Release Notes for 5.4.1 - Barracuda Campus
Transcription
Release Notes for 5.4.1 - Barracuda Campus
Barracuda NextGen Firewall F Release Notes for 5.4.1 Before you update your system to version 5.4.1, read these release notes and the 5.4.1 Migration Instructions. Contents: What´s New in Barracuda NG Firewall Version 5.4.1 Firewall Application Control 2.0 With Application Control 2.0, create dynamic application usage policies that can be enforced by application, application category, location, and the time of day. You can: Block unwanted applications for certain users or groups. Control and throttle acceptable traffic. Preserve the bandwidth and increase the speed of business critical applications. Enable or disable specific application sub-functions (e.g. Facebook Chat, YouTube postings, or MSN file transfers). Apply all of the above to applications using SSL-encrypted traffic. For more information, see Application Control 2.0. New Application Ruleset Create granular application usage policies to control network traffic based on the application context beyond traditional stateful packet inspection (IP addresses, ports, and protocols). Release Notes for 5.4.1 1 / 20 Barracuda NextGen Firewall F Application Objects Create application objects that include a static list of applications. Application Filter Objects Create application filter objects with dynamic lists that are automatically updated to include applications according to their category, risk, or properties. Release Notes for 5.4.1 2 / 20 Barracuda NextGen Firewall F Custom Applications Create custom applications to be used in the application rule set. SSL Interception Intercept and enforce policies for TLS/SSL encrypted traffic. Because SSL Interception must be enabled separately within each access rule, you can specify exclusions from SSL scanning (e.g. internal LAN traffic). You can also configure exceptions on an application basis (e.g. custom SSL applications). SSL Interception works only for the Barracuda NG Firewall F200 and above. For a detailed list of supported appliances (both Barracuda and phion legacy), see the Migration Instructions. The Barracuda NG Firewall can extract certificate information to enforce policies for TLS/SSL-encrypted web traffic that is not intercepted. Full SSL Interception can detect sub-applications, such as Facebook chat or photo uploading in encrypted Facebook traffic. Release Notes for 5.4.1 3 / 20 Barracuda NextGen Firewall F SSL Inspection also lets you create new root certificates and import existing trusted root certificates. Live Application Control Control active application sessions by changing QoS bands (e.g. prioritize active Salesforce sessions), modifying traffic intelligence settings, and specifying different VPN transports. Comprehensive Reporting and Drill-Down Capabilities View statistics on the new Firewall > Monitor page for application and protocol usage. Release Notes for 5.4.1 4 / 20 Barracuda NextGen Firewall F For a detailed report on traffic and application usage for a specific period of time, you can print the Monitor page. Deep Application Context Gain insight into the target of users and applications. For example, you can verify if a proxy service was used to access a job search site or if YouTube was used to watch specific videos. Release Notes for 5.4.1 5 / 20 Barracuda NextGen Firewall F On the Firewall > Monitor page, you can view all active sessions for a specific application or protocol by clicking its name in the Live Traffic section. The Firewall > Live page then opens and only displays sessions for that application or protocol, letting you quickly adjust them (e.g. changing QoS or terminating the respective sessions). Protocol and Application Definition Updates – Receive new protocol and application definition updates via Energize Updates. Block Page – Customize the text of the block page that lets users know that an application is being blocked according to corporate application usage policy. Geo Location Database (Reporting and Network Objects) The Geo Location database contains a list of IP addresses that are used by specific countries. To control traffic coming or going to specific geographic locations, you can specify regions or countries in your network objects. Release Notes for 5.4.1 6 / 20 Barracuda NextGen Firewall F The Geo Location Database is included in the object viewer, so you can drag-and-drop regions and countries to the Src and Dst columns of a firewall rule. You can also view regions and countries for sessions on the Firewall > Live, History, and Monitor pages for troubleshooting and reporting. For more information on this feature, see How to Apply Geo Location Settings. Renaming of Forwarding Firewall Rules to Access Rules Stateful firewall rules have been renamed from Forwarding Rules to Access Rules. New Default Ruleset For monitoring purposes, the new default rule set includes a default application rule that allows all application traffic. Release Notes for 5.4.1 7 / 20 Barracuda NextGen Firewall F To ease configuration, the rule set includes various new default access rules (e.g., deactivated rules to redirect web and VoIP traffic to the