All rights reserved. Use of this product and this manual is subject to license. Information in this document is subject to change without notice.
Trademarks
Barracuda Web Site Firewall is a trademark of Barracuda Networks. All other brand and product names mentioned in this document are
registered trademarks or trademarks of their respective holders.
ii Barracuda Web Site Firewall Administrator’s Guide
viii Barracuda Web Site Firewall Administrator’s Guide
Chapter 1
Introduction
This chapter provides an overview of the Barracuda Web Site Firewall and includes the following
topics:
• Overview on page 8
• Current Prevention Techniques on page 11
• Web Security Requirements on page 13
• Barracuda Web Site Firewall Purpose on page 15
• Features of Barracuda Web Site Firewall on page 17
Introduction 7
Overview
Methods of attack
Web-based applications offer organizations a rapid, cost-effective vehicle for deploying applications
to customers, partners, and employees. They also present an easy target for malicious hackers, putting
critical data and processes at significant risk from external attack. Current security methods were not
designed to address Web-based attacks. Every organization relying on Web applications must
consider how to protect themselves against the constantly changing array of potential applicationlayer attacks.
There are wide variety of known application and network layer attack methods. These methods fall
into a number of categories. The following table describes some of the common attack techniques.
The Protection column summarizes how a Barracuda Web Site Firewall can address these attack
methods.
Table 1.1: Protection against different methods of attack
TechniqueDescription
Application Layer Attack Techniques
Cross-Site
Scripting
SQL InjectionSQL injection allows commands to
Command
Injection
Cookie/Session
Poisoning
Cross-site scripting takes
advantage of a vulnerable Web
site to attack clients who visit that
Web site. The most frequent goal
is to steal the credentials of users
who visit the site.
be executed directly against the
database, allowing disclosure and
modification of data in the
database.
Operating system and platform
commands can often be used to
give attackers access to data and
escalate privileges on back-end
servers.
Cookies are often used to transmit
sensitive credentials, and they can
be modified to escalate access or
assume another user's identity.
Protection provided by Barracuda
Web Site Firewall
Protects against cross-site scripting
vulnerabilities by inspecting application traffic
and blocking all methods of inserting malicious
scripts into URLs, headers, and forms.
Protects against all SQL injection vulnerabilities
by inspecting application traffic and blocking all
methods of inserting dangerous database
commands into URLs, headers, and forms.
Protects against all command injection
vulnerabilities by inspecting application traffic
and blocking all methods of inserting dangerous
operating system and platform commands into
URLs, headers, and forms.
Digitally encrypts, signs, and time-stamps
cookies, protecting their content from tampering.
Parameter/Form
Tampering
8 Barracuda Web Site Firewall Administrator’s Guide
Parameters used in URLs, HTTP
headers, and forms are often used
to control and validate access to
sensitive information.
Protects against parameter tampering by using
parameter profiles for all application parameters
and allowing only user requests that match the
legitimate profile.
Table 1.1: Protection against different methods of attack
TechniqueDescription
Buffer OverflowAttackers attempt to flood
vulnerable back-end servers with
excess requests. If successful,
attackers can often execute
commands directly on the
compromised server.
Directory
Traversal/
Forceful
Browsing
Cryptographic
Interception
Cookie
Snooping
Allowing access outside of the
defined application provides
unintended information disclosure
and/or modification.
Hackers seldom attempt to break
strong encryption like SSL.
Instead, they attack sensitive
hand-off points where data is
temporarily unprotected. The use
of multiple devices for managing
cryptography and encryption
makes cryptographic interception
far more likely.
Cookies are commonly used to
transmit user credentials and are
often encoded only with simple
encoding methods like Base64.
This can lead to disclosure of login
credentials.
Protection provided by Barracuda
Web Site Firewall
Automatically enforces legitimate buffer limits at
the perimeter, ensuring that even vulnerable
servers cannot be compromised.
Prevents the access of unpublished Web pages
by using application profiles and blocking
requests with path traversal metacharacters and
enforcing access to only those pages that the
application was designed to expose.
Has extensive SSL security capabilities and can
ensure that no unencrypted traffic traverses the
network in any circumstance. Combining all
critical DMZ functionality into a single device
also reduces the risk of exposure.
Digitally encrypts, signs, and time-stamps
cookies, protecting their content from tampering.
Log TamperingErasing and tampering with
transaction logs allows an attacker
to cover their tracks or alter Web
transaction records.
Error Message
Interception
Attack
Obfuscation
Application
Platform Exploits
Security
Management
Exploits
Information in error messages are
often rich with site-specific
information, allowing an attacker
to learn private application
architectures.
Hackers frequently disguise
attacks by encoding their requests
with methods like URL encoding or
Unicode.
Well-known exploits can often be
addressed through a patch, but
patching is not always timely.
Sophisticated attackers may target
security management systems in
an attempt to modify or turn off
security enforcement. (These
could be either network or
application layer.)
Centralizes the collection of all back-end server
logs, then digitally signs and encrypts them to
prevent tampering. As with all its features,
secure logs can be generated on a perapplication basis.
The Website cloaking feature prevents
unintended information disclosure from error
messages.
Fully decodes URL, Unicode, and polymorphic
encoding before inspection.
Allows for blocking of well-known attacks,
effectively buying time for proper patch
management.
Has all management functions securely
firewalled from production traffic and is operated
through dedicated, secure management
channels.
Introduction 9
Table 1.1: Protection against different methods of attack
TechniqueDescription
TCP
Fragmentation
Denial of Service There are a wide variety of
Fragmenting an attack into
multiple TCP packets allows
attacks to slip by devices that are
inspecting only packets, and not
inspecting the entire session.
methods used to flood critical
applications and servers in an
attempt to take them out of
production.
Other Considerations
Many techniques to manage Web application security can have an adverse impact on performance and
availability. Adverse consequences can include the following:
•Significant performance degradation from intensive data analysis and processing
•Web site inaccessibility for legitimate users from misapplied rules
•Long and complex configuration procedures subject to a variety of observable and transparent
errors
•Processing bottlenecks from inefficient load balancing
•Availability risks from complex or unreliable failover (redundancy) procedures
Protection provided by Barracuda
Web Site Firewall
Network Layer Attack Techniques
Performs both stateful and deep inspection
throughout the entire session, incorporating
packet and stream reassembly to search out
attacks.
Includes full network-layer DoS protection
through integrated techniques like SYN cookies
and client-rate limiting.
10 Barracuda Web Site Firewall Administrator’s Guide
Current Prevention Techniques
Companies try to protect their Web applications with solutions designed to protect networks that were
optimized for client-server application delivery. Network firewalls, intrusion detection systems,
software development methodology, and patch management are woven together to create a complex
security system that is ineffective in stopping Web attacks.
Network Firewalls
The first generation network firewalls were designed to control access to network resources.
Administrators could create network Access Control Lists (ACLs) to allow or deny traffic based on
source and destination IP addresses and ports. Traditional network firewalls do not prevent Web
attacks, whether inside or outside the corporate firewall. They are incapable of inspecting, blocking,
modifying, deleting, or rewriting application HTTP content of requests and responses. To provide
access to mission-critical Web applications, port 80 is typically configured as either open or closed,
meaning anyone trying to access Web applications from the Internet may connect directly to Web and
application servers with virtually no security inspection and enforcement.
Stateful inspection firewalls represented a significant improvement in firewall technology. Today
they are widely deployed. These firewalls add stateful inspection to network layer ACLs. They track
the session state and verify that inbound packets match a previously allowed session. Stateful
inspection firewalls added the capability to prevent network-layer attacks with TCP anomaly and
attack signature methodologies. Many also perform IP defragmentation/assembly, detecting
problems and attacks distributed among multiple packets. However, stateful inspection firewalls
cannot detect many application-layer attacks. An attack hidden in a valid packet is still passed on to
the target application. Likewise, an attack encrypted or payload encoded in the data cannot be
detected at the firewall.
Intrusion Detection Systems
Network Intrusion Detection Systems (IDS) use signature-recognition to log and alert administrators
of potential threats. They are passive and do not block attacks or alert you of unknown attacks. The
bulk of the attack database is comprised of network layer attacks. Inherently, the pure signature
detection methods create a "false positive" problem that drains resources. In addition, they can be
bypassed with encryption, TCP fragmentation, and other evasion techniques.
Building Security into the Application
Security features can be written directly into an application, and many companies have used this
approach. However, securing applications directly is difficult and time consuming. According to a
U.S. Department of Defense study, on average there are up to 15 security defects in every 1000 lines
of code. Shortcuts, debug features, poor code, and insufficient documentation all increase security
risk. Developers are hard pressed to deliver feature functionality on time and in budget. Security can
become a second-level priority, which substantially increases security risk.
Introduction 11
Patch Management
Security patch management is about applying software patches for known application vulnerabilities.
However, keeping up with the deluge of patches has become close to impossible. IT organizations
face two major choices; try to find and patch all known problems to close application security holes,
or patch only the most pressing ones and live with the risk of potential attack. In addition, security
patches cannot be deployed to prevent unknown vulnerabilities or threats. Patches also do not
eliminate vulnerabilities caused by administration or configuration errors.
Patching is problematic at best. For custom applications, the software developers must keep current
on advisories affecting libraries and code as well as best practices for application security, such as
validating input in forms and cookies. Couple this with the challenge of integrating multiple
platforms, Web servers, application servers, databases and legacy systems, and the scope of the
security problem becomes evident.
For commercial application software, IT organizations must rely on vendors to supply fixes, typically
as interim patches for known security problems. But aggressive patching as a strategy is costly, risky,
and sometimes ineffective. Companies can take up to six months to release a patch for a known
security problem. Patches that make it through the pipeline faster may not experience the thorough
testing that customers expect. Managing software patches alone is a huge task for complex data
centers, which must track and maintain critical patches from multiple vendors.
12 Barracuda Web Site Firewall Administrator’s Guide
Web Security Requirements
Securing Web applications at the perimeter simplifies and centralizes security management,
significantly reducing the cost and effort. Perimeter security provides the following benefits:
•Limits changes to back-end servers and applications
•Reduces the need for continuous patch management
•Supports rapid, secure deployment of new applications
Establishing perimeter Web security requires that data packets be deeply inspected and that Web (as
well as network) firewalls be implemented.
Deep Inspection
A firewall capable of deep inspection is one that can look far enough into the packet to block attacks
at Layers 4-7 (as well as lower levels) of the OSI network model. A deep packet inspection firewall
performs all the tasks of a stateful inspection firewall (such as enforcing network-layer ACLs,
maintaining TCP session state, applying TCP attack prevention, and defragmenting and reassembling
packets) and the following four essential tasks:
•Decryption of application-layer information. Attacks can be disguised in URL-encoding,
Unicode, or SSL-encrypted data. Deep inspection firewalls can decrypt application-specific
protocols. SSL-encrypted data is the most notable. If the firewall cannot decrypt SSL on the fly,
then it leaves a wide opening to applications that are probably the most sensitive.
•Traffic normalization to a consistent, canonical format. A deep inspection firewall must be able
to normalize all traffic to a common, canonical encoding before performing a security string
match. In the HTTP world, this means decoding Unicode, UTF, or Hex to base text. Otherwise,
the firewall compares policies in different formats, and the security strings will not match.
Hackers can take advantage of firewalls that do not normalize traffic by disguising attacks with
different encoding formats.
•Application protocol conformance. Deep inspection firewalls have protocol conformance
detectors built on the TCP/IP protocol for specifications such as HTTP, SMTP, POP3, DNS,
IMAP, and FTP. Only RFC-compliant traffic should be allowed; at the minimum traffic is
manipulated to conform to a protocol.
•Bi-directional payload inspection. The firewall must be able to inspect, manipulate, and apply
policy on the payload of traffic flow to and from the Web servers, in both directions and
simultaneously on all portions of the packet, including HTTP headers, URLs, forms, and
message body.
Web Application Firewalls
Web application firewalls have both similar and unique components relative to traditional network
firewalls.
The major features of traditional firewalls (network ACLs and NAT) have corollaries in the Web
application security field, Web Address Translation (WAT). In many ways you can think of the URL
as the IP address of the Web universe. You apply Web ACLs (WACLs) and WAT to URLs much as
you apply ACLs and NAT to an IP address. Just as a traditional firewall denies or allows traffic based
on connection tables or network ACLs, the Web application firewall denies or allows traffic by
comparing the results of its deep inspection with Web application ACLs.
Introduction 13
The other two critical components of a Web application firewall are unique to the demands of Web
application security, that is, profiling application traffic for expected behavior and passive
monitoring. A Web data center is highly dynamic, with new applications, recoded software modules,
and patches constantly changing the landscape. Security professionals need tools and methods for
applying effective policies in such a dynamic environment. Dynamic application profiling and
passive monitoring extend an application firewall to assist in effective policy analysis and
implementation.
14 Barracuda Web Site Firewall Administrator’s Guide
Barracuda Web Site Firewall Purpose
The Barracuda Web Site Firewall is designed to provide all the features necessary to implement a
high-speed Web application security perimeter. Figure 1.2 explains the detailed architecture of
Barracuda Web Site Firewall. The Barracuda Web Site Firewall combines all critical Web security
functionality into a single, high performance gateway, including a full-featured Web application
firewall specifically designed to protect the Web data center. The Barracuda Web Site Firewall
performs deep inspection of all Web traffic, enabling it to provide a wide range of intrusion
prevention capabilities at both the network and application layers.
The Barracuda Web Site Firewall can reside in-line behind an existing network firewall as shown in
Figure 1.1 or in other locations to protect the Web data center.
Figure 1.1: Standard Barracuda Web Site Firewall Deployment
The Barracuda Web Site Firewall's deep inspection capabilities enable it to examine application-layer
traffic and apply policies defined in ACLs to individual applications or entire groups of applications.
In addition, the Barracuda Web Site Firewall can analyze data in both directions, profile application
behavior to define an allowed normal behavior set, and passively monitor policies before putting them
into action. The Barracuda Web Site Firewall provides an extensive range of application security and
optimization features.
The Barracuda Web Site Firewall physically separates Web traffic from management operations by
providing separate ports for data (two on the front) and management (one on the back), ensuring that
administrators never have access to the Web traffic itself. When the Barracuda Web Site Firewall is
in operation, data traffic is never passed to the management system. An attacker cannot access the
management system, because it is effectively blocked from the data control and forwarding ports.
The Barracuda Web Site Firewall stores highly confidential information, such as keys and certificates,
on an internal disk drive that is fully encrypted.
Introduction 15
Figure 1.2: Barracuda Web Site Firewall Architecture
16 Barracuda Web Site Firewall Administrator’s Guide
Features of Barracuda Web Site Firewall
Barracuda Web Site Firewall supports features designed specifically to address the problems
discussed above. These features include the following:
Web Firewall ...................................................................................... 17
The Barracuda Web Site Firewall proactively protects Web applications by performing deep
inspection of all Web traffic, enabling it to provide a wide range of intrusion prevention capabilities.
The Barracuda Web Site Firewall supports application firewalls that can inspect and enforce security
policy at all layers.
At the application layer, the Barracuda Web Site Firewall proactively blocks attacks before they reach
the Web server, preventing malicious requests and embedded software code from ever reaching the
target application. The Barracuda Web Site Firewall defragments, normalizes, and decodes all
incoming requests; examines them for validity and correct formation; and only allows properly
formatted and RFC-compliant requests to pass through. Known patterns of malicious activity are
blocked and invalid input embedded in headers, forms, and URLs is stopped. The Barracuda Web Site
Firewall enforces Web address translation, request limits, URL normalization, and cookie security.
The Barracuda Web Site Firewall stops entire classes of attacks, both known and unknown, including
Day Zero attacks. It thwarts common Web hacking techniques such as cross site scripting, buffer
overflows, forceful browsing, and SQL injection.
Each Web firewall can be defined at a granular level. For example, consider a typical CGI script that
accepts a wide range of parameters in form fields such as transaction ID, account number, date, and
password. The password parameter might legitimately include special characters like an exclamation
mark (!) that in other situations could signal a metacharacter used to launch a malicious script. While
general ACLs could deny these metacharacters, a specific ACL for just the password parameter would
allow necessary special characters.
Load Balancing
The Barracuda Web Site Firewall has the capability to act as a stand-alone load balancer or in
conjunction with other load balancers. It can be situated in front of a set of servers and distribute
incoming traffic across the servers based on an algorithm.
