All rights reserved. Use of this product and this manual is subject to license. Information in this document is subject to change without notice.
Trademarks
Barracuda Web Filter is a trademark of Barracuda Networks, Inc. All other brand and product names mentioned in this document are
registered trademarks or trademarks of their respective holders.
This chapter provides an overview of the Barracuda Web Filter and includes the following topics:
• Overview on page 8
• Deploying the Barracuda Web Filter on page 11
7
Barracuda Web Filter Release 4.0
Overview
The Barracuda Web Filter is an integrated anti-spyware and content filtering solution that eliminates
spyware and other forms of malware from your organization.
The Barracuda Web Filter combines preventative, reactive, and proactive measures to form a
complete anti-spyware solution. The Barracuda Web Filter:
• Uses content filters to block access to Web site categories like gaming or online shopping sites
• Blocks access to applications like instant messaging and music streaming
• Blocks access to spyware Web sites
• Detects spyware access to the Internet
• Identifies infected machines
• Facilitates spyware removal by providing access to the Barracuda Spyware Removal Tool
The sections in this guide will detail the typical tasks that are performed by Web Filter administrators:
1.Installation
2.Configuring, Monitoring and Managing
3.Managing Users and Groups
4.Managing Policies
5.Reporting
Spyware-blocking techniques
The Barracuda Web Filter prevents spyware programs from being installed on your users’ systems
and also secures your organization against existing spyware by detecting spyware access to the
Internet and notifying you of infected systems. You can also configure the Barracuda Web Filter to
prompt infected users to run the Barracuda Spyware Removal Tool.
Table 1.1: Spyware Functions
FunctionDescription
Spyware Web site BlockingBarracuda Networks continuously updates a list
containing thousands of known spyware download sites.
The Barracuda Web Filter blocks spyware at the source
by preventing browser and application access to these
locations.
Spyware Download BlockingSpyware is everywhere, even in apparently harmless
8Chapter 1: Introduction
downloads from legitimate sites. The Barracuda Web
Filter unpacks and examines every individual file within
17 different types of archives. It also uses techniques to
examine password-protected archives.
Administrator’s Guide
Table 1.1: Spyware Functions
FunctionDescription
Spyware DetectionThe Barracuda Web Filter not only identifies infected
machines on the network, but also blocks the spyware
communication from those infected systems to the
spyware servers on the Internet.
Spyware RemovalThe Barracuda Web Filter can be configured to
automatically prompt users to run the Barracuda Spyware
Removal Tool when spyware is detected on their system.
This feature allows users to proactively remove spyware
so they do not have to rely on network administrators to
perform this task.
The Barracuda Web Filter scans inbound traffic for the following malware over HTTP port 80 and
FTP port 21: spyware (such as keyloggers, Browser Helper Objects [BHOs], and data miners),
adware, trojans, and viruses. The Barracuda Web Filter also scans outbound traffic on all ports and
protocols to prevent spyware from communicating outside of your network.
Content-filtering techniques
In addition to protecting your network from spyware infections, the Barracuda Web Filter also uses
filters to protect your users from visiting offensive Web sites and to help enforce your organization’s
Internet usage policies.
To block access to offensive sites, the Barracuda Web Filter includes a URL list containing millions
of URLs classified into 58 categories for easy and efficient content filtering. This list is continuously
updated by engineers at Barracuda Central and delivered hourly via the Energize Updates
subscription service sold with the Barracuda Web Filter.
In addition, the Barracuda Web Filter allows you to create custom classification and specify domains
for filtering.
These content filters can help organizations comply with new security initiatives and standards.
User and group-based policy control
The Barracuda Web Filter allows you to create Content, Application, Domain, URL and MIME Type
based policies to control user access to online content. The policies can be created by users, groups
or in some cases by IP addresses. These filtering policies can be used to allow, block, warn or monitor
user requests to online content.
The Barracuda Web Filter also enables you to create exception policies for specific users and groups
to override general policies that prevent access to content or applications. These policies are useful in
providing executives and departments with additional control over the content they can access.You
can also use exception policies to allow users to bypass blocking filters during specific hours of the
day. For example, you can configure the Barracuda Web Filter to allow users to access shopping or
gaming sites only during non-business hours.
