Release Notes for 5.4.1 - Barracuda Campus

Transcription

Release Notes for 5.4.1 - Barracuda Campus
Barracuda NextGen Firewall F
Release Notes for 5.4.1
Before you update your system to version 5.4.1, read these release notes and the 5.4.1 Migration Instructions.
Contents:
What´s New in Barracuda NG Firewall Version 5.4.1
Firewall
Application Control 2.0
With Application Control 2.0, create dynamic application usage policies that can be enforced by application,
application category, location, and the time of day. You can:
Block unwanted applications for certain users or groups.
Control and throttle acceptable traffic.
Preserve the bandwidth and increase the speed of business critical applications.
Enable or disable specific application sub-functions (e.g. Facebook Chat, YouTube postings, or MSN file
transfers).
Apply all of the above to applications using SSL-encrypted traffic.
For more information, see Application Control 2.0.
New Application Ruleset
Create granular application usage policies to control network traffic based on the application context beyond
traditional stateful packet inspection (IP addresses, ports, and protocols).
Release Notes for 5.4.1
1 / 20
Barracuda NextGen Firewall F
Application Objects
Create application objects that include a static list of applications.
Application Filter Objects
Create application filter objects with dynamic lists that are automatically updated to include applications
according to their category, risk, or properties.
Release Notes for 5.4.1
2 / 20
Barracuda NextGen Firewall F
Custom Applications
Create custom applications to be used in the application rule set.
SSL Interception
Intercept and enforce policies for TLS/SSL encrypted traffic. Because SSL Interception must be enabled
separately within each access rule, you can specify exclusions from SSL scanning (e.g. internal LAN traffic). You
can also configure exceptions on an application basis (e.g. custom SSL applications).
SSL Interception works only for the Barracuda NG Firewall F200 and above. For a detailed list of supported appliances (both Barracuda and phion
legacy), see the Migration Instructions.
The Barracuda NG Firewall can extract certificate information to enforce policies for TLS/SSL-encrypted web
traffic that is not intercepted. Full SSL Interception can detect sub-applications, such as Facebook chat or photo
uploading in encrypted Facebook traffic.
Release Notes for 5.4.1
3 / 20
Barracuda NextGen Firewall F
SSL Inspection also lets you create new root certificates and import existing trusted root certificates.
Live Application Control
Control active application sessions by changing QoS bands (e.g. prioritize active Salesforce sessions), modifying
traffic intelligence settings, and specifying different VPN transports.
Comprehensive Reporting and Drill-Down Capabilities
View statistics on the new Firewall > Monitor page for application and protocol usage.
Release Notes for 5.4.1
4 / 20
Barracuda NextGen Firewall F
For a detailed report on traffic and application usage for a specific period of time, you can print the Monitor
page.
Deep Application Context
Gain insight into the target of users and applications. For example, you can verify if a proxy service was used to
access a job search site or if YouTube was used to watch specific videos.
Release Notes for 5.4.1
5 / 20
Barracuda NextGen Firewall F
On the Firewall > Monitor page, you can view all active sessions for a specific application or protocol by
clicking its name in the Live Traffic section. The Firewall > Live page then opens and only displays sessions
for that application or protocol, letting you quickly adjust them (e.g. changing QoS or terminating the respective
sessions).
Protocol and Application Definition Updates – Receive new protocol and application definition
updates via Energize Updates.
Block Page – Customize the text of the block page that lets users know that an application is being
blocked according to corporate application usage policy.
Geo Location Database (Reporting and Network Objects)
The Geo Location database contains a list of IP addresses that are used by specific countries. To control traffic
coming or going to specific geographic locations, you can specify regions or countries in your network objects.
Release Notes for 5.4.1
6 / 20
Barracuda NextGen Firewall F
The Geo Location Database is included in the object viewer, so you can drag-and-drop regions and countries to
the Src and Dst columns of a firewall rule.
You can also view regions and countries for sessions on the Firewall > Live, History, and Monitor pages for
troubleshooting and reporting.