Introduction 17
The Barracuda Web Site Firewall includes the following load-balancing features:
•Sends traffic requests to a collection of servers according to a user-configured algorithm.
•Automatically identifies the status of a server for appropriate routing of traffic.
•Add and removes servers without interrupting network traffic.
•Provides persistence support that allows a user to maintain connection integrity between a client
and a Web application.
•Provides redirect support that defines the HTTP redirect response when all servers in a server
group are deemed to be out of service.
Website Cloaking
Most successful Web attacks begin by probing a network for weaknesses. Readily available tools on
the Internet make it easy for potential intruders to scan a Web site for information about applications,
servers, and URLs. The Barracuda Web Site Firewall provides Website cloaking capabilities that
make enterprise Web resources invisible to hackers and worms scanning for vulnerabilities. The
Barracuda Web Site Firewall hides URL return codes, HTTP headers, and back-end IP addresses.
Because the Barracuda Web Site Firewall fully terminates all inbound and outbound TCP/IP sessions,
there is no direct access to Web servers, application servers, operating systems, or patches running on
the protected Web sites. With an Barracuda Web Site Firewall deployed in front of Web applications,
critical information that could be used to exploit vulnerabilities is completely inaccessible, making it
less likely that hackers or worms will be able to launch a successful attack.
Policy Recommendation Wizard
Policy Wizard simplifies the human intervention to allow the false- positives (URLs and parameters
that should be allowed but are not allowed). For all the blocked requests or responses in the firewall
logs, the policy wizard recommends an action(s) which will remove it from being generated in the
future. If, for a log entry which is identified as a false positive, the recommended action is accepted,
the policy wizard automatically applies the fix without the user having to manually locate and change
the configuration. This greatly simplifies the administration and monitoring of the Barracuda Web
Site Firewall.
Security Policies
The Barracuda Web Site Firewall provides default security policies to define strict checks to a
Website and Web applications. Apart from these default policies, you can create customized policies.
Each policy is a collection of nine sub-policies which protects against:
• HTTP protocol compliance
• SQL injection blocking
• OS command injection protection
• XSS protection
• Form/cookie tampering defense
• Denial of Service Protection
• Web site cloaking
18 Barracuda Web Site Firewall Administrator’s Guide
Request Limits
Enforcing size limits on the HTTP request header fields prevents the request with malicious code to
pass. Requests that have fields larger than the defined lengths are dropped. Proper configuration of
limits helps mitigate buffer overflow exploits that lead to Denial of Service (DoS) attacks.
Cookie Security
Cookie Security reduces the Cross Site Scripting Attacks using HttpOnly cookies. It guarantees
confidentiality of the cookie and avoids tampering of the cookie value. A shorter timeout interval can
be configured for cookies to help minimize the chances of cookie stealing.
URL/ Parameter Protection
URL Protection s
ettings protects the service against web attacks in the absence of a URL profile.
Parameter Protection protects the service against attacks based on parameter values in the absence
of a parameter profile.
Data Theft Protection
Data Theft Protection identifies confidential personal or business information such as social security
numbers, credit card information, and other privileged personal or corporate information such data in
responses sent by the server and protect it against exposure.
URL Normalization
Barracuda Web Site Firewall normalizes all traffic into a standard or "canonical" form before
applying any security policy string matches. In the HTTP world, this means decoding Unicode, UTF,
or Hex to base text. Otherwise, hackers can disguise attacks within different encoding formats that the
firewall might not detect using a string match.
Global ACLs
Global ACLs defines strict Access Controls (ACLs) to a Website and services.
Action Policy
Action Policy specifies the action to be taken for a particular type of Web attack.
Passive Monitoring
Configuring a Web firewall can have unintended consequences. Applying inappropriate rules can
adversely impact current application behavior. Because of this, many administrators are hesitant to
enforce the highest levels of security. Passive monitoring is an essential feature for application
security, as it lets administrators test policies non-intrusively before putting them into action.
The Barracuda Web Site Firewall provides a passive mode where a rule’s effects can be observed
before the rule is actively applied. The administrator can then analyze the behavior to determine if the
policy is appropriate or has unintended consequences.
For example, for a new Barracuda Web Site Firewall implementation, an administrator can configure
ACLs with passive monitoring and then deploy the device in line. The Barracuda Web Site Firewall
then generates log events for traffic that would have been blocked. The device also supports passive
Introduction 19
monitoring for specific ACLs, so administrators can test the effects of security policy changes without
affecting production traffic.
Custom Security per Application
The Barracuda Web Site Firewall allows administrators to manage multiple security zones from a
single gateway. Different applications can require varying sets of security policies. For example, a
business-to-business extranet application might require a Web firewall, encryption, authentication,
and detailed transaction logging, while an HR portal might only require encryption and moderate
logging. The Barracuda Web Site Firewall provides a single, consolidated way to manage security
customized to each application.
SSL Encryption
The Secure Sockets Layer (SSL) protocol provides an authenticated (public and private key pair),
secure (encrypted), and reliable (integrity check) connection. Many businesses rely on SSL
encryption to protect transactions from being compromised. Supporting SSL encryption can,
however, be an expensive and time consuming process.
The Barracuda Web Site Firewall lets enterprises easily encrypt entire Web sites using SSL. No
changes to back-end applications or servers are required. The Barracuda Web Site Firewall fully
terminates incoming HTTPS sessions and automatically transforms unencrypted URLs (HTTP) into
encrypted ones (HTTPS).
The Barracuda Web Site Firewall supports both SSL strengths: 40-bit and 128-bit encryption.
(Strength refers to the length of the session key that each encrypted transaction generates; longer keys
are considered more difficult to break.) The Barracuda Web Site Firewall also supports both the SSL
and the Transport Layer Security (TLS) protocols.
The Barracuda Web Site Firewall off-loads all SSL processing from the servers, freeing processing
resources and providing an instant performance boost for servers. Without SSL processing creating a
bottleneck, existing servers can better handle growing Web traffic. Customers experience faster
response times and the security of knowing that their transactions are safe from online eavesdropping.
Certificate Management
Barracuda Web Site Firewall allows users to upload PKI Objects to manage the encryption and
decryption process. This includes signed and intermediary certificates purchased from Certificate
Authorities.
Users can also generate and use self-signed certificates using Barracuda Web Site Firewall.
Performance
The top of the line Barracuda Web Site Firewall can handle up to 1 million simultaneous TCP sessions
and 4,000 full SSL sessions per second. None of this processor-intensive work is off-loaded to other
system servers, thus significantly reducing the performance cost of enhanced Web security.
The data ports come in either 10/100-Mb or 1-Gb speeds. You can deploy the Barracuda Web Site
Firewall in-line, in which one data port is for external (front-end) traffic with the Web while the other
20 Barracuda Web Site Firewall Administrator’s Guide
is for internal (back-end) traffic with the Web servers, or one-armed, in which a single data port is
used for both internal and external traffic.
The Barracuda Web Site Firewall contains load balancing features and is designed to complement
existing traffic management devices. The Barracuda Web Site Firewall integrates critical reliability
services for security enforcement by clustering or load balancing multiple Web servers into a single
redundant system. It identifies failed applications and transparently places those servers in or out of
service.
High Availability
Two Barracuda Web Site Firewalls can be configured as a fault-tolerant cluster pair. In this
configuration each Barracuda Web Site Firewall manages its set of active services, but each also
functions as a redundant standby gateway for the services running on its partner. Should one of the
Barracuda Web Site Firewalls have a problem or go into single-user mode, the active services on that
gateway automatically move to the partner gateway. The active Barracuda Web Site Firewall
maintains the state information during a failover, so the sessions can continue even when a failover
occurs.
In most areas of the Barracuda Web Site Firewall, administrators can make dynamic configuration
changes without taking the system off-line. This allows you to add, modify, or delete services without
adversely affecting existing services.
Energize Updates
Once you install the Barracuda Web Site Firewall, your Energize Update and Instant Replacement
subscriptions are most likely active. However, it is important for you to verify the subscription status
so that your Barracuda Web Site Firewall can continue to receive the latest attack and security
definition files released by Barracuda Central. The Energize Update service is responsible for
downloading these updates to your Barracuda Web Site Firewall.
Logging and Reporting
The Barracuda Web Site Firewall uses the logging feature to record occurrence of significant
events.These log messages of the Barracuda Web Site Firewall are extensive and have filtering
capabilities for easing the search. These log messages can be used to analyze the traffic for suspicious
activity and also fine tune the web firewall policies
The Barracuda Web Site Firewall reporting feature help the system administrators in their day-to-day
security management and statistical analysis of the log messages.The reporting feature augments the
management capabilities available with the Barracuda Web Site Firewall. Using this module, reports
can be generated based on all the logged information.
Usability
The Barracuda Web Site Firewall includes a graphical user interface (GUI) for administering and
configuring the Barracuda Web Site Firewall. The GUI interface is designed to provide a consistent
look and feel across multiple tasks and to leverage standard interfaces that many users already know.
Introduction 21
Ease of use is a very important feature in Web Site Firewalls, since the underlying technology and
related configuration can be complex. Barracuda Web Site Firewall GUI has been specifically
designed to facilitate easy deployment and administration of the product for intermediate as well as
advanced users. For new users, the default security policies will provide adequate protection out of
the box. Advanced users can use the advanced GUI screens to customize their security policies.
22 Barracuda Web Site Firewall Administrator’s Guide
Chapter 2
Web Site Firewall Concepts
This chapter provides an overview of the Barracuda Web Site Firewall and includes the following
topics:
• Basic Terminology on page 24
• Service on page 26
• Trusted Host on page 27
• Web Site Security on page 28
• Load balancing on page 30
• High Availability on page 31
Web Site Firewall Concepts 23
Basic Terminology
The following is a list of some of the terms used by the Barracuda Web Site Firewall. Understanding
these particular terms will aid administering your Barracuda Web Site Firewall.
Table 2.1: Basic terminology
TermDescription
ACLA network Access Control List (ACL) defines an IP firewall rule. The rules
CertificateAn encrypted digital statement that establishes credentials of a user. It
Cookie PoisoningHTTP is a stateless protocol, which means that it does not remember the
specify matching criteria for a packet and a corresponding action. If the
packet matches the criteria, the configured actions are allowed.
contains a public key and a variety of other identification information. A
certificate is a secure object that was created based on a distinguished name
(DN) and the key. A certificate can be created and stored locally in Barracuda
Web Site Firewall. It can also be installed and loaded from a third-party
company and then stored locally.
connection status and contents of a session. Cookies are small files on the
hard drive or in memory that maintain the state of a Web application. Cookies
usually contain a session identifier (session ID), and they can contain user
credentials such as the user ID and password. Cookie poisoning is an attempt
to modify the data in the cookie, usually to assume another user's online
identity.
Cross-site ScriptingCross-site scripting (XSS) is a type of vulnerability typically found in web
applications which allow code injection by malicious web users into the web
pages viewed by other users. An exploited cross-site scripting vulnerability
can be used by attackers to bypass access controls such as the same origin
policy. Vulnerabilities of this kind have been exploited to craft powerful
phishing attacks and browser exploits.
Forceful BrowsingForceful browsing is an attempt to access files and directories in a Web
application without using the Web application to provide the links to the files
and directories. An attacker who attempts to execute a forceful browsing
attack would see a directory such as
http://someapp.com/guests/welcome.html and attempt to go to
http://someapp.com/members/welcome.html. In this way, the attacker gains
access to the members area of the Web site without supplying proper
credentials.
Load BalancingLoad balancing distributes traffic to servers according to a specific algorithm.
Load balancing is managed by the Barracuda Web Site Firewall on a per
application basis.
Private Key A secret key in the asymmetric key pair and in the sole possession of a single
owner. A private key is the secret portion of an encryption/decryption key pair.
It should be known only to the person exchanging a secure transaction. A
private key can be created and stored locally in an Barracuda Web Site
Firewall.
SQL Injection SQL injection is a technique that exploits a security vulnerability occurring in
the database layer of an application. The vulnerability is present when user
input is either incorrectly filtered for string literal escape characters embedded
in SQL statements or user input is not strongly typed and thereby
unexpectedly executed.
24 Barracuda Web Site Firewall Administrator’s Guide
TermDescription
ServerThis container represents the server properties. It contains all the parameters
that are configurable for the server. This resource is created under a server
group.
ServiceA user-designed entry point for controlled access to the Web site. A service
sets the front-end interface (VIP) and a variety of possible controls (such as
SSL encryption, authentication, load balancing, and caching policies) for the
Web site.
Signed CertificateA signed certificate is a certificate obtained from a third party CA organization.
SSLSecure Socket Layer. This is an encryption technology to provide secure Web
traffic.
SyslogThis specifies the mechanism for storing log messages or events from various
network elements.
TCP Session HijackingTo hijack a TCP session, the attacker must be able to assume the identity of
one end of the TCP session. (The Web [HTTP] uses TCP as its transport
mechanism.) Usually the attacker spoofs the IP address of one end of the
session, and it can then send and receive as this new party in the
conversation.
Trusted CertificateA trusted certificate is a certificate sent from a CA. Including the CA's
certificate as a trusted certificate implies that any entity that has a certificate
signed by the CA will be authenticated for the SSL services that a Barracuda
Web Site Firewall provides.
Virtual IP (VIP)The user-defined IP address (registered if it is used for Internet access) on
which the Barracuda Web Site Firewall accepts traffic for a configured
application. In a redundant configuration it is a virtual address that applies
regardless of which Barracuda Web Site Firewall is managing the application
at any given time.
Web LogsThese logs contain messages about actions that occurred on a customer's
Web site protected by an Barracuda Web Site Firewall. While Web logs is a
common industry term, in this context the term Web application logs is used
to distinguish these logs from Web firewall logs.
Web WormsWeb worms are a special type of malicious code ("malware") that target Web
applications. A worm is an automated form of a virus that requires no user
interaction to propagate. A Web worm uses port 80 (HTTP) or 443 (HTTPS)
to target Web applications.
Web Site Firewall Concepts 25
Service
Web Site Profiles
A Service processes Web (HTTP and HTTPS) traffic between front-end clients and back-end Web
servers. The service defines a transport layer access point. A front-end virtual IP (VIP) and port
number identifies the service. (The back-end interface is specified under
Config
page; see Advanced IP Config help for more information.) The front-end and back-end
parameters identify the external and internal interfaces for the service.
By default all services use 'default' as the Web Firewall Policy. Depending on your need you can use
the available Web Firewall polices or create a new policy specific to that service under
POLICIES > Policy Manager
the IP address and port configured on the service.
The structure of the Web Site is called the profile of the Web Site.Web Site Profiles are used to
describe a Web Site. Profiles can be used to specify fine grained security settings for individual URLs
or form parameters.
URL Profiles are defined for each Web Site and provide security settings applicable at the defined
URL. Form parameters can be secured by creating parameter profiles under the corresponding URL
Profile.
page. These policies define the processing of HTTP requests destined to
ADVANCED > Advanced IP
SECURITY
The profile is distinct from the action that is what happens when a request is not conforming to the
profile received. The combination of a profile and a set of action preferences determine how a nonconforming request is disposed off.
For example, a profile contains information about a particular form URL with five parameters and
specifies each parameter's name. This means that a request with four or six parameters is treated as
violation of the profile. But, the action to be taken on different types of violations is not part of the
profile. The action can be deny the request, only log it or just ignore it.
A Web Site profile is auto generated when a new service is added to the Barracuda Web Site Firewall.
If the parameter “Use Profile” is set to “Yes”, then URL profiles and parameter profiles must be
created for validating the requests coming for that service.
Server Monitors
The Server Monitor is the mechanism used by the Barracuda Web Site Firewall to detect the
availability of a downstream real server. It can be configured on a per server basis to use one of several
different methods to establish the availability of a real server.
26 Barracuda Web Site Firewall Administrator’s Guide
Trusted Host
The Barracuda Web Site Firewall allows you to designate a Trusted Host, that is, to specify an IP
address for which authentication is not necessary. In this case, it is assumed that any request from that
address is from an allowed user, and all user requests from that IP address are exempted from
authentication.
Web Site Firewall Concepts 27
Web Site Security
Protocol Checks
At a basic level, the Barracuda Web Site Firewall verifies that all inbound requests comply with the
HTTP specification. For example, only the request with version HTTP/1.0 and HTTP/1.1 are allowed
and the request with version HTTP/0.9 and below is blocked automatically.