Overview 9
Barracuda Web Filter Release 4.0
Application-blocking techniques
Many organizations choose to block access to certain applications so they can minimize the amount
of non-essential traffic on their network and to prevent users from running applications that can
spread viruses or other malware. For this reason, the Barracuda Web Filter enables you to control
access to a variety of commonly used applications like Instant Messaging and Media. In addition,
application traffic can also be blocked based on MIME type or port number. For example, you can
use the MIME type blocking feature to prevent users from running executable files (.exe) or from
streaming music and video files over your network.
Energize Updates minimize administration and maximize
protection
To provide you with maximum protection against the latest types of spyware, Barracuda Networks
maintains Barracuda Central, a powerful operations center. From this center, engineers monitor the
Internet for trends in spyware and automatically deploy updates and definitions via Barracuda
Energize Updates.
By identifying spyware trends early on, the team at Barracuda Central can quickly develop new and
improved blocking techniques that are quickly made available to your Barracuda Web Filter.
Barracuda Central has identified over 2,000 spyware applications that are actively blocked and is
continuously adding to this list.
The following figure shows how Barracuda Central provides the latest rules and definitions through
the Energize Update feature.
Figure 1.1: Barracuda Energize Updates
10Chapter 1: Introduction
Deploying the Barracuda Web Filter
You can deploy your Barracuda Web Filter so it is either inline with your core network components,
or you can deploy the system as a forward proxy. The following sections provide a brief overview of
each deployment type.
Inline pass-through (transparent) mode
Inline pass-through is the recommended type of deployment because it provides the strongest level of
protection against spyware. In this deployment, the Barracuda Web Filter is directly inline with your
core Internet network components, and all network traffic to the Internet passes through the Barracuda
Web Filter. In this mode, your Barracuda Web Filter is able to:
• Filter and scan all Internet traffic requests.
• Perform content filtering and scan downloads for spyware and viruses.
• Detect and block outbound spyware protocol requests.
• Scan all outbound traffic for spyware activity on all ports to detect infected clients.
Inline pass-through deployment requires you to have an understanding of your network topology
because even though the Barracuda Web Filter acts as a proxy, it does not participate in routing
protocols. As a result, you may need to set up static routes in your Barracuda Web Filter so it knows
how to properly route traffic.
Administrator’s Guide
The following table describes the advantages and disadvantages of deploying your Barracuda Web
Filter in inline pass-through mode.
AdvantagesDisadvantages
Supports application blockingMay require setting up static routes in your Barracuda
Web Filter.
Supports automatic pass-through mode in
the event of a system failure (model 310
and above)
Does not require users to configure proxy
server settings in their Web browser
Uses perimeter transparency mode that
exposes client IP addresses (supports
corporate firewall rules)
Figure 1.2 illustrates a basic installation using the Inline Pass-Through deployment.
Initial setup requires an interruption to network traffic
while you make necessary cabling changes.
Deploying the Barracuda Web Filter 11
Barracuda Web Filter Release 4.0
Figure 1.2: Inline Pass-through Deployment
12Chapter 1: Introduction
Forward proxy
The forward proxy deployment uses a proxy as an intermediary between a client and the Internet to
protect the client from being visible from the Internet. In a forward proxy deployment, only HTTP
Internet traffic passes through the Barracuda Web Filter. After the Barracuda Web Filter processes
clients’ requests, it sends the requests out directly to the Internet.
When deployed as a forward proxy, the Barracuda Web Filter shows all HTTP traffic as coming from
its own IP address instead of from the individual client IP addresses as is done in the inline passthrough deployment.
We recommend deploying the Barracuda Web Filter in forward proxy mode in the following
situations:
• You need to replace an existing forward proxy (such as Microsoft ISA Server) with the
Barracuda Web Filter.
• You do not want the Barracuda Web Filter to reside inline with all your network traffic and are
satisfied with the system only scanning HTTP traffic for viruses and spyware.
The following table describes the advantages and disadvantages of deploying your Barracuda Web
Filter in forward proxy mode.
Administrator’s Guide
AdvantagesDisadvantages
The initial setup of forward proxy mode
does not require any interruptions to your
network traffic.
Because the Barracuda Web Filter only scans
outbound HTTP traffic, the system cannot perform
the following functions in forward proxy mode:
• Block access to applications listed on the
BLOCK/ACCEPT > Applications page.