transparent web proxy). Rules are also organized into sections according to their function. VPN Site-to-Site WAN Optimization To reduce latency when exchanging files via site-to-site VPN TINA tunnels, Server Message Block v2 (SMBv2) protocol optimization is supported. SMB is also known as Common Internet File System (CIFS). It is a remote file protocol which is commonly used by Microsoft Windows clients and servers for exchanging files. VPN Graphical Tunnel Interface (GTI) Editor Re-Design The VPN GTI Editor includes new navigation items such as a function to zoom into specific network nodes, a search tool to find tunnels by name, and a mini map. For more information on the VPN GTI Editor, see The VPN GTI Editor Overview. Release Notes for 5.4.1 8 / 20 Barracuda NextGen Firewall F Networking Configuration Wizard For standalone Barracuda NG Firewalls, a wizard is available to help you configure basic settings for productive deployment or to prepare the system for evaluation. The wizard starts automatically for freshly installed Barracuda NG Firewalls (no PAR file) and newly shipped appliances during their initial connection with Barracuda NG Admin. Improved Configuration of Layer 2 Bridging During Layer 2 bridging configuration, all available IP addresses from the bridged interfaces are propagated to the configured bridge groups. Bridged IP addresses no longer need to be manually chosen. DHCP on Port 4 Enabled On the Barracuda NG Firewall F10 to F301, the DHCP client on port 4 is enabled by default. To allow the management of the firewall for initial configuration via port 4, a new default access rule named SETUP-MGMTACCESS is available. Release Notes for 5.4.1 9 / 20 Barracuda NextGen Firewall F Barracuda NG Admin Device Management On standalone Barracuda NG Firewalls, all management connections use TCP port 807. For Barracuda NG Admin environments that include Barracuda NG Firewalls with versions 5.2.7 and below, a fallback is included. Host Routes to Dynamically Assigned DNS Servers To prevent provider-unfriendly DNS routing, separate host routes are automatically created for each dynamically assigned DNS upon IP address assignment (DHCP, 3G, xDSL). Logs Syslog Logging The backend logging architecture has been improved. All software components now use syslog. This improves the system performance. IPv6 Enhancements The following services now support IPv6: Virus Scanner DNS Service IPv4 and IPv6 addresses can be simultaneously resolved. DHCP Relay DHCP Service DHCP for IPv6 includes all features as for IPv4. DHCP service can run in simple or advanced mode. Using auto configuration (enabled in Firewall settings) stateless configuration is needed in DHCP service. Dynamic Routing: OSPF, BGP Multipath handling for IPv6 is not supported. Multipath routes are internally divided into various routes with different metrics. SNMP Service Mail Gateway Firewall Management traffic IPv6 addresses on standalone Barracuda NG Firewalls can be assigned to all services, even to those that do not yet support IPv6. In version 5.4.1, the following services do not support IPv6: FTP Gateway Access Control Service Spam Filter SSH Proxy URL Filter VPN IPv6 Service Table Administration Release Notes for 5.4.1 Networks Firewall Layer-7 Security High Availability Logging Others 10 / 20 Barracuda NextGen Firewall F • Management multiplatform (management interface is not fully IPv6 compatible) • Address objects • Address objects networks • MAC-based address objects • VLAN tags • VLAN subinterfaces (minimum 10) • Layer 2 bridge mode (minimum 2 pairs) • Wired mode (2 Port) • Tab mode (1 Port) • QoS mapping • DHCP server • DHCP relay • IP helper • Dynamic routing RIP • Dynamic routing OSPF • Policy based routing • Neighbor discovery protocol • Access rules separate • Access rule mixed IPv4 and IPv6 AO • FTP active • FTP passive • Anti-spyware • Gateway antivirus • Stateful Inspection • High • Security Availability services with monitoring DPI • Anti-spam • Content filtering service • SNMP • Logging • Connection cache • Connection limiting • Connection monitor • Web proxy • Wireless Miscellaneous Support for Open Virtual Machine Tools (open-vm-tools) Open Virtual Machine Tools are now supported. SNMP Plugin Enhancements The SNMP plugin now reports the VPN tunnel status and BGP neighbor states. SIP Proxy Enhancement The SIP proxy can be enabled and disabled manually. Barracuda NG Admin Release Notes for 5.4.1 11 / 20 Barracuda NextGen Firewall F New In-Place Edit Function for Firewall Rules The settings and actions for access rules and application rules can be edited directly on the rule set pages. The Firewall Rule Editor can still be opened by either double-clicking the rule number or right-clicking the rule and selecting Edit Rule. New List Views on Firewall Live and History Pages The Firewall > Live and History pages exhibit more performance with high data volumes and include new display features (e.g. new filters, new columns, etc.). From these pages, you can also open the Application Details window for more information on a specific application. Release Notes for 5.4.1 12 / 20 Barracuda NextGen Firewall F New Traffic