
DF bit in the IP header is set). If the client does not
understand the answer code, data transmission fails and data loss
may occur if packet sizes exceed the MTU of the network.
Before enabling this setting, consider the following points:
The fragmentation and packet reassembling process might lead
to significant performance loss at high traffic rates.
The maximum segment size (MSS) is automatically decreased
as necessary when traffic is routed through the respective VPN.
Encapsulating packets reduces the available MTU size. The DF
bit is automatically cleared from traffic, which is forwarded
towards a VPN interface.
Only enable this setting when experiencing transport problems
that are clearly associated with packet size restrictions.
To clear the DF bit from the IP header and fragment packets if
necessary regardless of the setting in the packet's IP header, select
Yes. By default, this setting is disabled.
Set TOS Value
The TOS value. By default, the value is set to 0 (TOS unchanged).
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Prefer Routing over Bridging
394
Controls the routing behavior of routed transparent Layer 2 bridges.
To route traffic over bridges that are configured on the Barracuda NG
Firewall, select Yes. Enable this setting when an external router
connects the bridges and traffic should not be directed to this router.
If traffic is first routed to the external router, it is rejected because it
passes the gateway twice.
By default, this setting is disabled.
For more information on routed transparent Layer 2 bridges, see How
to Configure Routed Layer 2 Bridging.
The color of the rule in the rule set.
Color
Quarantine Policy
In the Quarantine Policy section, you can select one of the following rule matching policies for evaluating sessions to and from a specific
quarantine class:
Match – The rule matches.
Block – The rule blocks the request.
Deny – The rule denies the request.
Continue – Rule evaluation continues with the next rule in the rule set.
A session is only evaluated when it matches the specified policy for the following settings:
Setting
Description
LAN Rule Policy
Matching policy for sessions to and from a non–quarantine net.
Quarantine Class 1 Rule Policy
Matching Policy for sessions to and from a Quarantine class 1 net.
Quarantine Class 2 Rule Policy
Matching Policy for sessions to and from a Quarantine class 2 net.
Quarantine Class 3 Rule Policy
Matching Policy for sessions to and from a Quarantine class 3 net.
Dynamic Interface Handling
Setting
Description
Source Interface
Restricts rule processing to the specified dynamic network interface
(if installed and configured).
Continue on Source Interface Mismatch
Continues with rule processing, even if no matching interface can be
found. The subsequent rule is then used for rule evaluation.
Reverse Interface (Bi-directional)
The interface that the destination address is allowed to use. Only
applicable for bi-directional rules.
Interface Checks After Session Creation
Disables interface checks. Only applicable for bi-directional rules.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
395
Example - How to Enable Remote Management Access From the Internet
Barracuda Networks recommends that you only enable management access from the Internet for a limited period of time. Remote
management access constitutes a significant security risk, especially if you allow access via SSH. To minimize risk potential, restrict
access to very few trusted source addresses or networks, disable access when it is not needed, and use strong passwords or key
authentication.
When you place a standalone Barracuda NG Firewall at a remote site, you can enable access to it over the Internet for remote management and
configuration. You can also enable remote access for Barracuda Networks Technical Support if direct access to the system is required for
troubleshooting.
Create an App Redirect Firewall Rule
To enable remote management access to the Barracuda NG Firewall from the Internet, create an App Redirect Rule for the management ports to
the internal management IP address.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. From the Rule Lists menu in the left pane, select Access Rules.
3. Click Lock.
4. Create an App Redirect rule with the following settings:
Source – Select Internet. To restrict access to specific IP addresses, you can explicitly enter the IP addresses or create a
network object for reference.
Service – Select NGF-MGMT-STAT (TCP 807 Single Point Of Entry)
Destination – If the Barracuda NG Firewall connects to the Internet via a dynamic address, select the network object to match
your connection (DHCP Local IP, DSL Local IP or 3G Local IP). If the system uses a static public IP address, enter this
address.
Redirection – In the Local Address field, enter your internal management IP address (MIP) as defined in the network settings.
5. Click Send Changes and Activate.
Next Step
You can now manage your Barracuda NG Firewall over the Internet with the Barracuda NG Admin application. Instead of connecting to the
management IP address of the unit, log into the system via the public IP address of your unit.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
396
How to Configure a Transparent Redirect
To transparently forward connections to a proxy behind a Barracuda NG Firewall in the DMZ, you can configure the Dst NAT access rule to not
rewrite the source and destination addresses of the connection. This configuration allows the proxy to apply all policies as if it were directly
connected to the client. It also allows the proxy to create meaningful statistics and connection information.
The proxy as described here may be a Barracuda Web Security Gateway. Transparent Redirect for the Barracuda Web Security
Gateway is limited to HTTP.
In this article
Before your Begin
Step 1. Create a Transparent Redirect DNAT Access Rule
Step 2. Create a PASS Access Rule for the Proxy to Access the Internet
Step 3. Create a PASS Access Rule for the HTTP Proxy to Access the Client
Step 4. Configure the Proxy
Before your Begin
Verify that the Forwarding Firewall service is using Feature Level 6.1 or above.
The Barracuda NG Firewall and the Proxy must be directly connected to the same subnet (within the same ARP domain).
Step 1. Create a Transparent Redirect DNAT Access Rule
Create the DNAT access rule to forward all traffic to the proxy.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual servers > Firewall > Forwarding Rules.
2. Click Lock.
3. Create an access rule to forward selected traffic coming from your clients to the proxy:
Action – Select Dst NAT.
Source – Select Trusted Networks. Alternatively enter the network the client using the HTTP Proxy is in.
Destination – Select Internet.
Service – Select the service you want to forward. E.g. HTTP+S.
Target List – Enter the IP address. You can use multiple Proxies. E.g., 172.16.0.10
Do not use network objects containing host names (DNS objects). The firewall does not redirect traffic to a hostname
or FQDN.
Fallback/Cycle – If you have defined multiple target IP addresses, select how the Barracuda NG Firewall distributes the traffic
between the IP addresses.
Fallback – The connection is redirected to the first available IP address in the list.
Cycle – New incoming TCP connections are distributed evenly over the available IP addresses in the list on a per
source IP address basis. The same redirection target is used for all subsequent connections of the source IP address.
UDP connections are redirected to the first IP address and not cycled.
Connection Method – Select No SNAT.
Application Policy – Disable Application Control:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
397
4. In the left menu, click Advanced.
5. In the Miscellaneous section set Transparent Redirect to Enable.
6. Click OK.
7. Drag and drop the access rule so that it is the first rule that matches the traffic that you want it to forward. Ensure that the rule is located
above the BLOCKALL rule; rules located below the BLOCKALL rule are never executed.
8. Click Send Changes and Activate.
Step 2. Create a PASS Access Rule for the Proxy to Access the Internet
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual servers > Firewall > Forwarding Rules.
2. Click Lock.
3. Create a PASS rule to allow the HTTP proxy to access the Internet:
Action – Select Pass.
Source – Enter the IP address of the HTTP Proxy.
Destination – Select Internet.
Service – Select HTTP+S.
Connection Method – Select Dynamic SNAT.
Application Policy – Disable Application Control.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
4. In the left menu, click Advanced.
5. In the Dynamic Interface Handling section set Source Interface to Any.
6. Click OK.
7. Click Send Changes and Activate.
Step 3. Create a PASS Access Rule for the HTTP Proxy to Access the Client
To allow the HTTP proxy to access the client, you must create a PASS rule:
Action – Select Pass.
Source – Enter the IP address of the HTTP Proxy.
Destination – Select Trusted Networks.
Service – Select HTTP+S.
Connection Method – Select No SNAT.
Application Policy – Disable Application Control.
Copyright © 2015, Barracuda Networks Inc.
398
Barracuda NG Firewall 6.1 Administrator's Guide - Page
399
Step 4. Configure the Proxy
In order to successfully send the connection from the proxy to the Internet you must configure the device to:
Route to the Internet using the NG Firewall as the gateway.
Route to the internal client network using the NG Firewall as gateway.
Traffic must use the IP address of the proxy as the source IP for outgoing connections.
The device must accept HTTP connections on port 80 and HTTPS connections on port 443.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
400
Firewall Objects
Firewall objects are named collections that represent specific networks, services, applications, user groups or connections. You can use the
firewall objects that are preconfigured on the Barracuda NG Firewall, but you can also create custom firewall objects depending on your
requirements. Firewall objects are re-usable which means that you can use one firewall object in as many rules as required. The following section
explains the firewall objects that are available for use and configuration on the Barracuda NG Firewall and contains articles on how to create the
different firewall objects for your firewall rules.
Advantages of Firewall Objects
Using firewall objects gives you the following advantages:
Each firewall object has a unique name that is more easily referenced than, for example, an IP address or a network range.
Maintenance of the firewall rule set is simplified. When you update a firewall object, the changes are automatically updated in every rule
that refers to this object.
Firewall Object Types
The following types of firewall objects are available for use and configuration:
Connection Objects — The egress interface and source (NAT) IP address for traffic matching a firewall access rule.
For more information, see Connection Objects.
Proxy ARPs – Resolve MAC addresses not physically on the Barracuda NG Firewall to the corresponding IP addresses.
For more information, see Proxy ARPs.
Network Objects — Networks, IP addresses, geolocation, host names, or interfaces when configuring firewall rules.
For more information, see Network Objects.
Service Objects — TCP/UDP ports for a service.
For more information, see Service Objects.
User Objects — Lists of users and/or user groups for use within firewall rules.
For more information, see User Objects.
Schedule Objects — Time restriction or scheduling tables that can be applied to access rules on an hourly, weekly, or calendar date
basis.
For more information, see Schedule Objects.
Interface Groups – A specific interface or interface group containing one of more interfaces.
For more information, see How to Create Interface Groups.
Applications – Lists of applications and/or sub-applications when creating application aware firewall rules.
For more information, see Application Objects and Application Control 2.0.
URL Filter – Access restrictions for web sites. The Barracuda NG Firewall provides a predefined list of URL categories that are
available for blacklisting and whitelisting.
For more information, see How to Create an URL Filter Policy Object.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
401
Network Objects
Use network objects to reference networks, IPv4 and IPv6 addresses, hostnames, geolocation objects, or interfaces when you create firewall
rules. A network object can also include other existing network objects. Network objects are stored in the host and forwarding firewall. If the
Barracuda NG Firewall is managed by a Barracuda NG Control Center, it also inherits all network objects in the Global, Range, and Cluster
Firewall Object stores.
Firewall rule management is simplified with the use of network objects instead of explicit IP addresses. For example, if an IP address changes,
you do not have to edit it in every rule that references it; you must only change the IP address in the network object. The IP address is then
automatically updated for every rule that references the network object.
Unified networks objects cannot contain both IPv4 and IPv6 addresses. For more information, see How to Use IPv6.
Network Object Types
A network object may consist of the following:
Generic Network Objects – You can add network addresses of all types. All network objects that are available on Barracuda NG
Firewall systems by default are configured as generic network objects.
Single IP Address – A single IP address.
List of IP Addresses – Multiple single IP addresses and/or references to other single IP address objects. For example: 10.0.10.1, 10
.0.10.10, 10.0.10.127
Single Network Address – A single network. For example: 10.0.10.0/25
List of Network Addresses – Any combination of multiple networks, IP addresses, and/or references to other network address objects.
For example: 10.0.10.0/25, 172.16.0.10
Hostname (DNS Resolved) – A single DNS resolvable host name. For example: myhost.test.com
If the hostname used in the network object is not resolvable, any firewall rules that use it will never be matched to traffic. For a
detailed description of configuration options, see Hostname (DNS Resolvable) Network Objects.
Single IPv6 Address – A single IPv6 address.
List of IPv6 Addresses – Multiple IPv6 addresses and/or references to other single IPv6 address objects.
Single IPv6 Network – A single IPv6 network.
List of IPv6 Networks – Any combination of multiple IPv6 networks, IPv6 IP addresses, and/or references to other IPv6 network
address objects.
Excluded Entries – Specific networks that are excluded from the network object.
For transparency and consistency, other network objects cannot be referenced in the Excluded Entry section.
Enable L3 Pseudo Bridging – When bridging is activated on an interface, host routes and PARPs are automatically created by
the Barracuda NG Firewall. In this section, you can specify the information required for this task. The Bridging section is only available in
the Local Networks list of the Forwarding Firewall service. Select Bridging enabled (Advanced Settings) from the list (default: Bridging
not Enabled) if you want to configure bridging details.
The configuration options in the Bridging section are only applicable for Layer 3 Bridging. For more information, see How to
Configure Layer 3 Bridging.
Interface Address Reside – The name of the interface on which bridging is to be enabled (for example, eth1).
Parent Network – The superordinate network from which the bridged interface has been separated.
Introduce Routes – Introduces host routes to the IP addresses to be separated from the superordinate network (IP
addresses listed in the network object) automatically.
Restrict PARP to Parent Network – Restricts the Proxy ARP to only answering ARP requests within the parent network.
Network objects cannot be deleted if they are referenced by other objects. You can delete network objects when they are only
referenced in configuration files. Before you delete a network object, verify that it is not used anywhere. The Referenced By column in
the Network Objects listing displays where a network object is currently referenced.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
402
Hostname (DNS Resolvable) Network Objects
You can use hostnames in a network object. This might be needed in contexts where the remote network uses a dynamic IP address and can
only be reached by hostname. The Firewall service resolves and uses the first 24 IP addresses in the network object. The firewall rule set uses
these resolved IP addresses when evaluating rules. If the hostname is not resolvable or the DNS server is currently not available, the access rule
will never match.
In this article:
Limitations and Drawbacks
Creating Hostname Network Objects
Using Hostname Network Objects
Monitoring Network Objects of Type Hostname
Site-Specific Network Objects
Limitations and Drawbacks
There are several limitations and drawback to using hostnames in network objects:
Only explicit host names can be used. For example: www.barracuda.com
A maximum of 24 IP addresses can be resolved
Using a hostname network object in a BLOCK access rule is not recommended.
When a non-resolvable object is used in a rule, rules cannot be matched or processed correctly. Hostname objects become
non-resolvable when they refer to a non-existent host name or the DNS server is unavailable.
Active sessions are not re-evaluated when DNS resolution changes; sessions are re-evaluated only when the rule itself is modified. To
establish new connections with updated DNS entries, you must manually terminate persistent sessions.
When the firewall is started or restarted, it can take up to 10 seconds until DNS resolution is provided for all configured hostname
network objects. Because the firewall is already active, the traffic that you want to be handled by the rule with the added hostname
object can be matched to another rule instead.
To use hostname network objects, you must specify a DNS server in the DNS Server IP field in the Box Settings file (How to
Configure DNS Settings).
Using DNS resolvable host names in firewall rule sets can cause problems because of the following:
IP addresses that are allocated to DNS host names might change.
A DNS record might contain multiple IP addresses.
Creating Hostname Network Objects
You can create hostname objects:
In the Local Firewall rule set.
In the Forwarding Firewall rule set.
As global, range-specific, or cluster-specific firewall objects.
Hostname objects cannot be created as explicit source or destination objects in access rules.
To create a hostname network object, select Hostname (DNS resolved) from the Type list in the Network Object window. Consider the
following detail configuration options:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
403
You can configure the following parameters:
Type – The type defines specific object characteristics. Network objects of type Hostname expect specification of an explicit DNS
resolvable host name in the Name field below.
Once the object has been created its type cannot be changed.
Name – Into this field insert the DNS resolvable name the object is to be created for.
Description – Into this field insert a significant object description.
The specified name is the name of the network object at the same time. The object name may be changed retroactively.
Resolve – The functionality of this button is purely informational. Click it to execute a DNS query for the host name inserted into the Nam
e field. The result of the query is displayed in the IP field in the Entry section. Note that the query is executed using the DNS server(s)
known to the client running the graphical administration tool Barracuda NG Admin and NOT using the DNS server(s) known to the
Barracuda NG Firewall running the firewall service.
DNS Lifetime (Sec) – The DNS Lifetime defines the interval after which to refresh DNS entries for network objects of type Hostname th
at are configured for use in currently effective access rules (default: 600 s). Setting to a lower value than 30 seconds might cause
problems in network object lists containing a huge number of hostname objects. DNS entries may also be refreshed manually in FIREW
ALL > Dynamic > Dynamic Rules.
The DNS Lifetime has no effect on actively established connections, even if the DNS resolution of a network object that is
currently used in a access rule changes. In this case to force a refresh terminate the active session in order to enable new
connection establishment using the updated DNS entry.
The Include and Exclude Entries sections may be used to restrict a network object and to force a condition to match explicitly or to
exclude it from being part of it. For example, if a DNS host name entry www.domain.com matches four DNS A-records pointing to the IP
addresses 10.0.6.1, 10.0.8.1, 10.0.8.2 and 10.0.8.3, and it is wanted that connection requests must always point to addresses residing in
the 10.0.8.0/24 network, but must never be addressed to the IP address 10.0.8.3, the following values need to be configured in the
corresponding fields: Section Included Entry: IP 10.0.8.0/24, section Excluded Entry: IP 10.0.8.3. The configuration stated above will
be processed as follows, when it is utilized in a access rule: Connection requests may be addressed to IP addresses living in the network
10.0.8.0/24, but they may not address the excluded IP address 10.0.8.3.
Using Hostname Network Objects
You can use hostname objects as:
Source/Destination in rules within the Forwarding Firewall.
Source/Destination in rules within the Local Firewall.
Reference in the Entry list of generic network objects.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
404
You cannot reference hostname objects in other network object types.
Monitoring Network Objects of Type Hostname
DNS queries addressed to the DNS server configured in the box settings are triggered when a hostname network object is created. You can view
these queries in the following places:
In all views but the Dynamic Rules tab, DNS resolution is retrieved using the DNS server(s) known to the client running the graphical
administration tool Barracuda NG Admin and NOT using the DNS server(s) known to the Barracuda NG Firewall running the firewall
service.
In the Entries column in the network object list.
In the Rule Object list when the hostname object configured in the rule is used.
In the Source/Destination window querying the rule object list when the hostname object is currently used.
In the Rule Tester.
In the Dynamic Rules tab of the Firewall Monitoring Interface.
Site-Specific Network Objects
Site-specific network objects can be used to share single firewall rule sets for branch offices with template-based network layout. This type of
object inherits its content from the IP address or IP network defined in the Virtual Server’s Server Properties of a branch office.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
405
How to Create Network Objects
Create a network object containing an IP address, a reference to another network object and a network.
Do not change the dynamic network objects that are automatically generated by the Barracuda NG Firewall.
Create a Network Object
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left navigation click on Networks.
3. Click Lock.
4. Right-click the table and select New. The Edit/Create Network Object window opens.
5. Enter a Name for the network object. E.g., ExampleNetworkObject
6. In the Include Entries section, click + , enter the IP address/es that should be included in the IP field and then click Insert and Close.
7. In the Exclude Entry section, add the IP addresses that should be excluded from the rule.
8. Click OK.
9. Click Send Changes and Activate.
You can now use the network object in your firewall rules. When creating or editing a firewall rule click on the Object Viewer in the left navigation
to see a list of all available network objects.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
406
How to Create a Geo Location based Network Object
The geolocation database included with the Barracuda NG Firewall can match the IP address and network to the country it was issued to. This
enables you to create firewall ruled based on the physical location of the source or destination. Lists of countries or regions are combined in a
reusable network object. The geolocation database is updated with every firmware release.
Create a Network Object
Create a network object and include all countries you want to use for your firewall rule.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left pane, click on Networks.
3. Right click in the main area and select New. The Edit/Create Network Object window will open.
4. Enter a Name.
5. To include or exclude a region or country:
a. Click the globe icon either in the Include or Exclude Entries section.
b. In the Select Region/Country window, select the region or country.
c. Click OK.
6. Click Send Changes and Activate.
You can now select the geolocation network object you just created from the Source and Destination dropdown lists when creating firewall rules.
Alternatively you can find the network object icon the Object Viewer in the Networks > Network Objects section.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Copyright © 2015, Barracuda Networks Inc.
407
Barracuda NG Firewall 6.1 Administrator's Guide - Page
408
Custom External Network Objects
If you have a file containing a list of IP addresses or networks, you can import them automatically or manually into the external network objects.
On Barracuda NextGen F-Series Firewalls running in the public cloud, these objects are automatically filled in with information gathered from the
cloud provider.
File Format
IP addresses must be written in CIDR notation.
IP addresses must be separated by one whitespace.
limited to 10.000 IP addresses per file.