Request Limits
Message headers included in an HTTP request describe the contents of each message. However, the
request could include malicious code that a hacker added (injected) into the message header.
Enforcing size limits on the HTTP request header fields prevents the request with malicious code to
pass. (Requests that have fields larger than the defined lengths are dropped.) Proper configuration of
limits helps mitigate buffer overflow exploits that lead to Denial of Service (DoS) attacks.
Cloaking
Most successful Web attacks begin by probing a network for weaknesses. Readily available tools on
the Internet make it easy for potential intruders to scan a Web site for information about applications,
servers, and URLs. The Barracuda Web Site Firewall provides Web Site cloaking capabilities that
make enterprise Web resources invisible to hackers and worms scanning for vulnerabilities. The
Barracuda Web Site Firewall hides URL return codes, HTTP headers, and back-end IP addresses.
Because the Barracuda Web Site Firewall fully terminates all inbound and outbound TCP/IP sessions,
there is no direct access to Web servers, application servers, operating systems, or patches running on
the protected Web sites. With an the Barracuda Web Site Firewall deployed in front of Web
applications, critical information that could be used to exploit vulnerabilities is completely
inaccessible, making it less likely that hackers or worms will be able to launch a successful attack.
Cookie Security
A cookie is a simple text file provided by a Web server. Cookies provide a mechanism to store Web
application state information on a client's navigation platforms, such as browsers and other user
agents. Cookies are used to store user preferences, shopping cart items, and sometimes very sensitive
information such as registration and login information. If the structure of the cookie can be revealed,
the user's information is vulnerable to attack.
A server can send a cookie, which is a packet of whatever information the server chooses to send (such
as information to authenticate or identify a user), to maintain state between otherwise stateless HTTP
transactions. Because cookies are simple text files, they can easily be altered and then used to launch
a Web attack. Cookies can also be stolen and sensitive information, such as client information, can be
obtained from the message.
28 Barracuda Web Site Firewall Administrator’s Guide
Allow/Deny Rules
The Barracuda Web Site Firewall allows you to configure fine grained policy per URL. These policies
control which URLs are allowed or explicitly denied. The rules can be configured per Web Site under
WEBSITES > Allow/Deny > URL ACLs or globally under SECURITY POLICIES > GLobal ACLs.
Web Site Firewall Concepts 29
Load balancing
A load balancer is a networking device that distributes traffic to servers, so that the demand for the
servers is evenly distributed. This ensures that one server is not over-burdened and the Web traffic is
sent faster to its intended destination.
The Barracuda Web Site Firewall has the capability to act as a load balancer. It can check incoming
traffic intended for the servers, and then send the traffic to an appropriate server based on the
algorithm used. When requests are given to a service, they are load balanced to the servers, according
to the specified algorithm. This feature is available only with the purchase of Barracuda Web Site
Firewall model 460 and higher.
Load Balancing Features of the Barracuda Web Site Firewall:
•sends the traffic requests to a collection of servers according to a user-configurable algorithm.
•automatically identifies the status of a server to appropriate routing of traffic.
•adds and removes servers without interrupting network traffic.
•provides Persistence support within load balancing that allows a user to maintain connection
integrity between a client and a Web server application. This policy sends traffic back and forth
to a specific client and its receiving server until the session ends or the cookie expires. This is an
essential feature for applications that require a conversation to complete a multi-phased
transaction. For example, in an E-commerce application this policy maintains the connection
from the time an online customer begins filling a shopping cart until that customer purchases the
cart contents and completes the transaction.
•provides Redirect support within load balancing that defines the HTTP redirect response when
all servers in a server group are deemed to be out-of-service.
30 Barracuda Web Site Firewall Administrator’s Guide
High Availability
Enabling High Availability (HA) on your Barracuda Web Site Firewall allows you to connect it to a
backup Barracuda Web Site Firewall to act as a fail-over server in case your primary system fails for
any reason. This feature is available only with the purchase of two (2) Barracuda Web Site Firewalls,
model 360 or higher.
For High Availability to be active, both systems must be located on the same network since the
secondary unit will take over the services of the primary Barracuda Web Site Firewall whenever it
does not detect a heartbeat from the primary system.
Note
To enable High Availability, the Software versions must be same on both units in a cluster.
Web Site Firewall Concepts 31
32 Barracuda Web Site Firewall Administrator’s Guide
Chapter 3
Getting Started
This chapter provides general instructions for deploying and installing the Barracuda Web Site
Firewall. This chapter covers the following topics:
• Deployment Modes for the Barracuda Web Site Firewall on page 34
• Initial Setup on page 40
Getting Started 33
Deployment Modes for the Barracuda Web Site Firewall
Before deploying the Barracuda Web Site Firewall, user must get acquainted with the interfaces
present on the Barracuda Web Site Firewall. They are:
•WA N : The WAN interface is connected to the client side or Internet facing network.
•LAN: The LAN interface is connected to the server side or Application facing network.
•MGMT (Management): The MGMT interface is connected to a separate out-of-band network
for securely managing the Barracuda Web Application Controller. The MGMT port on the
Barracuda Web Application Controller is secure and denies ICMP Pings by default.
• By default the configuration happens through the WAN port
• But it is highly recommended that the configuration happen through the MGMT port
•Virtual IP (VIP): This is a per service IP address configured for each service on the Barracuda
Web Site Firewall. Depending on the mode of deployment, these can be same as or different
from the Real Server IP addresses. In Bridge-path mode, they are the same while in Reverse
Proxy and One Arm mode they are different.
Services on the Barracuda Web Site Firewall can be deployed in the following three modes:
The deployment mode chosen is usually dependent on the type of network configuration that currently
exists at your site as well as on the types of services that you want from the Barracuda Web Site
Firewall. The Bridge-path is recommended for initial deployment, as it requires the least amount of
invasive changes to your existing network configuration. For this reason the Barracuda Web Site
Firewall is shipped with the bridge mode setting. Depending on your need, you can choose the mode
of operation. To change the mode of operation, go to
appropriate radio button under Operation Mode and click
BASIC > IP Configuration page, select the
Save Changes.
Note
When deploying in either One-armed or Reverse Proxy mode, the Operation Mode should be set
Proxy.
to
Table 3.1 The following table lists the criteria to consider when deciding which deployment strategy
is optimal for your environment.
Table 3.1: Deployment Options
CriteriaReverse Proxy Bridge-Path One-Armed
Maximize network bandwidth (use
both ports)
Create secure path to Web
servers
Minimize change to existing
network infrastructure
Integrate with existing enterprise
load balancers
XX
X
X
X
34 Barracuda Web Site Firewall Administrator’s Guide
Table 3.1: Deployment Options
CriteriaReverse Proxy Bridge-Path One-Armed
Establish multiple paths to servers
for testing
Cannot change existing IP
addresses.
XX**
X*
Note:
* - Clients can reach the website either (i) via the Barracuda Web Site Firewall VIP (secure) or (ii)
directly through the server host IP (insecure).
** - Server host can retain IP address, but DNS will have to be changed to point to the VIP for the
website on the Barracuda Web Site Firewall. Also accessing directly via server IP will be insecure
since it bypasses the Barracuda Web Site Firewall.
Getting Started 35
Reverse Proxy (Recommended)
In Reverse Proxy, the Barracuda Web Site Firewall is deployed in-line, using both the physical ports
(WAN and LAN) of the device. This is the recommended configuration and/as it provides the best
security, but it requires changes to the existing network infrastructure.
With reverse proxy, the WAN and LAN interface of the Barracuda Web Site Firewall must be on
separate logical networks.
•The servers are moved to a private network connected through a switch on the LAN port.
•The WAN port connects to a switch to which the publicly accessible IP addresses will be routed
from the internet.
Each server in the private network gets a virtual IP on the Barracuda Web Site Firewall. The virtual
IP addresses should be accessible from the internet and should be routed to the WAN port via the
switch connected to it. When a request is received by the Barracuda Web Site Firewall on a VIP
advertised through the WAN port, it inspects it and redirects it to the real server on the private network
via the LAN port.
The following table describes the advantages and disadvantages of deploying your Barracuda Web
Site Firewall in Reverse proxy mode.
AdvantagesDisadvantages
Full feature availability including Load
Balancing and Instant SSL
Most Secure Deployment Scheme since
backend servers are completely isolated
Fast High Availability failoverDeployment requires cutover of live services
Network changes such as Server IP addresses and DNS
mappings are required
Backing out requires undo of all the changes
Figure 3.1: Sample Reverse proxy network layout
36 Barracuda Web Site Firewall Administrator’s Guide
Bridge-Path
Bridge-Path provides an easy configuration scenario by using the same IP address for the VIP and
back-end server. It does not use any extra IP address. Also changes to the server IP addresses or DNS
mappings are not required. Users may place the Barracuda Web Site Firewall inline with their existing
IP infrastructure, and add servers as required without changing IP addresses. With Bridge-Path
deployment, the WAN and LAN interfaces must be on physically separate networks and the LAN
interface must be on the same logical switch as the servers.
The following table describes the advantages and disadvantages of deploying your Barracuda Web
Site Firewall in Bridge-Path mode.
AdvantagesDisadvantages
Minimal network changes since the existing IP
infrastructure is reused
Real Servers keep their existing IP addresses Less resilient to network misconfigurations
Sensitive to broadcast storms and other errors related to
loops in a Spanning Tree protocol.
Features like Load balancing, Instant SSL and TCP
pooling are not available
Figure 3.2: Sample Bridge-Path network layout
One-armed
One-armed deployment minimizes changes to the existing infrastructure. This option uses WAN port
for both external and internal traffic passing through the Barracuda Web Site Firewall. The network
throughput is less as only one port (WAN) is used.
Getting Started 37
The following table describes the advantages and disadvantages of deploying your Barracuda Web
Site Firewall in One-Armed mode.
AdvantagesDisadvantages
Easier Deployment compared to Reverse
Proxy. Network infrastructure and partitioning
does not need to be changed.
Helps establish multiple path to servers for
testing.
Easier integration with existing enterprise load
balancers.
Requires DNS, IP changes as in Reverse Proxy.
Lower throughput since only one port (WAN) is used.
Not as secure as Reverse Proxy since server can be
accessed directly.
Figure 3.3: Sample One-armed network layout
Best Practise
Barracuda realizes that some customers don’t want to change their IP addressing schemes and that
certain implementation modes might be easier on the migration path to Reverse-Proxy mode. The
following conclusion can be drawn from the above three modes of deployment:
•Using one interface, the One-Armed mode is by far the most transparent and easiest way to plug
into a network, without affecting any existing traffic in the network.
•Using Bridge Mode, no renumbering of IP addresses on either for the Real Servers or for the
client facing IP address for the Service is required. The bridge is transparent, so no existing
services are disrupted, disconnecting it from the network is easy, and all proxy-based security
features at the application layer are supported.
•Reverse-Proxy is the most secure of all topologies and results in a complete security barrier
between the internet and the Web Applications.
38 Barracuda Web Site Firewall Administrator’s Guide
In addition, services in each of the modes can be run in Passive or Active mode.
•Passive mode simply logs offending traffic and doesn’t block
•Active mode performs full blocking of threats
So the general practise would be to intially run the service in Passive mode as the application is new,
there is not much traffic on it and then gradually change it to Active mode when the traffic starts
coming in.
Getting Started 39
Initial Setup
These are the general steps to set up your Barracuda Web Site Firewall. For more detailed instructions
for each step, see the following reference pages.
Prepare for the Installation
Before installing your Barracuda Web Site Firewall, complete the following tasks:
•Decide which type of deployment is most suitable to your network. For more information on the
•To install the Barracuda Web Site Firewall certain changes might be required to your existing
•(Reverse proxy deployment only) Re-configure the Real Servers with a new private network and
•Identify the TCP port numbers used by the services/applications running on the real servers that
•Verify you have the necessary equipment:
Prepare for the Installation ............................................................... 40
Connect Barracuda Web Site Firewall to Network............................ 41
Configure IP Address and Network Settings ..................................... 41
Configure the Barracuda Web Site Firewall......................................42
Update the Barracuda Web Site Firewall Firmware ......................... 43
Verify Your Subscription Status.......................................................... 43
Update Attack and Security Definitions ............................................ 44
deployment options, see Deployment Modes for the Barracuda Web Site Firewall on page 34.
network. The exact nature of the changes depends upon your existing network configuration and
the mode in which you deploy the Barracuda Web Site Firewall. Network Changes can be
classified as:
• Hardware changes - Changes related to cabling, switches, routers, network interfaces,
etc.
• Configuration changes - Changes related to DNS databases, IP addresses of hosts and
services, router configuration etc.
set the Real Servers’ default gateway to an unused IP address in this subnet. This IP addres will
be assigned to the LAN IP address of the Barracuda Web Site Firewall in step 3a of Configure the Barracuda Web Site Firewall.
you want to protect.
• Barracuda Web Site Firewall (check that you have received the correct model)
• AC power cord
• Ethernet cables
• Mounting rails (model 660 and higher) and screws
• VGA monitor (recommended)
• PS2 keyboard (recommended)
40 Barracuda Web Site Firewall Administrator’s Guide
Connect Barracuda Web Site Firewall to Network
1. Fasten the Barracuda Web Site Firewall to a standard 19-inch rack or other stable location.
Caution
Do not block the cooling vents located on the front and rear of the unit.
2. If using Reverse proxy, then the network switch referenced in the steps below may be the same
physical switch. If using Bridge-Path, however, then separate switches on different Layer 2
networks must be used.
2a. Connect a CAT5 Ethernet cable from the WA N interface on the Barracuda Web Site
Firewall to the network switch where the VIPs reside.
2b. Connect a CAT5 Ethernet cable from the LAN interface on the Barracuda Web Site
Firewall to the network switch where the Real Servers reside.
Note
It is recommended to connect MGMT port located on the back panel of the unit to the network
switch where the VIPs reside.
3. Connect the following to your Barracuda Web Site Firewall:
•Power cord
•VGA monitor
• PS2 keyboard
After you connect the AC power cord, the Barracuda Web Site Firewall may power on for a few
seconds and then power off. This behavior is normal.
4. Press the Power button located on the front of the unit.
The login prompt for the administrative console displays on the monitor, and the power light on
the front of the Barracuda Web Site Firewall turns on. For a description of each indicator light,
refer to Understanding the Indicator Lights on page 75.
Configure IP Address and Network Settings
The Barracuda Web Site Firewall is assigned a default IP address of 192.168.200.200. You can
change the address using the administrative console or by pressing and holding the RESET button on
the front panel.
Holding RESET for eight seconds changes the default IP address to 192.168.1.200. Holding the
button for 12 seconds changes the IP address to 10.1.1.200.
To set a new IP address from the administrative console:
1. Connect your keyboard and monitor directly to the Barracuda Web Site Firewall.
2. At thebarracuda login prompt, enter admin for the login and admin for the password.
The User Confirmation Requested window displays the current IP configuration of the
Barracuda Web Site Firewall.
Getting Started 41
Using your Tab key, select Change and press Enter to change the IP configuration.
3.
4. Enter the new IP address, netmask, and default gateway for your Barracuda Web Site Firewall.
Save to enter your changes. (The Primary and Secondary DNS fields are optional at this
Select
time, but if not entered at this step then they must be entered in step 3c. of To configure the Barracuda Web Site Firewall on page 42). Select
Exit.
The new IP address and network settings are applied to your Barracuda Web Site Firewall.
Configure the Barracuda Web Site Firewall
After specifying the IP address of the Barracuda Web Site Firewall and opening the necessary ports
on your corporate firewall, configure the Barracuda Web Site Firewall from the Web administration
interface. Make sure the system being used to access the Web interface is connected to the same
network as the Barracuda Web Site Firewall, and that the appropriate routing is in place to allow
connection to the Barracuda Web Site Firewall’s IP address via a Web browser.
To configure the Barracuda Web Site Firewall
1. From a Web browser, enter the IP address of the Barracuda Web Site Firewall followed by port
8000.
For example: http://192.168.200.200:8000.
2. To log into the administration interface, enter admin for the username and admin for the
password.
3. Select BASIC > IP Configuration, and perform the following steps:
3a. Enter the following information in the LAN IP Configuration section:
• LAN IP Address. The address that connects the Barracuda Web Site Firewall to the
Real Server network.