• Block access to applications that use the
destination IP address specified on the
BLOCK/ACCEPT > IP Block/Exempt page.
• Block access to applications that use the
destination port specified on the
> IP Block/Exempt
page.
• Inspect outbound traffic for spyware infection
activity.
Does not require the configuration of static
routes.
The Barracuda Web Filter does not scan non-HTTP
traffic for viruses and spyware.
Requires clients’ Web browsers to be configured with
the IP information of the forward proxy server
(Barracuda Web Filter).
Figure 1.3 illustrates a basic installation using the Forward Proxy Deployment.
BLOCK/ACCEPT
To set up the Barracuda Web Filter as a forward proxy without placing it inline, you must manually
direct all outgoing web traffic through the Barracuda. The initial setup of forward proxy mode does
not require any interruptions to your network traffic. This configuration is also known as "proxy on a
stick." For this to work, the Barracuda Web Filter will need to be connected to the same switch as the
network gateway (just one network hop away).
Once the Barracuda has been installed in this fashion, the following options must be configured on
BASIC > IP Configuration page:
the
Deploying the Barracuda Web Filter 13
Barracuda Web Filter Release 4.0
Set the Operating Mode to Active.
Set the Transparency, Client IP Visibility, or Pass Client IP addresses through WAN port option to
No.
In order to forward outgoing web traffic to the Barracuda Web Filter, it is required that all clients’
web browsers are configured with the IP of the Barracuda Web Filter as their forward proxy server,
on port 8080.
Figure 1.3: Forward Proxy Deployment
14Chapter 1: Introduction
Administrator’s Guide
Chapter 2
Getting Started
This chapter provides general instructions for installing the Barracuda Web Filter.
The Barracuda Web Filter appliance is designed for low-risk deployment because it is intended to be
a bridge within your network. The appliance can view Internet traffic that passes through the network
but does not affect its routing. To reduce the risk of interfering with important network traffic, initially
set the Barracuda Web Filter to monitor and log the spyware activity only. Determine which internal
servers and clients to exclude from spyware and virus scans.
These pre-installation considerations may help you understand some of the issues that may occur.
Routers
Make sure the default gateway is properly set to reach the Internet. Also, if you are testing the
Barracuda Web Filter in one portion of your network and move to another portion of the network for
deployment, make sure that you check the default gateway and make changes as necessary.
External DNS
Some of the considerations regarding DNS include the following issues:
Optimal DNS query response time—When the Barracuda Web Filter is in Active mode, it proxies all
Internet requests for the clients. As a result, the Barracuda Web Filter needs to resolve website
hostnames to IP addresses while proxying the HTTP requests made by the users. The response for
DNS queries needs to be optimal to allow the Barracuda Web Filter to look up and quickly process
these requests. A slow DNS server will cause the Barracuda Web Filter to respond slowly to clients,
which adds latency to their Internet access.
Requests for fully qualified Web application server names—If a user attempts to browse to a Web
site by specifying a Web server name is not a fully qualified name that includes the domain name, the
Barracuda Web Filter automatically appends the string
order to resolve the request. For example, if the user enters the server name
myserver.mydomain.com, the Barracuda Web Filter resolves the request using the hostname
myserver.barracuda.com.
barracuda.com to the unqualified name in
myserver instead of
Internal DNS
If you have an internal server that is only resolvable via an internal DNS, make sure that this DNS
server is used by the Barracuda Web Filter as a secondary DNS.
Enterprise class Layer 3 switch, VLANS, VPN concentrators
These device types are normally capable of handling multiple subnets and providing default routes to
clients. However, they may affect the Barracuda Web Filter deployment in the following ways:
• A Layer 3 switch can also be set up to have multiple VLANs (Virtual Local Networks) using
port assignments. There is no side effect by having VLAN tags in the traffic that is visible to the
Barracuda Web Filter. However, when the Barracuda Web Filter is set up to a single subnet, it
needs to have routes to process requests for other subnets.
• A standard solution is to add static routes to these foreign subnets. All Layer 3 switch subnets
should use its IP address as the gateway. In the case of a VPN concentrator, use the IP of the
concentrator as the default gateway for all the networks aggregated by that VPN concentrator.