In this article
Before You Begin
Importing External IP File on a Stand-alone F-Series Firewall
Step 1. Copy the File to the F-Series Firewall
Step 2. Import the File into a Custom External Object
Step 3. (Optional) Create a Cron Job for Import
On an F-Series Firewall in the Public Cloud
On a Barracuda NextGen Control Center
Before You Begin
An admin account with full shell access is required.
Importing External IP File on a Stand-alone F-Series FirewallStep 1. Copy the File to the F-Series Firewall
1. Copy the file containing the IP addresses to /var/phion/home/. Use a temporary file format to ensure that only data of completely copied
files are imported into the network objects. E.g., addresses.dirty
2. Rename the file after the copy process:
# mv -f /var/phion/home/addresses.dirty /var/phion/home/addresses
Step 2. Import the File into a Custom External Object
On the command line enter /opt/phion/bin/CustomExternalAddrImport -i /var/phion/home/addresses -o <External
Firewall Object Number> in the Command section. E.g., /opt/phion/bin/CustomExternalAddrImport -i
/var/phion/home/addresses -o 1 to import into the Custom External Object 1 .
Check the CustomExternalImport firewall log file to verify the import was successful. You can also open the FIREWALL > Forwarding Rules p
age and click on Networks.
The IP addresses and networks in the custom external network objects are not displayed on the CONFIGURATION > Full
Configuration > Virtual Servers > your virtual server > Firewall > Firewall Rules page. Directly on the firewall go to FIREWALL >
Forwarding Rules to see the content of the dynamic network objects.
Step 3. (Optional) Create a Cron Job for Import
Create a cron job to automatically trigger a periodic import process.
1.
2.
3.
4.
5.
6.
Go to CONFIGURATION > Configuration Tr ee > Box > Advanced Configuration > System Scheduler.
Click Lock.
In the left menu, click Daily Schedule.
Click + to add an Interhour Schedule job.
Enter the Name, and click OK.
Enter /opt/phion/bin/CustomExternalAddrImport -i /var/phion/home/addresses -o <External Firewall
Object Number> in the Command section.
7. For High Availability setups, add -h to execute the CustomExternalAddrImport binary located in /opt/phion/bin and import the IP
addresses to the Custom Network Object with the index number 1. E.g., CustomExternalObject1
8. Select every from the Minutely Schedule drop-down list and enter the period for the Run Every...Minutes parameter.
9. Click OK.
10. Click Send Changes and Activate.
On an F-Series Firewall in the Public Cloud
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
409
If your F-Series Firewall is running in the public cloud (AWS or Azure), the custom external network objects will be automatically filled with:
Custom external object number 1 contains the internal IP address.
Custom external object number 2 contains the internal network address.
Custom external object number 3 contains the external IP address.
If you are using multiple virtual network interfaces in AWS, only information for the first interface will be imported. The IP addresses will also be
automatically synced to the Control Center.
On a Barracuda NextGen Control Center
Configure a cron job on the Control Center to copy the addresses file to the /var/phion/home/ directory of your managed firewalls. Copying the
files through the management tunnels does not require separate authentication as the Control Center already has a trust relationship established
with the remote firewalls. On the managed firewalls create another cron job to import the addresses file every 5 minutes.
On the Control Center, create a cron job to regularly copy the addresses file to the managed firewalls.
On the managed firewalls, create a cron job to import the addresses.
Do not use the h (HA synchronization flag)
The predefined external objects can be copied into the global objects database and then be used throughout the firewall configuration.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
410
Service Objects
Service objects, when applied to a firewall access rule, define which destination and client TCP/UDP ports and/or IP protocols that the service
applied to the rule can use. By default, the Barracuda NG Firewall contains a set of pre-configured service objects. You can edit these service
objects for a custom setup or use of a non-standard port, or you can create new
services objects to reference IP protocols and, if
TCP/UDP is used, the destination port numbers.
A service object can consist of the following:
IP Protocol – The required protocol (e.g. TCP) for the service used by an access rule.
Ports and Port Ranges – The ports or port ranges that the service can use for the protocol.
Dynamic Services – Dynamic services.
Plugin Modules – Plugins for shared service objects (see Shared Service Objects).
Port Protocol Protection – Policies for handling prohibited services.
Shared Service Objects
Shared service objects refer to services using dynamic port allocation. The Firewall service uses firewall plugin modules to dynamically open and
close required ports. For more information, see Firewall Plugin Modules.
Create a New Service Object
For instructions on how to create a new service object, see How to Create Service Objects.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
411
How to Create Service Objects
Create service objects to reference IP protocols and, if TCP/UDP is used, the destination port numbers, when configuring firewall access rules.
The Barracuda NG Firewall provides a range of predefined service objects. When creating a new service object, you can also include (reference
to) other
service objects that are already configured.
In this article:
Create a Service Object
Apply a Service Object to a Firewall Rule
Service Object Settings
Create a Service Object
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left menu, click on Services.
3. Click Lock.
4. Right-click the table and select New. The Edit/Create Service Object window opens.
5. Enter a Name for the service object. E.g., POP3 Service.
6. If you want to include an already configured service object, select it from the Any drop down list and click New Reference.
7. Click New Object. The Service Entry Parameters window opens.
8. From the IP Protocol list, select the required protocol. E.g., 006 TCP
For TCP- and UDP-based protocols, you can enter a space-delimited list of ports in the Port Range field. To use all ports for
the protocol, enter an asterisk (*). You
can also define a port range, such as 3001-3008, or enter a
combination of port ranges and a space-delimited list of ports. For example: 25 80 8080
3001-3008
9. In the Port Protocol Protection section, select an action from the Action for prohibited Protocols list.
10. Click OK.
11. Click Send Changes and Activate.
You can now apply the service object to your firewall access rules.
Apply a Service Object to a Firewall Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left navigation, click on Access Rules.
3. Click Lock.
4. Double-click the number of the rule you want to apply the service object to, or right-click it and select Edit Rule. (You can also create a
new rule.)
5. In the Edit Rule window, select the Object Viewer check box.
6. In the Object Viewer window that appears, open the Services tab, and drag the service object to the Service table in the Edit Rule win
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
412
6.
dow.
7. Finish your rule configuration.
Service Object Settings
TCP & UDP
Port Range – Port or port range the service is running on.
Dyn. Service – This parameter is required in conjunction with ONCRPC.
Service Label – Here you may enter certain labels. If left empty, well-known service names (available in /etc/services) are used.
It is highly recommended that you use this parameter only for defining service names that are not well-known (for example,
Oracle521).
Client Port Used – The port range the firewall uses for the connection. This port range is only used if a dynamic port allocation is
required, e.g., as in the 'proxy dynamic' connection type. If you want to enter a custom port range, select Manual Entry and enter the
first port in the From field and the last port in the To field. This parameter is not evaluated when the firewall services checks if the rule
matches.
ICMP Echo
Max Ping Size – The maximum size allowed for the ping packet.
Min Delay – The minimum allowed delay for pinging. The 'FW Flood Ping Protection Activated [4002]' event is generated if this limit is
not met.
General
Session Timeout – Time in seconds that a session can remain idle until it is terminated by the firewall (default values: TCP:
86400; UDP: 60; ICMP: 20; all other protocols: 120). This timeout is applied to all TCP connections by counting the time that has passed
in a session since the last traffic transmission. Similarly, it applies an initial timeout to all stateless protocols counting the time until the
source has answered the initial datagram. When the datagram is answered, the Balanced Timeout setting comes into effect.
This parameter can only be used in the forwarding firewall. Setting this parameter in the host firewall has no effect.
Balanced Timeout – The time in seconds that a session-like connection established through a non-connection oriented protocol
(all protocols except TCP) can remain idle until it is terminated by the firewall (default values: UDP: 30; ICMP: 10; all other protocols:
120). The balanced timeout comes into effect after the initial datagram sent by the source has been answered and the "session" has
been established. Generally, the balanced timeout should be shorter than the session timeout because it is otherwise overridden by the
session timeout and never comes into effect. The balanced timeout allows for keeping non-connection oriented "sessions" short and
minimizing the amount of concurrent sessions. The larger initial session timeout guarantees that late replies to initial datagrams are
not inevitably dropped.
This parameter is only executable in the forwarding firewall. Setting this parameter in the local firewall takes no effect.
Plugin – The name and parameters of any plugins that you might be required for this object. For more information, see Firewall Plugin
Modules.
Port Protocol Protection
Action for prohibited Protocols – From this list, select an action that should be taken if prohibited
protocols are detected. For more information, see How to Define Port Protocol Protection.
Detection Policy – From this list, select the policy to be applied. For more information, see How to
Define Port Protocol Protection.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
413
Schedule Objects
To restrict host, access, and application rules to specific times and intervals, configure schedule objects as an additional matching criteria. Sched
ule objects provide time granularity in minutes. When time objects are evaluated the time of the NG Firewall it is running on is used.
The Barracuda NG Firewall, the client running NG Admin, and, if applicable, the NG Control Center must use the correct time for their
respective time zones. Using NTP is highly recommended. For more information, see How to Configure Time Server (NTP) Settings.
A schedule object consists of two time configuration elements that can be combined or used separately:
Recurring Schedule – Configure the schedule to be active during specific days and intervals by selecting weekdays and time from a list.
Restrict to time interval – Configure the schedule to be active during a specific interval by specifying a date and time span.
For information on how to create schedule objects, see How to Create and Apply Schedule Objects.
In this article:
Recurring Schedules
Time Interval
Schedule Object Options
Legacy Time Restriction Settings for Access Rules
Recurring Schedules
You can restrict the schedule to a specific day and time interval, e.g., every week from Monday at 09:00 until Wednesday at 15:30, by selecting
the Enable Recurring Schedule checkbox. Selecting this option expands the configuration and provides the Recurring Schedule table, where
you specify the days and times for the schedule to be active.
A time schedule entry can cover up to one week, starting on Mon-00:00, and ending on Mo 0:00 of the next week . To enable the
schedule for an interval crossing the Mo 00:00 threshold, split the entry. E.g., Fri-15:00 to Mo 0:00 and Mon-00:00 to Tue-10:30.
Time Interval
Selecting the Restrict to time interval checkbox lets you restrict the schedule to a date and time span by specifying the dates and times in the
fields provided by the section.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
414
Schedule Object Options
Terminate existing sessions – By default, sessions that match the rule using the schedule object stay active until they are closed or
time out. Selecting the Terminate existing sessions checkbox immediately terminates active sessions as soon as the time restriction
configured in the schedule applies. Sessions are not terminated between two time intervals which directly follow each other. (E..g, Tue
8:00 - Tue 9:00 and Tue 9:00 - Tue 10:00)
Block if schedule does not match – When you enable this option, the connection is blocked when the time schedule does not match,
since no further access rule will be evaluated.
Legacy Time Restriction Settings for Access Rules
Existing Time Restrictions (Edit Rule > Advanced > Miscellaneous > Time Restriction) for an access rule override the schedule objects of
an access rule. Barracuda Networks recommends configuring schedule objects instead of time restrictions in an access rule. Barracuda NG
Firewall firmware 6.1 or later no longer supports legacy time restrictions. Use schedule objects instead.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
415
How to Create and Apply Schedule Objects
Create schedule objects to configure rules with a time restriction. When applied to a host rule, application rule, or access rule, the schedule
specifies the days and times that an action handled by the rule, is allowed or denied. You can also select specific dates that the schedule is valid
for. Schedule Objects use the time of the NG Firewall they are running on.
In this article:
Before you Begin
Create a Schedule Object
Apply a Schedule Object to a Forwarding Rule
Before you Begin
Verify that the feature level of the Firewall service is set to 6.1 or later.
1. Go to Configuration > Configuration Tree > Box > Virtual Servers > your virtual server > Firewall > Forwarding Rules.
2. Click Lock.
3. In the left menu, expand the Settings section and click Setup.
4. Select Release 6.1 from the Feature Level dropdown.
5. Click OK.
6. Click Send Changes and Activate.
Create a Schedule Object
1. Go to Configuration > Configuration Tree > Box > Virtual Servers > your virtual server > Firewall > Forwarding Rules.
2. Click Lock.
3. In the left menu, click Schedules.
You can also create a schedule in the Object Viewer while editing an access rule.
4. Click the plus
sign to create a new schedule object, or right-click the table and select New Schedule Object. The Schedule window
opens.
5. In the Object Name field, enter a name for the schedule.
6. Configure the active time interval for the schedule object:
a. To create a schedule for a recurring interval, e.g., Every Monday - Tuesday 14:00 - 15:00, and Thursday - Friday 09:00 - 15:00:
i. Select the Enable Recurring Schedule checkbox.
ii. Click the plus sign
to add a time interval.
iii. Select the weekdays and hours from the dropdown fields provided in the section.
Recurring time intervals must be between Monday 0:00 to Monday 0:00 of the next week. Create multiple entries if the
time interval passes the Mo 00:00 threshold. For more information, see Configuring Daytime Intervals in Schedule
Objects.
b. To create a schedule for a specific date and time span:
i. Select the Restrict to time interval checkbox.
ii. Enter or select the dates and times in the fields provided in the section.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
416
7. Select Terminate existing sessions if you wish active sessions to be terminated as soon as the time restriction begins.
8. By default, the rest of the access rules in the ruleset are evaluated when the schedule object of the access rule does not match. Select B
lock if schedule does not match to immediately block the connection when the schedule object does not match. No further rules will be
evaluated.
9. Click Save.
The schedule object is now listed in the Schedules window and can be applied to host rules, access rules, or application rules.
Apply a Schedule Object to a Forwarding Rule
1.
2.
3.
4.
5.
6.
Go to Configuration > Configuration Tree > Box > Virtual Servers > your virtual server > Firewall > Forwarding Rules.
Click Lock.
Edit the rule that you want to apply the schedule to.
Select the time object from the Schedules dropdown.
Click OK.
Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
417
User Objects
User objects restrict firewall rules to specific users and user groups. You can apply user objects to forwarding firewall rules and specify user
conditions such as login names, groups, and policy role patterns. You also have the option to include VPN groups in the object configuration.
User objects are populated by querying the external authentication servers or the local authentication service on the Barracuda NG Firewall. For
VPN, users objects can also query X.509 certificate patterns.
User Conditions
When you create a new user object, configure the following settings in the User Condition configuration window to define the users that the user
object applies to:
Authentication Pattern – The group assignments of the users, according to the affected external authentication scheme (MSAD, LDAP,
or RADIUS).
Policy Roles Patterns – The policy role patterns for VPN users when using the Barracuda Network Access Client. You can select:
healthy
unhealthy
untrusted
probation
X509 Certificate Pattern – The certificate conditions for VPN users and groups:
Subject/Issuer – The subject/issuer of the affected X.509 certificate. If multiple subject parts (key value pairs) are
required, separate them with a forward slash (/). For example, if OU=test1 and OU=test2 are required, select OU and enter tes
t1/test2.
Policy/AltName – The ISO number and the SubjectAltName according to the certificate.
VPN User Pattern – The VPN login and VPN group policy that the object has to apply to in the VPN Group field.
Authentication Method – In this section, you can specify the following settings:
Origin – Defines the type of originator. The following originators are available when configured:
VPNP (PersonalVPN)
VPNG (GroupVPN)
VPNT (Tunnel)
HTTP (Browser login)
Proxy (Login via proxy)
Server/Service/Box – Allows enforcing authentication on a certain server/service/box.
Create a User Object
How to Create and Apply Custom User Objects
How to Create and Apply User Objects for VPN Users
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
418
How to Create and Apply Custom User Objects
Create custom user objects to reference users and groups for implementation within the Barracuda NG Firewall forwarding rule set. In a user
object, you can enter conditions such as authentication patterns and policy roles, depending on your requirements, to define the users that you
want to include in the user object. You can also reference other user objects that have already been configured.
In this article:
Create a User Object
Apply a User Object to an Access Rule
Create a User Object
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. From the left menu, select Users and Groups.
4. Right-click the table and select New.
5. In the Edit/Create User Object window, enter a Name for the user object. For example: Trusted LAN Users
6. Click New to add a user condition. The User Condition window opens.
7. Enter the Login Name. Question marks (?) and asterisks (*) are allowed. If you enter a question mark and asterisk (?*), you must also
enter at least one character.
8. From the Group Patterns list, select the required group condition. You have the following options:
One Pattern must match (OR) – Users must match one of the patterns listed in the Group Patterns section.
All Patterns must match (AND) – Users must match all the patterns listed in the Group Patterns section.
9. Click Add to select your users. The Edit Group Pattern window opens.
This option lets you perform an AD Lookup. Select Use current AD Connection to check entries from your configured AD
domain controller or enter your search criteria in the provided fields.
10. Select the users and/or groups the user object applies to, and click OK.
11. After you specify the conditions for all of the users that you want to include in this object, click OK to create the user object.
12. Click Send Changes and Activate.
If you are using Offline Authentication, ensure that user-specific rules are sequenced after the fwauth rule (see How to Configure
Offline Firewall Authentication).
Apply a User Object to an Access Rule
To apply a configured user object to an access rule:
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Edit the access rule that you want to apply the user object to.
4. From the Authenticated User list, select the user object.
5. Click OK.
6. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Copyright © 2015, Barracuda Networks Inc.
419
Barracuda NG Firewall 6.1 Administrator's Guide - Page
420
How to Create and Apply User Objects for VPN Users
In user objects, you can enter either X.509 certificate patterns or VPN user patterns to reference VPN users and groups. With use of the Barracu
da Network Access Client, you can also reference users by policy role patterns.
Combining fields is also possible. For example, you can enforce a VPN connection (by entering required VPN user patterns) and require a
matching X.509 certificate to be installed in the browser application (by entering required X.509 certificate patterns).
In this article:
Create a User Object for VPN Users
Apply a User Object to a Firewall Rule
Create a User Object for VPN Users
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. From the left Firewall Objects menu, select Users and Groups.
4. Right-click the table and select New.
5. In the Edit/Create User Object window, enter a Name for the user object. For example: VPN Users
6. Click New to add a user condition. The User Condition window opens.
7.
If you are using the Barracuda Network Access Client, enter the policy roles patterns in the Policy
Roles Patterns section.
a. Select the required condition from the list.
b. Click Add and select one or more patterns. If a condition must not apply, select the Negative Match check box.
8. To use a certificate, click Edit in the X509 Certificate Pattern section and specify the certificate conditions:
Subject/Issuer – The subject/issuer of the affected X.509 certificate.
If multiple subject parts (key value pairs) are required, separate them with / (for example, OU=test1 and OU=test2 are
required, select OU and enter test1/test2). Using wildcards (?, *) is allowed. Take into consideration that order is
mandatory.
Policy/AltName – The ISO number and the SubjectAltName according to the certificate.
9. If applicable, enter the required VPN login and group policy the object has to apply to in the VPN User Pattern section:
VPN Name – The required VPN login name. Using wildcards (?, *) is allowed.
VPN Group – The required VPN group policy that the object has to apply to.
Authentication Method – In this section, you can specify the following settings:
Origin – Defines the type of originator (see User Objects).
Server/Service/Box – Allows enforcing authentication on a certain server/service/box.
10. Click OK.
11. After you specify the conditions for all of the users that you want to include in this object, click OK to create the user object.
12. Click Send Changes and Activate.
If you are using Offline Authentication, ensure that user-specific rules are sequenced after the fwauth rule (see How to Configure
Offline Firewall Authentication).
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
421
Apply a User Object to a Firewall Rule
To apply a configured user object to a firewall rule:
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Edit the firewall rule that you want to apply the user object to.
4. From the Authenticated User list, select the user object.
5. Click OK.
6. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
422
Connection Objects
A connection object defines the egress interface and source (NAT) IP address for traffic matching the firewall access rule. If a source IP address
is specified, the appropriate link will be used based on the routing table. If an interface is specified, the appropriate source IP address will be used
based on the routing table. You can use the predefined connection objects or you can create new connection objects.
Connection Objects
Dynamic SNAT – The firewall uses the routing table to find a suitable interface for routing the packet and uses the IP address of the
relevant interface as the new source IP address.
No SNAT – The original source IP address of the packet is not changed.
SNAT with 3G IP – Source NAT is using the first IP address on the ppp5 device.
SNAT with DHCP IP – Source NAT is using the first IP address on the dhcp device.
SNAT with DSL IP – Source NAT is using the first IP address on the ppp1 device.
Custom Connection Objects (explicit-conn) – Create your own custom connection objects, to define the explicit source address for
this connection.
NAT Tables – NAT Table are a expanded type of source NAT for a network or IP address range.
For more information, see How to Create a Custom Connection Object and How to Create NAT Tables (Translation Maps).
