The information contained in this document is subject to change without notice.
UNLESS EXPRESSLY SET FORTH IN A WRITTEN AGREEMENT SIGNED BY AN AUTHORIZED
REPRESENTATIVE OF BARRACUDA NETWORKS, INC., BARRACUDA NETWORKS MAKES NO WARRANTY OR
REPRESENTATION OF ANY KIND WITH RESPECT TO THE INFORMATION CONTAINED HEREIN, INCLUDING
WARRANTY OF MERCHANTABILITY AND FITNESS FOR A PURPOSE. Barracuda Networks assumes no
responsibility or obligation of any kind for any errors contained herein or in connection with the furnishing, performance,
or use of this document.
This document contains information that is the property of Barracuda Networks, Inc. This document may not be copied,
reproduced, reduced to any electronic medium or machine readable form, or otherwise duplicated, and the information
herein may not be used, disseminated or otherwise disclosed, except with the prior written consent of Barracuda
Networks.
NETCONTINUUM is a registered trademark of Barracuda Networks, Inc.
Linux is a registered trademark of Linus Torvalds in the United States and other countries.
Windows is a registered trademark of Microsoft Corporation in the United States and other countries.
Netscape is a registered trademark of AOL Time Warner, Inc. and Netscape Communications Corp. in the United
States and other countries.
All other trademarks and registered trademarks are the property of their respective holders.
Creating a Vsite2–1
Creating a Bridged Vsite2–3
Creating a Private Interface2–4
Creating a Server Group2–5
Configuring a Web Server2–6
Defining a Web Server2–6
Creating Back-Up Web Server2–11
Configuring Server-side SSL2–11
Configuring Redirection Policy2–13
Configuring In-Band Health Check2–14
Configuring Out-Of-Band Health Check2–16
Table B-1.Regular Expression ValuesB–7
Table B-2.Operators to support regex in header rulesB–11
Table C-1.Macro DefinitionsC–6
Table D-1.Sample Hierarchical Rule MatchD–10
Table D-2.Sample Sequential Rule MatchD–11
Table E-1.Blocked MetacharactersE–1
Table E-2.Misused Metacharacters and KeywordsE–2
Table E-3.Misused KeywordsE–3
Table F-1.Pattern ParametersF–9
xivCLI Reference Manual (449-000006-00)NetContinuum OS 6.1
This guide describes how to create, configure, and protect Web sites and applications
through the NetContinuum Application Security Gateway (NC-Gateway).
NOTE
Unless otherwise noted, the information in this guide
applies to all models of the NC-Gateway.
Revision Information
This is the eleventh edition of the NetContinuum Application Security Gateway
Application Configuration Guide (449-000018-00). This document (for NetContinuum
OS release 6.1.0) incorporates the following changes:
•Chapter 1: Server group updated with other application specific server group
details. Configuration tree image moved to Appendix A.
•Chapter 2: Added the procedure to configure the Response Page, Trusted Host,
CRLs and Custom Parameter Classes sections.
Preface <Preface>Preface
•Chapter 3: Added Special Web Applications section.
•Chapter 5: Many parameter names modified. Added Web Firewall Policies section.
•Chapter 17: Describes how to create Templates, use of saved Add and Patch
templates for further custom configuration.
•Appendix A: Configuration tree image added.
•Appendix B: Describes logical and regular expression syntax rules.
•Appendix C: Describes usage guidelines.
•Appendix D: Describes evaluation rules and process flow.
•Appendix E: Lists susceptible metacharacters and keywords.
NetContinuum OS 6.1Prefacexv
Audience
•Appendix F: Describes the new data types.
•Appendix G: Describes the Web Application wizard.
•Appendix H: Describes the default web-firewall-policies. Attack groups and
associated attack actions.
Audience
This document is intended for administrators and developers who create or manage
Web applications and security. Users should have a background in the following:
This document uses the following conventions and symbols:
•Screen text (not in a menu) is presented in a display:
This is display text
Displays do not include any system prompts (for example, a $ sign) as part of the
text unless explicitly noted in the accompanying general text.
•The following font conventions apply both to general text and to text in displays:
— Courier represents display text:
Broadcast Message from ...
— Courier bold represents user input and Courier italic represents
variables:
show command
•Palatino represents all window titles, fields, and menu names, and menu items in
the GUI system:
Select
xviApplication Configuration Guide (449-000018-00)NetContinuum OS 6.1
Contents from the Help menu.