For more information on this feature, see How to Apply Geo Location Settings.
Renaming of Forwarding Firewall Rules to Access Rules
Stateful firewall rules have been renamed from Forwarding Rules to Access Rules.
New Default Ruleset
For monitoring purposes, the new default rule set includes a default application rule that allows all application
traffic.
Release Notes for 5.4.1
7 / 20
Barracuda NextGen Firewall F
To ease configuration, the rule set includes various new default access rules (e.g., deactivated rules to redirect
web and VoIP traffic to the transparent web proxy).
Rules are also organized into sections according to their function.
VPN Site-to-Site
WAN Optimization
To reduce latency when exchanging files via site-to-site VPN TINA tunnels, Server Message Block v2 (SMBv2)
protocol optimization is supported. SMB is also known as Common Internet File System (CIFS). It is a remote file
protocol which is commonly used by Microsoft Windows clients and servers for exchanging files.
VPN Graphical Tunnel Interface (GTI) Editor Re-Design
The VPN GTI Editor includes new navigation items such as a function to zoom into specific network nodes, a
search tool to find tunnels by name, and a mini map.
For more information on the VPN GTI Editor, see The VPN GTI Editor Overview.
Release Notes for 5.4.1
8 / 20
Barracuda NextGen Firewall F
Networking
Configuration Wizard
For standalone Barracuda NG Firewalls, a wizard is available to help you configure basic settings for productive
deployment or to prepare the system for evaluation.
The wizard starts automatically for freshly installed Barracuda NG Firewalls (no PAR file) and newly shipped
appliances during their initial connection with Barracuda NG Admin.
Improved Configuration of Layer 2 Bridging
During Layer 2 bridging configuration, all available IP addresses from the bridged interfaces are propagated to
the configured bridge groups. Bridged IP addresses no longer need to be manually chosen.
DHCP on Port 4 Enabled
On the Barracuda NG Firewall F10 to F301, the DHCP client on port 4 is enabled by default. To allow the
management of the firewall for initial configuration via port 4, a new default access rule named SETUP-MGMTACCESS is available.
Release Notes for 5.4.1
9 / 20
Barracuda NextGen Firewall F
Barracuda NG Admin Device Management
On standalone Barracuda NG Firewalls, all management connections use TCP port 807. For Barracuda NG Admin
environments that include Barracuda NG Firewalls with versions 5.2.7 and below, a fallback is included.
Host Routes to Dynamically Assigned DNS Servers
To prevent provider-unfriendly DNS routing, separate host routes are automatically created for each
dynamically assigned DNS upon IP address assignment (DHCP, 3G, xDSL).
Logs
Syslog Logging
The backend logging architecture has been improved. All software components now use syslog. This improves
the system performance.
IPv6 Enhancements
The following services now support IPv6:
Virus Scanner
DNS Service
IPv4 and IPv6 addresses can be simultaneously resolved.
DHCP Relay
DHCP Service
DHCP for IPv6 includes all features as for IPv4. DHCP service can run in simple or advanced mode.
Using auto configuration (enabled in Firewall settings) stateless configuration is needed in DHCP
service.
Dynamic Routing: OSPF, BGP
Multipath handling for IPv6 is not supported.
Multipath routes are internally divided into various routes with different metrics.
SNMP Service
Mail Gateway
Firewall Management traffic
IPv6 addresses on standalone Barracuda NG Firewalls can be assigned to all services, even to those that do not yet support IPv6.