Failover and Link Load Balancing
For every custom connection objects you create a failover and link/load balancing can be defined.
For more information, see How to Configure Link Balancing and Failover for Multiple WAN Connections.
Multipath Routing
Multipath routing is used when multiple paths are used to route traffic through a single target network. Multipath routing offers benefits such as
increased bandwidth. When a session is established, the Barracuda NG Firewall assigns a network path to the session based on the source
address.
For more information, see How to Configure Multipath Routing.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
423
How to Configure Multipath Routing
Firewall-assisted multipath routing is used when multiple paths are used to route traffic through a single target network. Multipath routing offers
benefits such as increased bandwidth. When a session is established, the Barracuda NG Firewall assigns a network path to the session based on
the source address. The weight of a multipath gateway determines how often the path is used in comparison with the others. If all multipath
gateways are given the same weight, the load is distributed evenly over all available multipath gateways.
Use connections and link balancing via connection objects in the Firewall service if you require failover support. If one part of the
multipath connection goes down, the entire multipath route is considered down even if the other multipath gateways are still up and
running.
Configure Multipath Routing
Create a multipath route and set the weight of each link according to your preferences.
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Network.
In the left menu, click Routing.
Click Lock.
In the left menu, expand the Configuration Mode section and click Advanced View.
5. Add
a route to the Main Routing Table.
6. Enter a Name for the multipath route.
7. Enter the settings for the multipath route:
Target Network Address – Enter the target network. For example, enter 0.0.0.0/0 if you want to use a multipath route as the
default route
Route Type – Select multipath.
Trust Level – Select the trust level for the route. For example, select Untrusted for a WAN connection
Route Metric – Enter the route metric for this route. If you want traffic to the target network to take this route, ensure that no
other route to the same destination has a lower metric.
Multipath Gateway – Click
and enter the following settings for each multipath gateway:
Multipath Gateway – Enter the IP address for the gateway. For example, enter 10.0.10.11 for the first gateway in
the previous figure.
Weight Number – Enter the weight number for this multipath gateway.
Assigned Source – Enter the IP address that you want to use as the source IP address.
8. Click OK.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
424
9. Click Send Changes and Activate.
10. Open the CONTROL > Box page and click Activate new network configuration.
Now you can send traffic to the Target Network of the multipath route and the traffic will be distributed across the configured multipath gateways
according to the assigned weight. Balancing might not be perfect, because the link is selected based on a route table lookup, and route lookups
are cached. Routes to heavily used IP addresses will most likely always be over the same link.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
425
How to Create a Custom Connection Object
Connection objects are used to rewrite the source IP address of a connection. Connection object is also used for outbound loadbalancing and
failover support. A custom connection object allows you to combine loadbalancing / failover support with a custom source IP address.
Create a Custom Connection Object
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left menu, click Connections.
3. Right-click the table and select New Connection. The Edit/Create a Connection Object window opens.
4. In the Name field, enter a name for the connection object. E.g., CustomConnectionObject
5. From the NAT Address list, select how the source address should be determined for your connection:
Client | No Src NAT – Uses the source IP
Source-based NAT – Dynamically chosen according to firewall routing tables. This is a general purpose option.
Src NAT – 1st Srv IP (Proxyfirst) – Uses the First-IP[IP1] configured in the virtual Server Properties the firewall service is
running on.
Src NAT – 2nd Srv IP (Proxysecond) – Uses the Second-IP[IP2] configured in the virtual Server Properties the firewall
service is running on.
From Interface – Explicitly specified interface. May be used to restrict the bind address to a specific interface. Selecting
Interface activates further options below and in section Firewall configuration Explicit – Explicitly specified IP address. May be used to restrict the bind address to a specific address. Selecting Explicit activ
ates further options below and in section Firewall Configuration – Service Objects – General settings – section Failover
and Load Balancing:
Same Port – Ticking this checkbox enforces to use the same client port when establishing the connection.
Explicit IP – Here the specific IP address is to be entered.
Create Proxy ARP – If the explicitly defined IP address does not exist locally, an appropriate ProxyARP entry may be
created by selecting this checkbox.
Network Object – section Failover and Load Balancing:
Interface Name – Here the name of the affected interface is to be entered.
Translation Table – Source NAT for a complete subnet. In order to avoid misconfiguration, the netmasks up to 16 bits can be
used. Otherwise, a Proxy ARP with 10.0.0.0/8 would "blank out" the whole internal network for example.
If you define a map, make sure that the source range using this connection is equal or smaller than the map range. If
not, the firewall will wrap the larger source net into the smaller bind net. E.g., If you use X.X.X.X/24 network as source
and a Y.Y.Y.Y/25 as the map range, the IP address X.X.X.128 is mapped to Y.Y.Y.1.
6. Map to Network – Here the specific mapping network is to be entered.
7. Netmask – Here the corresponding netmask is to be entered.
8. Proxy ARP – This parameter is needed by a router if the addresses live in its local network. For more information, see How to Create
Proxy ARP Objects.
If the connection object applies to a multi-transport VPN tunnel, you can define the preferred and secondary transport class in
the VPN Traffic Intelligence (TI) Settings section.
9. Click OK.
10. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
426
You can now apply the connection object to your firewall rules. Double-click a rule´s number (or right click an existing firewall rule and select Edit
Rule to open the rule configuration). From the left navigation pane, select the Object Viewer check box to drag connections objects from the Obj
ect Viewer window to the Connection Method table.
Parameters
Click here to expand...
General Settings
Parameter
Description
Name
Name of the connection object.
Description
Significant connection object description.
Connection Color
Choose a color, in which you want the connection object to be
displayed in the Firewall - Connections window.
Connection Timeout
This general option for all connection types is the timeout for trying
to establish a connection. The default value is 30 seconds.
Increasing this value can be useful for very protracted connection
partners. Decreasing this value can be useful for faster failover
mechanisms.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
427
This parameter specifies the Bind IP. The following options are
available:
NAT Address
Proxyfirst | Src NAT - 1st Server IP – First IP address of
server under which firewall service is operating. May be used
to restrict the bind address or when policy routing is activated.
Proxysecond | Src NAT - 2nd Server IP – Second IP
address of server under which firewall service is operating.
May be used to restrict the bind address or when policy
routing is activated.
Proxy Dyn | Dynamic Source NAT (default) – Dynamically
chosen according to firewall routing tables. This is a general
purpose option.
Client | No Src NAT – IP Address of the Client. Source IP =
Bind IP.
Explicit – Explicitly specified IP address. May be used to
restrict the bind address to a specific address. Selecting Expli
cit activates further options below and in section Firewall
Configuration – Service Objects - General settings –
section Failover and Load Balancing:
Same Port – Ticking this checkbox enforces to use the
same client port when establishing the connection. This
setting has no effect if the Failover and Loadbalancing
policy is not set to NONE.
Explicit IP – Here the specific IP address is to be
entered.
Create Proxy ARP – If the explicitly defined IP address
does not exist locally, an appropriate ProxyARP entry
may be created by selecting this checkbox.
From Interface – Explicitly specified interface. May be used to
restrict the bind address to a specific interface. Selecting
Interface activates further options below and in section Firewa
ll configuration – Service Objects - General Settings –
section Failover and Load Balancing:
Interface Name – Here the name of the affected interface
is to be entered.
Translation Table – Source NAT for a complete subnet. In
order to avoid dramatic misconfiguration, the netmask is
limited to up to 16 bits. Otherwise, a Proxy ARP with
10.0.0.0/8 would "blank out" the whole internal network for
example.
If you define a map, you’ve got to make sure that
the source range using this connection is equal or
smaller than the map range. If not, the firewall will
wrap the larger source net into the smaller bind net.
Map to Network – Here the specific mapping network is to be
entered.
Netmask – Here the corresponding netmask is to be entered.
Proxy ARP – This parameter is needed by a router if the
addresses live in its local network. For more information, see
How to Create Proxy ARP Objects.
The section Failover and Load Balancing is only available with parameter Address Selection set to Explicit or Interface.
Failover and Load Balancing
Parameter
Description
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Policy
428
This parameter allows you to specify what should happen if the
connection cannot be established. Especially when having multiple
providers and policy routing this parameter comes handy because
it allows you to specify which IP address/interface has to be used
for backup reasons. Otherwise, connecting via the backup provider
using the wrong IP address in conjunction with the backup provider
would make routing back quite impossible. Available policies are:
NONE – (No Fallback or Source Address Cycling) [default
setting] Selecting this option deactivates the fallback feature.
Fallback – (Fallback to alternative Source Addresses) Causes
use of the alternative IP addresses/interfaces specified below.
SEQ – (Sequentially Cycle Source Addresses) Causes cycling
of the IP addresses/interfaces specified below.
RAND – (Randomize Source Addresses) Causes randomized
usage of the IP addresses/interfaces specified below.
Configuration examples related to multipath routing are described
below in more detail in the section Barracuda NG Firewall Multipath
Routing.
Alternative/Type
Here up to three Alternative IP addresses or interfaces can be
configured for use with the selected policy.
Usage of alternative interfaces is recommended when no
permanently assigned IP address exists on an interface.
Weight
Assigns a weight number to the IP address or interface. Higher
numbers mean higher priority. When performing load balancing,
the weight numbers represent the traffic balancing ratio of the
available links. A weigh ratio of 40:20:10 means that traffic is
balanced over the configured interfaces in a ratio of 4:2:1. Thus the
first link will process twice as much traffic as link two and four times
as much as link three.
VPN Traffic Intelligence (TI) Settings
Settings configured in this section only apply to Traffic Intelligence configuration in combination with TINA tunnel VPN technology. See Traffic
Intelligence for details.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
429
How to Create NAT Tables (Translation Maps)
NAT Table are a expanded type of source NAT for a network or IP address range. The NAT Tables connection object rewrites the source IP
address to a source NAT IP address range. To rewrite both the destination and the source address of the connection, you can choose to use a
NAT Table connection object with a MAP firewall rule. You can enter multiple rewriting maps that are are processed from the top to the bottom.
The first matching rewrite map is used.
Create a NAT Table Connection Object
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. From the left menu, click Connections.
3. Click Lock.
4. Right-click the table and select New >NAT Table.
5. Enter a Name for the NAT Table.
If you want to use this NAT Table in a firewall rule, select this name from the Connection list in the firewall rule settings.
6. In the Original Address/Net/Range field, enter the source IP range or network.
7. In the Translated Address field, enter the network that you want the source IP address or network to be rewritten to.
8. Unless the destination network is connected by a Layer 2 bridge to the source network, select the Proxy ARP check box.
9. Click New to add the addresses to the list.
10.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
430
10. Click OK.
11. Click Send Changes and Activate.
Apply the NAT Table to a Firewall Rule
To apply a NAT Table object to a firewall rule, select the object from the Connection list in the firewall rule settings.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
431
Proxy ARPs
The Address Resolution Protocol (ARP) is predominantly used to resolve IPv4 IP addresses to the corresponding MAC addresses. ARP sends a
broadcast request including the IP address to all hosts in the same subnet. The host with the requested IP address then replies with the MAC
address of the interface that the IP address is bound to. To connect two physically separated networks, a host (the Barracuda NG Firewall) must
be configured as a proxy ARP to answer ARP requests for hosts in the other subnet which cannot be reached by the ARP broadcast. The
Barracuda NG Firewall then answers ARP requests on behalf of the remote host and also accepts packets, taking over responsibility for
forwarding all traffic to the actual destination. This is called transparent subnetting, as the client computer can connect to the remote host without
knowing that the firewall is forwarding its request in between.
The proxy ARP configuration is done via proxy ARP objects. Proxy ARPs can thus be regarded as additional IP addresses that the firewall
responds to when it receives an ARP request. Proxy ARP addresses can be used for redirecting and mapping in firewall rule sets, if they are in
the same address space as the source of a connection request. Additionally, Proxy ARP objects are used in bridging setups.
Proxy ARP Types
You can create either a standalone or dynamically generated proxy ARP object.
Dynamically generated – These proxy ARPs exist as long as the objects that they have been created for are used, and they are deleted
when the objects referring to them are deleted. To create proxy ARPs, select the Proxy ARP/Create Proxy ARP check box next to a
specific configuration parameter’s properties in other configuration areas (rule configuration window, connection object dialog).
Standalone – If you want to use a proxy ARP object that is not connected to a referring object, create it as standalone. As standalone,
proxy ARP objects cannot be accidentally deleted if the referring object is deleted.
Recommendations and Limitations
You can define up to 256 proxy ARP entries per Barracuda NG Firewall. Only the numbers of entries are limited; the number of IP
addresses are not limited.
Do not create proxy ARPs in the subnet where the firewall IP address is configured as the gateway IP address, because traffic for other
networks are sent to the gateway. The following provide of examples of a subnet where proxy ARP can be used and a subnet where
Proxy ARP cannot be used.
Localnet
Firewall IP
Default Gateway IP
Redirected IP
Create Proxy ARP
10.0.0.0/24
10.0.0.100
none
10.0.0.10
yes
10.0.0.0/24
10.0.0.100
10.0.0.100
10.0.1.10
no
Create a Proxy ARP Object
For more information, see: How to Create Proxy ARP Objects.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
432
How to Create Proxy ARP Objects
You can configure the Barracuda NG Firewall to answer ARP requests on behalf of a remote interface. It can then accept packets and correctly
forward packets to the remote host. Proxy ARPs can be treated like additional IP addresses that the firewall responds to when it receives an ARP
request. If proxy ARP addresses are in the same address space as the source of a connection request, use them for redirecting and mapping in
firewall rule sets. You can also use proxy ARP objects for bridging.
Do not create Proxy ARPs in address spaces where the firewall IP address is configured as the gateway IP address.
You can create a Proxy ARP object as a standalone object or in combination with a connection object. However, the proxy ARP object is then
dependent on the connection object; if the connection object is deleted, the proxy ARP object is also deleted.
Create a Proxy ARP Object
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left menu, expand the Firewall Objects section and click Proxy ARPs.
3. Click Lock.
4. Right-click the main pane and select New.
5. In the Edit/Create a Proxy ARP Object window, configure the settings for your proxy ARP object:
Expand proxy ARP settings explanations ...
Setting
Description
Network Address
Enter a single IP address or a complete network.
Standalone
To let the proxy ARP object exist without a referring object
(such as a connection object), select this check box.
Otherwise, the proxy ARP object is deleted if the referring
object is deleted. The Standalone setting is enabled by
default.
Primary Network Interface
Interface that is used when responding to an ARP request. You
can either enter a specific network interface (e.g., eth1), or
select one of the following options:
match (default) – ARP requests are answered via the
interface that hosts the network.
any – ARP requests are answered via any interface.
Additional Interfaces
Additional interfaces that are used when responding to ARP
requests. Only enter interfaces that do not conflict with the
primary network interface. You can enter a space-delimited list
of interfaces.
Exclude Networks
Network addresses that sare from the network entered in the N
etwork Address field. Enter a space-delimited list of
addresses to exclude multiple IP networks.
Source Address Restriction
Network addresses that must be used as the source IP
address when responding to ARP requests. Enter a
space-delimited list of source addresses.
Introduce Route on Interface
Read-only field that displays the bridging interface route when
using the proxy ARP for bridging.
For more information, see Bridging.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Send Unsolicited ARP
433
To configure the firewall to propagate specified IP addresses
through ARPs, select this check box. The Send Unsolicited
ARP setting is enabled by default.
Unsolicited ARPs can only be sent if the
corresponding network interface has an active IP
address. The status of the IP address is only verified
when the forwarding firewall starts up, such as
during an HA takeover or when the firewall rule set
changes. The status of the IP address is not verified
if the network interface changes into state "up" or if a
pending route becomes active, such as when a
server IP address is introduced. In this case, only the
Proxy ARP is introduced to answer incoming ARP
requests.
6. Click OK.
7. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
434
How to Create Interface Groups
Processing of a firewall rule does not necessarily need to be associated with the physical network environment on a Barracuda NG Firewall box,
which is configured on box level. On systems equipped with multiple network interfaces, you can explicitly define specific interfaces for usage
when a rule comes into action.
An interface group specifies the interface that the source address is allowed to use. When you create firewall rules, you can use predefined
For each rule an
interface may be assigned to origin and destination of the connection request when selected in the Connection
Objects settings.
groups, or if you want to reference custom interfaces that are not in the default list, you can create custom interface groups.
In this article:
Predefined Interface Groups
Create an Interface Group
Predefined Interface Groups
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. From the left navigation pane, expand the Firewall Objects menu and select Interface Groups.
The following predefined network interface objects are available for selection:
Any – With this setting the first interface matching the request is utilized for the connection in accordance with routing configuration. The
packet source is not verified. Reply packets might be forwarded through another interface, if multiple interfaces capable of doing so
are available. Not to check the physical source of packets might sometimes be needed in very special configurations.
For security reasons do not use this setting without explicit need.
Matching (default) – This setting ensures that arriving packets are processed through the same interface, which will forward
the corresponding reply packets. Source and destination addresses are thus only reversed. This method aims at preventing a network
attack, in which an attacker might try using internal addresses from outside the internal network (IP spoofing).
With eventing activated (parameter IP Spoofing set to yes), IP spoofing identification will trigger the events FW IP Spoofing
Attempt Detected [4014] and FW Potential IP Spoofing Attempt [4015].
RAM, ADSL, DHCP, ISDN, SERIAL, 3G, ... – Explicitly restricts rule processing to the specified dynamic network interface (if installed
and configured).
Create an Interface Group
To create a new interface group, proceed with the following steps:
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Right-click the table and select New.
4. In the Edit/Create an Interface Group window, enter a descriptive Name for the interface group.
5. From the Interface drop-down list, select your desired option:
match (default) – This setting ensures that arriving packets are processed through the same interface, which will forward
the corresponding reply packets. Source and destination addresses are thus only reversed. This method aims at preventing a
network attack, in which an attacker might try using internal addresses from outside the internal network (IP spoofing).
With eventing activated (parameter IP Spoofing set to yes), IP spoofing identification will trigger the events FW IP
Spoofing Attempt Detected [4014] and FW Potential IP Spoofing Attempt [4015].
any – With this setting the first interface matching the request is utilized for the connection in accordance with routing
configuration. The packet source is not verified. Reply packets might be forwarded through another interface, if multiple
interfaces capable of doing so are available. Not to check the physical source of packets might sometimes be needed in very
special configurations.
For security reasons do not use this setting without explicit need.
eth0 - 4 – Lets you select a specific port.
dhcp – Explicitly restricts rule processing to the specified dynamic network interface (if installed and configured).
6. Click Add to add the interface to the list.
7. Click OK.
8. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
435
Application Control 2.0
With Application Control 2.0, you can control application traffic, including sub-applications (e.g., chat function and picture uploading). It includes
the following features:
Application Rule Set – Dedicated rule set to detect and control application traffic. You can create rules to drop, throttle, prioritize, or
report detected applications. Traffic patterns are compared to predefined application objects containing detection patterns to detect the
latest applications. The application pattern database is updated with every Barracuda NG Firewall firmware update. You can also
customize application definitions based on previously analyzed network traffic. To classify applications and threats, all application objects
are categorized based on risk, bandwidth, or vulnerabilities.
URL Filtering – Based on the Barracuda Web Filter URL category database.
SSL Interception – Most applications encrypt outgoing connections with SSL or TLS. SSL Inspection intercepts and decrypts encrypted
traffic to let Application Control 2.0 detect and handle embedded features or sub-applications of the main application. For example, you
can create a policy that permits the general usage of Facebook but forbids Facebook chat. If you choose not to enable SSL Inspection,
the main applications can still be detected. For example, Facebook can still be detected without SSL Inspection, but you will not be able
to determine if Facebook chat or a Facebook app is being used.
AV Scanning – If AV scanning is activated in a forwarding firewall rule, all matching traffic is scanned for malicious content. You can use
Avira and/or clamav scanners.
ATD – If ATD is enabled in an access rule, all matching traffic is scanned for malicious content by the virus scanner and if no virus is
found and the file matches the ATD policy, the file is uploaded to the Barracuda Content Security Cloud for scanning.
Safe Search – Enforce safe search on Google, Bing, Yahoo and YouTube.
YouTube For Schools – Only allow access to the YouTube for Schools channel connected with the YouTube for Schools token supplied
by YouTube.
You can use Application Control 2.0 in combination with HTTP(S) proxies. However, the detection of sub-applications might not be available
depending on the configuration and type of proxy service. For more information, see Using Application Control 2.0 with HTTP(S) Proxies.