Notation Conventions
•Bold emphasizes words in text:
…does not support…
•Italic introduces or defines new terms and is used in book titles:
A rule group is …
•The notation [Ctrl]–[char] indicates a control–character sequence. For example,
[Ctrl]–[c] means hold down the [Ctrl] key while pressing the [c] key; the letter c does
not appear on the screen.
•Document citations include the document name followed by the document part
•Note, Caution, Warning, and Danger notices call attention to essential information.
NOTE
Notes call special attention to essential information, such
as important tips or advice on using a program, device, or
system.
CAUTION
Cautions alert you to conditions that could damage a
program, device, system, or data.
WARNING
Warning notices alert the reader to conditions that are
potentially hazardous to people. These hazards can
cause personal injury if the warnings are ignored.
DANGER
Danger notices alert the reader to conditions that are
potentially lethal or extremely hazardous to people.
NetContinuum OS 6.1Prefacexvii
Product Documentation
Product Documentation
An NC-2000 comes with a documentation CD-ROM, online help, and selected printed
documents. To order documentation (or provide comments about the documentation),
contact customer support (see ‘‘Customer Support”). The CD-ROM includes the
following documents:
•NetContinuum Application Security Gateway Command Line Interface (CLI)
Reference Manual (449-000006-00)
•NetContinuum Application Security Gateway Command Line Interface (CLI)
Procedures Guide (449-000036-00)
xviiiApplication Configuration Guide (449-000018-00)NetContinuum OS 6.1
Customer Support
Contact customer support to request assistance or when you need to report a problem.
You can contact customer support in any of the following ways:
Method Enter
phone 1-800-831-2050
E-mail support@netcontinuum.com
Web http://www.barracuda.com/netcontinuum
Click on
support page.
To expedite a support request, have the following information available:
•Serial number: This is located on both the back of the NC-2000 and the packing slip.
•Customer identification (ID): This is located on the packing slip.
NOTE
Keep the packing slip. It has the NC-2000’s serial number
and customer ID number.
Customer Support
Support to access the technical
NetContinuum OS 6.1Prefacexix
Customer Support
xxApplication Configuration Guide (449-000018-00)NetContinuum OS 6.1
Chapter 1
This chapter provides an introduction to configuring Web Application. It includes the
following topics:
•Overview
•Configuration Areas
•Application Configuration Features
•Application Objects
Overview
The NC-Gateway is a network security solution intended to secure web applications
and accelerate communication among devices on a network. The NC-Gateway can be
configured within the heart of a data center to provide communication and security
between front-end clients and back-end resources (Figure 1-1). The NC-Gateway is
designed so that it can be seamless positioned in a network.
The NC-Gateway acts as a proxy server, where each TCP/IP connection is fully
terminated, inspected, and then forwarded, dropped, or redirected as determined
through the inspection. The NC-Gateway processes and analyzes the
application-specific protocols that run over a TCP/IP packet. Supported protocols
include HTTP, HTTPS, FTP, POP3, SMTP, and IMAP. NC-Gateway applications
support these protocols with custom policies used to protect and expedite user traffic.
For example, an application for transmitting POP3 e-mail traffic can be created to
include policies for encrypting and load balancing the traffic.
Introduction
1-
NetContinuum OS 6.1Introduction1-1
Overview
(Front-end Users)
Server Farm
(Back-end Applications)
RouterSwitch
Internet
Figure 1-1. Simple Data Center Configuration
Configuration Areas
After system initialization (see the NetContinuum Application Security Gateway
Installation Guide (449-000035-00)), the NC-Gateway is ready to be configured.
Configuration falls into three areas:
•Application Configuration: This relates to the application protocols that are
included in an IP packet, including Hypertext Transfer Protocol (HTTP and HTTPS),
File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), and Post
Office Protocol (POP). This guide describes how to configure applications.
•PKI Configuration: This is performed on the Public Key Infrastructure (PKI)
objects, which are used for SSL encryption. Objects such as digital certificates and
key pairs are created in a separate PKI administration mode and then exported to
the general administration side for use in encrypting transmission between clients
and Web servers. See the NetContinuum Application Security Gateway PKI Administration Guide (449-000017-00) for information about creating certificates
and other PKI objects.