In version 5.4.1, the following services do not support IPv6:
FTP Gateway
Access Control Service
Spam Filter
SSH Proxy
URL Filter
VPN
IPv6 Service Table
Administration
Release Notes for 5.4.1
Networks
Firewall
Layer-7
Security
High
Availability
Logging Others
10 / 20
Barracuda NextGen Firewall F
• Management
multiplatform
(management
interface is not fully
IPv6 compatible)
• Address
objects
• Address
objects networks
• MAC-based
address objects
• VLAN tags
• VLAN
subinterfaces
(minimum 10)
• Layer 2 bridge
mode (minimum
2 pairs)
• Wired mode (2
Port)
• Tab mode (1
Port)
• QoS mapping
• DHCP server
• DHCP relay
• IP helper
• Dynamic
routing RIP
• Dynamic
routing OSPF
• Policy based
routing
• Neighbor
discovery
protocol
• Access
rules
separate
• Access
rule mixed
IPv4 and
IPv6 AO
• FTP active
• FTP
passive
• Anti-spyware
• Gateway antivirus
• Stateful
Inspection
• High
• Security
Availability
services with
monitoring
DPI
• Anti-spam
• Content
filtering service
• SNMP
• Logging
• Connection
cache
• Connection
limiting
• Connection
monitor
• Web proxy
• Wireless
Miscellaneous
Support for Open Virtual Machine Tools (open-vm-tools)
Open Virtual Machine Tools are now supported.
SNMP Plugin Enhancements
The SNMP plugin now reports the VPN tunnel status and BGP neighbor states.
SIP Proxy Enhancement
The SIP proxy can be enabled and disabled manually.
Barracuda NG Admin
Release Notes for 5.4.1
11 / 20
Barracuda NextGen Firewall F
New In-Place Edit Function for Firewall Rules
The settings and actions for access rules and application rules can be edited directly on the rule set pages.
The Firewall Rule Editor can still be opened by either double-clicking the rule number or right-clicking the rule and selecting Edit Rule.
New List Views on Firewall Live and History Pages
The Firewall > Live and History pages exhibit more performance with high data volumes and include new
display features (e.g. new filters, new columns, etc.).
From these pages, you can also open the Application Details window for more information on a specific
application.
Release Notes for 5.4.1
12 / 20
Barracuda NextGen Firewall F
New Traffic and Filter Selection User Interface
On the Firewall > Live and History pages, the Traffic Selection and Traffic Filter have been redesigned.
New Columns on Firewall Live and History Pages
On the Firewall > Live and History pages, the following columns are available to provide more information
about firewall sessions and help with network troubleshooting and adapting security policies:
Geo Source
Geo Destination
QoS (consolidates the Forward and Reverse Shaping columns)
Application
Application Context
Content
Protocol (does not replace the Proto column, which is renamed as IP-Protocol)
Enhanced Context Menu Functions
With extended context menus, you can copy specific entries or entire lists to the clipboard. You can also print
Release Notes for 5.4.1
13 / 20
Barracuda NextGen Firewall F
lists and export them to a text file.
The Access Rules and Application Rules can also be printed.
IP-Anonymizing Function for Firewall Live, History and Monitor Printing
To comply with legal and privacy regulations, the last IP address octets can be set to xxx when printing lists
from the Firewall > Live, History, and Monitor pages.
You can enable this feature in the Barracuda NG Admin Settings.
Customizable External IP Lookups
You can perform external IP lookups (e.g. on whois.com, ip-tracker.org, etc.) to view additional IP address and
host information on the Firewall > Live, History, and Monitor pages. In the Client Settings, you can specify
the preferred lookup site.
Release Notes for 5.4.1
14 / 20
Barracuda NextGen Firewall F
Enhanced Object Viewer
The Firewall Object Viewer now includes Application Objects and Geo Locations. You can simultaneously
drag-and-drop multiple objects when configuring firewall rules.
Redesigned DCHP Status Page
The DCHP page was redesigned. For more information, see DHCP Tab.
Release Notes for 5.4.1
15 / 20
Barracuda NextGen Firewall F
VPN Client
VPN Profile Configuration Using Barracuda NG Admin
With version 3.2 of the Barracuda Network Access Client for Windows and Barracuda VPN Client for Mac OS X,
VPN profiles that were created and saved with Barracuda NG Admin can be imported by double-clicking the
*.vpn file in Windows Explorer. This allows easy deployment of VPN profiles. For example, the end user can
simply double-click a VPN profile that is emailed by the administrator for installation.