In this article:
Understanding Application Control 2.0
Using Application Control 2.0
Understanding Application Control 2.0
Because applications either are web-based or connect via SSL or TLS encrypted connections to servers in the Internet, they can be detected and
then controlled as they pass the Barracuda NG Firewall. If Application Control 2.0 and SSL Interception is enabled in the forwarding firewall rule
that handles the application traffic, then the traffic is sent to the application rule set and processed as follows:
1. SSL traffic is decrypted.
2. Application rules are processed from top to bottom to determine if they match the traffic. If no rule matches, the default application policy
is applied.
3. If a matching application rule is found, the detected application is handled according to the rule settings. The application can be reported,
or it can be restricted by time, bandwidth (QoS), user information, or content (e.g., MPEG).
4. If the traffic was decrypted, it is re-encrypted.
5. The traffic is sent back to the forwarding firewall, which forwards it to its destination.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Using Application Control 2.0
How to Enable Application Control 2.0
Application Rule Set and Lists
How to Create a Custom Application Object
How to Create an Application Object
How to Create a Protocol Object
How to Create an Application Filter
How to Create an Application Rule
Application Based Provider Selection
How to Override the Risk Classification of an Application
Using Application Control 2.0 with HTTP(S) Proxies
Copyright © 2015, Barracuda Networks Inc.
436
Barracuda NG Firewall 6.1 Administrator's Guide - Page
437
How to Enable Application Control 2.0
Application Control 2.0. expands the scope of the Firewall engine to include application type as a matching criteria. If an access rule matches that
Application Control is enabled for, the application ruleset is processed from top to bottom and the action set in the first matching application rule is
executed (block or deny). Application detection for applications using SSL-encrypted connections allow for more granular control when SSL
Interception is enabled. Application Control 2.0 is currently limited to IPv4. Additional features of the Forwarding Firewall that require Application
Control 2.0 are SSL Interception, Web Filtering, Virus Scanning, and ATD.
In this article:
Supported NG Firewall Models
Enable Application Control 2.0
Supported NG Firewall Models
Feature
Supported NG Firewall Model
Application Control
Available on all Barracuda NG Firewall models with valid Energize
Updates subscription. On hardware models without valid Energize
Updates subscription or with a legacy phion license, Application
Control is limited to detecting applications only.
SSL Interception
Available on all Barracuda NG Firewall models with valid Energize
Updates subscription, except F10 and F100/F101.
URL Filter
Available on all Barracuda NG Firewall models with valid Energize
Updates subscription, except F10.
Virus Scanning
Available on all Barracuda NG Firewall models with valid Energize
Updates and Malware subscriptions, except F10.
Advanced Threat Detection
Available on all Barracuda NG Firewall models with valid Energize
Updates, Malware, and Advanced Threat Detection subscriptions, ex
cept F10 and F100/F101.
Safe Search and
YouTube for Schools
Available on all Barracuda NG Firewall models with valid Energize
Updates subscription.
Enable Application Control 2.0
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left menu, expand Settings and click Setup. The Ruleset Setup window opens.
3. Verify that the correct Feature Level is selected:
Feature
Required Firewall Feature Level
Application Control 2.0
Release 5.4.0 or later
SSL Interception
Release 5.4.0 or later
URL Filter
Release 5.4.2 or later
Virus Scanning in the Firewall
Release 5.4.3 or later
ATD
Release 6.0.0 or later
Safe Search
Release 6.1.0 or later
YouTube for Schools
Release 6.1.0 or later
4.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
438
4. To enable the use of application rules, select Use Application Ruleset from the Application Ruleset list.
5. Click OK.
6. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
439
Application Rule Set and Lists
On the Forwarding Firewall - Rules page, you can view and configure the application rule set. You can also view the list of application and URL
filter objects that can be used in application rules.
In this article:
Application Rule Set
Application Objects List
URL Filter Objects List
Application Rule Set
In the Application Rules section of the Forwarding Firewall - Rules page, you can view and edit the application rule set. It lists all of the
application rules that have been created. After adding a new application rule, you can directly edit specific rules. For more information, see Firewa
ll Access Rules
The following figure displays the application rule set.
In the rule set, information and settings for each rule is organized into the following columns:
Column
Description
Name
The name of the application rule.
Application
The applications and sub-applications that are affected by the rule.
You can either statically assign specific applications or use an
application object.
Barracuda Networks recommends that you use Application Object or
Application Filter instead of linking static applications to access rules.
Content
The types of multimedia content that are affected by the rule. You
can choose to globally block Flash, AVI, MPEG, QuickTime, and
RealMedia content in websites.
URL Filter Match
The URL Filter Match policy that are affected by the rule. You can
either statically assign specific URL filters or use an existing URL
filter match object.
Barracuda Networks recommends that you use URL Filter Match
Objects instead of linking static URL Filter Match policies to access
rules.
URL Filter Policy
The URL Filter Policy that are affected by the rule. You can either
statically assign specific URL Policies or use an existing URL Filter
Policy object.
Barracuda Networks recommends that you use URL Filter Policy
Object instead of linking static URL Filter policies to access rules.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
440
Protocol
The protocols that are affected by the rule. With protocols, traffic can
be controlled without having to match criteria like source or
destination network. For example, you can select protocols to
globally detect IPsec or SMTP network traffic and apply QoS policies
to prioritize business critical network communications without needing
to know the origin or target.
User
The users and user groups who are affected by the rule.
Schedule
The time or date during which the rule can be applied.
QoS
The traffic shaping settings that are used by the rule. For more
information, see Traffic Shaping and How to Create and Apply QoS
Bands.
Action
The action that is performed when the application is accessed by the
user (Deny or Pass).
Source
The source network address of the traffic that is affected by the rule.
Because the source network is already evaluated in the Access Rule
set, you can either use Any or enter specific IP addresses.
Destination
The destination network address of the traffic that is affected by the
rule. Because the destination network is already evaluated in the
Access Rule set, you can either use Any or enter specific IP
addresses.
Comment
Optional. Additional information about the application rule.
IPS Policy
The Intrusion Prevention System (IPS) policy that is enforced by the
rule. For more information on IPS, see Intrusion Prevention System
(IPS).
Usage
Optional. Additional information about the application rule.
TI-Settings
The Traffic Intelligence (TI) settings. For more information, see Traffic
Intelligence.
Application Objects List
In the Applications section of the Forwarding Firewall - Rules page, you can view, create, and edit the applications and application objects that
are used in application rules. Applications are organized into the following categories:
Application Object – Lists any application objects that you have created. An application object is a reusable combination of predefined
applications, custom applications, and other applications objects. Application objects help simplify the configuration of application rules.
For more information, see How to Create an Application Object.
Protocol Object – Lists any protocol objects that you have created. A protocol object is a reusable combination of predefined
protocols. For more information, see How to Create a Protocol Object.
Custom Application – Lists any custom applications that you have created. If the default Application Control 2.0 pattern database does
not cover an application that you want to use in your application rules, you can customize an application. For more information, see How
to Create a Custom Application Object.
Application Overrides – Lists any applications whose risk levels you have changed. For more information, see How to Override the
Risk Classification of an Application.
Applications – Lists predefined applications from the Application Control 2.0 database.
The following figure displays the Applications section.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
441
The following information is provided for each application and application object:
Name – The name of the application including the icon of the service/application.
Ref by – The reference to which application object the selection points. This is applied when an
application filter is created. Note that referenced objects cannot be deleted.
Description – A description of the application including type and features.
Comment – General information about the application.
URL Filter Objects List
In the URL Filter section of the Forwarding Firewall - Rules page, you can view, create, and edit URL filter objects that are used in application
rules.
The following information is provided for each URL filter object:
Name – The name of the URL filter object.
Ref by – The reference to which URL filter object the selection points. Note that referenced objects cannot be deleted.
Description – A description of the URL filter object, including type and features.
Comment – General information about the URL filter object.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
442
How to Create a Custom Application Object
If the default Application Control 2.0 pattern database does not include an application that you want to use in your application rules, you can
create a custom application object. Select a template for an existing application and configure it to match the application that you want to drop,
throttle, prioritize, or report.
Create a Custom Application Object
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left menu, expand Firewall Objects and select Applications.
3. Click Lock.
4. Create the custom application by either right-clicking the table and selecting New > Custom Application or using the icons in the
top-right area of the rule set.
5. Select an application to customize and click
OK.
6. You can customize the following settings for the application:
Name – The name of the application.
Comment – Additional information about the application.
Category – The category of the application.
Risk – The risk level of the application, from 1 (low) to 4 (high).
Properties – The properties of the application.
Application Name – If
you want to customize specific components of the application, add the
component names. To get the name of a component, go to the Firewall > Monitor page, click the
application, and see the Deep Application Control window in the Application Statistics section
. Examples:
Facebook – Use the canvas name of the FB application: https://apps.facebook.com/<canvasname>.
SSL – Create matching criteria based on X.509 certificate content.
Web browsing – Create matching criteria based on URL host (www.acme.com) or URL path (/images?/)
7. Click Save.
The following figure displays the process for creating a custom application.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
443
How to Create an Application Object
An application object is a reusable combination of predefined applications and custom applications. You can use application objects to create
your own set of applications with custom include and exclude lists.
Create an Application Object
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. In the left menu, expand Firewall Objects and select Applications.
4. Create the application by either right-clicking the table and selecting New > Application Object or using the icons in the top-right area of
the rule set.
5. Filter the available applications by Name or Category.
6. Select the applications that you want to add to your application objects and either drag them to the Application Set section or click the
plus sign (+) that appears in the Name column.
If an application consists of more than one component, you can add the parent application and to also add the child objects.
7. Click Result to view a list of all currently selected applications.
8. To exclude specific sub-applications from applications containing of more than one component:
a. Expand the application.
b. Click the minus icon (-) icon next to the application features that you want to exclude.
The base component belongs to the application and must never be excluded separately.
9. Click Save.
10. Click Send Changes and Activate.
The following figure displays the process for creating an application object:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
444
How to Create a Protocol Object
Internet communication systems are based on defined protocols that reside in the application layer (most common: HTTP, HTTPS, or SMTP) and
guarantee that users can visit websites, access encrypted online banking accounts, and send emails through the web. Although Application
Control 2.0 works on the application layer and detects applications based on communication patterns, you still want to have full control over
generic network communication protocols like IPsec, BGP or SIP. In critical back-end environments (like MSSP), Application Control 2.0 detection
based on protocol objects is the right tool to detect, classify, regulate, or even block generic IP-based protocols independent from communication
criteria like source and destination network or even protocol.
Create a Protocol Object
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. In the left menu, expand Firewall Objects and select Applications.
4. Create the protocol object by either right-clicking the table and selecting New > Protocol Object or using the icons in the top-right area
of the rule set.
5. Either search or filter for the protocols to include in the object.
6. Add protocols by either dragging them to the Protocol Set section or clicking the plus sign (+) next to their names.
7. If an application consists of more than one component, you can add the parent application to also add the child objects.
8. Click Save.
9. Click Send Changes and Activate.
The following figure displays the process for creating a protocol object.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
445
How to Create an Application Filter
Application filters are objects that are dynamically updated to include applications based on category, risk, or properties selection. Any
applications that match the criteria of the application filter are automatically added to the application filter object.
Create an Application Filter
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. In the left menu, click Applications.
4. Create the filter by right-clicking the table and selecting New > Application Filter or using the icons in the top-right area of the rule set.
5. Select the categories, risk level, and properties for the applications to be filtered into the object.
6. Click Save.
7. Click Send Changes and Activate.
The following figure displays the process for creating an application filter.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
446
How to Create an Application Rule
Configuring an application rule is similar to configuring an access rule. You can enable Application Control 2.0 features on a per access rule
basis. Application rules allow you to block or throttle traffic for detected applications. You can optionally combine the application rule with a URL
filter policy objects. The application ruleset is evaluated every time an access rule matches that has enabled any of the Application Control
options. Make sure the matching access rule allows all protocols needed for the applications you are creating policies for. The application ruleset
can be created as a positive or negative list, depending on whether the default policy is set to allow or block undetected applications per default.
In most cases setting the default policy to allow undetected applications and then creating application rules to block or throttle application traffic is
the recommended setup.
In this article:
Before you Begin
Step 1. Enable Application Control Features in the Access Rule
Step 2. Create an Application Rule
Additional Matching Criteria
URL Filter
Applying Traffic Shaping to Detected Applications
Before you Begin
Verify that you have enabled Application Control 2.0 and that you are using the latest feature level of the Firewall service. For more
information, see How to Enable Application Control 2.0.
Create Application Objects and/or Application Filters necessary for your application policies. For more information, see How to Create
an Application Object and How to Create an Application Filter.
Step 1. Enable Application Control Features in the Access Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Double-click to edit the access rule you want to enable application control for.
3. Click on the Application Policy link.
4. Select the Application Control 2.0 features used for this access rule:
Application Control
SSL Interception
URL Filter
AV Scan
ATD
Safe Search
YouTube for Schools
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
447
5. Click OK.
6. Click Send Changes and Activate.
Step 2. Create an Application Rule
For each application policy create an application rule. Rules are evaluated from the top to bottom. The action set in the first matching rule is
executed.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left menu, click Application Rules.
3. Click Lock.
4. Click the green plus sign (+) in the top right of the page or right-click the rule set and select New > Rule. An application rule New Rule is
added to the application ruleset.
5. Double click on the New Rule application rule you just created. The Edit Rule window opens.
6. Select Pass or Deny as the action.
7. Enter a name for the rule. For example, LAN-DMZ.
8. Specify the following settings that must be matched by the traffic to be handled by the access rule:
Source – The source addresses of the traffic. The source must be the same or a subset of the source of the matching access
rule.
Destination – The destination addresses of the traffic.The destination must be the same or a subset of the destination of the
matching access rule.
Application – Select the application object or application filter.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
448
For the example access rule displayed above, a network object named FacebookAndGooglePlus has been created. For
more information, see How to Create an Application Object and How to Create an Application Filter.
9. Set Additional Matching Criteria or change the QoS Bands as needed (see below).
10. Click OK.
11. Drag and drop the application rule so that it is the first rule that matches the traffic that you want it to forward. Ensure that the rule is
located above the BLOCKALL rule; rules located below the BLOCKALL rule are never executed.
12. Click Send Changes and Activate.
Additional Matching Criteria
Authenticated User – Select a user object to apply this application policy only to a specific user group. For example, you can use this to
allow social media access to specific employees, whereas an application policy below denies it for everybody else. For more information,
see User Objects.
Schedule Objects – Applies time restrictions to the application policy. For example, you can use a schedule object to throttle social
media during office hours. For more information, see Schedule Objects.
Protocol – Selecting a protocol object for a detected application allows to apply a policy that will deny an application the usage of this
protocol, or alternatively apply a higher traffic shaping queue to the VOIP feature of an application. Protocols not allowed by the matching
access rule cannot be allowed in the application rule. For more information, see How to Create a Protocol Object.
Content – To block or allow specific content types, you can select from the following content types:
Any
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
449
AVI
Flash
MPEG
Quicktime
Realmedia
URL Filter
You can combine URL filtering with application control. Use URL filter policy objects or URL Filter Match objects to block website categories.
URL Filter Policy – URL Filter policies define the allow/block/warn/alert policy for every URL filter category. To apply that policy to the
application rule select the URL filter policy object from the list. For more information, see How to Create an URL Filter Policy Object.
URL Filter Matching – URL Filter matching is used to assign additional policies such as traffic shaping or TI settings to web categories.
For more information, see How to Create an URL Filter Match Object.
Applying Traffic Shaping to Detected Applications
Applications can not only be allowed or denied, you can also change the QoS Band assigned to the traffic matching this application rule. This
allows you to throttle or prioritize applications as needed. By default the QoS Band of the matching access rule is used. For more information, see
Traffic Shaping.
Change the QoS Band – Select this checkbox to use a different QoS band than the QoS band used by the matching access rule.
QoS Band (Fwd) – Select the QoS Band to be applied to the outgoing application traffic matching this application rule.
QoS Band (Reply) – Select the QoS Band to be applied to the incoming application traffic matching this application rule.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
450
Application Based Provider Selection
You can specify which link is used for an application by creating an application based link selection connection object. In this object, add
applications or application categories, and then assign them to a connection object that includes the links that they must use.
The Barracuda NG Firewall detects the application as the client connects and routes the traffic through the link that is defined in the application
based link selection connection object. If the application is not explicitly defined, the default connection policy is used.
In this article:
Before You Begin
Step 1. Create a Application Link Connection Object
Step 2. Create a Firewall Rule
Before You Begin
Before you create an application based link selection connection object, complete the following:
Enable Application Control 2.0. For more information, see Application Control 2.0.
Create connection objects for every ISP line that you want to route application traffic over. For more information on how to create
connection objects, see Connection Objects.
Step 1. Create a Application Link Connection Object
To create an application link connection object:
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left menu, click Connections.
3. Click Lock.
4. Right-click the table and select New > Application Based Link Selection.
5. In the Edit Application Based Link Selection Object window, specify the following settings:
Object Name – Enter a name for the connection object (e.g., AppBasedProviderSelection).
Default Connection – Select the default connection from the list by clicking the link. Traffic that is not defined in the application
based links is routed over this connection.
6. For every application or application category that you want to add:
a. Click the plus sign (+) to add an application based link entry.
b. Edit the Name of the new entry.
c. Select the Connection Object for the ISP to route the detected application traffic (e.g., Source NAT with DHCP for the first
DHCP line).
d. Double-click the Condition field.
e. In the Edit Condition window, click the No Application selected tab.
f. Either add applications from the list by category or double-click the entry. You can also filter the application list by selecting Cate
gory, Risk, and Properties.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
451
g. Click Save.
h. Click Save.
7. Click Send Changes and Activate.
The application link connection object is now in the Connections list.
Step 2. Create a Firewall Rule
Create a firewall rule to redirect the application traffic. Alternatively, you can also edit an existing matching firewall rule.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Right-click the Main Rules table and select New > Rule to create a new firewall rule.
4. Create a Pass firewall rule with the following settings:
Source – Select Trusted LAN.
Service – Select the type of service.
Destination – Select Internet.
Application Policy – Select App Control + SSL Interception.
Connection Method – Select the application link connection object that you created in Step 1 (e.g., AppBasedProviderSele
ction).
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
452
5. Click OK.
6. Click Send Changes and Activate.
All applications are now routed over the provider selected in the application based link selection object. Go to the Firewall > History page to
monitor which link is selected for the applications defined in the connection object.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
453
How to Override the Risk Classification of an Application
Every application pattern delivered with the Barracuda NG Firewall's Application Control 2.0 database contains a risk classification. The risk
classification extends the category of each application, to allow an even more granular classification of single applications. Depending on the
common usage and reputation, the risk classification may vary from 1 (low risk) to 4 (high risk).
Let's take the category File Storage and Backup as an example: Cloud storage is more popular than ever and sometimes even an integral part
of modern business communication. But depending on the business model of cloud storage services, some of them are highly attractive for illegal
and extremely bandwidth consuming file sharing activities. While Copy and Amazon Web Services enjoy a good reputation, others like DepositFil
es or Mega have a poor reputation. Transforming these reputations into risk categories, allows you to only allow services with a good reputation.
Barracuda Networks continuously observes web application reputations and keeps you up to date with the latest risk classifications. However, in
some cases it may be necessary to manually override risk classification.
Override the Risk Level of an Application
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. In the left navigation pane, expand Firewall Objects and click Applications.
4. Change the risk level of an application by either right-clicking it and selecting Override this Application or using the icons in the
top-right area of the rule set.
5. Select the new risk level for the application and then click OK.
6. Click Send Changes and Activate.
The risk classification of the application in the list is now changed to the new value.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
454
Using Application Control 2.0 with HTTP(S) Proxies
You can use Application Control with the internal HTTP Proxy service and external proxies. Depending on what type of proxy is used, Application
Control might be limited or require additional configuration.
Proxy Type
Application Control
2.0
Sub-application
Detection
SSL Interception
ATD
Application Based
Provider Selection
HTTP Proxy
Service (Forward
Proxy on ports
3128 and 8080)
Yes (only for HTTP)
No
Yes (via HTTP
Proxy service)
Yes
No
HTTP Proxy
Service
(Transparent
Proxy)
Yes
Yes (with a firewall
rule for HTTPS)
Yes (with a firewall
rule for HTTPS)
Yes
No
External HTTP(S)
Proxy
Yes
Yes
Yes
Yes
-
External HTTP +
HTTPS Proxies
Yes
Yes
Yes
Yes
-
HTTP Proxy Service (Forward Proxy)
When the client is configured to use the HTTP Proxy service for both HTTP and HTTPS, Application Control 2.0 can be used to detect
applications for HTTP connections. Clients contact the HTTP Proxy service directly on port 3128 or 8080 for both HTTP and HTTPS connections.