Firewall
Switch
Switch
NC-Gateway
•System Configuration: This relates to general processing, that is global to the
NC-Gateway or a virtual site (vsite). Procedures include setting TCP/IP and other
system parameters, configuring NTP and SNMP, configuring network firewalls and
features (ACLs, NATs, Routes, ARPs, and VLAN Ports), performing system
maintenance, and initiating redundancy between two NC-Gateways. See the
NetContinuum Application Security Gateway System Administration
Guide (449-000016-00) for information about configuring and maintaining the system. See the NetContinuum Application Security Gateway Logging
Guide (449-000028-00) for information about logging.
1-2Application Configuration Guide (449-000018-00)NetContinuum OS 6.1
Application Configuration Features
You can customize and protect an application in a number of areas. The following
features are specific to application configuration:
•Web Firewall Protection: The NC-Gateway provides a variety of Web firewall
protections that you can customize for each Web application:
— URL NormalizationandRequest Limits: The Web firewall provides various
format controls including normalizing URL strings and enforcing size limits on
request header fields.
— Cookie Security: The Web firewall can apply security features to cookies sent
from back-end servers.
— Data Theft Protection: The Web firewall can protect (by blocking or masking)
outgoing sensitive data such as credit card and social security numbers.
— Rate Control: The Web firewall supports setting the rate control pool limiting
client requests.
— Web Address Translation (WAT): The Web firewall can translate internal
codes, headers, and cookies in responses so that the actual message is
concealed to external users. WAT is an extension of the Network Address
Translation (NAT) implementation (RFC 1631).
Overview
— URL Policies: The Web firewall supports two types of Web access control
lists: URL and header. URL Policies provide numerous controls (entry, format,
failure response, data theft) based on the access location (URL). In addition,
URL Policies can activate Access Control. Header ACLs provide strict
limitations for parameters (such as form fields) and headers to prevent SQL or
operating system command injection, cross site scripting, and other types of
attacks.
— Web Services: The Web firewall supports various parameters which decide
how SOAP requests will be validated.
•SSL andInstant SSL: The NC-Gateway can be used to create and then
incorporate a complete set of digital certificates and key pairs to provide Secure
Socket Layer (SSL) encryption. In addition, the Instant SSL feature provides a
mechanism to convert existing HTTP (port 80) applications into HTTPS (port 443)
applications without having to change back-end resources. See the NetContinuum Application Security Gateway PKI Administration Guide (449-000017-00) for
information on digital certificates and other SSL objects.
•Authentication: The NC-Gateway can enforce access controls with associated
authentication databases as specified for each application.
•Load Balancing,Caching and Compression: Traffic management settings for
load balancing, caching and Compression can be specified for each application.
NetContinuum OS 6.1Introduction1-3
Overview
•Web Logging: Events and errors that occur on a Web site can be collected and
sent to a Web application logging server. (The NC-Gateway also supports system,
network firewall, and Web firewall logging.) See the NetContinuum Application Security Gateway Logging Guide (449-000028-00) for information about logging.
Application Objects
Each application is built around several objects that you configure. The following are
objects that you must create to enable an application.
Vsite
A virtual site (vsite) is created as a portal to a data center that processes all
application-specific traffic sent over a TCP/IP connection. You can create multiple
applications within the vsite to handle various protocols and security requirements. It is
designed to function as an administrative domain that controls access and content to
and from back-end servers.
Private Interface
A private interface is created to define the back-end connection point between the
NC-Gateway and the Web servers. This access point is defined by assigning an IP
address, mask, and back-end port. This interface is a logical exit point that allows traffic
to safely and securely travel between the NC-Gateway and the Web servers.
Server Group
A Web server group is created to associate a set of Web servers (one or more)
accessed through the NC-Gateway. These servers provide the content and other
resources for your applications. Servers that load balance the same content for a Web
site should be members of the same server group, and a vsite can contain multiple
server groups for varying purposes.
The other server group contains the following application specific server groups:
•FTP Server Group: An FTP server group is created to associate a set of FTP
servers (one or more) accessed through the NC-Gateway.
•SMTP Server Group: An SMTP server group is created to associate a set of SMTP
servers (one or more) accessed through the NC-Gateway.
•POP3 Server Group: A POP3 server group is created to associate a set of POP3
servers (one or more) accessed through the NC-Gateway.