For more information, see the following articles:
How to Import a *.vpn File into the VPN Client
How to Install VPN Service Licenses
Improvements Included with Barracuda NG Firewall Version 5.4.1
Barracuda NG Admin
Entering an HTTPS address within Settings > Custom IP Lookup did not work as intended. An
appropriate fix was included. (BNNGF-18298)
In Barracuda NG Admin versions 5.2.6 and 5.2.7, importing Barracuda Personal Firewall rules that were
created using Barracuda NG Network Access Client 3.0 occasionally led to problems with imported
network and service objects. An appropriate fix was included. (BNNGF-16809)
In Barracuda NG Admin version 5.2.x, informational login messages were hidden below the login window.
An appropriate fix was included. (BNNGF-16418)
Barracuda NG Admin versions 5.2.6 and 5.2.7 failed if the username of the executing user contained
Unicode characters. An appropriate fix was included. (BNNGF-16318)
On the Firewall > Live page, the Band Filter did not work as intended. An appropriate fix was included.
(BNNGF-16055)
On the Forwarding Rules page, the Copy option in the context menu for the list of Networks objects
was missing. An appropriate fix was included. (BNNGF-16027)
In the GTI Editor of Barracuda NG Admin version 5.2.X, it was possible to create several VPN tunnels with
the same Tunnel Name. This usually occurred when the second tunnel between a pair of servers is not
renamed before its configuration is saved. This caused severe problems with the newly created tunnel.
An appropriate fix was included. (NO TICKET)
In rare cases, Barracuda NG Admin version 5.2.7 did not correctly process ZIP codes during license
purchasing. An appropriate fix was included. (BNNGF-18712)
Barracuda NG Installer
In versions 5.0.5 to 5.2.7, Barracuda NG Installer failed when Standard Hardware was selected as Product
Type / Hardware Model and a keyboard layout other than DE or UK was configured. An appropriate fix was
included. (BNNGF-16333)
Release Notes for 5.4.1
16 / 20
Barracuda NextGen Firewall F
Barracuda NG Firewall
Module
Description
• In versions 5.2.6 and 5.2.7, VLAN did not work as intended with Intel Pro/1000 PCI-Express
82575/6. An appropriate fix was included. (BNNGF-18457)
Barracuda OS
• In version 5.2.7, units with flash disks sometimes rebooted when the system load was very
high. An appropriate fix was included. (BNNGF-18653)
Firewall
A security issue was removed by including an appropriate enhancement. (BNNGF-18240)
Network
• In versions 5.2.6 and 5.2.7, the Barracuda NG Firewall F900 and F800 Rev B units with Intel
82599EB 10Gbe fiber optic NICs were under certain circumstances suffering from problems
with performance and packet loss. An appropriate fix was included. (BNNGF-18194)
• In versions 5.2.6 and 5.2.7, under special circumstances and with high system load, NIC
outages occurred because of a problem with a NIC driver. An appropriate fix was included.
(BNNGF-18193)
BNNGF-16280)
Known Issues
For more information about known issues, see https://login.barracudanetworks.com/support/knownissue[1]
Technical Support.
or contact Barracuda Networks
To successfully update the Barracuda NG Firewall via SSH, the IDLESHELL value in the
opt/phion/config/active/control.conf file must be changed to .
For instructions on how to execute updates via SSH, see How to Update the Barracuda NG Firewall or
Control Center via SSH.
IPv6 addresses can be assigned to any available service, even if the service is not IPv6-capable.
The Barracuda Networks proprietary TINA VPN protocol is occasionally detected as OpenVPN network
traffic by Application Control 2.0.
DCE/RPC network traffic is currently occasionally detected as BitTorrent network traffic by Application
Control 2.0.
The Wi-Fi service does not support channels 12 and 13, although these channels are offered in the
configuration settings.
With VMware tools enabled, IP forwarding must be manually enabled after restoring snapshots of Vx
units. To do so, execute the following command on the CLI:
echo > /proc/sys/net/ipv4/ip_forward
To avoid this issue, disable VMware Tools on your hypervisor for affected virtual hosts by going to
Options > VMware Tools > Scripts: disable everything.