SSL Interception is handled in the HTTP Proxy service
Please note that this setup does not work if you are using a load balanced HA deployment where the Forwarding Firewall service and
the HTTP Proxy service are not on the same virtual server.
HTTP Proxy Service (Transparent Proxy)
When the HTTP Proxy service on the Barracuda NG Firewall is configured as a transparent proxy, only HTTP traffic is sent to the HTTP proxy. To
pass HTTPS traffic through Application Control and SSL Interception, you must configure an explicit firewall rule.
It is not possible to use the built-in SSL Interception in the HTTP proxy in a transparent proxy configuration.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
455
External Proxy
When clients use an external proxy for both HTTP and HTTPS traffic, there are no restrictions. Application Control 2.0 can inspect all traffic
coming from or going to the proxy.
Separate HTTP and HTTPS (SSL) Proxies
No limitations apply when clients are configured to use separate external HTTP and HTTPS proxies. Application Control and SSL Interception
can inspect all traffic coming from and going to the HTTP and HTTPS proxies.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
Copyright © 2015, Barracuda Networks Inc.
456
Barracuda NG Firewall 6.1 Administrator's Guide - Page
457
How to Configure SSL Interception in the Firewall
Most applications encrypt outgoing connections with SSL or TLS. SSL Interception decrypts SSL-encrypted traffic to allow Application Control
features (such as the Virus Scanner, ATD, URL Filter, Safe Search, or File Content Scan) to inspect encrypted content that would otherwise not
be visible to the Firewall service. To avoid certificate errors when the users use SSL-encrypted connections, you must install the SSL Interception
root certificate on all client computers. If you are using CRL checks, the CRL/OCSP check is done once per 24h period to reduce the load on the
CRL/OCSP server. If an error occurs during the CRL check, it is repeated after 10 minutes. Applications with the application object property not
interceptable cannot be intercepted and are automatically excluded from SSL Interception. Open the application object on the Forwarding
Rules > Applications page to check if an application is interceptable. You can configure SSL Interception to use a cipher string of your choice.
Enable SSL Interception
Configure Advanced SSL Interception Settings
Certificate Management
Certificate Management with Intermediate Certificate Authorities
SSL Interception for VPN Traffic
SSL Interception on Bridged Interfaces
Enable SSL Interception
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Sec
urity Policy.
2. Click Lock.
3. Select the Enable SSL Interception checkbox.
4. In the Root Certificate section, either select Use self signed certificate or add your certificate by clicking the plus sign (+). The root
certificate is used to intercept, proxy, and inspect the HTTP/S session. The Barracuda NG Firewall can then intercept the HTTP/S
connections by presenting the client with a CA that was derived from this root CA.
When changing the root certificate, the firewall service must be restarted.
5. In the Trusted Root Certificates table, you can extend the default set of trusted root certificates by clicking the plus sign (+). To view the
Barracuda NG Firewall's certificate store, click the Show CA Certificates link.
6. Select the Enable CRL Checks checkbox to automatically check for revoked CA certificates.
7. In the Exception Handling section, add domains that should be excluded from SSL Interception. SSL-encrypted traffic to and from these
domains is not decrypted, although SSL Interception is globally enabled. Domains automatically include all subdomains. E.g., google.co
m will also includes mail.google.com
8. In the Block Settings section, enter a browser message that should be displayed when traffic is blocked.
9. Click Send Changes and Activate.
SSL Interception can now be enabled on a per-access or application rule basis.
Configure Advanced SSL Interception Settings
For SSL Interception, you can also configure advanced settings such as the number of working instances that are involved in the SSL decryption
process, log verbosity, CRL checks, or the used cipher string.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Security Policies.
2. Click the Advanced link in the upper right of the Security Policy page. The SSL Interception Advanced window opens.
3. Change the advanced SSL Interception settings according to your requirements:
Number of Workers – The number of working instances to be involved in the SSL decryption and encryption process. Default:
auto
Maximum Workers – The maximum number of working instances that decrypt and encrypt SSL connections. When all workers
are used, SSL connections are refused. Default: auto
Worker Idle Timeout – The timeout for the working instances involved in the SSL decryption and encryption process. Default: 0
Log Verbosity – You can select one of the following log granularity options: Normal, Verbose, or Debug.
Ignore Validation Status – Since the clients cannot check the revocation status for server certificates of intercepted SSL
connections, you can configure the default validation policy for all intercepted SSL connections for which CRL/OCSP checks
could not be performed. Default: Yes
Yes – The NG Firewall creates a valid certificate for the client as long as the content of the server certificate is
validated.
No – The NG Firewall creates an invalid certificate to let the client know that CRL/OCSP checks could not be
performed.
SSL version handling
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
458
Allow (obsolete) SSLv2 – Enable if you must support clients that are SSLv3 only.
Allow (obsolete) SSLv3 – Enable if you must support clients that are SSLv3 only.
OpenSSL cipher string – You can set a custom cipher string.The Barracuda NG Firewall uses the DEFAULT cipher
string of the OpenSSL version used in the firmware by default.
4. Click OK.
5. Click Send Changes and Activate.
Certificate Management
SSL Interception process breaks the certificate trust chain. To reestablish the trust chain, you must install the security certificate (root certificate)
and, if applicable, intermediate certificates that are used by the SSL Interception engine. Install this certificate on every client in your network. To
prevent browser warnings and allow transparent SSL interception, install the security certificate into the operating system's or web browser's
certificate store.
1. On the Security Policy page, click the edit icon next to (Self Signed) Certificate and click Export to file.
2. Enter a name, select *.cer as file type, and click Save.
3. Deploy this certificate to the computers in your network. Either create a group policy object or install the certificate manually (MS
Certificate Import wizard). Ensure that you deploy the certificate into MS Windows' Trusted Root Certification Authorities certificate
store.
Mozilla Firefox does not automatically use trusted CA certificates installed in the MS Windows certificate store.
Certificate Management with Intermediate Certificate Authorities
Intermediate CAs are not directly delivered from the Barracuda NG Firewall to the client. They must be deployed manually from the Microsoft
Active Directory PKI.
1. Use Microsoft Internet Explorer and connect to your MS Active Directory Certificate Services server. For example, https://127.0.0.1/certsr
v
2. Click Request a Certificate and select advanced certificate request.
3. Click Create and submit a request to this CA and answer all questions with Yes.
4. Select Subordinate Certification Authority from the Certificate Template.
5. Fill out the form below.
6. Select your key size in the Key Options section and select the Mark keys as exportable checkbox.
7. Click Submit and answer all questions with Yes.
8. Click Install this certificate.
After the certificate is installed successfully, start the MS Active Directory's management console.
1. Open the Certificates - Current User snap-in.
2. Right-click the Intermediate Certification Authorities\Certificates section and select your certificate.
3. Select All Tasks > Export in the upcoming window.
4.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
4.
5.
6.
7.
8.
9.
10.
459
Click Next to proceed.
In the Export Private Key window, select Yes, export the private key and proceed.
Enter a password and click Next.
Select the export destination folder and enter a file name.
Click Finish.
After the certificate has been exported, rename the file extension from *.pfx to *.p12 .
Use openssl to extract the private key from your *.p12 file. Enter the following command:
openssl.exe pkcs12 -in <filename>.p12 -nocerts -nodes -out privateKey.pem
11. Enter the password entered in step 6.
12. Use openssl to convert the key file to RSA. Enter the following command:
openssl.exe rsa -in privateKey.pem -out yourPrivateKey.pem
13. You can now import the certificate (*.p12) and private key (*.pem) pair to be used for SSL Interception.
14. Install the certificate (*.p12) and root CA from which the certificate was derived.
SSL Interception for VPN Traffic
To use SSL Interception for traffic going through a VPN tunnel, you must create a VPN interface and assign an IP address that is covered by the
source route of the VPN tunnel.
SSL Interception on Bridged Interfaces
SSL Interception can only be used on routed Layer 2 and Layer 3 bridges. Additionally, a default route is needed to carry out CRL checks.
For more information, see Bridging.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
460
How to Configure Virus Scanning in the Firewall
The Barracuda NG Firewall scans incoming traffic for malware on a per access rule basis when AV scanning in the firewall is enabled. If a user
downloads a file containing malware, the Barracuda NG Firewall detects and discards the infected file and redirects the user to a warning page.
You can combine virus scanning with SSL Interception to also scan SSL encrypted connections.
In this article:
Before You Begin
Step 1. Enable the Virus Scanner Service
Step 2. Configure an AV Engine
Step 3. Enable SSL Interception and AV Scanning in the Firewall
Step 4. Enable the AV Scanner in the Firewall Rules
Monitoring and Testing
Next Steps
Before You Begin
Enable Application Control 2.0. For more information, see How to Enable Application Control 2.0.
Create a Virus Scanner service. For more information, see Virus Scanner
Step 1. Enable the Virus Scanner Service
Ensure that the Virus Scanner service is enabled.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Virus-Scanner
> Service Properties.
2. Click Lock.
3. From the Enable Service list, select yes.
4. Click Send Changes and Activate.
Step 2. Configure an AV Engine
Select and configure a Virus Scanner engine. You can use Avira and ClamAV either separately or together. Barracuda NG Firewall F100 and
F101 can only use the Avira virus scanning engine.
Using both AV engines significantly increases CPU utilization and load.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Virus-Scanner
> Virus Scanner Settings.
2. Click Lock.
3. Enable the virus scanner engines of your choice:
Enable the Avira AV engine by selecting Yes from the Enable Avira Engine list.
Enable the ClamAV engine by selecting Yes from the Enable ClamAV list.
4. Click Send Changes and Activate.
Step 3. Enable SSL Interception and AV Scanning in the Firewall
If you want to scan files that are transmitted over a SSL-encrypted connection, enable SSL Interception and virus scanning in the firewall.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Security Policy.
2. Click Lock.
3. Select the Enable SSL Interception check box.
4.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
461
4. Upload your root CA certificate or create a self-signed Root Certificate.
5. (Optional) Click the plus sign (+) in the Trusted Root Certificates section to add additional root certificates.
6. In the Virus Scanner Configuration section, select the Enable Virus Scanning in the firewall check box.
7. In the Scanned MIME types list, add the MIME types of the files that you want the AV scanner to scan.
The default <factory-default-mime-types> includes the most important MIME file types.
Click here for a full list of the factory default MIME types...
application/msword
application/msonenote
application/vnd.openxmlformats-officedocument.wordprocessingml.document
application/vnd.openxmlformats-officedocument.wordprocessingml.template
application/vnd.ms-word.document.macroEnabled.12
application/vnd.ms-word.template.macroEnabled.12
application/vnd.ms-excel
application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
application/vnd.openxmlformats-officedocument.spreadsheetml.template
application/vnd.ms-excel.sheet.macroEnabled.12
application/vnd.ms-excel.template.macroEnabled.12
application/vnd.ms-excel.addin.macroEnabled.12
application/vnd.ms-excel.sheet.binary.macroEnabled.12
application/vnd.ms-powerpoint
application/vnd.openxmlformats-officedocument.presentationml.presentation
application/vnd.openxmlformats-officedocument.presentationml.template
application/vnd.openxmlformats-officedocument.presentationml.slideshow
application/vnd.ms-powerpoint.addin.macroEnabled.12
application/vnd.ms-powerpoint.presentation.macroEnabled.12
application/vnd.ms-powerpoint.slideshow.macroEnabled.12
application/pdf
application/x-pdf
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
462
application/vnd.pdf
application/vnd.android.package-archive
8. (optional) Change the Action if Virus Scanner is unavailable.
9. (optional) Click on Advanced:
Large File Policy – The large file policy is set to a sensible value for your appliance. The maximum value is 4096MB.
Data Trickling Settings – Change how fast and how much data is transmitted. Change these settings if your browser times out
while waiting for the file to be scanned.
10. Click Send Changes and Activate.
Step 4. Enable the AV Scanner in the Firewall Rules
You can enable AV scanning for every Pass firewall rule.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Open the settings for the firewall rule that you want to enable AV scanning for.
4. Click the Application Policy link.
5. Select the Application Control and AV Scan check boxes.
6. If you want to scan SSL encrypted traffic, select the SSL Interception check box.
7. Click OK.
8. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
463
Monitoring and Testing
Test the AV scan setup by downloading EICAR test files from http://www.eicar.com. The block page is customizable. For more
information, see How to Configure Custom Block Pages.
To monitor detected viruses and malware, go to the FIREWALL > Threat Scan page.
Next Steps
To combine ATD with virus scanning, see Advanced Threat Detection (ATD).
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
464
How to Configure ATD in the Firewall
Configure when and which types of files are uploaded to the Barracuda ATD Cloud. Files with a size is limited by the Large File Watermark of the
virus scanner and the 8 MB upload limit for the ATD cloud, whichever is the smaller value. You can also configure if users will receive files
immediately or have to wait until the file analysis is completed to continue with the download. Users, who downloaded files with a risk factor
higher than the defined risk threshold, are placed in quarantine. Create access rules to define what is blocked for the infected users and/or IP
addresses.Malware and Advanced Threat Detection subscriptions are required.
In this article
Before you Begin
Step 1. Configure ATD Scan Policy and Risk Threshold
Step 2. Enable ATD in the Firewall and Configure Automatic Quarantine Policy
Step 3. Create two Quarantining Access Rules
Quarantine Management
Manually Placing a User and/or IP Address in Quarantine
Removing a User and/or IP Address from Quarantine
Download a Scan Report
Before you Begin
You must have a Malware and an Advanced Threat Detection license subscription. For more information, see Licensing.
Verify that you have configured a System Notification Email address. For more information, see How to Configure the System Email
Notification Address.
Verify that you have enabled virus scanning in the firewall. For more information, see How to Configure Virus Scanning in the Firewall.
If you are not using the default MIMES types in the virus scanner configuration, verify that all file types you want to scan with ATD are
also listed in the scanned MIME types of the virus scanner. For more information, see How to Configure Virus Scanning in the Firewall.
Verify that all files types you want to scan are not whitelisted in the Virus Scanning configuration. For more information, see How to
Configure Virus Scanning in the Firewall.
Verify the Feature Level of the forwarding firewall ruleset is set to Release 6.0 or higher in (Forwarding Firewall > Forwarding Rules >
Settings > Setup).
Step 1. Configure ATD Scan Policy and Risk Threshold
Configure the ATD scan policy to determine if the user will have to wait for scanning to complete before the file is forwarded.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >Virus Scanner
> Virus Scanner Settings.
2. Click Lock.
3. In the left menu, click ATD.
4. In the ATD Scan Policy section, select the Global Policy:
Deliver First, then Scan – The user receives the file immediately. If malware is found the quarantine policy applies.
Scan First, then Deliver – The user is redirected to a scanning page. If no malware is found during the scan, the download
starts.
5. If needed set the individual scan policies for each file type:
Apply Global Policy (default)
Do Not Scan – This file type is not scanned and immediately forwarded to the user.
Deliver First, then Scan – The user receives the file immediately. If malware is found the quarantine policy applies.
Scan First, then Deliver – The user is redirected to a scanning page. After the scan is complete the download starts.
6.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
465
6. In the ATD Threats section, select the Block Threats policy:
High Only – File classified as high risk are blocked.
High and Medium (Default) – Files classified as high or medium risk are blocked.
High, Medium and Low – Files classified as high, medium or low risk are blocked. Only files with classification None are
allowed.
7. Set Send Notification Emails to:
No – No notification emails are sent when malware is found.
To System Notification Email (Default)– A notification email is sent to the system notification email address. For more
information, see How to Configure the System Email Notification Address.
To Explicit Address – Enter the Explicit Email Address and Explicit SMTP Server the Barracuda NG Firewall will use to
send the notification emails.
8. (optional) Set the ATD Data Retention (in days). These values determine how long files are kept on the system before they are deleted.
9. Click Send Changes and Activate.
Step 2. Enable ATD in the Firewall and Configure Automatic Quarantine Policy
You must first enable ATD in the security policy of the forwarding firewall.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services >Firewall > Secu
rity Policy.
2. Click Lock.
3. In the Advanced Threat Detection section click Enable ATD in the firewall.
4. Select the Automatic Blacklist Policy:
No auto quarantining – No connections are blocked.
User only – All connections by the infected user are blocked regardless of the source IP address.
User@IP (AND) – All connections originating from the infected source IP address and the infected user are blocked.
User, IP (OR) – All connections coming from the infected source IP address and/or the infected user are blocked.
5. Click Send Changes and Activate.
Step 3. Create two Quarantining Access Rules
To block users and/or IP addresses you must create access rules using the ATD User Quarantine network object. Place the Deny or Block rules
before any other access rules handling traffic for these IP addresses and/or users. Enable Transparent Redirect on Port 80 to redirect HTTP
traffic from quarantined users or IP addresses to the custom quarantine block page. You must allow DNS queries from quarantined users to
display the HTTP block page. Non-HTTP traffic is simply blocked or denied.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Create a new access rule to allow DNS queries:
Action – Select PASS.
Source – Select ATD User Quarantine network object.
Destination – Enter the IP addresses of your DNS servers.
Service – Select DNS.
Connection Method – Select a connection object to allow you to connect to the DNS Server.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
4. Click OK
5. Place the access rule, so that no rule before it matches the same traffic.
6. Create a new access rule:
Action – Select Deny or Block.
Source – Select ATD User Quarantine network object.
Destination – Select Any (0.0.0.0/0) network object.
Service – Select Any.
7. In the left menu, click Advanced.
8. In the Miscellaneous section, set Block Page for TCP 80 to Quarantine Page.
Copyright © 2015, Barracuda Networks Inc.
466
Barracuda NG Firewall 6.1 Administrator's Guide - Page
467
9. Click OK.
10. Place the access rule directly below the rule allowing DNS queries from the quarantine, so that no rule before it matches the same traffic.
11. Click Send Changes and Activate.
Quarantined users, or users connecting via HTTP from quarantined IP addresses are automatically redirected to the customizable quarantine
page. For more information, see How to Configure Custom Block Pages.
Step 4. Edit Access Rules to Use ATD
Enable ATD by editing the access rules handling traffic you want to be scanned. E..g, LAN-2-INTERNET
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Edit the access rule handling the traffic you want analyzed by ATD.
4. Click the link below Application Policy.
5. Enable AV Scan.
6. Enable ATD.
7. If you want to scan files transmitted over SSL encrypted connections, enable SSL Interception.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
468
8. Click Send Changes and Activate.
All traffic handled by access rules with the ATD enabled are now scanned by the ATD service.
Quarantine Management
Manually Placing a User and/or IP Address in Quarantine
If you are not using automatic quarantine policy, the administrator can also place a user in quarantine manually.
1.
2.
3.
4.
5.
6.
Go to FIREWALL >ATD.
Click the Scanned Files tab.
Double click the malicious file. The ATD File Details widow opens.
In the File Download section select the user in the list.
Click Quarantine. The Select Quarantine Policy window opens.
Select the Quarantine Policy:
Block only Users – Place the user in quarantine, but not the source IP address.
Block only IP Addresses – Place the IP address in quarantine, but not the user.
Block User @ IP (logic AND) – Place user@IP address in quarantine. Both user and IP address have to match.
Block User, IP (logic OR) – Place the user and IP address in quarantine. Either user or IP address have to match.
7. Click OK.
The user and/or IP address are now in quarantine network object (Click the Quarantine tab to verify). Create an access rule using the ATD User
Quarantine network object to block connection to and from the infected users and/or IP addresses.
Removing a User and/or IP Address from Quarantine
1.
2.
3.
4.
Go to FIREWALL > ATD.
Click the Quarantine Tab.
Right click the user or IP address you want to remove from quarantine.
Click Remove from Quarantine.
The user and/or IP address is removed from the quarantine network object.
Download a Scan Report
You can download a short or long version of scan report.
1. Go to FIREWALL > ATD.
2. Double click the scanned file.
3. Click Download Report and select the report type:
Summery Report
Full Report
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
469
URL Filtering in the Firewall
The Barracuda NG Firewall offers real-time URL filtering for web traffic. To use URL Filtering in the Firewall service, an Energize Updates
subscription is required. The Barracuda Web Filter supports both Firewall and HTTP Proxy services. The Barracuda NG Web Filter is limited to
the HTTP Proxy service.
In this article
URL Filter Firewall Objects
URL Filtering in the Firewall
URL Filter Override in the Firewall
URL Filter Firewall Objects
You can create two types of URL Filter firewall objects.