When in Reverse proxy mode, the LAN interface provides the default gateway for the
Real Servers. All Real Server IP addresses need to be in the same subnet as the LAN
IP address because they will need to use this IP as their default gateway.
• LAN Netmask.The subnet mask tied to the LAN.
3b. Enter the IP address of your primary and secondary DNS servers (if these have not yet
been set up).
3c. Enter the default hostname and default domain name of the Barracuda Web Site
Firewall.
3d. Click Save Changes.
Note
When you reconfigure the WAN IP address of the Barracuda Web Site Firewall on the IP
Configuration page, you will be disconnected from the administration interface. Please log in again
using the new IP address.
4. Select BASIC > Administration, and perform the following steps:
4a. Assign a new administration password to the Barracuda Web Site Firewall (optional).
This step is highly recommended.
4b. Make sure the local time zone is set correctly.
Time on the Barracuda Web Site Firewall is automatically updated via NTP (Network
Time Protocol). It requires that port 123 is opened for outbound UDP (User Datagram
Protocol) traffic on your firewall (if the Barracuda Web Site Firewall is located behind
one).
42 Barracuda Web Site Firewall Administrator’s Guide
It is important that the time zone is set correctly because this information is used to
coordinate traffic distribution and in all logs and reports.
4c. If desired, change the port number used to access the Barracuda Web Site Firewall
administration interface. The default port is 8000.
4d. Enter the amount of time for the session expiration length (in minutes) of your Web
administration interface session.
At expiration, you are required to log back into the administration interface.
4e. (Optional) Specify your local SMTP server. Enter the email address for your
Administrator to receive system and threat email alerts and notifications.
4f. Click Save Changes.
Update the Barracuda Web Site Firewall Firmware
To update the firmware on the Barracuda Web Site F irewa ll:
1. Select Advanced > Firmware Update.
2. Read the release notes to learn about the latest features and fixes provided in the new firmware
version.
3. Click Download Now next to Latest Version. Click OK on the download duration window.
Updating the firmware may take several minutes. Do not turn off the unit during this process.
Download Now is disabled if the Barracuda Web Site Firewall is already up-to-date with the
latest firmware version.
The Barracuda Web Site Firewall begins downloading the latest firmware version. You can
view the download status by clicking
once the download is complete.
4. Click Apply Now when the download completes.
5. Click OK when prompted to reboot the Barracuda Web Site Firewall.
A Status page displays the progress of the reboot. Once the reboot is complete, the login page
appears.
Refresh. A “Firmware downloaded” message displays
Verify Your Subscription Status
Once you purchased the Barracuda Web Site Firewall, your Energize Update and Instant Replacement
subscriptions are most likely active. However, it is important for you to verify the subscription status
so that your Barracuda Web Site Firewall can continue to receive the latest updates to the Intrusion
Prevention System from Barracuda Central. The Energize Update service is responsible for
downloading these updates to your Barracuda Web Site Firewall.
To check your subscription status:
1. Select BASIC > Status.
2. From the Subscription Status section, verify that the word Current appears next to Energize
Updates
3. The Barracuda Web Site Firewall should arrive with the Energize Updates (and Instant
Replacement where applicable) subscription already enabled. If it is, then this step can be
skipped. Otherwise, to enable your subscription:
and Instant Replacement Service (if purchased).
3a. Click the Activate link as shown in Figure 3.4. The product activation displays in a
new browser window.
Getting Started 43
Figure 3.4: Location of the Activate Link
3b. On the Product Activation page, fill in the required fields and click Activate. A
confirmation page opens to display the terms of your subscription.
3c. After a few minutes, from the Barracuda Web Site Firewall administration interface,
Refresh in the Subscription Status section of the BASIC > Status page. The status
click
of your subscriptions displays as Current.
Note
If your subscription status does not change to Current, or if you have trouble filling out the Product
Activation
page, call your Barracuda Networks sales representative.
Update Attack and Security Definitions
Click to activate your
subscription
To apply latest attack and security definitions.
1. Select Advanced > Energize Updates.
2. Select Hourly or Daily for Automatically Update. The recommended setting is Hourly for Attack
Definition Updates and Security Definition Updates.
3. Check to see if the current version is the same as the latest general release. If the rules are up-to-
date, proceed to the next section. If the rules are not up-to-date, continue to the next step.
4. Click Update to download and install the latest available attack or security definitions onto the
Barracuda Web Site Firewall.
5. Click Save Changes.
44 Barracuda Web Site Firewall Administrator’s Guide
Note
Chapter 4
Securing a Web Site
This chapter describes the configuration and monitoring tasks you can perform from the Web
interface. The following topic is covered:
• Creating Services on page 46
For more detailed information about a specific page in the Web interface, view the online help by
clicking the question mark icon on the right side of the interface.
Securing a Web Site 45
Creating Services
The BASIC > Services page allows you to add a new service that specifies the parameters for
configuring a service and server(s) to be protected by the Barracuda Web Site Firewall. Four types of
services can be created. They are:
•HTTP service
•HTTPS service
•Redirect service
•Instant SSL service
By default, passive mode is enabled for a service. For more information refer Passive versus Active Mode on page 48. To change it to active mode, click
Passive Mode under Basic Security section. ClickSave Changes.
Edit next to the service and select “No” for
Note
In bridge mode, the same IP address is used for both the VIP (service) and the server. Therefore
Real Server field is not available. To change the operation mode, go to the BASIC > IP
Configuration page, set the Mode of Operation to Proxy under Operation Mode section.
Deploying HTTP service
An HTTP service acts as a front-end for a non-encrypted HTTP application on the server.
To create an HTTP service:
1. Specify values for the following fields:
• Service Name. Name used to identify this specific service.
• IP Address. The IP address used to reach this service.
• Port. Specify the specific TCP port for the service to listens on.
• Type. Select HTTP from the drop down list.
• Real Server. Specify the IP Address of the server that hosts the service that will be
protected by the Barracuda Web Site Firewall.
2. Click Add. The service appears on the BASIC > Health page with a green, orange, or red health
indicator next to it. For more information, refer to the next section.
3. To configure advanced settings for a service, click Edit next to the service.
Deploying HTTPS service
An HTTPs service acts as a front-end for an encrypted HTTPs application on the server. This allows
all transactions to the clients to be authenticated via SSL.
To manually create an HTTPS service:
1. Specify values for the following fields:
• Service Name. Name used to identify this specific service.
• IP Address. The IP address used to reach this service.
• Port. Specify the specific TCP port for the service to listens on.
46 Barracuda Web Site Firewall Administrator’s Guide
• Type. Select HTTPS from the drop down list.
• Real Server. Specify the IP Address of the server that hosts the service that will be
protected by the Barracuda Web Site Firewall.
• Certificate. Select a certificate from the drop-down list. This is the certificate presented
by the service when authenticating itself to a browser or some other client. The list of
certificates available is based on the certificates that are created or imported in the
> Server Certificates
2. Click Add. The service appears on the BASIC > Health page with a green, orange, or red health
page.
indicator next to it.
3. This creates an HTTPS service that encrypts only the contents between the Barracuda Web Site
Firewall and the client browser. To use SSL encryption between the Barracuda Web Site
Firewall and the server, click
Edit next to the server and select “Yes” for Server uses SSL
under SSL(Server) section.
4. To configure advanced settings for a service, click Edit next to the service.
Securing an HTTP Web Site with HTTPS
An Instant SSL service redirects an HTTP connection to an HTTPS service. This creates two
services with the same IP address. An HTTPS service with port 443 and a redirect service with port
80. The redirect service is a non-SSL service that redirects all the requests to the HTTPS service. At
least one secured site domain should be specified to determine which links in the response will be
converted from 'http' to 'https'. For example; if http://www.barracuda.com is specified, all such links
found in the outgoing response will be rewritten to https://www.barracuda.com. After adding, you can
edit the HTTPS service to add more domains which must be rewritten in the response. On receiving
the request, the redirect service does the redirection to the service on port 443/HTTPS which in turn
sends it to the servers. The HTTPS service rewrites an “http:...” request into an “https:...” in the
response content.
BASIC
Note
Instant SSL works only in Proxy mode.
To manually create an instant SSL service:
1. Specify values for the following fields:
• Service Name. Name used to identify this specific service.
• IP Address. The IP address used to reach this service.
• Port. Specify the specific TCP/UDP port for the service to listens on.
• Type. Select Instant SSL from the drop down list.
• Real Server. Specify the IP Address of the server that hosts the service that will be
protected by the Barracuda Web Site Firewall.
• Domain. Specify the main domain which identifies links to be rewritten from 'http' to
'https'.
• Certificate. Select a certificate from the drop-down list. This is the certificate presented
by the service when authenticating itself to a browser or some other client. The list of
certificates available is based on the certificates that are created or imported in the
> Server Certificates
page.
BASIC
Securing a Web Site 47
Click Add. The service appears on the BASIC > Health page with a green, orange, or red health
2.
indicator next to it.
3. To configure advanced settings for a service, click Edit next to the service.
Creating a redirect service
The redirect service is a non-SSL service that redirects all the HTTP requests to an HTTPS service.
To manually create a redirect service:
1. Specify values for the following fields:
• Service Name. Name used to identify this redirect service.
• IP Address. The IP address used to reach this service.
• Port. Specify the specific TCP/UDP port for the service to listens on.
• Type. Select Redirect Service from the drop down list.
• Real Server. Specify the IP Address of the server that hosts the service that will be
protected by the Barracuda Web Site Firewall.
2. Click Add. The service appears on the BASIC > Health page with a green, orange, or red health
indicator next to it.
3. To configure advanced settings for a service, click Edit next to the service.
Passive versus Active Mode
Active mode blocks any request when an anomaly or intrusion is observed. Passive mode observes
the traffic, logs all observed anomalies and intrusions, and allows the traffic to pass through the
Barracuda Web Site Firewall. Active mode might block some legal traffic resulting in false positives
if the policy is not configured properly. Consider enabling a
passive mode initially. Observe the Web firewall logs for potential intrusions, and make appropriate
adjustments to security policies before enabling active mode.
Passive Mode is set to “Yes” for a service, all request with attacks on that service would be
If the
logged but allowed to pass the Barracuda Web Site Firewall. This setting overrides the passive mode
setting in the
When the
URL Policy and URL Profile.
in
URL Policies and URL Profiles for that service.
Passive Mode is set to “No”, an attack is allowed or denied based on the URL Match settings
Also, if the service is in passive mode, the deny/process ACLs under
for that service will be logged but not enforced.
ACLs
Security Policy
The Barracuda Web Site Firewall provides a range of security policies for your Web Sites and Web
applications. These policies determine what actions to take when one or more of the rules match the
request. All policies are global and they can be shared among multiple services configured on the
Barracuda Web Site Firewall. Some commonly used policies are defined by default. They are:
Service and or individual URL Policy in
WEBSITES > Allow/Deny > URL
•Default
•Sharepoint
48 Barracuda Web Site Firewall Administrator’s Guide
•OWA
•Oracle
Apart from these default policies, you can create customized policies. Each policy is a collection of 9
sub-policies. They are; Request Limits, Cookie Security, URL Protection, Action Policy, Global
ACLs, URL Normalization, Cloaking, Parameter Protection and Data Theft Protection.
To create a new policy, go to
Policy Name field and click the Add button. This creates a new policy with default values. To
in
SECURITY POLICIES > Policy Manager enter a name for the new policy
modify a particular policy, go to the desired sub-policy page and select the policy from the
Name
drop-down list and change the value of the parameter(s) and click the Save Changes button.
When a service is created, a basic set of Web Firewall features are activated automatically. By default
all services use “default” as the policy. Based on your requirement you can change the policy for a
service. To change the policy for a service, go to the
The service page opens, select the desired policy from the
Basic Security. Click the Save Changes button to save and activate the new setting.
Allowing/Denying Specific URLs
The WEBSITES > Allow/Deny allows you to define strict allow/deny rules for a Web Site. URL
ACLs allow you to customize access to your site for a variety of specific conditions such as the
following:
•Partition a Web site into security zones and configure different security policies on each zone.
•Configure explicit deny ACLs for known or observed attacks.
A security zone is a partition of a site that can be specified using a URL ACL key. The key is
comprised of the URL, host and an optional extended match rule (that is, a value or expression for the
header parameter). The matching URL ACL is determined by a best match algorithm using the host,
URL and extended match fields in specified sequential order. In most cases, host and URL may only
be used to specify an ACL. The Barracuda Web Site Firewall optimizes the search for the most
common case by implementing a parallel search algorithm on all ACLs. The best matching ACL is
the ACL with longest matching host and URL keys. To configure a more complex ACL based on
certain fields in the request such as a client IP or an HTTP header, use extended match rules. Not all
extended match rules are considered for evaluation. Only the ones specified for the matching host and
URL are used for evaluation. If more than one such rule is specified, they are evaluated based on the
specified extended match sequence.
Policy
Basic > Services page, click Edit under Actions.
Web Firewall Policy drop-down list under
There are two ways of redirecting a request using the URL ACL:
1. Set the Action parameter to Redirect, and specify the Redirect URL.
2. Set the Action parameter to Deny, set the Deny Response to Redirect and specify the Redirect
URL.
The first case is not considered as an attack, therefore:
•It is logged at a lesser severity.
•Passive mode has no effect on it.
Whereas the second case is a suspected attack, therefore:
•It is logged at a higher severity.
•Passive mode is applied on it so that the request is not denied.
Securing a Web Site 49
To manually create an URL ACL:
1. From WEBSITES > Allow/Deny page, click Add under Actions. The Create ACL page opens.
2. Specify values for the following fields:
• URL ACL Name. Enter the name for the URL ACL.
• Enable URL ACL. Enables access controls policy for all services.
• Host Match. Enter the matching criterion for host field in the Request Header. This is
either a specific host match or a wildcard host match with a single “*” anywhere in the
URL. You can enter a partial domain with wildcard (for example: *.abc.com) but you can
not use multiple asterisks. (Examples: *, *.abc.com, www.abc.com)
• URL Match. Enter the matching criterion for URL field in the Request Header. The URL
should start with a “/”and can have only one “*” anywhere in the URL. A value of /*
means that the ACL applies for all URLs in that domain. (Examples: /, /index.html,
/public/index.html)
• Extended Match. Enter an expression that consists of a combination of HTTP headers
and/or query string parameters. Use “*” to denote “any request”, that is, do not apply the
Extended Match condition.
• Extended Match Sequence. Enter an order for matching the extended match rule when a
request matches multiple rules with the same URL Match.
• Action. Select the action to be taken on the request matching this URL from the dropdown list.
• Deny Response. Select the response to be sent to the client if the request is denied. A
deny response is used when the “Action” is set to “Deny”.
• Response Page. Select the response page to be sent to the client, if the deny response
parameter is set to “Custom Response”.
• Redirect URL. Enter the URL to be used to redirect the client if the “Deny Response” is
set to “Redirect”.
3. Click Add to add the above configurations.
50 Barracuda Web Site Firewall Administrator’s Guide
Note
Chapter 5
Customized Security for Websites
This chapter describes the configuration and monitoring tasks you can perform from the Web
interface. The following topics are covered:
• Security Policies on page 52
• Creating a New Security Policy on page 59
• Web Site Profiles on page 60
• Web Site Profiles on page 60
• Web Site Translations on page 62
• Trusted Hosts on page 66
For more detailed information about a specific page in the Web interface, view the online help by
clicking the question mark icon on the right side of the interface.
Customized Security for Websites 51
Security Policies
A Web application is configured with several security policies. These policies define the processing
of HTTP requests destined to the IP address and port configured on the Web application. Barracuda
Web Site Firewall allows you to define strict checks to a Web Site and Web applications. It is a
shareable policy that can be used among multiple Web applications configured on a Barracuda Web
Site Firewall. Some commonly used policies, defined by default are:
•default
•sharepoint
•owa
•oracle
Apart from these default policies, you can create customized policies. Each policy is a collection of
nine sub-policies. You can modify a policy, by visiting the desired sub-policy page and changing the
value of the parameter(s). The following topics discuss these nine sub-policies in detail:
The SECURITY POLICIES > Request Limit page displays the parameters to configure Request Limits.
Request Limits define the validation criterion for incoming requests by enforcing size limits on HTTP
request header fields. The request that have fields larger than the defined lengths are dropped. Proper
configuration of limits helps mitigate buffer overflow exploits that lead to Denial of Service (DoS)
attacks.