16Chapter 2: Getting Started
Administrator’s Guide
Firewall DMZ
A demilitarized zone (DMZ) is an area where any servers that access the Internet are placed. Servers
inside this zone may be configured to access certain servers within an internal network with their own
security rules set up. Normally these servers need to be accessible from the Internet, such as email
servers. The Barracuda Web Filter should not be deployed to protect these machines. The Barracuda
Web Filter is not designed to protect servers but to protect end user machines.
Internal servers
In most organizations, internal servers are protected by corporate firewalls that use port forwarding
rules to limit access to the servers. Port forwarding rules define the ports that can be used to access
the servers (such as HTTP, FTP, and mail servers). These servers should have optimal response time.
As a result, the server traffic must not be interrupted. Barracuda Networks recommends that you
exempt or bypass these servers from the Barracuda Web Filter. To reduce Layer 2 bridging overhead,
place a switch between the firewall and the Barracuda Web Filter and connect your server farm on a
different port on the switch. In this case, set up the servers parallel to the Barracuda Web Filter instead
of behind it, and the configure exempt IP addressing feature to exclude these IP addresses from server
exemption.
Cache
Caching provides faster access to repeatedly requested content by storing content locally on the
Barracuda Web Filter.The Barracuda Web Filter handles the data by using an LRU (Least Recently
Used) algorithm. The Barracuda Web Filter must be configured with the accurate time since it uses
the current time to ensure accurate cache updates.
QoS/packet reconfiguration (Quality of Service, packet shapers)
There are many products available that can control traffic in a LAN environment, specify priorities,
and size these different traffic types. Normally, this is done using a Layer 7 device on different types
of applications. The Barracuda Web Filter deployment is affected when the Barracuda Web Filter is
placed in front of these devices to benefit from the shaped data. Place the Barracuda Web Filter close
to the Internet to help reduce noise and overhead on both the Layer 2 bridging and HTTP proxy.
Mounting and cabling considerations
To install the Barracuda Web Filter you need to:
• Mount it on a rack or shelf
• Cable it to other network devices
The Barracuda Web Filter is designed to be installed in a data center with other networking devices
and servers. Its dimensions are suitable for a 19-inch rack. You must position it within cabling
distance of any switches or other devices that access the network segments that you want to protect.
The appliance can be mounted facing either direction in your rack, so consider which side will have
access to the ports and which will have access to the LED lights.
You may need access to the ports during installation, and you may need to use the back panel during
initial configuration.
Network considerations 17
Barracuda Web Filter Release 4.0
Installing the Barracuda Web Filter
These are the general steps to set up your Barracuda Web Filter. For more detailed instructions for
each step, see the following reference pages.
Step 1. Verify that you have the necessary equipment on page 18
Step 2. Install the Barracuda Web Filter on page 18
Step 3. Configure the Barracuda Web Filter IP and network settings on page 19
Step 4. Configure your corporate firewall on page 20
Step 5. Configure the Barracuda Web Filter on page 20
Step 6. Update the Barracuda Web Filter firmware on page 21
Step 7. Verify your subscription status on page 22
Step 8. Update the definitions on page 23
Step 9. Integrate the Barracuda Web Filter into your network on page 23
Step 10. Test and adjust the Barracuda Web Filter on page 24
Step 1. Verify that you have the necessary equipment
Before installing your Barracuda Web Filter, make sure you have the following equipment:
• Barracuda Web Filter (check that you have received the correct model)
• AC power cord
• Ethernet cables
• Mounting rails and screws (available for models 610, 810, and 910 only)
• VGA monitor (recommended)
• PS2 keyboard (recommended)
Step 2. Install the Barracuda Web Filter
To physically install the Barracuda Web Filter:
1.Fasten the Barracuda Web Filter to a standard 19-inch rack or other stable location.
CAUTION! Do not block the cooling vents located on the front and rear of the unit.
2.Connect a CAT5 Ethernet cable from your network switch to the LAN port on the front of your
Barracuda Web Filter, as shown in the following figure.
18Chapter 2: Getting Started
Figure 2.1: Connecting the Barracuda Web Filter to your Network
Administrator’s Guide
The Barracuda Web Filter supports 10BaseT, 100BaseT, and Gigabit Ethernet (higher end models
only).
Do not connect any other cables to the unit. The connectors on the back panel are for diagnostic
purposes.