•IMAP Server Group: An IMAP server group is created to associate a set of IMAP
servers (one or more) accessed through the NC-Gateway.
•Custom Server Group: A Custom server group is created to associate a set of
custom servers (one or more) accessed through the NC-Gateway.
1-4Application Configuration Guide (449-000018-00)NetContinuum OS 6.1
Overview
Web Server
A Web server entry is created for each server in the server group that specifies
addressing, flow management, health, and security settings for traffic between that
Web server and the NC-Gateway.
Web Application
Controls a Web application (Web site or Web-based program), including Web firewall,
SSL encryption, load balancing, Web logging, authentication, access control, and
caching options.
Other Application
An application is created to define the front-end connection point for clients attempting
to access the back-end servers for a Web or other application. This access point is
defined by assigning a virtual IP (VIP) address, port, server group, front-end port, and
other connection-related parameters. The following applications can be created:
•FTP Application: Controls an FTP application, including PASV mode, attack
prevention (command blocking), SSL encryption, and load balancing options.
•SMTP Application: Controls an SMTP application, including SSL encryption,
authentication, and load balancing options.
•POP3 Application: Controls a POP3 application, including SSL encryption and
load balancing options.
•IMAP Application: Controls a IMAP application, including SSL encryption and load
balancing options.
•Custom Application: Controls an unspecified TCP/IP application. This type of
application simply forwards data from a client to the back-end server; the
NC-Gateway does no parsing. However, you can configure SSL encryption and
load balancing options.
Virtual Site (vsite): Holds both application-specific configuration information and
some system configuration such as network firewall settings. No vsites exist by default;
you must create them.
A vsite (virtual site) is an admin defined portal to a data center. It is similar in concept
to setting up a database view, where users can access only that part of the database
built into the view. In the case of a vsite, you define the resources that control traffic to
and from the data center through the vsite. You can create multiple vsites to address
different conditions, applications, and users. You can configure a vsite to manage any
number of applications and server groups.
Some containers, such as Network Firewall, appear automatically when you create a
vsite. Others, such as a server group or application, must be created explicitly.
NetContinuum OS 6.1Introduction1-5
Overview
The following resources can be configured under a vsite:
Vsite level containers: Network Firewall, Private Interface, Server Group, Application,
and Authentication Database.
Web Application level containers: Web Firewall, Instant SSL, SSL, Load Balancing,
Web Logging, Authentication, Access Control, Caching and Rule Group.
After creating the vsite the admin creates a private interface to provide a virtual path to
the back-end resources. Then the admin creates a server group to define the actual
Web servers that will be used to support the created vsite. The next step is to create a
Web application and provide the front-end connection for clients attempting to access
the Web site. The Network firewall is configured to protect the network layer attacks by
creating ACL, ARP, static route entry and so on. Web firewall is configured to prevent
the Web attacks. SSL protocol is configured to provide data encryption and server/
client authentication for transmitting private information over the Internet. Syslog server
is configured to allow the user to centrally store and view logs sent from the
NC-Gateway.
Applications are created and configured under a vsite. No applications exist by default;
you must create each application within the appropriate vsite.
NOTE
Containers under the root node are accessible by the
admin user (and optionally other created administrative
users) only; containers under the SSL root node are
accessible by the pkiadmin user only.
Bridged Vsite: In bridge mode, NC-Gateway uses same IP address for the VIP
(application) and the back-end server. The NC-Gateway can be deployed in bridge
mode without any network restructuring and it supports all the application firewall
features. It supports all applications except FTP Application.
The bridged vsite has limitations in comparison to the proxy vsite. The following
features are not available in bridge-mode:
•PIFs
•Network Firewall (No ACLs, No NATs, No Routes, No ARPs)
•TCP Pooling
•OOB Monitoring
•Server Groups
•active-active failover support
1-6Application Configuration Guide (449-000018-00)NetContinuum OS 6.1
Overview
•Backup Rule Group
There is delay in failover/failback for bridged vsites based on the network devices.
Active-Active configuration is not supported for bridged vsites, therefore all bridged
vsites have to be active on the same NC-Gateway so that they failover together.
The "failback" policy can be manual or automatic. It is recommended that the
"failback" set to be manual (especially in the case of active/passive pairing). Otherwise,
the L2 switches on the front and back have to relearn before it can process requests
(delay of 15 seconds or more) again.