Request limits are enabled by default, and the default limit values are chosen with the assumption that
any requests with lengths greater than the defaults are potential buffer overflow attacks. The defaults
are normally appropriate, but you might choose to change one or more of the default values under
certain conditions.
To configure Request Limits
1. Select the policy from the Policy Name drop-down list.
2. Specify values for the following fields:
• Enable Request Limits. Select whether to enable size limit checks on requests.
• Max Request Length. Enter the maximum allowable request length. This includes the
• Max Request Line Length. Enter the maximum allowable length for the request line.
• Max URL Length. Enter the maximum allowable URL length including the query string
Request Line and all HTTP request headers.
The request line consists of the method, the URL (including any query strings) and the
HTTP version.
portion of the URL.
52 Barracuda Web Site Firewall Administrator’s Guide
• Max Query Length. Enter the maximum allowable length for the query string portion of
the URL.
• Max Number of Cookies. Enter the maximum number of cookies to be allowed.
• Max Cookie Name Length. Enter the maximum allowable length for cookie name.
• Max Cookie Value Length. Enter the maximum allowable length for a cookie value.
Requests with Cookie values that are larger than the defined setting are denied.
• Max Number of Headers. Enter the maximum number of headers in a request. If there
are more headers than this limit in the request, the request is denied.
• Max Header Name Length. Specifies the maximum allowable length for header name.
• Max Header Value Length. Enter the maximum allowable length for any request
header. A request header could either be a HTTP protocol header such as "Host," "UserAgent" and so on, or a custom header such as "IIS Translate" header. A request may
contain any number of these headers.
3. Click Save Changes to save the above settings.
Cookie Security
The SECURITY POLICIES > Cookie Security page displays the parameters to configure Cookie
Security.
Cookies provide a mechanism to store service state information on a client's navigation platforms,
such as browsers and other user agents. Cookies are used to store user preferences, shopping cart
items, and sometimes very sensitive information such as registration and login information. If the
structure of the cookie can be revealed, the user's information is vulnerable to attack.
A server can send a cookie, which is a packet of whatever information the server chooses to send (such
as information to authenticate or identify a user), to maintain state between otherwise stateless HTTP
transactions. Because cookies are simple ASCII name value pairs, they can easily be altered and then
used to launch a Web attack. Cookies can also be stolen and sensitive information, such as client
information, can be obtained from the message.
You have the option to apply security features to the cookies sent from the servers to the Web users.
Cookie security is disabled by default.
To configure Cookie Security
1. Select the policy from the Policy Name drop-down list.
2. Specify values for the following fields:
• Tampe r Pro o f Mod e . Select whether the cookies should be encrypted or signed.
• Cookie Max Age. Enter the maximum age for session cookies.
• Cookie Replay Protection Type. Select the type of protection to be used to prevent the
cookie replay attacks from the drop-down list.
• Custom Headers. Enter the custom headers to be used in the cookie if the parameter
"Cookie Replay Protection Type" is set to "Custom Headers" or "IP and Custom
Headers" and click
Add.
• Secure Cookie. Select whether the cookies need to be returned for HTTPS requests only.
This parameter directs the user agents to send this cookie back only when they make
secure HTTPS connection to the origin server.
• HTTP Only. Select whether the cookie security feature should be enabled for HTTP
cookies.
• Cookies Exempted. Enter the cookies to be exempted from the policy and click
Add.
Customized Security for Websites 53
Click Save Changes to save the above settings.
3.
URL Protection
The SECURITY POLICIES > URL Protection page displays the parameters to configure URL
Protection. The settings in this container protects the service against Web attacks in the absence of a
URL Profile.
To configure URL Protection
1. Select the policy from the Policy Name drop-down list.
2. Specify values for the following fields:
• Enable URL Protection. Select whether to enable or disable URL protection
• Allowed Methods. Enter the list of allowable methods in the request and click
• Allowed Content Types. Enter the list of allowable content types in the POST body for a
URL and click
• Max Content Length. Enter the maximum allowable length of the content, that is, the
request body.
• Max Parameters. Enter the maximum number of parameters allowed in a request.
• Max Upload Files. Enter the maximum number of files that can be of file-upload type in
one request.
• Max Parameter Name Length. Enter the maximum length of any parameter name in the
request.
3. Click Save Changes to save the above settings.
Add.
Add.
Parameter Protection
The SECURITY POLICIES > Parameter Protection page setting protects the service against attacks
based on parameter values in the absence of a parameter profile. It defines strict limitations in form
fields and other parameters. It deep inspects the user input when a FORM is submitted. This allows
users to set up validation rules for FORM parameters.
To configure Parameter Protection
1. Select the policy from the Policy Name drop-down list.
2. Specify values for the following fields:
• Enable Parameter Protection. Select whether to enable or disable parameter protection.
• Denied Metacharacters. Enter the meta-characters to be denied in this parameter value.
• Max Param Value Length. Enter the maximum allowable length of the value of a
parameter.
• File Upload Extensions. Enter the extensions that are allowed while uploading the files.
'.' is a special extension which indicates no extension, and * indicates any extension and
Add.
click
• Max Upload File Size. Enter the maximum size for individual files that can be of fileupload type in one request.
• Blocked Attack Types. Select the check box(es) for malicious patterns in the parameter
value. An intrusion is detected when the value of a parameter matches one of the selected
Attack Types.
54 Barracuda Web Site Firewall Administrator’s Guide
3. Click Save Changes to save the above settings.
Cloaking
The SECURITY POLICIES > Cloaking page is used to enable security policies to cloak a Web site or
service.
It does this by removing HTTP headers and return codes before sending a response to a client. This
prevents hackers from gleaning information about services that could be used to launch attacks. (In
the industry, the term Website cloaking is sometimes used to refer to the technique of delivering one
version of a Web page to a user while delivering a different version of the same page to a search
engine, but that is not the meaning in this case.)
This policy offers the following cloaking features:
•Remove specified headers such as Server from responses.
•Suppress client error (status code 4xx) and server error (status code 5xx) messages from
• Custom Blocked Attack Types. Select the check box(es) to define your own attack
patterns to extend the parameter protection. These custom attack types can be defined in
Advanced > Libraries page as a set of regular expression patterns.
the
• Ignore Parameters. Enter the list of parameters to exempt from all validations and click
Add.
responses.
All Website Cloaking parameters are enabled by default. There is rarely a reason to change any of the
default values, except to add headers to be filtered.
To configure Cloaking
1. Select the policy from the Policy Name drop-down list.
2. Specify values for the following fields:
• Suppress Return Code. Select whether to enable or disable the blocking of the return of
an HTTP status code in a response header.
• Filter Response Header. Select whether to enable or disable removing the HTTP
headers in responses. Configure the list of HTTP headers to remove using the "Headers to
Filter" parameter.
• Headers to Filter. Enter a list of headers that are removed from a response before
serving it to a client and click
3. Click Save Changes to save the above settings.
Data Theft Protection
Data theft refers to the unauthorized copying of confidential personal or business information such as
social security numbers, credit card information, and other privileged personal or corporate
information. Unintended exposure of such data can lead to identity theft.
Add.
The SECURITY POLICIES > Data Theft Protection page is used to identify such data in responses sent
by the server and protect it against exposure. Enabling data theft protection on an ACL increases the
processing overhead per page. To optimize performance, enable it only for parts of the site that are
known to carry such sensitive information.
Customized Security for Websites 55
To configure Data Theft Protection
1. Select the policy from the Policy Name drop-down list.
2. Specify values for the following fields:
• Data Theft Element Name. Enter the name for this data theft element.
• Enabled. Select whether the data theft element is used. When this set to "Yes," all URL
policies which have Data Theft Protection > Status = On will look for this data type in
server response pages.
• Identity Theft Type. Select the data type that the element refers to from the drop-down
list. It is a binding to data type defined under
Identity Theft Patterns
.
ADVANCED > View Internal Patterns >
• Custom Identity Theft Type. Select the customized identity theft type to be used, if the
parameter "Identity Theft Type" is set to "<CUSTOM>" from the drop-down list. Refer
Creating Identity Theft Patterns on page 90 for more information.
• Action. Select whether to block any page sent by server containing this data type or to
cloak (part of the data overwritten with "X"s) from the drop-down list.
• Initial Characters to keep. Enter the number of initial characters are to be displayed to
the user when the data of this data type is identified in a server page.
• Trailing Characters to keep. Enter the number of trailing characters are to be displayed
to the user when the data of this data type is identified in a server page.
3. Click Save Changes to save the above settings.
Protected Data Types
This table lists all the default and created data theft elements. You can edit these data theft elements.
URL Normalization
The SECURITY POLICIES > URL Normalization page displays the parameters to configure URL
Normalization.
The Barracuda Web Site Firewall normalizes all traffic into a standard or "canonical" form before
applying any security policy string matches. In the HTTP world, this means decoding Unicode, UTF,
or Hex to base text. Otherwise, hackers can disguise attacks within different encoding formats that the
firewall might not detect using a string match.
Normalization (converting a URL into a canonical form) is always enabled if the Web firewall is
active. The Default Character set parameter specifies the character set encoding type for incoming
requests. It is set to ASCII by default; to specify an alternate type, simply select a different type such
as Shift-JIS for Japanese characters.
Additional checks to prevent path traversal and path disclosure attacks are set in URL Normalization.
There are situations where multiple character set encoding is needed. For example, a Japanese
language site might need both Shift-JIS and EUC-JP encoding. You have the option of setting the
Barracuda Web Site Firewall to automatically add character set encodings as needed. To configure
this, set the Detect Response Charset parameter to Yes. (It does this by searching all response
headers for a META tag that specifies the character set encoding type and dynamically adding any
supported types listed in the META tags.)
Double encoding is the re-encoding of the encoded data. For example: The UTF-8 escape for the
backslash character is %5C, which is a combination of three characters i.e. %, 5, and C. So the Double
56 Barracuda Web Site Firewall Administrator’s Guide
encoding is the re-encoding either one or all the 3 characters by using their corresponding UTF-8
escapes as %25, %35, and %63.
The following table describes double-encoding variations of the \ character.
Table 5.1: Double encoding variations of the \ character.
EscapeDescription
%5C%5C Normal UTF-8 escape of the backslash character.
%255C %25, the escape for % followed by 5C.
%%35%63The % character followed by %35, the escape for 5, and %63, the
escape for C.
%25%35%63The individual escapes for %, 5, and C.
To configure URL Normalization
1. Select the policy from the Policy Name drop-down list.
2. Specify values for the following fields:
• Default Character Set. Select the character set encoding type to be used for incoming
requests from the drop-down list.
• Detect Response Charset. Defines whether or not the Barracuda Web Site Firewall will
detect the character set encoding from the response. When it cannot determine the
character set encoding, it will default to one specified for the 'charset' parameter.
• Parameter Separators. Select the URL-encoded parameter separator to be used from the
drop-down list.
• Double Encoding. Select whether to re-encode the encoded data.
3. Click Save Changes to save the above settings.
Global ACLs
The SECURITY POLICIES > Global ACLs page allows you to define strict allow/deny rules for all the
services configured on the Barracuda Web Site Firewall. It is a shareable policy that can be used
among multiple services. You can add a new URL ACL or modify the existing URL ACL.
To configure Global ACLs
1. Select the policy from the Policy Name drop-down list.
2. Specify values for the following fields:
• URL ACL Name. Enter the name for the URL ACL.
• Enable URL ACL. Enables access controls policy for all services.
• URL Match. Enter the matching criterion for URL field in the Request Header. The
URL should start with a "/" and can have only one " * " anywhere in the URL. A value of
/* means that the ACL applies for all URLs in that domain.
• Extended Match. Enter an expression that consists of a combination of HTTP headers
and/or query string parameters. Use '*' to denote "any request", that is, do not apply the
Extended Match condition.
• Extended Match Sequence. Enter an order for matching the extended match rule when a
request matches multiple rules with the same URL Match.
Customized Security for Websites 57
3. Click Add to add the above configurations.
Existing Global ACLs
This table lists all the default and created global URL ACLs. You can edit these URL ACLs.
Action Policy
The SECURITY POLICIES > Action Policy page specifies the action to be taken for a particular type
of Web attack. Action policy is a collection of settings that decide what action to be taken when a
violation occurs. It consists of a set of attack groups, which in turn contains a set of attack actions.
The following attack groups are available:
The following attack groups are available:
•advanced-policy-violations
•application-profile-violations
•param-profile-violations
•protocol-violations
•request-policy-violations
•response-violations
•url-profile-violations
• Action. Select the action to be taken on the request matching this URL from the dropdown list.
• Redirect URL. Enter the URL to be used to redirect the client if the parameter "Deny
Response" is set to "Redirect".
To edit an Action Policy
1. Select the policy from the Policy Name drop-down list.
2. Click Edit against the default attack action.
3. Specify values for the following fields:
• Action. Select the action to be taken for an invalid request from the drop-down list.
• Deny Response. Select the response from the drop-down list to be sent to the client if the
request is denied. A deny response is used when the parameter "Action" is set to
"Protect".
• Redirect URL. Enter the URL to be used to redirect the request if the deny response is
set to "Redirect".
• Response Page. Select the response page to be sent to the client, if the parameter "Deny
Response" is set to "Send Response" from the drop-down list.
• Follow Up Action. Select the follow up action to be taken from the drop-down list if the
request is denied.
• Follow Up Action Time. Enter the time in seconds to block the client IP, if the parameter
"Follow Up Action" is set to "Block Client IP".
4. Click Save Changes to save the above settings.
58 Barracuda Web Site Firewall Administrator’s Guide
Creating a New Security Policy
Apart from the default policies, you can create customized policies. The new policy is created with
default values. You can change the default values by visiting the individual sub-policy pages and
changing the values.
To create a customized Security Policy:
1. From the SECURITY POLICIES > Policy Manager page, enter a name of the new policy under
Create New Policy and click Add.
2. The new policy with the default values is created and added to the list of policies under Policy
Overview
3. To modify a policy, go to the desired sub-policy page and select the policy from the Policy
Name
4. Change the value of the parameter(s) and click Save Changes to save and activate the new
settings.
5. Click Delete to remove a policy. All the policies can be removed except the default policy.
By default all services use the default policy. Based on your requirement you can change the policy
for a service.
To change the policy for a service
1. From the Basic > Services page, click Edit under Actions. The service page opens.
2. Select the desired policy from the Web Firewall Policy drop-down list under Basic Security.
3. Change the value of the parameter(s) and click the Save Changes button to save and activate the
new setting.
.
drop-down list.
Customized Security for Websites 59
Web Site Profiles
The WEBSITES > Web Site Profiles page uses the URL profiles and Parameter profiles created for a
service to validate the requests coming for that service. When a new service is added, a Web Site
profile is created by default and is “Off” for that service. You can modify the default settings, which
overrides the default policies. If the parameter "Use Profile" is set to "Yes", then URL Profiles and
Parameter Profiles must be created for validating the requests coming for that service. This falls in
accordance with the positive security nodes, which denies any request for which there is no URL or
Param Profile.
To edit a Web Site Profile
1. Click Edit against the created Web Site Profile. The Edit Web Site Profile dialog box opens.
2. Specify values for the following fields:
• Use Profile. Select whether to use URL profiles and parameter profiles for validating the
requests coming for this service.
• Domain. Enter the domain attribute of the session cookie and click
• Exclude URL Patterns. Enter the list of URL patterns to exclude the URL profile
validations and click
• Include URL Patterns. Enter the list of URL patterns to be included in the URL profile
validations in spite of being listed in "Exclude URL Patterns" parameter and click
• State. Select the state of the Web Site profile for this service from the drop-down list.
• Session Cookie Domain. Enter the cookie domain to be used to allow the browser to
send the cookie back to the Barracuda Web Site Firewall.
• Session Cookie Timeout. Enter the time-out for session cookie after the successful login.
0 indicates no time-out, the session lives forever.
URL Profiles are used to validate the requests coming to the service as per the settings in parameter
"State" in the Web Site Profile. You can create many URL profiles for a service.
To add a URL Profile
1. Click Add URL Profile against the created Web Site Profile. The Create URL Profile dialog box
opens.
2. Specify values for the following fields:
• URL Profile Name. Enter the name for this URL profile.
• Status. Select whether to enable this URL profile.
• URL Match. Enter the matching criterion for URL field in the Request Header. The
URL should start with a "/" and can have only one " * " anywhere in the URL. A value of
/* means that the ACL applies for all URLs in that domain.