3.Connect the following hardware to your Barracuda Web Filter:
•Power cord
•VGA monitor
• PS2 keyboard
After you connect the AC power cord, the Barracuda Web Filter may power on for a few
seconds and then power off. This behavior is normal.
4.Press the Power button located on the front of the unit.
The login prompt for the administrative console displays on the monitor and the power light on
the front of the Barracuda Web Filter turns on. For a description of each indicator light, refer to
Understanding the indicator lights on page 39.
Step 3. Configure the Barracuda Web Filter IP and network settings
The Barracuda Web Filter is assigned a default IP address of 192.168.200.200. You can change the
address using the administrative console or by pressing and holding the RESET button on the front
panel.
Holding RESET for eight seconds changes the default IP address to 192.168.1.200. Holding the
button for 12 seconds changes the IP address to 10.1.1.200.
Installing the Barracuda Web Filter 19
Barracuda Web Filter Release 4.0
To set a new IP address from the administrative console:
1.Connect your keyboard and monitor directly to the Barracuda Web Filter.
2.At the barracuda login prompt, enter admin for the login and admin for the password.
The User Confirmation Requested window displays the current IP configuration of the
Barracuda Web Filter.
3.Using your Tab key, select Change and click Enter to change the IP configuration.
4.Enter the new IP address, subnet mask, and default gateway IP address for your Barracuda Web
Filter. Select Save
optional. Select
The new IP address and network settings are applied to your Barracuda Web Filter.
Step 4. Configure your corporate firewall
If your Barracuda Web Filter is located behind a corporate firewall, refer to Table 2.1 for the ports
that need to be opened on your corporate firewall to allow communication between the Barracuda
Web Filter and remote servers.
Table 2.1: Ports to Open on Your Corporate Firewall
to enter your changes. The Primary DNS and Secondary DNS files are
Exit.
PortDirectionProtocolDescription
22In/OutTCPRemote diagnostics and technical
support services
25OutTCPEmail and email bounces
53OutTCP/UDPDNS (Domain Name Server)
80OutTCPVirus, spyware, category definition
updates, and firmware updates
123In/OutUDPNTP (Network Time Protocol)
8000OutTCPSee Step 5. Configure the Barracuda
Web Filter
8001, 8002In/OutTCPSynchronization between linked
systems. For more information, see
on page 20.
Controlling access to the Web
interface
on page 34.
In addition to the ports listed above, you may have to configure your corporate firewall to allow the
Barracuda Web Filter to email system alerts and reports. Some organizations create firewall rules that
only allow emails to be sent from the IP address of their email server. In this case, you should
configure your corporate firewall to allow emails to be sent from the Barracuda Web Filter as well.
If your Barracuda Web Filter is located in a DMZ, you may need to configure your corporate firewall
to allow the Barracuda Web Filter to send notifications to your internal email server.
Step 5. Configure the Barracuda Web Filter
After specifying the IP address of the Barracuda Web Filter and opening the necessary ports on your
corporate firewall, configure the Barracuda Web Filter from the administration interface. Make sure
the client’s computer that you configured the Barracuda Web Filter for is connected to the same
network and that the appropriate routing is in place to allow connection to the Barracuda Web Filter’s
IP address via a Web browser.
20Chapter 2: Getting Started
Administrator’s Guide
To configure the Barracuda Web Filter:
1.From a Web browser, enter the IP address of the Barracuda Web Filter followed by port 8000.
For example: http://192.168.200.200:8000.
2.To log into the administration interface, enter admin for the username and admin for the
password.
3.Select BASIC > IP Configuration, and perform the following steps:
3a. Enter the IP address of your primary and secondary DNS servers (if these have not yet
been set up).
3b. Set Operating Mode to Audit.
3c. Set Enable Perimeter Transparency to one of the following depending your type of
deployment:
• For Inline Pass-Through deployment, select Yes to expose the IP addresses of your
clients instead of allowing all HTTP traffic coming from the Barracuda Web Filter.
• For Forward Proxy deployment, select No.
3d. (Optional) Configure any static routes.
3e. ClickSave Changes.
Note: If the IP address of your Barracuda Web Filter on the IP Configuration page is changed,
you are disconnected from the Web interface. If this occurs, log in again using the new IP
address.