and Filter Selection User Interface On the Firewall > Live and History pages, the Traffic Selection and Traffic Filter have been redesigned. New Columns on Firewall Live and History Pages On the Firewall > Live and History pages, the following columns are available to provide more information about firewall sessions and help with network troubleshooting and adapting security policies: Geo Source Geo Destination QoS (consolidates the Forward and Reverse Shaping columns) Application Application Context Content Protocol (does not replace the Proto column, which is renamed as IP-Protocol) Enhanced Context Menu Functions With extended context menus, you can copy specific entries or entire lists to the clipboard. You can also print Release Notes for 5.4.1 13 / 20 Barracuda NextGen Firewall F lists and export them to a text file. The Access Rules and Application Rules can also be printed. IP-Anonymizing Function for Firewall Live, History and Monitor Printing To comply with legal and privacy regulations, the last IP address octets can be set to xxx when printing lists from the Firewall > Live, History, and Monitor pages. You can enable this feature in the Barracuda NG Admin Settings. Customizable External IP Lookups You can perform external IP lookups (e.g. on whois.com, ip-tracker.org, etc.) to view additional IP address and host information on the Firewall > Live, History, and Monitor pages. In the Client Settings, you can specify the preferred lookup site. Release Notes for 5.4.1 14 / 20 Barracuda NextGen Firewall F Enhanced Object Viewer The Firewall Object Viewer now includes Application Objects and Geo Locations. You can simultaneously drag-and-drop multiple objects when configuring firewall rules. Redesigned DCHP Status Page The DCHP page was redesigned. For more information, see DHCP Tab. Release Notes for 5.4.1 15 / 20 Barracuda NextGen Firewall F VPN Client VPN Profile Configuration Using Barracuda NG Admin With version 3.2 of the Barracuda Network Access Client for Windows and Barracuda VPN Client for Mac OS X, VPN profiles that were created and saved with Barracuda NG Admin can be imported by double-clicking the *.vpn file in Windows Explorer. This allows easy deployment of VPN profiles. For example, the end user can simply double-click a VPN profile that is emailed by the administrator for installation. For more information, see the following articles: How to Import a *.vpn File into the VPN Client How to Install VPN Service Licenses Improvements Included with Barracuda NG Firewall Version 5.4.1 Barracuda NG Admin Entering an HTTPS address within Settings > Custom IP Lookup did not work as intended. An appropriate fix was included. (BNNGF-18298) In Barracuda NG Admin versions 5.2.6 and 5.2.7, importing Barracuda Personal Firewall rules that were created using Barracuda NG Network Access Client 3.0 occasionally led to problems with imported network and service objects. An appropriate fix was included. (BNNGF-16809) In Barracuda NG Admin version 5.2.x, informational login messages were hidden below the login window. An appropriate fix was included. (BNNGF-16418) Barracuda NG Admin versions 5.2.6 and 5.2.7 failed if the username of the executing user contained Unicode characters. An appropriate fix was included. (BNNGF-16318) On the Firewall > Live page, the Band Filter did not work as intended. An appropriate fix was included. (BNNGF-16055) On the Forwarding Rules page, the Copy option in the context menu for the list of Networks objects was missing. An appropriate fix was included. (BNNGF-16027) In the GTI Editor of Barracuda NG Admin version 5.2.X, it was possible to create several VPN tunnels with the same Tunnel Name. This usually occurred when the second tunnel between a pair of servers is not renamed before its configuration is saved. This caused severe problems with the newly created tunnel. An appropriate fix was included. (NO TICKET) In rare cases, Barracuda NG Admin version 5.2.7 did not correctly process ZIP codes during license purchasing. An appropriate fix was included. (BNNGF-18712) Barracuda NG Installer In versions 5.0.5 to 5.2.7, Barracuda NG Installer failed when Standard Hardware was selected as Product Type / Hardware Model and a keyboard layout other than DE or UK was configured. An appropriate fix was included. (BNNGF-16333) Release Notes for 5.4.1 16 / 20 Barracuda NextGen Firewall F Barracuda NG Firewall Module Description • In versions 5.2.6 and 5.2.7, VLAN did not work as intended with Intel Pro/1000 PCI-Express 82575/6. An appropriate fix was included. (BNNGF-18457) Barracuda OS • In version 5.2.7, units with flash disks sometimes rebooted when the system load was very high. An appropriate fix was included. (BNNGF-18653) Firewall A security issue was removed by including an appropriate enhancement. (BNNGF-18240) Network • In versions 5.2.6 and 5.2.7, the Barracuda NG Firewall F900 and F800 Rev B units with Intel 82599EB 10Gbe fiber optic NICs were under certain circumstances suffering from problems with performance and packet loss. An appropriate fix was included. (BNNGF-18194) • In versions 5.2.6 and 5.2.7, under special circumstances and with high system