• Extended Match. Enter an expression that consists of a combination of HTTP headers
and/or query string parameters. Use '*' to denote "any request", that is, do not apply the
Extended Match condition. For more on how to write extended match expressions, refer
Extended Match and Condition Expressions on page 107.
• Extended Match Sequence. Enter an order for matching the extended match rule when a
request matches multiple rules with the same Host Match and URL Match.
• State. Select the state for this URL profile from the drop-down list. It can be either be
“Active” or “Passive”.
60 Barracuda Web Site Firewall Administrator’s Guide
• Allow Content Types. Enter the list of allowable content-types in the POST body for a
URL.
• Hidden Parameter Protection. Select the protection for hidden parameters in the forms
and URLs from the drop-down list.
• CSRF Prevention. Select the cross-site request forging prevention for the forms and
URLs from the drop-down list. This CSRF protection is not applicable when there is no
parameter profile.
• Max Parameter Name Length. Enter the maximum length of the parameter name.
• Max Upload Files. Enter the maximum number of files that can be of file-upload type in
one request.
3. Click Add to add the above configurations.
4. Click Edit against the created URL Profile to modify the settings.
5. Click Delete against the created URL Profile to delete it.
Parameter profile
Parameter Profiles is used to validate the requests coming for this service as per the settings for the
parameter "State" under URL profile. You can create many parameter profiles for a service.
To add a Parameter Profile
1. Click Add Param Profile against the created Web Site Profile. The Create Parameter Profile
dialog box opens.
2. Specify values for the following fields:
• Parameter Profile Name. Enter the name for this parameter profile.
• Status. Select whether to enable or disable this parameter profile.
• Parameter. Enter the name of the parameter expected in the requests. No name
parameter (&noname-param) is also supported. The parameter name with the special
characters like &pathinfo and &sessionid and wildcard (*) should be manually specified.
• Type. Select the type of parameter to be validated in the requests from the drop-down
list.
• Va lu es . Enter a fixed set of strings to match against the parameter's value, if the
parameter "Type" is set to "Global Choice".
• Parameter Class. Select the parameter class to be used from the drop-down list.
• Custom Parameter Class. Select the customized parameter class to be used, if the
parameter "Parameter Class" is set to "<Custom>" from the drop-down list. Refer
Creating Custom Parameter Class on page 92 for more information.
• Max Value Length. Enter the maximum allowable length for the value of the parameter.
• Required. Select whether this parameter is required to be present always in the request,
or can it be skipped.
• Ignore. Select whether to ignore this parameter completely, that is, not to validate the
value of this parameter at all.
• Max Instances. Enter the maximum number of times this parameter is allowed.
• File Upload Extensions. Enter the list of extensions that are allowed in file uploads. '.' is
a special extension which indicates no extension, and * indicates any extension is
allowed.
3. Click Add to add the above configurations.
4. Click Edit against the created Parameter Profile to modify the settings.
5. Click Delete against the created Parameter Profile to delete it.
Customized Security for Websites 61
Web Site Translations
The WEBSITE > Website Translations page is used to set a variety of address translation rules for
application-specific packets sent through the Barracuda Web Site Firewall. It translates the internal
codes, headers, and cookies so that the actual message is concealed to the external users. It has
features for Web site cloaking and translation of URLs and headers in the requests and responses.
Configuring Request Rewrite
This policy sets rewrite rules for inbound requests. It specifies the parameters to modify incoming
request headers. It allows you to add, delete, or rewrite headers and rewrite or redirect the URL.
Request Rewrites are used for specific purposes. For example, the Barracuda Web Site Firewall fully
terminates the TCP/IP session for the original request and creates a new request using the private
interface (PIF) as the new source IP address. If you have a need for the original source IP address, you
could add a header that stores that address.
It is used to relay the actual client information back to the back-end resource. Enabling this parameter
allows a back-end resource to know exactly who is the client and from where the client is requesting
the information.
This feature is available only with the purchase of Barracuda Web Site Firewall model 460 and
higher.
To configure Request Rewrite
1. Specify values for the following fields:
• Rule Name. Enter the name for the request rewrite rule.
• Sequence Number. Enter the sequence number of this request rewrite policy. The
sequence number sets the order of execution for multiple configured policies from
highest (1) to lowest (64).
• Action. Select the request rewrite action for this policy from the drop-down list.
• Header Name. Enter the header name to match for this policy. This is required if the
action is to a header (rather than an URL).
• Old value. Enter the old value of a header or URL path to be rewritten.
• Rewrite Value. Enter the new value of a header or URL path to rewrite. This is required
if the action is to rewrite (or redirect) a header or URL.
• Rewrite Condition. Enter the condition under which the rewrite should occur. An
asterisk (*) indicates there are no conditions (applies to all). Refer Request Rewrite Condition on page 62 for more information.
• Continue Processing. Select whether to check against other (higher sequence number)
policies or stop here. This is relevant only when additional policies have been configured.
2. Click Add to add the above configurations.
Request Rewrite Condition
Request rewrite condition is an expression that consists of a combination of HTTP headers and/or
query string parameters. For HTTP headers, word "Header" should be prefixed before the header
expression and for Non-HTTP headers "Header" should not be prefixed. Define the header type (for
example, user agent or accept) for which you want an action to occur or add a wildcard to accept any
type of header.
The following are the possible operations that can be given in the expression:
62 Barracuda Web Site Firewall Administrator’s Guide
•contains, CONTAINS, co, CO - checks if the operand contains the given value.
•ncontains, nCONTAINS, nco, nCO - checks if the operand does not contain the given value.
•rcontains, rCONTAINS, rco, rCO - checks if the operand contain the given value. The given
value is interpreted as a regular expression.
•equals, EQUALS, eq, EQ - checks if the operand is equal to the given value.
•nequals, nEQUALS, neq, nEQ - checks if the operand is not equal to the given value.
•requals, rEQUALS, req, rEQ - checks if the operand is equal to the given value. The given value
is interpreted as a regular expression.
•exists, EXISTS, ex, EX - checks if the operand exists. It does not require any given value.
•nexists, nEXISTS, nex, nEX - checks if the operand does not exist. It does not require any given
value.
Each expression can be joined with another expression by using either of the following tokens:
•or, OR, || - This checks for either of the expressions are true.
•and, AND, && - This checks if both the expressions are true.
More than one expressions can be grouped together by using parenthesis '(' and ')'.
The expression consists of an operation being carried out on one of the following tokens. Each of the
following tokens are case insensitive.
Header
This refers to an HTTP header on the request path. The term "Header" should be followed by the name
of the header on which the action is to be applied.
Example: Header Accept co soap or Header Soap-Action ex
Client IP
This refers to the IP address of the client sending the request. The IP address can be either host IP
address or subnet IP address specified by a mask. Only the following operations are possible for this
token:
"EQUAL" and "NOT EQUAL"
Using any other operations are not permitted.
Example: Client-IP eq 192.168.1.0/24 (subnet IP address containing the mask)
Client-IP eq 192.168.1.10 (host IP address)
Uri
The URI is a Uniform Resource Identifier and identifies the resource upon which to apply the request.
Example: URI rco /abc*html
Method
This refers to HTTP method in the request.
Example: Method eq GET
Http Version
This refers to the version of the HTTP protocol of the request.
Example: HTTP-Version eq HTTP/1.1
Parameter
Customized Security for Websites 63
This refers to query part of the URL which is passed to the servers as a name-value pair. In addition,
the word "$NONAME_PARAM" is used to refer to the case where the parameter name is absent.
Example: Parameter sid eq 1234, Parameter $NONAME_PARAM co abcd
Pathinfo
This refers to the portion of URL which contains extra information about the path of the resource on
the server.
Example: pathinfo rco abc*
Configuring Response Rewrite
This policy sets rewrite rules for outbound responses. It allows you to add, delete, or rewrite headers.
Response Rewrites are used for specific purposes. For example, if responses include a header that lists
the source IP address you could delete that header. This would prevent users from seeing the actual
IP address of a server.
To configure Response Rewrite
1. Specify values for the following fields:
• Rule Name. Enter the name for the response rewrite rule.
• Sequence Number. Enter the sequence number of this request rewrite policy. The
sequence number sets the order of execution for multiple configured policies from
highest (1) to lowest (64).
• Action. Select the request rewrite action for this policy from the drop-down list.
• Header Name. Enter the header name to match for this policy. This is required if the
action is to a header (rather than an URL).
• Old value. Enter the old value of a header or URL path to be rewritten. This is required if
the action is to rewrite (or redirect) a header or URL.
• Rewrite Value. Enter the new value of a header or URL path to rewrite. This is required
if the action is to rewrite (or redirect) a header or URL.
• Rewrite Condition. Enter the condition under which the rewrite should occur. An
asterisk (*) indicates there are no conditions (applies to all). Refer Response Rewrite Condition on page 64for more information.
• Continue Processing. Select whether to check against other (higher sequence number)
policies or stop here. This is relevant only when additional policies have been configured.
2. Click Add to add the above configurations.
Response Rewrite Condition
Response rewrite condition is an expression that consists of a combination of HTTP headers and/or
query string parameters. For HTTP headers, word "Header" should be prefixed before the header
expression and for Non-HTTP headers "Header" should not be prefixed. Define the header type (for
example, user agent or accept) for which you want an action to occur or add a wildcard to accept any
type of header.
The following are the possible operations that can be given in the expression.
•contains, CONTAINS, co, CO - checks if the operand contains the given value.
•ncontains, nCONTAINS, nco, nCO - checks if the operand does not contain the given value.
•rcontains, rCONTAINS, rco, rCO - checks if the operand contain the given value. The given
value is interpreted as a regular expression.
64 Barracuda Web Site Firewall Administrator’s Guide
•equals, EQUALS, eq, EQ - checks if the operand is equal to the given value.
•nequals, nEQUALS, neq, nEQ - checks if the operand is not equal to the given value.
•requals, rEQUALS, req, rEQ - checks if the operand is equal to the given value. The given value
is interpreted as a regular expression.
•exists, EXISTS, ex, EX - checks if the operand exists. It does not require any given value.
•nexists, nEXISTS, nex, nEX - checks if the operand does not exist. It does not require any given
value.
Each expression can be joined with another expression by using either of the following tokens:
•or, OR, || - This checks for either of the expressions are true.
•and, AND, && - This checks if both the expressions are true.
More than one expressions can be grouped together by using parenthesis '(' and ')'.
The expression consists of an operation being carried out on one of the following tokens. Each of the
following tokens are case insensitive.
Header
This refers to an HTTP header on the request path. The term "Header" should be followed by the name
of the header on which the action is to be applied.
Example: Header Accept co soap or Header Soap-Action ex
Response Header
This refers to an HTTP header on the response path. The term "Response-Header" should be followed
by the name of the header on which the action is to be applied.
Example: Response-Header Set-Cookie co sessionid
Status Code
This refers to the status code of the response returned by the servers.
Example: Status-Code eq 200
Customized Security for Websites 65
Trusted Hosts
The WEBSITES > Trusted Hosts page allows you to designate a trusted host, that is, to specify an IP
address for which authentication is not necessary. In this case, it is assumed that any request from that
address is from an allowed user, and all user requests from that address are exempted from
authentication.
To configure a Trusted Host
1. Enter a name in Trusted Host Group Name field and click Add.
2. Click Add Host under Actions to add a trusted host under the created Trusted Host Group. The
Create Trusted Host dialog box opens.
3. Specify values for the following fields:
4. Click Add to add the above configurations.
• Truste d Host . Enter the trusted host name for which you want to exempt the security
checks.
• IP Address. Enter the IP address for the trusted host.
• Mask. Enter the associated netmask for the trusted host.
66 Barracuda Web Site Firewall Administrator’s Guide
Note
Chapter 6
Keys and Certificates
This chapter provides an introduction to the Public Key Infrastructure (PKI) technology. It also
includes a system overview of how the Barracuda Web Site Firewall uses PKI encryption to protect
traffic:
• Overview on page 68
• Creating a Test Certificate on page 71
• Loading a Certificate on page 72
For more detailed information about a specific page in the Web interface, view the online help by
clicking the question mark icon on the right side of the interface.
Keys and Certificates 67
Overview
The Barracuda Web Site Firewall uses PKI objects for Secure Socket Layer (SSL) encryption. This
technology encrypts data that is to be transmitted between a client and the Barracuda Web Site
Firewall, or between the Barracuda Web Site Firewall and Web servers. SSL encryption is the most
effective way to securely send confidential user information over the Internet. The Barracuda Web
Site Firewall includes Public Key Infrastructure (PKI) objects like keys and certificates that can be
used for SSL encryption.
The PKI technology allows secure exchange of data over the Internet. It allows successful and safe
accomplishment of the transactions such as using a credit card to purchase items online or allowing
employees’ access company’s Intranet. Unlike earlier forms of cryptography the public key
technology works with a pair of keys for authentication and encryption. This type of cryptography
starts with the creation of the two keys: a public key and a private key. The contents of a public key
is to be known by everyone, whereas the contents of a private key is secret and is known only by its
owner. This key pair is then used to encrypt and then decrypt messages sent by this owner. As the
private key remains secret and the public key is known you are able to initiate a secure communication
without having to previously share a secret through some other type of medium. Private portion of the
key pair confirms the owner’s identity.
Caution
A compromised private key is a security threat! If a private key is exposed, then the public key can
be easily derived. However, a private key cannot be derived from an exposed public key. A digital
certificate is derived from a key pair. It is an attachment to a sent message and used for security
purpose. The certificate helps verify the identity of a user that sends the message. A certificate also
provides the receiver the means to encode a reply. The most widely used standard for digital
certificates is X.509.
Most browsers require a digital certificate from a trusted third-party certificate authority (CA). In
most cases, if a browser does not recognize a certificate, it may deny a transaction or refuse access to
a secret portion of their Web site. In this case, an individual wants to send an encrypted message will
apply for a digital certificate from a trusted CA, such as VeriSign or Thawte. A CA issues a certificate
containing the applicant’s public key and other identification information. This digital certificate is
installed locally as root certificate. This enables confidential and authenticated communication with
other browsers that already have a certificate installed from the same CA.
PKI protects data sent over the Internet in the following ways:
•Authentication. an issued digital certificate that is given to a user, organization, or Web site
validates the identity of a person and then allows them to access the Web site.
•Privacy. a certificate also protects data from being intercepted during transmission.
•Integrity. a “signed” digital certificate ensures that the message or document has not been
manipulated or corrupted during transmission.
•Authorization. before certificates, users were required to give an ID and password for
authorization. This information was sometimes lost or forgotten. Certificates guarantee the
authenticity of each user.
Digital certificates that is created within the Barracuda Web Site Firewall are of the standard X.509
format. A test (user) certificate that is created is considered as self-signed.
Types of Certificates
Currently the Barracuda Web Site Firewall only supports X.509 certificate.
68 Barracuda Web Site Firewall Administrator’s Guide
X.509 Certificate
This certificate is used to encrypt a client’s session. This is an industry standard digital certificate,
which the Barracuda Web Site Firewall uses to negotiate an SSL session to a service
digital certificate can be created from scratch within the Barracuda Web Site Firewall. This certificate
is one of the most commonly used types of certificate and the International Telecommunication Union
(ITU) recommends it. This certificate is a self-signed certificate.
Certificate Usage
The Barracuda Web Site Firewall encrypts the traffic coming from a client to a back-end Web server,
and also makes server-side encryption. Standard X.509 certificates are used for the server-side
encryption. This type of certificates can either be created on the Barracuda Web Site Firewall or they
can be imported from a trusted third-party CA such as VeriSign or Thawte for the SSL encryption.
Besides server-side encryption, the Barracuda Web Site Firewall can also be used for clientauthentication. This type of encryption is used to protect services configured on the Barracuda Web
Site Firewall. The certificate received from a client’s browser acts as trusted certificate and
authenticates the client to the Barracuda Web Site Firewall.
The client-server negotiations includes the following:
•The Barracuda Web Site Firewall sends the server’s certificate to the client.
•Then the Barracuda Web Site Firewall requests the certificate in return.
.The X.509
The server is verified in the SSL handshake that allows the server and the client to authenticate each
other. This allows the alliance of the client and the server in creating symmetric keys that are used for
encryption, decryption, and tamper detection during the SSL sessions.
The Barracuda Web Site Firewall sends the server’s certificate to the client and requests the
certificate. In return, the client sends the user certificate, which is authenticated by Barracuda Web
Site Firewall using the trusted certificate.