4.Select BASIC > Administration, and perform the following steps:
4a. Assign a new administration password to the Barracuda Web Filter (optional). This step
is highly recommended.
4b. Make sure the local time zone is set correctly.
Time on the Barracuda Web Filter is automatically updated via NTP (Network Time
Protocol). It requires that port 123 is opened for inbound and outbound UDP (User
Datagram Protocol) traffic on your firewall (if the Barracuda Web Filter is located
behind one).
It is important that the time zone is set correctly because this information is used to
determine the delivery times for messages and is displayed in certain mail reading
programs.
4c. If desired, change the port number used to access the Barracuda Web Filter
administration interface. The default port is 8000.
4d. Enter the amount of time for the session expiration length (in minutes) of your
administration interface session.
At expiration, you are required to log back into the administration interface.
4e. (Optional) Specify your local SMTP server. Enter the email address for your
Administrator to receive system and threat email alerts and notifications.
4f. ClickSave Changes.
Step 6. Update the Barracuda Web Filter firmware
To update the firmware on the Barracuda Web Filter:
1.Select ADVANCED > Firmware Update.
2.Read the release notes to learn about the latest features and fixes provided in the new firmware
version.
3.Click Download Nownext to Latest General Release. Click OK on the download duration
window.
Installing the Barracuda Web Filter 21
Barracuda Web Filter Release 4.0
Verify your subscriptions are current
Updating the firmware may take several minutes. Do not turn off the unit during this process.
Download Nowis disabled if the Barracuda Web Filter is already up-to-date with the latest
firmware version.
The Barracuda Web Filter begins downloading the latest firmware version. You can view the
download status by clicking
4.Click Apply Now when the download completes.
5.Click OKwhen prompted to reboot the Barracuda Web Filter.
A Status page displays the progress of the reboot. Once the reboot is complete, the login page
appears.
Step 7. Verify your subscription status
After you install the Barracuda Web Filter, your Energize Update and Instant Replacement
subscriptions are most likely active. However, it is important you verify the subscription status so
your Barracuda Web Filter can continue to receive the latest virus and spyware updates from
Barracuda Central. The Energize Update service is responsible for downloading these virus and
spyware definitions to your Barracuda Web Filter.
To check your subscription status:
Refresh. A message displays once the download is complete.
1.Select BASIC > Status.
2.From the Subscription Status section, verify that the word Current appears next to Energize
Updates
and Instant Replacement Service (if purchased).
Figure 2.2 shows the location of the Subscription Status section.
Figure 2.2: Subscription Status
22Chapter 2: Getting Started
Administrator’s Guide
Click to activate your
subscription
3.Enable your subscription:
3a. Click the Activate link as shown in Figure 2.3. The product activation displays in a
new browser window.
Figure 2.3: Location of the Activate Link
3b. In the Product Activation window, fill in the required fields and click Activate. A
confirmation page opens to display the terms of your subscription.
3c. After a few minutes, from the Barracuda Web Filter administration interface, click
Refresh in the Subscription Status section of the BASIC > Status page. The status of
your subscriptions displays as Current.
Note:If your subscription status does not change to Current, or if you have trouble filling out
Product Activation window, call your Barracuda Networks sales representative.
the
Step 8. Update the definitions
To update the spyware, virus, and category definitions:
1.Select ADVANCED > Energize Updates.
2.Check to see if the current version is the same as the latest version available for spyware, virus,
and category definitions. If the definitions are up-to-date, proceed to Step 9.
3.Click Update for each of these sections.
4.In the spyware, virus, and category definition sections, select Hourly or Daily for Automatically
Update. The recommended setting is Hourly for both spyware and virus definitions, and Daily
for category definition.
5.Click Save Changes.
Step 9. Integrate the Barracuda Web Filter into your network
Table 2.2 describes how to integrate the Barracuda Web Filter into your network depending on your
deployment type.
Table 2.2: Integrating your Barrauda System into your Network
Deployment TypeNext Step
Inline pass-throughConnect your Barracuda Web Filter to your network. For more
information, see Connecting the Barracuda Web Filter to your
network on page 24.
Forward proxyConfigure your clients’ HTTP proxy settings from their browser to
access the Internet. See your Web browser’s technical
documentation for further information.