URL Filter Policy Objects – The URL Filter policy objects allow you to assign a policy for every URL category with the option of
including custom URL block and allow lists.
URL Filter Match Objects – The URL Filter Match objects are handled as an additional application rule matching criteria. The
application rule only matches if the detected website belongs to one of the URL categories included in the URL Filter Match object.
For more information, see How to Create an URL Filter Policy Object and How to Create an URL Filter Match Object.
URL Filtering in the Firewall
URL Filtering in the Firewall is handled as a part of the application rule. Use URL Filter Policy objects for the URL categorization to take place
after the application rule matches. URL Filter Match objects are evaluated as a matching criteria of the application rule. This means that if the
website is not part of the URL categories listed in the object, the application rule does not match.
For more information, see How to Configure URL Filtering in the Firewall.
URL Filter Override in the Firewall
If the action for the detected URL category is set to override in the URL Filter Policy object, the user can request permission for a URL category
override. A URL Filter override admin must grant the request and set the duration of the override request. Override requests are granted per URL
category.
For more information, see How to Configure URL Filter Overrides.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
470
How to Create an URL Filter Policy Object
A URL Filter Policy object determines how a website that matches one of the URL categories is handled by the Barracuda NG Firewall. To
override Barracuda's URL database, you must define custom URL black- and whitelists. The following actions are available for each URL
category:
Allow – The user can access the website.
Block – The user is blocked from viewing the website and is redirected to the customizable URL Filter block page. For more information,
see How to Configure Custom Block Pages.
Warn and Continue – The user can visit the webpage after clicking Continue on the customizable URL Filter warning page. This action
is logged to Box/Firewall/acknowledged. For more information, see How to Configure Custom Block Pages.
Alert – Visiting a website in this category is silently logged. Go to FIREWALL > Monitor and filter for Allowed, Warn & Alert or Warn &
Alert to see the logged alerts.
Override – Allow the user to request temporary access from an admin. Upon receiving the request the override admin must log in to the
override admin interface to grant access for a specific amount of time to this otherwise blocked URL category. The admin can only gran
overrides for the URL category not for specific websites.
Before You Begin
Before you create URL Filter Policy objects. verify that you have enabled the URL Filter. For instructions on how to activate the URL Filter, see H
ow to Enable Application Control 2.0.
Create a URL Filter Policy Object
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. In the left menu, click URL Filter.
4. Create the URL Filter Policy object by either right-clicking the table and selecting New > URL Filter Policy object or by using the icons
in the top-right area of the ruleset.
5.
6.
7.
8.
Click Advanced. The URL Cat Policy Object - Advanced Settings window opens.
Select the Action if online URL database is unavailable.
Enter the timeout for Warn and Continue Override valid for [min]. Default: 10 min.
Click OK.
9. Click on Default Action and select Block, Allow or Alert from the dropdown.
10. Select Block, Allow, Warn and Continue, Alert or Override in the Action column for each URL category.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
471
11. (optional) To whitelist or blacklist specific domains, select Custom URLs.
a. For each blacklisted domain, click + to add a domain to the Block List.
b. For each whitelisted domain, click + to select the action and to enter the domain name in the Allow List.
12. Click Save.
13. Click Send Changes and Activate.
You can now apply the URL Filter policy object to selected Application Rules. For more information, see How to Create an Application Rule.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
472
How to Create an URL Filter Match Object
An URL Filter Match object acts as an application rule matching criteria. Application rules containing this type of object are only processed if the
URL categories defined in the object are detected. If none of the defined URL categories match the traffic, the rule is not processed. Use this
object type in your application rules to detect specific web content for additional processing, such as Quality of Service assignment.
Before You Begin
Before you create URL Filter Match objects, verify that you have enabled the URL Filter. For instructions on how to activate the URL Filter, see H
ow to Enable Application Control 2.0. Otherwise, the URL Filter Match objects page is grayed out and you will not be able to create URL Filter
Match objects.
Create an URL Filter Match Object:
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. In the left menu, expand Firewall Objects and click URL Filter.
4. Create the URL Filter Match object by either right-clicking the table and selecting New > URL Filter Match Object or using the icons in
the top-right area of the rule set.
5. Either search or filter for the URL categories that you want to include in the object.
6. Add an URL category by either dragging it to the Matching URL Categories section or clicking the plus sign (+) next to its name.
7. Click Save.
8. Click Send Changes and Activate.
The following figure displays the process for creating a URL Filter Match object.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
473
How to Configure URL Filtering in the Firewall
To enforce web filtering policies, you can add URL Filter objects to the application rules as an additional matching criteria. When the application
rule matches, the website URL is compared with the on-device cache or online Barracuda URL category database. Once classified, the policy set
for this URL category is executed. A valid Energize Updates subscription is required for URL Filtering in the Firewall service.
In this article
Before you Begin
Step 1. Enable URL Categorization
Step 2. Enable URL Filter for the Access Rule Handling Web Traffic
Step 3. Create Application Rule using URL Filter Objects
Monitoring URL Filtering in the Firewall
Firewall Live View
Firewall Monitor
Before you Begin
Create URL Filter Policy Objects and URL Filter Match Objects as needed. For more information, see How to Create an URL Filter Policy
Object and How to Create an URL Filter Match Object.
A URL Filter service is required.
Step 1. Enable URL Categorization
You must enable the URL categorization engine to be able to process URL categorization requests.
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > General Firewall Configuration.
Click Lock.
From the Configuration menu in the left pane, click Application Detection.
Set Working Mode to on.
5. Click Send Changes and Activate.
The Barracuda URL Filter is now enabled and can handle URL categorization requests.
Step 2. Enable URL Filter for the Access Rule Handling Web Traffic
Enable Application Control 2.0, SSL Interception (optional), and URL Filter for the access rule matching web traffic.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Double-click to edit the access rule matching outgoing web traffic generated by your users.
3. Verify that the access rule matches on both HTTP and HTTPS Internet traffic.
4. Click on the Application Policy link and enable the following Application Control 2.0 features:
Application Control
(optional) SSL Interception
URL Filter
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
474
5. Click OK.
6. Click Send Changes and Activate.
Step 3. Create Application Rule using URL Filter Objects
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. In the left menu, click Application Rules .
3. Click Lock.
4. Create a PASS application rule. For more information, see How to Create an Application Rule.
Source – Select the same source used in the matching access rule.
Application – Select Any to use only the web filtering. Otherwise, select an application object from the dropdown to combine
application control and URL filtering.
Destination – Select the same destination used in the matching access rule.
5. Set at least one URL Filter object for the application rule:
Select a URL Filter Policy Object from the URL Filter Policy dropdown.
Select a URL Filter Match Object from the URL Filter Matching dropdown.
6. Click OK.
7. Click Send Changes and Activate.
Monitoring URL Filtering in the Firewall
You can either check individual connections to see which policies are applied in the FIREWALL > Live View or see a summary of all Application
traffic in the FIREWALL > Firewall Monitor.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
475
Firewall Live View
Go to FIREWALL > Live View and add the URL Category column to see the matching access and application rule, and the detected URL Filter
category.
Firewall Monitor
Go to FIREWALL > Monitor to receive a summary of all application and web traffic that matches Application Control 2.0-enabled access rules.
Click on the links in the individual elements to apply filters to the monitor. Click the filter icon in the taskbar to see only specific URL Filter policies.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
476
How to Configure URL Filter Overrides
You can use the Override feature of the URL Filter to grant temporary access to otherwise blocked URL categories. URL categories that are set
to the override policy redirect the user to the customizable Override Block page of the URL Filter. The user can then select the override admin
and request an override. The override admin must log into the override admin interface and grant the request for a specified time. When the
request has been granted, the user is automatically forwarded to the website. Overrides are always granted for the entire URL category.
In this article
Video
Before you Begin
Step 1. Create the SSL Certificate and Admin Users for the Override Admin Interface
Step 3. Create App Redirect Access Rule for Override Admin Portal
Granting URL Filter Override Requests
Logging for URL Filter Overrides
Video
For see URL Filter Overrides Request in action, watch the following video:
Videos are not visible in the PDF export.
Before you Begin
Create or edit existing URL Policy objects in order to use the override policy for the URL categories of your choice.
Configure web filtering in the Firewall. For more information, see How to Configure URL Filtering in the Firewall.
Step 1. Create the SSL Certificate and Admin Users for the Override Admin Interface
Create or upload an SSL certificate for the Override interface. This certificate is also used for the ticketing system.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Settings.
2. In the left menu, select Authentication.
3. Click Lock.
4. Import or create the Default HTTPS Private Key and Default HTTPS Certificate.
This SSL certificate is also used by inline and offline firewall authentication. If inline authentication is used, the Name of the
certificate must be the IP address or an FQDN resolving to the IP address of the Barracuda NG Firewall. This value is used to
redirect the client to the authentication daemon.
5.
6.
7.
8.
9.
Click Edit to add URL Filter Override Users. The URL Filter Override Users window opens.
Click + to add a User specific data entry.
Enter the Name. This is the username used to log into the override admin interface.
Enter the Password.
Enter the Full Name. The user can select this name from the dropdown on the Override Block page when requesting and override from a
specific admin.
10. Enter the User email.
The email address is currently not used.
11. Click Send Changes and Activate.
Step 3. Create App Redirect Access Rule for Override Admin Portal
Add an access rule to redirect the admin user to the web filter override admin page.This rule will also allow access to the guest user ticketing
system.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Create an App Redirect access rule:
Action – Select App Redirect.
Source – Select the source network allowed to access the web filter override portal.
Service – Select HTTPS.
Destination – Enter the IP address the override admin interface is accessed through. You can use any free IP address (e.g.,
1.2.3.4) or an IP address on the Barracuda NG Firewall that does not have a listener on port 443.
Redirection – Enter 127.0.0.1
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
477
4. Click OK.
5. Place the access rule so that it is the first rule to match for HTTPS traffic to the chosen admin override IP address.
6. Click Send Changes and Activate.
The admin ticketing interface is now reachable via https://1.2.3.4/cgi-bin/override-admin (if you used 1.2.3.4 as the destination IP
address in the access rule).
Granting URL Filter Override Requests
JavaScript must be enabled in the client browser for the override request to be sent.
When attempting to access a website that is in an override URL category, the URL Filter override page is displayed. You can optionally choose
which override admin the request is sent to and then click Request Access. When the request has been granted by the override admin, click Re
quest Access again to continue to the previously blocked website. If the admin denies the override request, the URL category is blocked for the
set duration.
For more information, see How to Grant URL Category Overrides - User Guide.
Logging for URL Filter Overrides
URL Filter overrides are logged to /Box/Firewall/Acknowledged.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
478
How to Grant URL Category Overrides - User Guide
If you are an URL Filter Override admin, you can grant users access to URL categories that are normally blocked by the URL Filter. Follow the
steps below to grant a user access to a URL category for a specific length of time.
In this article
Before You Begin
Grant URL Category Override
Before You Begin
Get the following information from the Barracuda NG Firewall administrator:
The IP address of the ticketing web interface (e.g., 1.2.3.4)
The username and password for your admin user.
Your browser must allow JavaScript on the override block and admin pages.
Grant URL Category Override
1. In a browser, go to: http://IP address for the override web interface/cgi-bin/override-admin
2. Enter your Username and Password.
3. Click Login.
4. Set the number of minutes the override will remain valid for and click the green button or the red X button to deny the request.
If the request was allowed the user is now permitted to access websites in this URL category for the timespan you set. If you denied the request
this URL category is blocked for the set timespan.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
479
How to Enforce Safe Search in the Firewall
You can protect users behind a Barracuda NG Firewall from undesired content in search results by enabling Safe Search for the access rule
handling web traffic. No configuration is required on the clients. The necessary parameters are automatically appended to the URL when the
request is forwarded by the Barracuda NG Firewall. Safe Search is supported for Google, Bing, Yahoo and YouTube search engines.
Limitations
Safe Search relies on the supported search engines to honor and filter the search results. The Barracuda NG Firewall can enable this
feature, but the execution is left up to the search engine.
Safe Search is not enforced for mobile search apps.
Safe Search is always set to strict.
In this article
Before You Begin
Create an Access to Enforce Safe Search
Disabling SafeSearch for YouTube
Before You Begin
The Feature Level of the Forwarding Firewall must be 6.1 or higher.
Enable Application Control 2.0. For more information, see How to Enable Application Control 2.0.
Enable SSL Interception. For more information, see How to Configure SSL Interception in the Firewall.
Create an Access to Enforce Safe Search
You can enforce the usage of Safe Search for all web traffic matching an access rule by enabling the Safe Search settings in the Application
Control 2.0 settings of the access rule.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Either click the plus icon (+) at the top right of the ruleset, or right-click the ruleset and select New > Rule.
4. Select Pass as the action.
5. Enter a name for the rule. For example, SafeSearch-LAN-2-INTERNET
6. Specify the following settings to match your web traffic:
Source – The source addresses of the traffic.
Destination – Select Internet.
Service – Select HTTP+S.
Connection Method – Select Dynamic SNAT.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
480
7. Click on the Application Policy link and select:
Application Control – required.
SSL Interception – Required for search provides which are available exclusively via HTTPS.
URL Filter – optional.
Safe Search – required.
8. (optional) Set additional matching criteria:
Authenticated User – For more information, see User Objects.
Schedule Object – For more information, see Schedule Objects.
9. Click OK.
10. Click Send Changes and Activate.
Every search query handled by this access rule now automatically enables the Safe Search feature of the search engine provider.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
481
Disabling SafeSearch for YouTube
In addition to removing the policy on the matching access rules, it is also necessary to clear the browser cache to remove the YouTube safe
search cookie.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
482
How to Enforce YouTube for Schools in the Firewall
The Barracuda NG Firewall can transparently add YouTube for Schools restrictions for all connections that the Barracuda NG Firewall forwards to
YouTube without the need to configure the clients. Enable YouTube for Schools for access rules matching HTTP and HTTPS traffic connecting to
YouTube.
Limitations
YouTube for Schools relies on YouTube to honor and filter the search results. The Barracuda NG Firewall can enable this feature, but
the execution is left up to YouTube.
YouTube for Schools is not enforced for mobile YouTube apps.
In this article
Before You Begin
Step 1. Enter the YouTube For Schools Token
Step 2. Create an Access Rule to Enforce YouTube for Schools
Before You Begin
Create a YouTube for Schools account. For more information, see Signing up and Getting started with YouTube for Schools.
The Feature Level of the Forwarding Firewall must 6.1 or higher.
Step 1. Enter the YouTube For Schools Token
The YouTube for Schools token is a unique ID identifying your YouTube for Schools account.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Security Policy.
2. Click Lock.
3. In the Safe Browsing Configuration section enter the YouTube for Schools Token.
4. Click Send Changes and Activate.
Step 2. Create an Access Rule to Enforce YouTube for Schools
You can enforce the usage of YouTube for Schools for all web traffic that matches an access rule by enabling YouTube for Schools in the
Application Control 2.0 settings of the access rule.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Either click the plus icon (+) at the top right of the ruleset, or right-click the ruleset and select New > Rule.
4. Select Pass as the action.
5. Enter a Name for the rule. For example, YTFS-LAN-2-INTERNET
6. Specify the following settings to match your web traffic:
Source – The source addresses of the traffic.
Destination – Select Internet.
Service – Select HTTP+S.
Connection Method – Select Dynamic SNAT.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
483
7. Click on the Application Policy link and select:
Application Control – required.
SSL Interception – Required for search providers that are available exclusively via HTTPS.
YouTube for Schools – required.
8. (optional) Set additional matching criteria:
Authenticated User – For more information, see User Objects.
Schedule Object – For more information, see Schedule Objects.
9. Place the access rule via drag and drop in the rule set, so that no access rule above it matches this traffic.
10. Click OK.
11. Click Send Changes and Activate.
Only YouTube videos that have been added to your YouTube for Schools channel can now be accessed via this access rule.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
484
How to Configure Custom Block Pages
The Barracuda NG Firewall uses generic, unbranded block pages by default. You can change the HTML source of these pages to adjust the
content and style to fit your needs. Each page has a predefined list of placeholder objects that are replaced on-the-fly by the Barracuda NG
Firewall when the block page is delivered to the client. Custom block pages can only be used for services using the Forwarding or Distributed
Firewall services. The HTTP proxy does not support custom block pages.
Block Page
Service
Action Triggering the Block Page
Access Block Page
Firewall Service
Matching Deny or Block access rule with the
advanced setting Block Page for TCP 80 se
t to Access Block Page.
Application Control Block Page
Firewall Service / Application Control 2.0
Connection blocked due to the action set in
the matching application rule.
Fail-Close Block Page
URL Filter or Virus Scanner not available
The Fail Close policy for the URL Filter, Virus
Scanner, or SSL Interception must be set
and:
URL Filter or Virus Scanner service is
unavailable
Configuration settings prevented the
virus scanning engine from scanning the
file. E.g., Block encrypted archives.
SSL Interception is unavailable.
Internal errors.
Quarantine Page
ATD
Page displayed for users in ATD quarantine.
URL Filter Block Page
Firewall Service / URL Filter
Connection blocked due to a URL Filter
category.
URL Filter Warning Page
Firewall Service / URL Filter
Connection blocked due to a URL Filter
category.
Virus Scanner Block Page
Virus Scanner, ATD
Connection/Download blocked due to
detected Malware
In this article
Edit a Block Page
Reset a Block Page to the Factory Default
Edit a Block Page
You can use HTML, CSS, and JavaScript code. Images up to 30 kB can be inserted as base64 encoded HTML code.
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Firewall > Response Messages.
Click Lock.
In the left menu, click the block page you want to edit.
In the HTML source code window, edit the source code of the block page.
You can use CSS, JavaScript and HTML.
5. Click External View or Update Preview to see the changes in an external browser or the preview area.
6. (optional) Click Insert Element to insert placeholder values or images into the block page. The available placeholder values depend on
the block page.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
485
7. Click Send Changes and Activate.
Reset a Block Page to the Factory Default
You can reset the block pages to its default value
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Firewall > Response Messages.
Click Lock.
In the left menu, click on the block page you want to reset.
Click on Restore Default.
5. Click Yes.
6. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
486
Intrusion Prevention System (IPS)
The Intrusion Prevention System (IPS) actively monitors local and forwarding traffic for malicious activities and can also block suspicious traffic.
The Barracuda NG Firewall engine analyzes network traffic and continuously compares the bitstream with its internal signatures database for
malicious code patterns. You can create, edit, and override default and custom IPS signature handling policies. After configuring your IPS
policies, you can also apply them to your firewall rules.
In this article:
IPS Features
TCP Stream Reassembly
URL Obfuscation
TCP Split Handshake
Configuring and Managing IPS
IPS Features
The following features are available with IPS:
TCP Stream Reassembly
The firewall engine provides support for TCP Stream Reassembly (SRA). In general, TCP streams are broken into TCP segments that are
encapsulated into IP packets. By manipulating how a TCP stream is segmented, it is possible to evade detection. For example, by overwriting a
portion of a previous segment within a stream with new data in a subsequent segment. This method allows the hacker to hide or obfuscate the
network attack. The firewall engine receives the segments in a TCP conversation, buffers them, and reassembles the segments into a correct
stream. For example, by checking for segment overlaps, interleaved duplicate segments, invalid TCP checksums, and so forth. Afterwards, the
firewall engine passes the reassembled stream to the IPS engine for inspection.
URL Obfuscation
The IPS engine provides various countermeasures to avert possible network attacks based on the following URL encoding techniques:
Escape encoding (% encoding)
Microsoft %u encoding
Path character transformations and expansions ( /./ , //, \ )
Premature URL ending
Long URL
Fake parameter
TAB separation
FTP Evasion
The IPS engine is able to avert FTP exploits where the attacker is trying to evade the IPS by inserting additional spaces and Telnet control
sequences in FTP commands.
TCP Split Handshake
The IPS engine provides an evasion countermeasure technique that is able to block the usage of TCP split handshakes attacks. Although the
TCP split handshake is a legitimate way to start a TCP connection (RFC793), it can also be used by hackers to execute various network attacks
by gaining access to the internal network by way of establishing a trusted IP connection, thus evading firewall and IPS policies.
Configuring and Managing IPS
For step-by-step instructions on how to configure and manage IPS, see the following articles:
How to Check the IPS Security Subscription Status
How to Configure IPS Policies
How to Configure the Intrusion Prevention System (IPS)
How to Manage Threats
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
487
How to Check the IPS Security Subscription Status
The IPS signature database contains all signature definitions for detecting malicious network traffic.
An Energize Updates subscription is required to receive IPS security updates. For more information, see Licensing.