The Virus Scanner service is not able to scan POP3 traffic.
The Resource Protection setting within the Advanced Firewall Rule options is not functional.
The Raw TCP mode in the Advanced Firewall Rule options is not functional.
When printing from the Firewall > Monitor, Live, or History pages, some PDF printer drivers do not
properly generate icons that contain a transparency channel.
QoS profiles created on a Barracuda NG Control Center are preventing on-the-fly reprioritization of
Release Notes for 5.4.1
17 / 20
Barracuda NextGen Firewall F
network sessions on the Firewall > Live page.
Microsoft Internet Explorer 9 does not accept Barracuda NG Firewall SSL VPN X.509 certificates of the
Generated Certificates identification type.
Content detection is performed for forwarded HTTP traffic but not for local HTTP proxy traffic.
Certificate keys in *.pfx (p12) format cannot be imported for SSL Interception.
Intermediate CA certificates are not automatically generated and sent to the clients.
For instructions on how to generate and distribute intermediate CA certificates using your Microsoft
Active Directory Certificate Services Server, see How to Enable Application Control 2.0, SSL Interception,
AV Scanning and URL Filtering.
You must manually block the following subapplications and protocols because they are not automatically
blocked when their parent applications are blocked in Application Control 2.0:
VeohTV
VeohTV General
VeohTV Flash
Google Lively
Netflix
Skype
eBuddy
AdobeConnect
BitTorrent General
eDonkey General
DirectConnect General
GaduGadu General
Paltalk General
WAP
The Mail Gateway stopped writing spooler log files for each email into
/var/phion/spool/mgw/<server name>_<service name>/spool/. An error message like the
following is displayed in the Mail Gateway log:
2013 06 28 10:37:56 Warning +02:00 SPOOLER id 20130628-103713-14318-00:
Can't move log: IOFileOp:
Move(/var/phion/spool/mgw/800-1_800MGW/spool/20130628-103713-14318-00.log,/var/
phion/spool/mgw/800-1_800MGW/done/20130628-103713-14318-00.log): source not
found
The log also cannot be displayed in Barracuda NG Admin. The following error message is generated:
MailGW
500 Cannot get mail log
Migration Instructions
You cannot cancel the update process after it has started.
The Barracuda NG Firewall will reboot during the installation process.
Release Notes for 5.4.1
18 / 20
Barracuda NextGen Firewall F
Update Matrix
Target Version
5.4.1
4.2.10 and earlier No
4.2.11 to 4.2.18
No
5.0 to 5.0.6
No
5.2.0
Yes
5.2.1
Current
5.2.2
Version
5.2.3
Yes
5.2.4
Yes
5.2.6
Yes
5.2.7
Yes
5.2.8
No
Yes
Yes
Download the installation files for Barracuda NG Firewall version 5.4.1 from
.
Updating from Version 4.2.x or 5.0.x
If you are migrating from the Barracuda NG Firewall version 4.2.X or 5.0.X, first read the following documents:
Updating / Migrating from 5.0.x or 5.2.x to 5.2.x
Barracuda NG Firewall 5.0 Migration Instructions (available in PDF format at
)
You cannot update directly from versions 4.2.X or 5.0.X. You must update release versions in this order: 4.2 >
5.0 > 5.2 > 5.4.1
Updating from Version 5.2.X
For information on how to migrate from the Barracuda NG Firewall version 5.2.x, see Migrating from 5.2.x to
5.4.x.
GPL Compliance Statement
This product is in part Linux-based and contains both Barracuda Networks proprietary software components and
open source components in modified and unmodified form. A certain number of the included open source
components underlie the GPL or LGPL or other similar license conditions that require the respective modified or
unmodified source code to be made freely available to the general public. This source code is available
on http://source.barracuda.com[2] .
Release Notes for 5.4.1
19 / 20
Barracuda NextGen Firewall F
Links
Release Notes for 5.4.1
20 / 20