Installing the Barracuda Web Filter 23
Barracuda Web Filter Release 4.0
Step 10. Test and adjust the Barracuda Web Filter
After connecting your Barracuda Web Filter to the network, verify connectivity. Open your Web
browser from a machine on your network. If you cannot browse the Web, review the installation steps
to make sure your Barracuda Web Filter is properly configured and connected to your corporate
firewall and network switch.
If you can browse the Web without any issues, you are ready to adjust the settings on the Barracuda
Web Filter. The most common adjustment to make is to create filters that determine what traffic and
applications the Barracuda Web Filter blocks and accepts. For more information about the available
filters, refer to Monitoring the Barracuda Web Filter on page 38.
Go to the
BLOCK/ACCEPT > IP Block/Exempt page, and use the IP and Port Exemption sectionto
bypass scanning or filtering for clients or targeted servers. To avoid accidentally specifying a broader
than intended exemption range, be sure to apply the proper subnet mask.
Connecting the Barracuda Web Filter to your network
To connect the Barracuda Web Filter to your network:
1.Connect the Ethernet cable from your corporate firewall to the WAN port on the front panel of
the Barracuda Web Filter. This step may require disconnecting your internal network switch
from the corporate firewall.
Note: A crossover cable may be needed if your corporate firewall does not have a switchable
port and therefore cannot switch between RX and TX. Another solution is to place a switch
between the corporate firewall and the Barracuda Web Filter.
Note:
Ethernet bridge between the WAN and LAN ports.
You do not need to configure the WAN port. The Barracuda Web Filter creates an
24Chapter 2: Getting Started
Figure 2.4: Connecting the Barracuda Web Filter to your Network
Administrator’s Guide
2.Connect an Ethernet cable from the LAN port on the Barracuda Web Filter to your internal
network switch Uplink port (if one is available).
Note: If your switch records the MAC address of an external device, make sure you delete all
pre-existing MAC address records from your switch.
3.Select BASIC > IP Configuration page in the administration interface, and set the Operating
Mode setting to Active.
Note: A hard bypass feature is available on the Barracuda Web Filter 310 and higher models.
4.If necessary, set up static routes on the BASIC > IP Configuration page. Setting up static routes is
often necessary in complex networks so the Barracuda Web Filter knows the proper way to
route traffic on your network.
Static routes are generally necessary to enable the Barracuda Web Filters to protect any client
machines that are at IP addressed outside of the native subnet of the Barracuda Web Filter.
For example, if the Barracuda Web Filter is assigned an IP address of 172.20.0.6 and a subnet mask
of 255.255.255.0 and uses the default gateway at 172.20.0.9, you will need to create a static route to
reach client machines in the 192.168.2.x range with a Netmask value of 255.255.255.0. The Gateway
Address should be inside 172.20.0.x.
Installing the Barracuda Web Filter 25
Barracuda Web Filter Release 4.0
Advanced Deployments
This section describes advanced installation topics that may apply to your Barracuda Web Filter
deployment.
Web Cache Control Protocol (WCCP) deployment
All Barracuda Web Filter models 410 and above can be deployed as WCCP cache engines on a
network with a WCCP capable core routing platform.
Because the WCCP control router or switch transparently redirects content requests, end users need
not configure browsers to use the Barracuda Web Filter as an HTTP proxy. This deployment means
that the Barracuda Web Filter is not inline and is not configured as a forward proxy.
In addition to compatibility with other WCCP capable routers, the Barracuda Web Filter supports
Cisco v1 and v2 routers. Enabling WCCP on your Barracuda Web Filter allows you to take full
advantage of your WCCP capable Cisco router’s ability to provide for failover and load balancing for
multiple Barracuda Web Filters connected to the router in a proxy configuration. For large
installations requiring high availability and fault tolerance, this is an attactive deployment option.
Note: WCCP allows Cisco routers/switches to forward non-http traffic to web cache servers, but the
Barracuda Web Filter only accepts http traffic (port 80) in this configuration. WCCP also allows
multiple Cisco routers to be connected to the same web cache server. The Barracuda Web Filter does
not support this feature and can only be connected to one WCCP router/switch. However, as always,
multiple Barracuda Web Filters can be connected to a single router/switch.