In this article:
Check the Subscription Status
Online IPS Database Updates
Check the Subscription Status
To access the IPS database, go to CONTROL > Server. The
current Security Subscription status is displayed in the right
pane as follows:
To check the IPS security subscription status, use the following options:
Version History – Click to see changes and updates to the IPS signature database.
Database Browser – Browse the currently installed IPS database.
Settings – Click to access the IPS Policies page: CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual
server > Assigned Services > Firewall
Online IPS Database Updates
You can perform an online update of the IPS database by using the following options:
Update – Triggers an immediate update of the IPS database and offers the following selections:
Check for updates – Check for available IPS database updates and install them.
Roll back to previous version – Revert the IPS database to any previously installed version.
Roll back to latest version – Revert the IPS database to the most recently installed version.
Update files are stored in the phion0/mcdownload/ips/files share. CC-managed Barracuda NG Firewalls are updated by the Barracuda
NG Control Center.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
488
How to Configure IPS Policies
IPS policies control the behavior of the IPS when an attack is detected. You can define multiple IPS policies and apply them to individual firewall
rules as needed.
In this article:
Default IPS Policy
Custom Policy Section
Policy Configuration
IPS Policy Management
IPS Signatures – Explicit Actions:
Assign IPS Policy to Firewall Rules
Default IPS Policy
By default all firewall rules use the default IPS policy. All traffic is scanned according to this policy while the IPS is enabled. To turn off IPS
scanning for an individual firewall rule, choose No Scan Policy from the IPS Policy dropdown. This makes sense for connections for which you
want to avoid being blocked in case of a IPS misconfiguration.
Custom Policy Section
Within the Custom Policy section it is possible to create and manage user created IPS policies. Each of the created policies can be individually
applied to firewall rules. The configuration interface for IPS policies is identical for the default policy and custom policies.
Policy Configuration
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > IPS
Policies.
2. Click Lock.
3. Select Enable IPS.
4. If you want malicious traffic to be dropped, disable the Report only check box.
Barracuda Network recommends to use Report only mode and to monitor the log files for false positives for an initial
deployment phase and then disable Report only mode later.
5. Select Scan SSL-Intercepted Traffic if decrypted SSL traffic should be scanned. Only available with enabled Application Control 2.0
with SSL Interception.
6. Configure the settings described in the following sections:
From Client/From Server – Allows different actions for data streams of a session. Streams initiated from the host are classified as From
Client, while answers from the target host are classified as From Server.
It may be necessary for system administrators to configure different IPS policy settings for the traffic source and destination.
Action – Describes the protection behavior of the IPS engine in case of detection of malicious traffic:
Drop – Drops malicious network traffic.
Log – Only informs about malicious network traffic according to the defined Notification.
None – Malicious network traffic will be neither reported nor dropped.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
489
Notification – Describes the warning behavior (Eventing) of the IPS engine in case of detection of malicious traffic:
Alert – An Alert Event will be generated.
Warn – A Warning Event will be generated.
Notice – A Notice Event will be generated.
Severity – Detected malicious network traffic is classified by the IPS engine into the following severities:
Critical
High
Medium
Low
Informational
IPS Policy Management
Custom Policies
Click Add to create an IPS Policy with custom settings.
Click Delete to remove the selected IPS Policy.
Click Clone to copy the selected IPS Policy.
Copy to Default Policy – Changes the currently selected policy to the default policy.
Explicit Signatures – For each IPS Policy, a set of custom signature actions can be defined and IPS scanning can be limited to
this user defined set.
Scan only for explicit signatures – If enabled, the IPS scanning will only be performed for IPS signatures that have been edited via the
explicit action link.
Edit explicit actions – Click this link to modify the action of a IPS signature.
IPS Signatures – Explicit Actions:
Edit – Select the desired IPS signature and click Edit Selected to modify the according action. Click Edit All to change actions
for all currently signatures displayed.
Severity Filter – Select the desired severity to filter for.
Policy Filter – Select the desired policy type:
All – Display all available IPS signatures.
Overwritten – Display only IPS signatures with custom actions.
Default only – Display only IPS signatures with default actions.
7. Click Send Changes and Activate.
Assign IPS Policy to Firewall Rules
As soon as a custom IPS Policy is configured, it is selectable within a firewall rule. Open a firewall rule
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
490
and select the desired IPS Policy. Now traffic that is handled by this firewall rule will be scanned according to
the selected policy.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
491
How to Configure the Intrusion Prevention System (IPS)
IPS policies define how the IPS engine scans traffic. You can create default and custom IPS policies to apply to your firewall rules. IPS can
automatically receive the latest intrusion prevention and security updates from Barracuda Central, an advanced 24/7 security operations center
that works to continuously monitor and block emerging Internet threats. Exploit signatures are regularly updated at Barracuda Central and are
automatically delivered to your system via Energize Updates. If your system is managed by a Barracuda NG Control Center, the IPS pattern
updates are done by the Barracuda NG Control Center. As soon as the Barracuda NG Control Center receives IPS pattern updates, these
patterns are delivered to all attached Barracuda NG Firewalls.
Enabling IPS can decrease the overall throughput of your system. By default, all firewall rules use the default IPS policy. For specific
firewall rules, you can disable IPS.
In this article:
Before you Begin
Enable IPS
View and Edit IPS Signature Policies
Create New IPS Policies
Create IPS Exceptions
Apply an IPS Policy to an Access Rule
Managing IPS on a Barracuda NG Control Center
Before you Begin
To use IPS, make sure that you have a valid Energize Updates subscription installed on your Barracuda NG Firewall or Barracuda NG Control
Center.
Enable IPS
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > IPS
Policies.
2. Click Lock.
3. Select the Enable IPS check box.
4. If you want malicious traffic to be reported without being dropped, select the Report only check box.
5. Click Send Changes and Activate.
View and Edit IPS Signature Policies
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > IPS
Policies.
2. Click Lock.
3. In the Default Policy section, click
Edit explicit actions to view the list of IPS signatures and how they are
handled.
4. To view the details for an IPS signature, double click it.
5. To edit the settings for an IPS signature, right click it and choose Edit Selected.
6. In the Change Action for Explicit Signatures window, define how the IPS signature is handled and reported. To use the default IPS
policy, select the Reset to default action check box.
7. Click OK and exit the list.
8. Click Send Changes and Activate.
Create New IPS Policies
Create new IPS policies to be applied to your access rules.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > IPS
Policies.
2. Click Lock.
3. In the Custom Policies table, click + to add a new entry for your policy.
4. Select an ID for your policy and click OK.
5. Enter a Name and Description for the policy.
6. If you want to apply your settings to the default IPS policy, click Copy to Default Policy.
7. Click Send Changes and Activate.
Create IPS Exceptions
If you want to exempt specific IPS signatures from the default or custom IPS policies, create IPS exceptions.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > IPS
Exception Database.
2. Click Lock.
3. Click the + icon.
4. In the Select IPS Signatures window, select the required IPS signatures and click Add. To remove a signature, select it and click Remo
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
492
4.
ve.
5. Click OK. Your override is listed in the table on the IPS Exception Database page.
6. Click Send Changes and Activate.
Apply an IPS Policy to an Access Rule
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > IPS
Policies.
2. Click Lock.
3. Edit the access rule you wish to apply the policy to.
4. Under Policy, select the policy from the IPS Policy list. If you want to disable IPS for the rule, select No Scan.
Managing IPS on a Barracuda NG Control Center
On the Barracuda NG Control Center, IPS pattern version information is displayed in the lower section of the File Updates page while successful
or failed IPS pattern updates for attached NG Firewalls are listed in the upper section.
Adjusting global file update settings may be necessary if your Barracuda NG Control Center needs to have Internet access through a
corporate HTTP proxy server. If your Barracuda NG Control Center is not able to download IPS patterns, increase the Log Level for better
troubleshooting.
1.
2.
3.
4.
5.
Go to the CONTROL tab and click File Updates in the ribbon bar.
Click the Set Area Config button.
In the Time Settings section, set the Download Interval (default: 60)
In the Proxy Settings section, specify the settings for the proxy server.
Click OK.
If a Barracuda NG Control Center-managed unit is reinstalled, the IPS pattern database must be updated after the installation process
because the database is not stored within the PAR file.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
493
How to Manage Threats
Threats that are detected by the IPS engine are listed in the Threat Scan tab of the FIREWALL page of a Barracuda NG Firewall. This user
interface provides a detailed view of information to each detected threat.
Firewall Threat Scan Interface
The Threat Scan interface can also be used to detect and manage false positive detections. If one of the entries listed was detected as malicious
but should be allowed instead,
1. Select the desired entry.
2. Select Add IPS Overrides in the upper bar.
3. In the False Positive interface, click Send Changes and Activate.
The entries are added to the IPS False Positives list of the Barracuda NG Firewall and, if present, to the Barracuda NG Control Center where you
can import them. Entries added to the IPS False Positives list will automatically get the None action and can be edited in the IPS False Positive i
nterface.
IPS Exceptions
With IPS enabled, it may happen that the engine detects network traffic that seems to be suspicious, but in special circumstances needs to be
allowed by the system administrator. To manage these threats, proceed as follows:
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > IPS
Exception Database.
2. Click Lock.
By selecting an entry, further modifications can be done by simply clicking the desired cell in the table. To extend a matching policy it is possible
to enter * (ALL) in the columns IPS Signature ID, Source, Port and Destination. A blank cell represents * (All). It is also possible to manually
create or copy false positives entries. To do so, click Add to create a new entry and configure as desired.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
494
Traffic Shaping
Limited network resources make bandwidth prioritization a necessity. The Barracuda NG Firewall enables traffic shaping to prioritize network
resources according to a number of factors such as time of day, application type and user identity. Traffic shaping supports the following features:
Data Traffic Classification – Classify traffic into different bandwidth allocation priorities.
Traffic Prioritization – Increase the bandwidth and lower the latency of important traffic.
Bandwidth Partition – Specify bandwidth limits for certain traffic types.
Network Overflow Protection – Prevent protocols without flow control mechanisms from congesting the network.
Dynamically Adjusted Shaping – Adjust traffic to dynamic factors such as time of day or download volume.
Shaping of VPN Transports – Adjust VPN tunnel settings to make sure remote locations are assigned enough bandwidth for business
critical web applications.
In this article:
Traffic Classification
QoS Profiles
Virtual Interfaces
Traffic Prioritization
Firewall Rules
TCP Flow Control
Traffic Classification
In addition to security classification, you can use the firewall rule set to classify network traffic for traffic shaping. Classification by the firewall rule
set is static - it does not change after the session is initiated unless you select the session in the rule set and change the QoS band. For
classification according to dynamic factors such as the time of day or download volume, the Barracuda NG Firewall provides the QoS profile. To
connect the rule-based static classification (session) and traffic shaping, the QoS band is used.
Network data can be shaped in the following ways:
Outbound shaping – The traffic is shaped before it is delivered to a network interface.
Inbound shaping – The traffic is shaped after it is received by a network interface.
QoS Profiles
When configuring the QoS profile for traffic shaping, an expandable “tree” of virtual interfaces is added to the network interfaces where traffic
must be shaped. A virtual tree consists of a root virtual interface that can be attached to a real network interface, and a number of
subnodes. When assigning a virtual tree to a physical network interface, you can enable and specify the rates for inbound and/or outbound traffic
shaping. The outbound and inbound rate of a virtual interface is ignored when the QoS Band policy in the corresponding access rule is set to NoShaping.
For more information on configuring virtual trees, see How to Create a QoS Profile.
Virtual Interfaces
The main purpose of a virtual interface is to shape and reduce traffic throughput from different sources to an available bandwidth according to
priorities. Data is transmitted over the virtual interface and then forwarded inbound or outbound according to the traffic shaping settings. The most
important characteristics of a virtual interface are:
A limiting bandwidth – This limit specifies the maximum data rate that is available for the virtual interface itself.
A priority weighting (high, medium or low) – This priority determines how the available bandwidth is partitioned if more data arrives
than the bandwidth limit allows.
Partitioning is never static. For example, if all available traffic has a low priority, it is assigned the whole bandwidth. The Weighted
Random Early Drop (WRED) queue management algorithm is used for prioritization.
To specify the bandwidth ratio of the traffic being propagated by a virtual node, you can select three priorities: class1, class2, and class3. For
high priority traffic that should not be restricted to a bandwidth limit, you can assign the NoDelay priority. The NoDelay priority should only be
used in well defined circumstances, to avoid crowding out the other traffic.
The bandwidth ratio is enforced in two steps:
1. Virtual Interfaces: Depending on the source, traffic is assigned and processed by the assigned virtual interface. Traffic is shaped
according to the bandwidth ratios set for each interface.
2. Virtual Root Interface: The virtual root interface is used to ensure that the combined traffic from all virtual interfaces do not exceed the
global limits.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
495
Example Setup
Traffic Prioritization
The QoS band evaluates and prioritizes traffic (high, medium, or low). It continually evaluates an IP packet’s ToS (type of service), current data
volume, and the absolute time domain. With QoS bands, you can construct routing-dependent traffic shaping schemes. For example, you can
configure an Internet connection in normal and fallback (ISDN) operation. For more information, see the Traffic Shaping examples.
QoS bands prioritize traffic flow in the shaping tree (together with the virtual interface). The connection between the traffic shaping engine and the
firewall is done by the shaping connectors. There are eight connectors available for out-of-the-box traffic management: Interactive, VoIP, Busine
ss, Internet, Background, LowPrio, LowestPrio, and Choke.
VoIP will always be given first priority. The same applies for Interactive which is limited to 90% of the overall available bandwidth, thus
always leaving at least 10% for VoIP traffic. The bandwidth which is not used by VoIP or Interactive.
The bandwidth ratio of Business : Internet : Background is 10:2:1 for residual bandwidth which is not used by VoIP or Interactive. In
addition, Internet has a built-in size limit of 10 MB after which a session is downgraded to Background, thus receiving a smaller
bandwidth ratio after the limit is exceeded.
The LowPrio virtual interface is limited to 5% of the overall available bandwidth. The bandwidth ratio of the LowPrio : LowestPrio :
Choke shaping connectors is 10:2:1.
The Choke virtual interface is limited to 0.1% of the overall bandwidth. These shaping connectors are ideally used to slow down
somewhat unnecessary traffic and applications which cannot be completely blocked.
For more information on configuring QoS bands, see How to Create and Apply QoS Bands.
Firewall Rules
In order to use a shaping connector, you must refer to it in a firewall rule. In the rule configuration, you can select between forward and reverse:
forward – This direction is defined by traffic that is generated by the session initiator (client).
reverse – This direction is defined by traffic that is generated by the responder (server).
For each traffic type, shaping may be configured differently. For instructions on how to create a QoS Band and apply traffic shaping to a firewall
rule, see How to Create and Apply QoS Bands.
TCP Flow Control
Because traffic shaping affects packet delivery, it also affects the TCP flow control mechanism. Ideally, the TCP flow control reduces its flow rate
to an amount where the shaping mechanism is no longer forced to discard packets. This is only possible if the traffic shaping mechanism can
delay packets long enough for the TCP flow control to detect a smaller bandwidth by measuring longer RTTs (round trip times). A longer delay
involves larger queue sizes that should be considered when configuring virtual interfaces. Long delays also result in larger latency values, which
might be unwanted for other protocols. Therefore, in the case of mixed TCP and other protocol traffic, consider using separate traffic shaping
nodes for TCP with different queue size settings.
It is also the TCP flow control mechanism which makes the priority weights approximate values. For example, there are 20 TCP sessions that are
all trying to receive the maximum bandwidth possible—where 10 are classified as high and 10 are classified as medium priority. If you configure a
ratio of 1:2 for the two priorities, you will observe this ratio when measuring the output for the two priorities. But if you change to setup to 1 high
priority TCP session and 39 medium TCP sessions, the results change. The single TCP session gets less bandwidth than expected, because the
flow control of the 39 TCP sessions generates more traffic while trying to find an optimum rate than the single high priority session. So to favor a
small number of TCP sessions over a large number of unprivileged TCP sessions, you should anticipate a larger ratio in order to get the desired
output ratio.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
496
How to Create and Apply QoS Bands
To make traffic shaping settings connectible with the forwarding firewall ruleset, you must apply an existing or new QoS Band. To configure a new
QoS Band, proceed as follows:
1. Create a QoS Band
To create a new QoS band, complete the following steps:
1.
2.
3.
4.
5.
6.
7.
Go to CONFIGURATION > Configuration Tree > Box > Traffic Shaping.
Click Lock.
Click the QoS Band tab.
Right-click the QoS Band table and select Add new QoS Band.
In the Name field, enter a descriptive name. (The ID field specifies the index number of the new QoS band.)
Click OK.
In the QoS Band Rule window, you can edit the following settings to specify the priority, interface, and conditions for traffic that is
handled by the QoS band:
Setting
Description
Priority
From this list, select the priority class that is assigned to data
packets that are handled by the QoS band.
Virtual Device
From this list, select the virtual interface into which the data
packets will be fed, should this rule apply.
TOS
To specify a value that must be matched by the TOS in the IP
header, select this check box.
Traffic Limit
To specify a data limit that must not be exceeded by network
sessions, select this check box.
Time Period
To specify specific dates and times during which this rule can be
applied, select this check box.
Weekday/Hour
To specify specific weekdays and times during which this rule
can be applied, select this check box.
8. Click
9.
OK.
Click Send Changes and Activate.
Example Scenario
2. Apply the QoS Band to a Firewall Rule
To apply traffic shaping to an access or application rule, complete the following steps:
1. Go to CONFIGURATION > Configuration Tree > Box >Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
497
2. Click Lock.
3. Create or double-click the access or application rule to which you are applying the QoS Band. For example, LAN-2-INTERNET-https.
To apply the QoS Band to an access rule:
Select the QoS Band from the QoS Band (Fwd) and QoS Band (Reply) list in the Policy section. For example, Backgr
ound.
The outbound and inbound rate of a virtual interface is ignored when the QoS Band policy in the
corresponding firewall rule is set to No-Shaping.
To apply the QoS Band to an application rule:
Select the Change QoS Band (Fwd) check box in the Policy section and select the QoS Band from the list.
4. Click OK.
5. Click Send Changes and Activate.
You can also apply traffic shaping settings to multiple rules. In the rule editor window for the rules, specify the following settings:
In the Rule Settings section, configure the Forward Band and Reverse Band settings.
In the TCP Policy section, configure the Syn Flood Protection setting.
For more information, see How to Edit, Copy, Clone, Deactivate, or Delete Access Rules.
Applying Traffic Shaping to VPN Tunnels
You can implement traffic shaping with VPN. For more information, see
Copyright © 2015, Barracuda Networks Inc.
How to Apply Traffic Shaping to a VPN Tunnel.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
498
How to Configure Basic Traffic Shaping
When deploying traffic shaping, consider the CPU resources of the system. Especially on low-end machines, shaping on highly used links may
cause performance degradation, resulting in high CPU loads and reduced network connectivity. Depending on the system configuration,
Barracuda Networks recommends a maximum interface shaping bandwidth of 10 MB/s on systems with a CPU clock of 800MHz or lower.
There are different ways to configure traffic shaping on the Barracuda NG Firewall. You can use the predefined Basic profile template or
configure all settings manually (see How to Create a QoS Profile ). The step-by-step instructions provided in this article explain how to configure
basic traffic shaping. The basic traffic shaping scheme employs a simple virtual tree named Default with a single virtual interface named NoDelay
attached to it.
Step 1. Apply the Basic Profile Template
1.
2.
3.
4.
5.
6.
7.
8.
Go to CONFIGURATION > Configuration Tree > Box > Traffic Shaping.
Click Lock.
From the Predefined Profiles list at top of the page, select Basic profile.
Click Yes to apply the template.
From the Select Interface list, select the interface to which you want to apply the basic profile.
Click OK. This assigns the virtual tree to the interface.
From the Interfaces table, double-click an interface to configure its bandwidth limit.
In the Rate section of the Interface Tree Mapping window, select Enable Shaping and enter a limit for the inbound and outbound
bandwidth.
9. Click OK.
10. Click Send Changes and Activate.
Step 2. Apply Traffic Shaping to Access Rules
Select the QoS Band in the Policy settings of an access or application rule.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Create or double-click the access or application rule to which you are applying the QoS Band.
To apply the QoS Band to an access rule:
Select the QoS Band from the QoS Band (Fwd) and QoS Band (Reply) list in the Policy section. For more information,
see How to Create and Apply QoS Bands.
The outbound and inbound rate of a virtual interface is ignored when the QoS Band policy in the
corresponding access rule is set to No-Shaping.