load, NIC outages occurred because of a problem with a NIC driver. An appropriate fix was included. (BNNGF-18193) BNNGF-16280) Known Issues For more information about known issues, see https://login.barracudanetworks.com/support/knownissue[1] Technical Support. or contact Barracuda Networks To successfully update the Barracuda NG Firewall via SSH, the IDLESHELL value in the opt/phion/config/active/control.conf file must be changed to . For instructions on how to execute updates via SSH, see How to Update the Barracuda NG Firewall or Control Center via SSH. IPv6 addresses can be assigned to any available service, even if the service is not IPv6-capable. The Barracuda Networks proprietary TINA VPN protocol is occasionally detected as OpenVPN network traffic by Application Control 2.0. DCE/RPC network traffic is currently occasionally detected as BitTorrent network traffic by Application Control 2.0. The Wi-Fi service does not support channels 12 and 13, although these channels are offered in the configuration settings. With VMware tools enabled, IP forwarding must be manually enabled after restoring snapshots of Vx units. To do so, execute the following command on the CLI: echo > /proc/sys/net/ipv4/ip_forward To avoid this issue, disable VMware Tools on your hypervisor for affected virtual hosts by going to Options > VMware Tools > Scripts: disable everything. The Virus Scanner service is not able to scan POP3 traffic. The Resource Protection setting within the Advanced Firewall Rule options is not functional. The Raw TCP mode in the Advanced Firewall Rule options is not functional. When printing from the Firewall > Monitor, Live, or History pages, some PDF printer drivers do not properly generate icons that contain a transparency channel. QoS profiles created on a Barracuda NG Control Center are preventing on-the-fly reprioritization of Release Notes for 5.4.1 17 / 20 Barracuda NextGen Firewall F network sessions on the Firewall > Live page. Microsoft Internet Explorer 9 does not accept Barracuda NG Firewall SSL VPN X.509 certificates of the Generated Certificates identification type. Content detection is performed for forwarded HTTP traffic but not for local HTTP proxy traffic. Certificate keys in *.pfx (p12) format cannot be imported for SSL Interception. Intermediate CA certificates are not automatically generated and sent to the clients. For instructions on how to generate and distribute intermediate CA certificates using your Microsoft Active Directory Certificate Services Server, see How to Enable Application Control 2.0, SSL Interception, AV Scanning and URL Filtering. You must manually block the following subapplications and protocols because they are not automatically blocked when their parent applications are blocked in Application Control 2.0: VeohTV VeohTV General VeohTV Flash Google Lively Netflix Skype eBuddy AdobeConnect BitTorrent General eDonkey General DirectConnect General GaduGadu General Paltalk General WAP The Mail Gateway stopped writing spooler log files for each email into /var/phion/spool/mgw/<server name>_<service name>/spool/. An error message like the following is displayed in the Mail Gateway log: 2013 06 28 10:37:56 Warning +02:00 SPOOLER id 20130628-103713-14318-00: Can't move log: IOFileOp: Move(/var/phion/spool/mgw/800-1_800MGW/spool/20130628-103713-14318-00.log,/var/ phion/spool/mgw/800-1_800MGW/done/20130628-103713-14318-00.log): source not found The log also cannot be displayed in Barracuda NG Admin. The following error message is generated: MailGW 500 Cannot get mail log Migration Instructions You cannot cancel the update process after it has started. The Barracuda NG Firewall will reboot during the installation process. Release Notes for 5.4.1 18 / 20 Barracuda NextGen Firewall F Update Matrix Target Version 5.4.1 4.2.10 and earlier No 4.2.11 to 4.2.18 No 5.0 to 5.0.6 No 5.2.0 Yes 5.2.1 Current 5.2.2 Version 5.2.3 Yes 5.2.4 Yes 5.2.6 Yes 5.2.7 Yes 5.2.8 No Yes Yes Download the installation files for Barracuda NG Firewall version 5.4.1 from . Updating from Version 4.2.x or 5.0.x If you are migrating from the Barracuda NG Firewall version 4.2.X or 5.0.X, first read the following documents: Updating / Migrating from 5.0.x or 5.2.x to 5.2.x Barracuda NG Firewall 5.0 Migration Instructions (available in PDF format at ) You cannot update directly from versions 4.2.X or 5.0.X. You must update release versions in this order: 4.2 > 5.0 > 5.2 > 5.4.1 Updating from Version 5.2.X For information on how to migrate from the Barracuda NG Firewall version 5.2.x, see Migrating from 5.2.x to 5.4.x. GPL Compliance Statement This product is in part Linux-based and contains both Barracuda Networks proprietary software components and open source components in modified and unmodified form. A certain number of the included open source components underlie the GPL or LGPL or other similar license conditions that require the respective modified or unmodified source code to be made freely available to the general public. This source code is available on http://source.barracuda.com[2] . Release Notes for 5.4.1 19 / 20 Barracuda NextGen Firewall F Links Release Notes for 5.4.1 20 / 20