The traffic between the Barracuda Web Site Firewall and the back-end server can either be encrypted
or unencrypted. The actual configuration of the server does not impact the SSL negotiation between
the Barracuda Web Site Firewall and the client in any way.
Certificate Components
Key Pair
The Barracuda Web Site Firewall implements an asymmetric methodology for encryption, where two
related keys are used in combination as opposed to symmetric encryption where just one key is used.
A key pair consists of a public key and a private key. They work together in such a way that one of
the key pair encrypts a message, and the other decrypts the encrypted message.
Even though the public key is known, it is still practically and mathematically impossible to deduce
the private key from the public key.
Distinguished Name (DN)
The Distinguished Name (DN) in the certificate uniquely identifies the public key owner who issues
the certificate.
Keys and Certificates 69
Token
A token is a cryptographic item used for secure storage and transfer of private interface and
certificate. Currently, the Barracuda Web Site Firewall supports only the PKCS12-type token. The
PKCS12 token can be loaded onto the Barracuda Web Site Firewall from a remote system or saved
from the Barracuda Web Site Firewall onto a remote system.
CA Certificate
A CA certificate is a third-party certificate that a CA issues and is part of trust between a root CA and
a certificate installed in the Barracuda Web Site Firewall. This certificate can be added to a certificate
chain, where it is used for encryption and authentication. Some browsers require that a certificate
should be from a known source (such as VeriSign), before communication between a client and a
server occurs.
70 Barracuda Web Site Firewall Administrator’s Guide
Creating a Test Certificate
Another PKI object that can be created from scratch within the Barracuda Web Site Firewall is an
X.509 digital certificate. This certificate is one of the most commonly used types of certificate and
the International Telecommunication Union (ITU) recommends it. However, it is not defined as the
industry standard for certificates. This means that an X.509 certificate generated by the Barracuda
Web Site Firewall may or may not be readable by a Web server or a Web browser.
This certificate is a self-signed certificate and is also called as a user certificate.
To create a test certificate do the following:
1. Select BASIC > Server Certificates > Certificate Generation.
2. Click the Create Certificate button. Certificate Generation dialog box opens. Enter the following
information:
2a. Certificate Name - Enter a name to identify this certificate.
2b. Common Name (CN) - Enter the domain name (DN) that is used to access the
Barracuda Web Site Firewall's Web interface. For example: "barracuda.domain.com".
2c. Country - Enter the two-letter country code for this new DN.
2d. State or Province Name - Enter the state's complete name for this DN.
2e. Locality Name - Enter a location's complete name for this DN.
2f. Organization Name - Enter the organization's complete name for this DN.
2g. Organization Unit Name - Enter the organization's division or unit for this DN.
3. Click the Generate Certificate button.
Keys and Certificates 71
Loading a Certificate
The BASIC > Server Certificates > Upload Certificate section allows CA certificates to be uploaded
on Barracuda Web Site Firewall.
Signed Certificate
A signed-certificate is a certificate obtained from the third party CA organization (such as VeriSign
or Thawte) to be used for SSL encryption. When uploading a signed certificate as a PKCS #12 token,
it is mandatory that the file should be with .pfx extension, otherwise it is treated as *.pem file.
To upload a Signed Certificate
1. Specify values for the following fields:
• Certificate Name. Enter the name of the certificate.
• Upload Signed Certificate. Click
• Certificate Password. Enter the password for the certificate only if its in PKCS12 token.
2. Click Upload Now to upload the signed certificate.
Certificate Key
Browse to upload a signed certificate.
A private-key is the secret portion of an encryption/decryption key pair. Only the person exchanging
a secure transaction should know it. Click
a X.509 certificate. This key must be unencrypted and it should be in PEM format.
Intermediary Certificates
Intermediary certificates are the are the CA certificates in PEM format. Click Browse to upload an
intermediary certificate. You can add a single or a set of intermediary CA certificates by clicking the
‘+’ button.
Browse to upload an unencrypted private key to accompany
72 Barracuda Web Site Firewall Administrator’s Guide
Note
Chapter 7
Monitoring, Reporting and Logging
This chapter provides information about the various types of logs and reports available for the
Barracuda Web Site Firewall. The following topics are covered:
• Monitoring Barracuda Web Site Firewall on page 74
• Logs on page 77
• Reports on page 80
For more detailed information about a specific page in the Web interface, view the online help by
clicking the question mark icon on the right side of the interface.
Monitoring, Reporting and Logging 73
Monitoring Barracuda Web Site Firewall
This section describes the monitoring tasks you can perform from the Web administration interface
and from the front panel of the Barracuda Web Site Firewall. This section covers the following topics:
Monitoring the Health of Services..................................................... 74
Automating the Delivery of System Alerts.........................................75
Viewing System Tasks......................................................................... 75
Understanding the Indicator Lights...................................................75
Viewing Performance Statistics
The BASIC > Status provides an overview of the health and performance of your Barracuda Web Site
Firewall, including:
•Traffic statistics, which shows the number of requests for various types of traffic since the last
system reset.
•Subscription status of Energize Updates.
•Performance statistics, such as CPU temperature and system load. Performance statistics
displayed in red signify that the value exceeds the normal threshold.
•Hourly and daily traffic statistics.
The following table describes the various health indicators displayed for the system:
Performance IndicatorDescription
GreenThe component is working fine.
OrangeIndicates warning. The component configuration is more or less
than the standard limit.
RedIndicates danger. Needs immediate attention.
Monitoring the Health of Services
The Basic > Services page display the health of your Service.
The following table describes the various health indicators displayed for Services.
Service Health IndicatorDescription
Green dotService is up and all servers are responding.
Orange dotService is up but atleast one server is not responding.
Red dotService is down and all servers are not responding.
74 Barracuda Web Site Firewall Administrator’s Guide
Automating the Delivery of System Alerts
The Basic > Administration page allows you to configure the Barracuda Web Site Firewall to
automatically email notifications to the addresses you specify. To enter multiple addresses, separate
each address with a comma.
System alerts notify you when:
•Your Energize Update subscription is about to expire
•New firmware updates are available
•Your system is low on disk space
Viewing System Tasks
The Advanced > Task Manager page provides a list of tasks that are in the process of being performed
and also displays any errors encountered when performing these tasks.
Some of the tasks that the Barracuda Web Site Firewall tracks include:
•Cluster setup
•Configuration restoration
If a task takes a long time to complete, you can click the
run the task at a later time when the system is less busy.
The Task Errors section will list an error until you manually remove it from the list. The errors are not
phased out over time.
Understanding the Indicator Lights
The Barracuda Web Site Firewall has five indicator lights on the front panel that blink when the
system processes any traffic.
Figure 7.1 displays the location of each of the lights.
Figure 7.1: Indicator Lights
Table 7.1 describes each indicator light.
Cancel link next to the task name and then
Table 7.1: Description of the Indicator Lights
LightColorDescription
RedReserved for future use
YellowReserved for future use
Monitoring, Reporting and Logging 75
Table 7.1: Description of the Indicator Lights (Continued)
LightColorDescription
Traffic GreenBlinks when the Barracuda Web Site Firewall
processes traffic.
Data I/O GreenBlinks during data transfer.
PowerGreenDisplays a solid green light when the system is
powered on.
76 Barracuda Web Site Firewall Administrator’s Guide
Logs
The Barracuda Web Site Firewall has comprehensive logging feature to record occurrence of
significant events. Events related to http traffic, action of web firewall and user actions are captured
and made available to the administrator through the user interface. These log messages enable the
system administrators to:
•obtain information about the Barracuda Web Site Firewall traffic and performance
•analyze logs for suspicious activity
•troubleshoot the problems
The following types of logs are available in Barracuda Web Site Firewall:
•Web Firewall Logs. All the actions/events on the web firewall are logged under web firewall
logs. These logs help the administrator to analyze the traffic for suspicious activity and also fine
tune the web firewall policies.
•Access logs. All web traffic activities are logged under the access logs. These logs helps the
administrator to obtain information about the web site traffic and performance.
•Audit logs. All administration and configuration activities of the administrator are captured
under the audit logs. This information can be used for audit purpose.
Every log in the Barracuda Web Site Firewall has a level associated with it, which indicates the
severity of the logs. An administrator can configure what level of logs should be recorded and control
the volume of logs been persisted.
Apart from persisting the logs in the internal storage, Barracuda Web Site Firewall also has the
capability to configure an external syslog server, for persistent external storage.
Web Firewall Logs
The BASIC > Web Firewall Logs page allows you to view the generated log messages stored in a
syslog server or the buffer. Use the built-in filters to quickly locate specific types of log entries. Click
Preferences to set the number of messages to be displayed per page.
Click
Back or More to toggle between different pages of log entries. The logging of Web Firewall
Logs are enabled by default.
To configure the log level for Web Firewall Logs
1. From the BASIC > Services page, click Edit against the service.
2. On the Edit page, under the Basic Security section, select the Web Firewall Log Level from the
drop-down list. A lower level signifies lesser information logging.
3. Click Save Changes to save the above settings.
Access Logs
The BASIC > Access Logs page allows you to view the generated log messages stored in a syslog
server or the buffer. Use the built-in filters to quickly locate specific types of log entries. Click
Preferences to set the number of messages to be displayed per page.
Monitoring, Reporting and Logging 77
Click Back or More to toggle between different pages of log entries. Access Logs are enabled by
default. To disable Access Logs, on
Enable Access Logs parameter to Off.
To disable Access Logs
1. From the BASIC > Services page, click Edit against the service.
2. On the Edit page, under the Services section, set the Enable Access Logs to “Off”.
3. Click Save Changes to save the above settings.
Audit Logs
The BASIC > Audit Logs page allows you to view the generated log messages stored in a syslog server
or the buffer. Use the built-in filters to quickly locate specific types of log entries. Click
to set the number of messages to be displayed per page.
Click
In the following situations there won't be any logout logs in Audit Logs:
•When Barracuda Web Site Firewall is restarted because other critical processes crashed, the
current existing sessions won't be logged out. So audit logs will not have corresponding logout
logs.
•When maintenance command is executed by user or by Barracuda Web Site Firewall, the
current existing sessions won't be logged out. Hence audit logs will not have corresponding
logout logs.
BASIC > Services page, click Edit against the service and set the
Preferences
Back or More to toggle between different pages of log entries.
Syslog
Note
In the following situations there will not be any login logs in Audit Logs:
•When maintenance command is executed by user or by Barracuda Web Site Firewall, a new
login session will be created in maintenance mode, but it won't be logged.
The ADVANCED > Syslog page is a standard UNIX/Linux tool for sending remote system logs and is
available on all UNIX/Linux systems. Syslog servers are also available for Windows platforms from
a number of free and premium vendors. Barracuda Networks has tested with a Windows freeware
syslog server from Kiwi Enterprises (www.kiwisyslog.com). Barracuda Networks makes no
guarantees that your Barracuda Web Site Firewall will be completely compatible with this syslog
server.
To configure System Logs
1. From the ADVANCED > Syslog page, under the System Logs Syslog Configuration section,
enter the IP address to send syslog data related to generic system events.
2. Click Save Changes to save the above settings.
3. Click Monitor Syslog to view the system logs.
This syslog data appears on the local0 facility with events at various priority levels on the specified
syslog server.
78 Barracuda Web Site Firewall Administrator’s Guide
To configure Application Logs
1. From the ADVANCED > Syslog page, under the Application Logs Syslog Configuration section,
2. Click Save Changes to save the above settings.
Note
Different facilities are specified to distinguish between the log type as all the log types go to the
same syslog server. They are: Web Firewall Logs: local0; Web Logs: local1; Audit Logs: local2.
Search Logs
You can use filters and the search option to quickly locate specific types of log entries.
To use the search criteria
1. Select the filter column and appropriate operator from the drop-down list and enter the value.
2. Click ‘+’ to add more search fields and ‘-’ to remove it. Multiple search criterion can be
3. Specify the complete timestamp while searching for the log messages generated within the
4. While using multiple search criterion, same fields cannot be specified more than once.
5. Click Back or More to toggle between different pages of log entries.
enter the IP address to send syslog data related to structure Application Logs.
Search, to display the audit logs pertaining to the filter specified.
Click
specified, which will result in an ‘And’ combination of the filters.
specified period.
Note
6. You can specify regular expressions (Regexp) for some selected fields.
The ‘Or’ operation is not supported by Barracuda Web Site Firewall.
Monitoring, Reporting and Logging 79
Reports
Available Reports
This section is intended for users who need to configure and generate reports. It describes the
procedures for generating reports on various categories. The generated reports help the system
administrators in their day-to-day security management and statistical analysis of the log messages.
The reporting feature augments the management capabilities available with the Barracuda Web Site
Firewall. Using this module, reports can be generated based on all the logged information.
Reports can be run immediately or queued and emailed after the report is processed. The reports can
be displayed as a pie or (vertical and horizontal) bar chart. The following reports are available in
Barracuda Web Site Firewall:
•Top Denied Clients
•Top Attacked Services
•Top Attacked URLs
•Top Clients by Requests
•Top Services by Requests
•Top URLs by Requests
•Top Clients by Bandwidth
•Top Services by Bandwidth
•Top URLs by Bandwidth
Generate Report
You can generate a report on all the logged information for various events on the Barracuda Web Site
Firewall by specifying the report type and date/time range for the report. The report can be run
immediately or it can be queued and emailed after the report is processed. Only one report is created
at a time, to prevent overloading the Barracuda Web Site Firewall.
Note
Reports run immediately can potentially consume too many system resources on the Barracuda
Web Site Firewall. Due to this potential hazard, reports over 7 days in length can only be generated
through email.
Report Properties
Use the Report Properties settings to change the number of results displayed in a report and the type
of chart used in the report. Apply these settings both to reports sent via email and reports generated
to be viewed on the screen.
80 Barracuda Web Site Firewall Administrator’s Guide
Note
Chapter 8
High Availability
This chapter describes the configuration and monitoring tasks you can perform from the Web
interface. The following topic is covered:
• Creating a High Availability (HA) Environment on page 82
For more detailed information about a specific page in the Web interface, view the online help by
clicking the question mark icon on the right side of the interface.
High Availability 81
Creating a High Availability (HA) Environment
The ADVANCED > High Availability page allows you to link a second Barracuda Web Site Firewall to
act as a backup to your primary as shown in Figure 8.1. Both systems must be located on the same
network, if the primary unit is down for any reason, the backup unit assumes and inherits the work of
the primary unit. This provides continuous network availability. The Barracuda Web Site Firewall
uses ports 8001 and 8002 to synchronize configuration between linked systems.
Figure 8.1: High Availability Pair of Barracuda Web Site Firewall
Each linked Barracuda Web Site Firewall sends a custom “heartbeat” to the other using UDP, to let
each other know that they are up and running. The backup unit automatically becomes active and
takes over the services of the primary system, if the primary system fails to send a heartbeat for nine
(9) seconds or if it receives a heartbeat with primary unit’s state as “failed”.
Before adding two systems in a cluster, each Barracuda Web Site Firewall must meet the following
requirements:
•Be installed on a unique WAN IP address. The Barracuda Web Site Firewalls use the WAN IP
address (UDP port) to communicate for HA.
•Be able to ping each other on the WAN interface.
•The WAN interface on both Barracuda Web Site Firewall must be on the same switch (or
physical network).
To link two Barracuda Web Site Firewalls together:
1. Complete the installation process for each system as described in Chapter 3 Initial Setup.
2. From the ADVANCED > Task Managerpage on Barracuda Web Site Firewall 1, verify that no
processes are running. Complete this step on Barracuda Web Site Firewall 2 as well. No
processes should be running when you link systems together.
3. From the ADVANCED > High Availability page on Barracuda Web Site Firewall 1, enter the
Cluster Shared Secret password, and click
4. From the ADVANCED > High Availability page on Barracuda Web Site Firewall 2:
4a. Enter the Cluster Shared Secret password. Both units in a cluster must have the same
cluster shared secret to communicate. Click
4b. In the Clustered Systems section, enter the WAN IP address of Barracuda Web Site
Firewall 1, and click
Join Cluster. The unit from which the Join Cluster is executed
Save Changes.
Save Changes.
becomes the designated backup unit. That is, Barracuda Web Site Firewall 1 becomes
primary and Barracuda Web Site Firewall 2 becomes backup.