To not use the QoS To apply a different QoS Band to an application rule
Select the Change QoS Band (Fwd) check box in the Policy section and select the QoS Band from the list.
4. Click OK.
5. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
499
How to Apply Traffic Shaping to a VPN Tunnel
If you want to configure Quality of Service for a virtual interface as in this example, a VPN tunnel, adapt the traffic shaping configuration.
Assign a QoS Profile to a VPN Tunnel
1. Create a TINA VPN Tunnel.
2. Configure the traffic shaping settings.
To configure basic traffic shaping settings with the Basic profile template, see How to Configure Basic Traffic Shaping.
To configure advanced traffic shaping settings, see How to Create a QoS Profile.
3. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > VPN-Service >
Site to Site.
4. Open the TINA Tunnel configuration window.
5. Click the TI - Bandwidth Protection tab.
6.
7.
8.
9.
From the Bandwidth Policy list, select Assign QoS Profile.
From the Assigned QoS Profile list, select your QoS profile.
In the Estimated Bandwidth field, enter the maximum rate for outbound traffic in KB/s. If you enter 0, no shaping occurs.
In the Reverse field, enter the maximum rate of inbound traffic in KB/s. If you enter -1, the same maximum rate is used for outbound and
inbound traffic.
10. Click OK.
11. Click Send Changes and Activate.
12. Create the access rules for the VPN tunnel traffic. For more information, see How to Create Access Rules for Site-to-Site VPN Access.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
500
Example - Traffic Shaping for WAN Connections
This article provides information on how to apply the default traffic shaping scheme to a new interface and how to add the basic QoS profile to a
static and a dynamic ISP link.
The steps in this article uses the following example settings:
ISP 1
ISP 2 (dynamic)
Firewall Rule
Port
eth1
Port
dhcp
Name
LAN-2-INTERNET
Traffic Outbound
Rate
10 Mbit/Sec
Traffic Outbound
Rate
2 Mbit/Sec
Service
HTTPS
Traffic Inbound
Rate
10 Mbit/Sec
Traffic Inbound
Rate
2 Mbit/Sec
Step 1. Create a New Interface
To create a new interface and assign it to the default Basic profile, complete the following steps.
1.
2.
3.
4.
Go to CONFIGURATION > Configuration Tree > Box > Traffic Shaping.
Click Lock.
In the Interface section, right-click and select Add new Interface.
In the Interface Tree Mapping window, set the following settings:
Setting
Description
Interface
The name of the interface. For example, enter eth1 for ISP 1 and
dhcp for ISP 2.
To apply traffic shaping, select or enter your specific
port name as it is listed on the CONTROL > Network
page. For dial-up connections like xDSL, ISDN, UMTS,
or 3G, you must enter the correct port name in order to
apply traffic shaping that uses dynamic IP addresses.
For example, if your xDSL port is listed as xDSL(ppp1
), enter ppp1 in the Interface field.
Assigned Profile
The QoS profile to assign to this interface. For example, Default.
Rate
In this section, select Enable Shaping and specify limits for the O
utbound and Inbound bandwidth settings. For example, enter 1
0 Mbit/Sec as the bandwidth limits for ISP 1 and 2 Mbit/Sec as
the bandwidth limits for ISP 2.
5. Click OK.
6. Click Send Changes and Activate.
For advanced options, see How to Create a QoS Profile.
Step 2. Apply the QoS Band to a Firewall Rule
Select the QoS Band in the Policy settings of an access or application rule.
1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Create or double-click the access or application rule to which you are applying the QoS Band. For example, LAN-2-INTERNET-https.
To apply the QoS Band to an access rule:
Select the QoS Band from the QoS Band (Fwd) and QoS Band (Reply) list in the Policy section. For example, Backgr
ound.
The outbound and inbound rate of a virtual interface is ignored when the QoS Band policy in the
corresponding access rule is set to No-Shaping.
To apply the QoS Band to an application rule:
Select the Change QoS Band (Fwd) check box in the Policy section and select the QoS Band from the list.
4. Click OK.
5. Click Send Changes and Activate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
On the FIREWALL > Live page, verify that the correct QoS band was applied to your session.
Copyright © 2015, Barracuda Networks Inc.
501
Barracuda NG Firewall 6.1 Administrator's Guide - Page
502
How to Create a QoS Profile
When deploying traffic shaping, consider the CPU resources of the system. Especially on low-end machines, shaping on highly used
links may cause performance degradation, resulting in high CPU loads and reduced network connectivity. Depending on the system
configuration, Barracuda Networks recommends a maximum interface shaping bandwidth of 10 MB/s on systems with a CPU clock of
800MHz or lower.
QoS profiles are constructed of a root virtual interface, which may be attached to a real network interface
and an arbitrary number of subnodes forming a tree. The output of any number of virtual interfaces can be fed
into the input of a superordinate virtual interface.
A new virtual interface can be created on the subordinate level of an existing virtual interface. Each and every virtual interface of a QoS profile
can be configured individually. QoS profiles are built as templates and will only operatively perform traffic shaping when they are referred to by a
physical network interface.
This way, the same QoS profile can be reused for several physical network interfaces. As a result, the limiting bandwidth rates are configured in
relative numbers (percent), which become absolute values when assigning a physical network interface with absolute bandwidth values. When
assigning QoS profiles to physical network interfaces, it is possible to decide if inbound and/or outbound traffic should be performed by the traffic
shaping mechanism. With the assignment the effective rates (in- and outbound) of the physical network interfaces are specified. Note that these
rates do not need to be identical with the rate the interface is capable of, but they should rather specify the expected effective bandwidth (for
example, a 2 Mbit provider line accessed over a 100Mbit Ethernet interface).
In this article:
Step 1. Create a QoS Profile
Step 2.
Create a Virtual Interface
Step 3. Create a QoS Band
4. Assign the QoS Profile to the Physical Interface
5. Apply Traffic Shaping to Application or Access Rules
Step 1. Create a QoS Profile
1.
2.
3.
4.
5.
6.
Go to CONFIGURATION > Configuration Tree > Box > Traffic Shaping.
Click Lock.
Click the QoS Profile tab.
In the Virtual Interface list, right-click and select Add new QoS Profile.
In the Profile Name field, enter a name for the QoS profile.
In the Outbound section, select an Operation Mode for traffic that is sent over the device:
Shape – The virtual interface limits traffic according to the Outbound settings.
Passthrough – Packets are immediately passed to the next tree node or to the associated network interface.
Drop – Packets are immediately discarded.
Priority – Packets are passed through the shaping tree without being queued.
7. In the Priority Weights fields, you can specify the relative weight of the three priorities: class1, class2, and class3.
These weights specify the ratio of the traffic being propagated, assuming that the input traffic is evenly distributed.
8. In the Inbound section, select an Operation Mode and specify the Priority Weights for the inbound traffic (traffic that is received by the
device). If you want inbound traffic to be handled with the same settings as outbound traffic, select As-Outbound.
9. Click OK.
10. Click Send Changes and Activate.
Step 2.
Create a Virtual Interface
1.
2.
3.
4.
5.
6.
Go to CONFIGURATION > Configuration Tree > Box > Traffic Shaping.
Click Lock.
Click the QoS Profile tab.
In the Virtual Interface list, right-click the new QoS Profile and select Add new virtual interface.
In the Virtual Interface Name field, enter a descriptive name.
In the Outbound section, select an Operation Mode for traffic that is sent over the device:
Shape – The virtual interface limits traffic according to the Outbound settings.
Passthrough – Packets are immediately passed to the next tree node or to the associated network interface.
Drop – Packets are immediately discarded.
Priority – Packets are passed through the shaping tree without being queued.
7. In the Assumed Rate field, enter the bandwidth limit (%) for the virtual interface. This value represents a hard bandwidth limit for this
virtual interface. Do not produce values lower than 512 kbit.
8. When a datagram is passed to the next node in the tree, you can adjust the c settings before processing is continued.
9. From the Priority Adjustment list, specify the adjustment of priority weights when packets are passed to the next virtual interface.
10.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
503
10. The Queue Size (Bytes) field is the hardcoded size of the virtual interface's internal queue (in bytes).
11. In the Inbound section, select an Operation Mode, enter an Assumed Rate, adjust the Assumed Rate, and specify the Queue Size
(Bytes).
12. Click OK.
13. Click Send Changes and Activate.
Step 3. Create a QoS Band
In order to assign traffic prioritization to the physical interface, you must apply the virtual interface to an existing QoS Band.
1.
2.
3.
4.
5.
6.
7.
8.
9.
Go to CONFIGURATION > Configuration Tree > Box > Traffic Shaping.
Click Lock.
Click the QoS Band tab.
Right-click the QoS Band table and select Add new QoS Band.
In the Name field, enter a descriptive name. (The ID field specifies the index number of the new QoS
band.)
Click OK.
In the QoS Band Rule window, you can edit the following settings to specify the priority, interface, and
conditions for traffic that is handled by the QoS band:
Priority – From this list, select the priority class that is assigned to data packets that are handled
by the QoS band.
Virtual Device – From this list, select the virtual interface into which the data packets will be fed,
should this rule apply.
TOS – To specify a value that must be matched by the TOS in the IP header, select this check
box.
Traffic Limit – To specify a data limit that must not be exceeded by network sessions, select this
check box.
Time Period – To specify specific dates and times during which this rule can be applied, select
this check box.
Weekday/Hour – To specify specific weekdays and times during which this rule can be applied,
select this check box.
Click OK.
Click Send Changes and Activate.
4. Assign the QoS Profile to the Physical Interface
To apply traffic shaping settings to a physical interface, such as port1, complete the following steps:
1. From the Interface table, double-click the interface to which the QoS profile should be assigned to.
2. From the Assigned Profile list, select the new QoS profile.
3. In the Rate section of the Interface Tree Mapping window, select Enable Shaping and enter a limit for the inbound and outbound
bandwidth.
4. Click OK.
5. Click Send Changes and Activate.
5. Apply Traffic Shaping to Application or Access Rules
1. Go to CONFIGURATION > Configuration Tree > Box >Virtual Servers > your virtual server > Assigned Services > Firewall >
Forwarding Rules.
2. Click Lock.
3. Create or double-click the access or application rule to which you are applying the QoS Band. For example, LAN-2-INTERNET-https.
To apply the QoS Band to an access rule:
Select the QoS Band from the QoS Band (Fwd) and QoS Band (Reply) list in the Policy section. For more information,
see How to Create and Apply QoS Bands.
The outbound and inbound rate of a virtual interface is ignored when the QoS Band policy in the
corresponding access rule is set to No-Shaping.
To apply the QoS Band to an application rule:
Select the Change QoS Band (Fwd) check box in the Policy section and select the QoS Band from the list.
4. Click OK.
5. Click Send Changes and Activate.
You can also apply traffic shaping settings to multiple rules. In the rule editor window for the rules, specify the following settings:
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
In the Rule Settings section, configure the Forward Band and Reverse Band settings.
In the TCP Policy section, configure the Syn Flood Protection setting.
For more information, see How to Edit, Copy, Clone, Deactivate, or Delete Access Rules.
Copyright © 2015, Barracuda Networks Inc.
504
Barracuda NG Firewall 6.1 Administrator's Guide - Page
505
Example - Simple Traffic Prioritization
For this example, traffic must be classified into three types, according to source IP address and network service. The types should be prioritized
with a ratio of 5:2:1 (C1 : C2 : C3).
For this example, you must configure the following:
1.
2.
3.
4.
A virtual tree consisting of a single virtual interface with a partition priority of 5:2:1.
Three QoS bands that point to the root node. One QoS band results in a high priority, one in a medium priority, and one in a low priority.
A firewall ruleset that consists of three rules, each referring to one of the three QoS Bands.
A physical network device to which network traffic is delivered with the virtual tree attached to it.
With this configuration:
The configured total for inbound and outbound bandwidth is never exceeded.
The three types of network traffic (low, medium, and high) share the bandwidth. If all three types of traffic are not in operation, the total
bandwidth is divided amongst the available traffic according to the partition priority. If the preset bandwidth limit is not reached, traffic
shaping does not occur and there is no prioritization.
Prioritization only occurs when the available bandwidth is insufficient.
Because all three types of traffic operate on the same limiting unit datagram and share the same datagram queue, the delivery latency of
a specific traffic type is highly dependent on the amount of traffic of the other types.
The configured priority partition is an estimated ratio. As more network traffic is sent, the closely the actual ratio matches this estimate.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
506
Example - ISP Customer Bandwidth Assignment
In this example, an ISP with an Internet access provides a total bandwidth of 100 Mbits. The bandwidth should be assigned to four customers.
One customer should get 40 Mbits and the other three customers should get 20 Mbits each. The assigned bandwidth of each customer should
not be exceeded, even if the total bandwidth is not saturated.
For this setup, you must configure the following:
1. A virtual tree consisting of a virtual root interface and four subnodes (A-D) with a limiting bandwidth of 40% for one node and 20% for the
remaining three nodes.
2. Four QoS bands where each one results in medium priority selection and points to each one of the subnodes.
3. A firewall ruleset with four rules that each refer to one of the four QoS bands.
4. A physical network device where network traffic should be delivered with the virtual tree attached to it.
With this configuration:
The total bandwidth (sum over all customers) is never exceeded.
The available bandwidth per customer is never exceeded. There is no bandwidth borrowing between customers (nodes).
The setup can be extended by introducing more than one QoS band per customer with varying priorities.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
507
Example - Traffic Shaping for the HTTP Proxy Service
In this example, traffic shaping for the HTTP Proxy service must be configured to ensure that HTTP, HTTPS, and FTP traffic is prioritized below
other traffic, such as VPN. To make source-based traffic shaping possible, the traffic shaping engine uses the shaping connector of the matching
inbound rule and replicates this shaping connector to the outbound session of the HTTP Proxy service for the Barracuda NG Firewall.
Traffic for the CEO must be given the higher prioritization than that for other people in the company. Two firewall rules are required in the inbound
ruleset, as illustrated in the following figure. Note that the QoS band for Rule 24: Band ID100 CEO is configured with higher priority than the QoS
band for Rule 25: Band ID105 Staff. Also the source addresses for Rule 24: Band ID100 CEO are limited from 10.0.10.90 to 10.0.10.99.
With this configuration:
The outbound ruleset is still default. No changes are necessary. The configured QoS bands are taken from the inbound ruleset.
In the firewall interface, LOUT-sessions are tagged with the correct shaping band.
These sessions are fed into the assigned shaping tree. This can be verified on the Firewall > Shaping page.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
508
Example - Advanced Traffic Shaping
In this advanced traffic shaping example, the prioritization of Example 1 and the bandwidth assignment of Example 2 are used. Furthermore, the
dynamic parameters of the session download volume are used to demonstrate the purpose of the QoS band rules. The setup describes an
Internet gateway which services the following:
An application which needs low delivery latency (such as for VoIP).
Internet access from the internal network (mainly HTTP traffic).
VPN traffic over the Internet.
Web access from the Internet (Web shop).
A multiprovider setup with a fallback ISDN line (bundled to 512 Kbits). ISDN fallback is implemented with redundant network routes.
From this setup, we expect the following:
Low latency delivery for the VoIP application by feeding the VoIP traffic directly into the root node. Other traffic must pass either the B2B
or Web node, where it is queued (delayed) if bandwidth saturation occurs. This way, the VoIP traffic may even overtake the traffic waiting
in the Web or B2B queues.
A minimum of 40% of the Internet bandwidth for VPN traffic. By limiting the Web node to 60%, it is guaranteed that the B2B node will get
at least 40% of the available bandwidth (assuming that the amount of VoIP traffic is negligible).
High priority treatment for Web access from the Internet (Web Shop).
Medium priority treatment for Web access from the internal network to the Internet.
Low priority treatment for downloads from the internal network which are larger than 10 MB.
For ISDN Fallback operation (provider failure), only the VPN and the VoIP application traffic should be delivered. This is achieved by
setting the Web node for the ISDN tree to operate in DROP mode. This way, the ISDN line is protected against unwanted web traffic.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
509
Bridging
A layer2 bridge checks the destination MAC address of each incoming frame. If the MAC address is assigned to the bridge computer, the frame is
processed by it as the destination. If the MAC address is not assigned to the bridge computer, the Network Bridge notes the source address of
the frame and the port on which the frame was received and either creates or refreshes an entry in a layer 2 bridge table. The port is a number
that identifies the network adapter and its corresponding LAN segment. Each entry in the layer 2 bridge table consists of a MAC address, the port
number corresponding to the LAN segment on which a frame from the MAC address was received, and a timeout value. Entries in the layer 2
bridge table persist for 5 minutes before being removed.
How to Configure Layer 2 Bridging
How to Configure Routed Layer 2 Bridging
How to Configure Layer 3 Bridging
For more information on bridging parameters, see Bridging Configuration Settings.
Bridging Type Feature Comparison
To help you decide which method to use, the following table compares the features that are available for each bridging method:
Features
Transparent Layer 2 Bridging
Routed Layer 2 Bridging
Layer 3 Bridging
MAC Transparent
Yes
Yes
No
Routing-Bridging-Forwarding
No
Yes
Yes
Local Firewall Traffic
(Gateway)
No
Yes
Yes
Auto Learning of Network
Nodes
Yes
Yes
No
Active Learning of Network
Nodes
No
Yes
No
Next Hop Bridging
Yes
Yes
No
Broad-Multicast Propagation
Yes
Yes
Yes
High Availability
Yes
Yes
Yes
VLAN capable
Yes
Yes
Yes
IP and ARP Forwarding
Yes
Yes
Yes
Non IP Protocols Forwarding
No
No
No
IPv6
No
No
No
IPS
No
Yes
Yes
Application Control 2.0
(Application Detection)
Yes
Yes
Yes
SSL Interception
No
Yes - default route required
Yes - default route required
Yes - default route required
Yes - default route required
Yes - default route required
Virus Scanning
No
Yes - default route required
Yes - default route required
ATD
No
Yes - default route required
Yes - default route required
Safe Search
No
Yes - default route required
Yes - default route required
YouTube for Schools
No
Yes - default route required
Yes - default route required
URL Filter
Bridging on VMware ESXi
Before configuring a layer2 bridge on a virtual Barracuda NG Firewall running on a VMware ESXi hypervisor, you must enable promiscuous mode
for all network interfaces and vSwitches that are used by the bridge.
Security Weaknesses and Solutions
Because bridging heavily depends on broadcasts for establishing connectivity, this results in a few weak points that you must carefully consider.
Try to implement bridging in a trusted environment. Broadcasts in large environments also consumes a lot of bandwidth. The Barracuda NG
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
510
Firewall offers different methods to help prevent the following common attacks.
Preventing IP or ARP Spoofing over Layer 2 Bridges
Network nodes may use the IP addresses of fake ARP responses in order to fake network traffic with arbitrary IP addresses. Because firewall
security is enforced on Layer 3, the security policy is bypassed. These issues can be solved by taking the following measures:
Segment Access Control Lists (Bridging Interface ACLs) – Specify which IP addresses are allowed on a segment.
Static Bridge ARP Entries – Statically specify IP addresses, MAC addresses, and segments to avoid learning via ARP.
MAC-based Firewall Rules – Define source MAC conditions for network objects.
ARP Change Reporting – Specify which types of the IP-MAC-Segment relationship changes must be reported in the access cache and
log.
Prevent Destination MAC Spoofing
Another security issue in bridged environments is the possible exploitation of security enforcement on Layer 3 and traffic delivery on Layer 2. You
can prevent these issues by enforcing Layer 2 when a Layer 3 session is granted. MAC addresses for a session are fixed when the session is
created and remain enforced until the session ends.
In the figure below, a client from LAN 1 tries to force a connection grant to a client in LAN 3. To do so, it sends a packet to the client in LAN 2
using MAC-A as a destination MAC address and 10.0.8.10 as the destination IP address. After the session has been granted through the bridge
and communication has been allowed, it sends a second packet exchanging the MAC address for the client in LAN2 with the MAC address for
the client in LAN3 leaving the IP address the same.If MAC enforcement is configured, the connection with the spoofed MAC address will not be
allowed.
Copyright © 2015, Barracuda Networks Inc.
Barracuda NG Firewall 6.1 Administrator's Guide - Page
511
How to Configure a Local Bridge for Evaluation
To transparently connect your local workstation with the network across a Barracuda NG Firewall use a local bridge. This configuration allows you
to explore the Barracuda NG Firewall’s advanced traffic and application inspection features by using traffic that your workstation generates on the
LAN. To make the connection transparent you must configure a loca