Rule groups under bridged-vsite allow you to route your requests to different servers.
By using rule groups, you can also change the behavior of the application with respect
to the following:
a. Caching: For example, disable caching for /dynamic/*
b. Web Logging: For example, disable logging for /*.gif
c. Compression: For example, do not compress /zips/*
In bridged mode, an application for wild card can be created. In this application, an IP
address of 0.0.0.0 is allowed for VIP that represents multiple applications in back-end
which is running on same port as specified in the application.
1. A router is required in the front-end of NC-Gateway to avoid bridging of packets
that are destined for other parts of the network.
2. The parameter ‘bridge-all’ under cluster should be set to ‘yes’.
3. All the wild card applications must be configured in the same bridged vsite.
4. No two wild card applications can have the same port.
NetContinuum OS 6.1Introduction1-7
Overview
1-8Application Configuration Guide (449-000018-00)NetContinuum OS 6.1
Chapter 2
Creating a Vsite
A virtual site (vsite) represents a Web traffic control center that includes private
interface, server group, server, and application definitions. This chapter provides
instructions for creating a vsite. It includes the following topics:
• Creating a Vsite
• Creating a Bridged Vsite
• Creating a Private Interface
• Creating a Server Group
• Configuring a Web Server
• Configuring a Bridged Web Server
• Configuring Response Pages
• Configuring Trusted Hosts
• Configuring Session Identifiers
• Configuring Custom Parameter Classes
• Configuring CRLs
2-
Procedures for creating applications within a vsite are discussed in subsequent
chapters.
Creating a Vsite
A vsite is an administrator-defined portal to a data center. You define the resources and
rules that control traffic to and from the data center through the vsite. You can create
multiple vsites to address differing conditions, applications, and user populations. The
vsite processes all application-specific traffic that is sent over the TCP/IP connection.
You can create separate applications within a vsite to handle HTTP, HTTPS, FTP,
SMTP, IMAP, and POP3 traffic.
To create a vsite, do the following:
1. From the Configuration Home page, select Vsite from Add drop-down list located
in Vsites table. The Create page opens. In this page, do the following (in the
specified parameter fields).
NetContinuum OS 6.1Creating a Vsite2-1
Creating a Vsite
a. Name: Enter a name for the new vsite.
b. Primary Gateway: Keep the default setting to the current NC-Gateway. This
c. Redundancy Enabled: Keep the default setting of On. This parameter has no
2. Click Add to save and activate the new settings.
3. Repeat step 1 to add additional vsites.
parameter can be changed only if there is a peer NC-Gateway configured in a
redundant environment (see Chapter 7, “Redundancy Configuration,” in the
NetContinuum Application Security Gateway System Administration
Guide (449-000016-00)).
effect on a standalone system.
4. To make a change, select one of the vsites from Vsite
s table, click Edit... button.
The Edit page opens. In this page, enter the desired value (or select the alternate
value from the drop-down list) for that parameter and then click Update to save and
activate the new setting(s).
The following table lists the vsite container parameters. These parameters can be
changed after a vsite is created.
Table 2-1. Vsite Parameters
ParameterDescriptionOptions
NameSets the name for the vsite. (Names cannot contain
spaces, slashes, punctuation, or special characters.)
Primary
Gateway
Redundancy
Enabled
Sets the NC-Gateway where this vsite will be active,
that is, the NC-Gateway where the
application-specific traffic will be processed. By
default, this is assigned to the current NC-Gateway
where the vsite was created. However, if there is a
peer NC-Gateway in a redundant environment, this
parameter can be set to the peer.
Enables redundancy for this NC-Gateway. It has no
effect on a standalone system. In a redundant
configuration, it has the following effect:
User defined
(default is vsite)
Any
NC-Gateway in
cluster
On (default)
Off
• On: Services will normally be active on the gateway
specified by primary-gateway. If this gateway fails,
services will be taken over by the other gateway.
• Off: Services will only be active on the gateway
specified by primary-gateway. If this gateway fails,
services will NOT be taken over by the other
gateway, and the services will be unavailable till the
first gateway is rebooted.
2-2Application Configuration Guide (449-000018-00)NetContinuum OS 6.1
Loading...
+ 344 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.