Note that NTLM and Kerberos authentication mechanisms will not work when the Barracuda Web
Filter is deployed using WCCP because they both require that the Barracuda Web Filter be a trusted
host in the Windows Domain and that it receive traffic directly from the users (as a proxy). In WCCP
deployments, the Barracuda Web Filter receives outgoing traffic via the Cisco Router.
Figure 2.5 shows this deployment method with two Barracuda Web Filters configured as WCCP
cache engines.
26Chapter 2: Getting Started
Figure 2.5: WCCP Deployment
Administrator’s Guide
Inline pass-through with pre-existing proxy deployment
Another deployment type that is much less common than either Inline mode or Forward Proxy mode
is using the Barracuda Web Filter as an inline device that uses a pre-existing proxy server on your
network. This type of deployment is not recommended because it breaks the following features of the
Barracuda Web Filter:
• Infection reports do not display the IP addresses of infected clients.
• Infected clients cannot be automatically redirected to the Barracuda Spyware Removal Tool.
Advanced Deployments 27
Barracuda Web Filter Release 4.0
To resolve these issues, we recommend that you remove your pre-existing proxy server and deploy
the Barracuda Web Filter inline as described in
The Barracuda Web Filter can be placed on the client or the server side of the existing proxy server.
If the existing proxy server is performing user authentication, then the Barracuda Web Filter must be
placed on the server side of the proxy. In this deployment, the Barracuda Web Filter detects all
network traffic. The proxy server connects directly to the Barracuda Web Filter LAN port. This
connection may require a crossover cable. No special port or IP address is required. The Barracuda
Web Filter scans for all inbound and outbound HTTP traffic from the proxy server. All outbound
traffic on other ports is scanned for normal spyware communication. However, since the proxy server
will most likely hide user identity, the Barracuda Web Filter cannot apply any user, group or IP based
policies.
Figure 2.6 illustrates this deployment type.
Alternately, the Barracuda Web Filter can be placed inline on the client side of the existing proxy
server. The LAN Switch can be connected to the LAN port of the Barracuda Web Filter and the WAN
port of the Barracuda Web Filter can be connected to the Proxy Server. This will ensure that the
Barracuda Web Fitler can identify users before the requests are proxied. In this configuration, you
may have to ensure that the Barracuda Web Filter passes client IP addresses through to the proxy
server or that the proxy server can handle requests coming from the Barracuda Web Filter’s IP
address. However, this configuration may not work when the proxy server is performing strong user
authentication.
Inline pass-through (transparent) mode on page 11.
The placement of your pre-existing proxy server and its functionality will have an impact on the
Barracuda Web Filter deployment. Some configurations may require technical assistance from
Barracuda Technical Support.
28Chapter 2: Getting Started
Figure 2.6: Inline Passthrough with Pre-existing Proxy Server Deployment
Administrator’s Guide
Connecting inline to your network with a pre-existing proxy
server
To set up the Barracuda Web Filter inline with your existing proxy server, place the proxy server
between the Barracuda Web Filter and your internal network switch.
If you have a proxy server, most HTTP requests are routed from your internal network through the
proxy server to the Barracuda Web Filter. When a Web site responds, the responding traffic goes
through the Barracuda Web Filter, which filters any spyware and viruses before allowing the traffic
to go through the proxy server and back to the clients.
The Barracuda Web Filter has been tested with Microsoft ISA and Squid proxy servers.
Advanced Deployments 29
Barracuda Web Filter Release 4.0
To connect your Barracuda Web Filter and existing proxy server to your network:
1.Connect your LAN port from your proxy server to the Uplink port of your internal network
switch.
Figure 2.7: Proxy Behind the Barracuda Web Filter
2.Connect the Ethernet cable from your WAN port of your proxy server to the LAN port on the
front panel of the Barracuda Web Filter.
Note: A crossover cable may be needed if your corporate firewall does not have a switchable
port and therefore cannot switch between RX and TX. Another solution is to place a switch
between the corporate firewall and the Barracuda Web Filter.
Note:
Ethernet bridge between the WAN and LAN ports.
3.Connect an Ethernet cable from the WAN port on the Barracuda Web Filter to the LAN port on
You do not need to configure the WAN port. The Barracuda Web Filter creates an
your firewall.
30Chapter 2: Getting Started
Loading...
+ 69 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.