5. Refresh the ADVANCED > High Availability page, and verify that:
• Each system’s WAN IP address appears in the
Clustered Systems list.
• The status is green for both units. This indicates the communication status.
82 Barracuda Web Site Firewall Administrator’s Guide
The High Availability Status can be viewed from BASIC > Status > Performance Statistics
6.
page. This shows the role and state of that unit.
Figure 8.2 and Figure 8.3 shows how this section would look before and after the second Barracuda
Web Site Firewall has been clustered with the primary unit.
Figure 8.2: An unclustered Barracuda Web Site Firewall 2
Make sure the
status is green.
IP address of the primary
Barracuda Web Site Firewall
Figure 8.3: Two clustered Barracuda Web Site Firewalls
Make sure the
Make sure both IP addresses
appear in this list.
status is green.
Evaluating System Status
A Barracuda Web Site Firewall can be in a number of system states when it is in cluster. Once two
Barracuda Web Site Firewalls are configured in redundant mode, you can view their system states
Performance Statistics section against High Avail. Status in the BASIC > Status page. When
under
a single unit is deployed High Avail. Status is displayed as Stand-alone.
The following table describes the possible system states.
Table 8.1: System Status
StateDescription
Active• The Barracuda Web Site Firewall is powered up, all processes are running, the
hardware is operating properly. The unit is capable of actively serving requests
coming for services (if any).
Standby• The Barracuda Web Site Firewall is powered up, all processes are running, the
hardware is operating properly. The unit is ready to assume services (if any).
Failed• The Barracuda Web Site Firewall is powered up, but the physical link status of an
interface (WAN, LAN or Management) is down or Data Path Process has crashed.
If the unit is in failed state, then the services should failover to the other unit, if the
other unit is standby or active.
High Availability 83
Failover
Failover is the process of moving active services from the primary unit to the backup unit when the
primary unit is in the failed state. The backup unit should not be in a failed state in order to take over
services. On failover, the backup unit assumes the services of the failed unit. It will continue to
process the traffic until the failed unit is restored. Failover can occur in three ways:
1. Link Down: If the parameter Monitor link for WAN IP Configuration, LAN IP
Configuration and Management IP Configuration is set to “Ye s” in
Configuration
page and when the link is down for any one of these interfaces, then the system
BASIC > IP
goes into a failed state.
2. Data Path Process Crash: If the system had an outage, particularly, if the process has been
crashing frequently, the system will be placed in the failed state. The frequency is measured by
number of crashes in the last 5 minutes. If 3 crashes occur within the last 5 minutes, the system
goes into failed state.
3. Lost Heartbeat: When the backup unit does not receive a heartbeat from WAN interface on the
primary unit for 9 seconds, it concludes that the primary unit is down or dead and it executes
failover.
Failback
Failback is an operation that restores the functioning of services that have failed over from the primary
unit to the backup unit. When the primary unit is returned from a failed state to the active state (that
is, capable of actively serving application requests), the services will be automatically failed back
(released) from the backup unit. The backup unit now goes into standby state.
Data Propagated to Linked Systems
Linking systems together not only makes it easier to manage the two Barracuda Web Site Firewalls,
but it also provides 100 percent redundant coverage of the propagated data. Synchronization of the
configuration takes place every 5 minutes on both units. Table 8.2 identifies the data that is
propagated when two systems are linked.
Table 8.2: Data Propagated Between Linked Systems
Propagated DataData Not Propagated
Any configuration changes through the
Administration interface.
• System IP configuration (IP address, netmask, gateway, and
DNS server) and Monitor Link information configured on the
BASIC > IP Configuration page.
• System password and time zone as configured on the
BASIC > Administration page.
Updating Redundant Barracuda Web Site Firewalls
Updating the Firmware on a redundant pair of Barracuda Web Site Firewalls can be done without loss
of services.
Do the following to upgrade the Firmware:
1. Download the new version of the Firmware on both units.
2. After downloading, first apply the new version on the backup unit, this reboots the unit. Wait
until backup unit comes up.
84 Barracuda Web Site Firewall Administrator’s Guide
Apply the new version on the primary unit, this reboots the unit. For a small period of time,
3.
services may failover to the backup unit (because it may not receive the heartbeat from the
primary unit while it is rebooting, and it will assume services). Once the primary has rebooted
successfully, it will resume services and the backup will relinquish.
Note
For seamless HA functionality, ensure that both the units have the same firmware version. Step 3
can be postponed to a later time, but the caveats of the database version and the heartbeat version
may come into force during the period where there is a mismatch.
Removing units from a cluster
A Barracuda Web Site Firewall can be removed from a cluster at any time. When removing a unit
from a cluster, make sure that none of the units assume the ownership of interfaces and/or services.
This can cause IP conflicts and services to go down.
Do the following to remove the units:
1. Take backups of both the units.
2. Ensure that the primary is active and handling traffic.
3. From the ADVANCED > High Availability page of the backup unit, remove the cluster by clicking
the delete button in the
4. From the ADVANCED > High Availability page of the primary unit, remove the cluster by
clicking the delete button in the
Clustered Systems list. This clears the backup configuration.
Clustered Systems list. This retains the configuration of the
primary unit, but removes the peer information from the configuration database.
Removing the units for RMA
Before attempting RMA, it is required to remove from the cluster. This is because, the serial number
is used to identify the peer and communicate between the two units. A replacement unit with a
different serial number will not be able to automatically become part of the cluster; it has to go
through the clustering procedure.
There are two scenarios for replacing the units:
•when the primary is dead. There are two ways to replace a primary unit:
• backup unit to become the new primary
• the new unit assume the role of the primary
•when the backup unit is dead
To remove the cluster when the primary is dead:
1. To replace backup unit as the new primary unit.
1a. Take a backup on the backup unit.
1b. Ensure that the backup is active and handling traffic.
1c. From the ADVANCED > High Availability page of the backup unit, remove the cluster by
clicking the delete button in the
1d. Configure a new unit with the primary unit’s WAN IP address in BASIC > IP
Configuration
1e. From the ADVANCED > High Availability page of the new unit, enter the WAN IP
page.
address of the new unit, and click
Clustered Systems list.
Join Cluster.
High Availability 85
To replace the new unit as primary unit, the pre-requisites are:
2.
• A backup of the primary unit exists before it went down
• A down-time period is planned
2a. Take a backup on the backup unit.
2b. Ensure that the backup is active and handling traffic.
2c. From the ADVANCED > High Availability page of the backup unit, remove the cluster by
clicking the delete button in the
2d. Configure a new unit with the primary unit's WAN IP address.
2e. Clear all configuration on the backup unit (this is required so that the services are
Clustered Systems list.
stopped).
2f. Restore the Primary unit's backup on the new unit. Note that this is not the backup taken
in Step 1. Now, the primary assumes the services.
2g. From the ADVANCED > High Availability page of the old backup unit, enter the WAN IP
address of the new primary unit, and click
Join Cluster.
To remove the cluster when the backup is dead:
1. Ensure that the primary is active and handling traffic.
2. From the ADVANCED > High Availability page of the primary unit, remove the cluster by
clicking the delete button in the
3. Configure the new unit with the old backup unit’s WAN IP address in BASIC > IP Configuration
Clustered Systems list.
page.
4. From the ADVANCED > High Availability page of the new backup unit, enter the WAN IP
address of the new backup unit, and click
Join Cluster.
86 Barracuda Web Site Firewall Administrator’s Guide
Note
Chapter 9
Advanced Concepts
This chapter describes the advance security configurations you can perform on the Barracuda Web
Site Firewall. The following topics are covered:
• Deployment on page 88
• Security on page 90
For more detailed information about a specific page in the Web interface, view the online help by
clicking the question mark icon on the right side of the interface.
Advanced Concepts 87
Deployment
The ADVANCED > Advanced IP Config pages allows you to configure advanced IP configurations for
the Barracuda Web Site Firewall.
Multiple IP Address Configuration
The Multiple IP Address Configuration section allows you to add virtual interface(s) to the physical
port (WAN or LAN or MGMT) used to communicate with the servers. This interface is a logical exit
point that allows traffic to safely and securely travel between the Barracuda Web Site Firewall and
the servers. This lists all service IP addresses along with the virtual interfaces.
To configure Multiple IP Addresses
1. Specify values for the following fields:
2. Click Add to add the above configurations.
• IP/Network Address. Enter an IP address to communicate with the servers.
• Netmask. Enter an associated netmask for this interface.
• Network Interface. Select the interface over which communication will be transmitted.
To do this, select either WAN or LAN or MGMT. (Back-end traffic is normally over
LAN.)
Static Routes
The Static Routes section allows you to create a static route to specify the exact route to a remote
network. This allows you to route an interface that is located on a different subnet.
To configure Static Routes
1. Specify values for the following fields:
• IP/Network Address. Enter the IP address of the destination in a route entry. An address
of 0.0.0.0 indicates this route applies to any destination IP address.
• Netmask. Enter the mask for the route entry. The destination and the mask together
define the set of destinations that can be reached through this route. An address of 0.0.0.0
indicates this route applies to any destination mask.
• Gateway Address. Enter the IP address of the network gateway.
2. Click Add to add the above configurations.
3. Click Bulk Edit to perform multiple changes to a list of configuration settings in one step. The
above values is translated into CSV (Comma-Separated Values) format and displayed in the
Bulk Edit window. From there, you can manually add, modify or remove as many rows as you
desire and click
Interface Routes
Save Changes.
The Interface Routes section allows you to create an interface route to specify the interface to use for
remote network. This is useful in the bridge mode where the service IP address is not owned by the
Barracuda Web Site Firewall.
88 Barracuda Web Site Firewall Administrator’s Guide
To configure Interface Routes
1. Specify values for the following fields:
• IP/Network Address. Enter an IP address which has to be routed through the interface.
• Netmask. Enter an associated netmask for this interface route.
• Network Interface. Select the interface over which communication will be transmitted.
To do this, select either WAN or LAN or MGMT.
2. Click Add to add the above configurations.
Advanced Concepts 89
Security
Creating Identity Theft Patterns
The following topics discuss the different data patterns used for advanced security. In addition, a
pattern can also be associated with an algorithm. The algorithm is then run on all strings matching the
regular expression to determine whether they actually conform to this pattern.
The ADVANCED > Libraries > Identity Theft Patterns allows you to add customized Identity Theft
data type apart from the default data types that are available under
page. One or more "patterns" which define the format of the data type can be added to each group.
Identity theft is the unauthorized collection and use of your personal information like name, address,
telephone number, credit card, and so on, for unauthorized and malicious purposes. Your personal
data like Social Security number, bank account or credit card number, telephone calling card number,
and other valuable identifying data can be used to personally profit them at your expense, if they fall
into the wrong hands.
To create customized Identity Theft Data Type
1. Enter the name for the New Group and click Add.
2. Against the newly created group click Add Pattern.
3. Specify values for the following fields:
• Pattern Name. Enter a name for the pattern.
• Status. Select whether to enable or disable this pattern. Only patterns with status set to
"On" are used for actual pattern matching.
• Pattern Regex. Enter the regular expression of the pattern. It recognizes the lexical
patterns in text.
• Pattern Algorithm. Select the algorithm for the pattern from the drop-down list.
• Case Sensitivity. Select whether the pattern regular expression is to be treated as case
sensitive or case insensitive from the drop-down list.
• Pattern Description. Enter the description for the pattern used. For example, Visa credit
card pattern. This indicates that the pattern used here is the visa credit card pattern.
4. Click Add to add the above configurations.
Advanced > View Internal Patterns
The added identity theft pattern becomes available under
Protection
which lists out all the newly added identity theft patterns.
. Select the Identity Theft Type as “<CUSTOM>” and click the Custom Identity Theft Type,
Using Custom Patterns
A pattern describes a data type format. When a data type is bound to an attack, all user input matching
the ACL is scanned for strings corresponding to any enabled pattern. The pattern format is defined
with a regular expression. In addition, a pattern can also be associated with an algorithm. The
algorithm is then run on all strings matching the regular expression to determine whether they actually
conform to this pattern.
Similarly, when a data type is bound to a data theft element, all server pages are scanned for strings
matching any enabled pattern in the data type.
90 Barracuda Web Site Firewall Administrator’s Guide
SECURITY POLICIES > Data Theft
Creating Attack Types
The ADVANCED > Libraries > Attack Types allows you to add customized Attack data type apart from
the default data types that are available under
"patterns" which define the format of the data type can be added to each group.
Attack is request based while identity theft is response based. You can define the list of items that a
request should not contain. If a request contains the patterns described here, then the request will be
dropped. For example, the attack can be SQL injection or OS command injection or cross site
scripting.
To create customized Attack Type
1. Enter the name for the New Group and click Add.
2. Against the newly created group click Add Pattern.
3. Specify values for the following fields:
• Pattern Name. Enter a name for the pattern.
• Status. Select whether to enable or disable this pattern. Only patterns with status set to
"On" are used for actual pattern matching.
• Pattern Regex. Enter the regular expression of the pattern. It recognizes the lexical
patterns in text.
• Pattern Algorithm. Select the algorithm for the pattern from the drop-down list.
• Case Sensitivity. Select whether the pattern regular expression is to be treated as case
sensitive or case insensitive from the drop-down list.
• Pattern Description. Enter the description for the pattern used. For example, Visa credit
card pattern. This indicates that the pattern used here is the visa credit card pattern.
4. Click Add to add the above configurations.
Advanced > View Internal Patterns page. One or more
The added attack type pattern becomes available under
Class > Add Custom Parameter Class > Custom Blocked Attack Types
enabled by default. Also it is available under
Blocked Attack Types
Creating Input Types
The ADVANCED > Libraries > Input Types allows you to add customized input type apart from the
default input types that are available under
"patterns" which define the format of the input type can be added to each group.
Includes a collection of pre-defined and custom input data types, which can be used to validate HTTP
Request parameters. This validates the inputs entered in the fields available in the forms used. Most
of the attacks can be prevented by properly validating input parameter values against the expected
input. Input Type validation enforces the expected value type as opposed to looking for malicious
values. Values of configured parameters are validated against the specified Input Type and requests
with failed validations are detected as intrusions and blocked.
Input Types are defined using reg-ex patterns. Input Types for alpha-numeric strings, credit card, date
and positive-long-integer are provided by default. Custom Input Types can be created and used in the
validation.
To create customized Input Type
1. Enter the name for the New Group and click Add.
ADVANCED > Libraries > Custom Parameter
as check box(es), which is
SECURITY POLICIES > Parameter Protection > Custom
as check box(es), which is to be manually selected.
Advanced > View Internal Patterns page. One or more
Advanced Concepts 91
Against the newly created group click Add Pattern.
2.
3. Specify values for the following fields:
• Pattern Name. Enter a name for the pattern.
• Status. Select whether to enable or disable this pattern. Only patterns with status set to
"On" are used for actual pattern matching.
• Pattern Regex. Enter the regular expression of the pattern. It recognizes the lexical
patterns in text.
• Pattern Algorithm. Select the algorithm for the pattern from the drop-down list.
• Case Sensitivity. Select whether the pattern regular expression is to be treated as case
sensitive or case insensitive from the drop-down list.
• Pattern Description. Enter the description for the pattern used. For example, Visa credit
card pattern. This indicates that the pattern used here is the visa credit card pattern.
4. Click Add to add the above configurations.
The added input type pattern becomes available under
Class > Add Custom Parameter Class
Custom Input Type Validation, which lists out all the newly added input types.
the
. Select the Input Type Validation as “<CUSTOM>” and click
Creating Custom Parameter Class
The ADVANCED > Libraries > Custom Parameter Class allows you to add customized paramater
classes apart from the internal parameter class that are available under
Patterns
group.
To create customized Parameter Class
1. Click Add Custom Parameter Class. The Add Custom Parameter Class dialog box opens.
2. Specify values for the following fields:
3. Click Add to add the above configurations.
page. One or more "patterns" which define the format of the data type can be added to each
•Name. Enter the name for this custom parameter class.
• Input Type Validation. Select the expected type for the configured parameter from the
drop-down list. Most of the attacks could be prevented by properly validating input
parameter values against the expected input.
• Custom Input Type Validation. Select the expected custom input data type for the
configured parameter. You need to create your own custom types.
• Denied Metacharacters. Enter the meta-characters to be denied in this parameter value.
• Blocked Attack Types. Select the check box(es) to detect malicious patterns in the
configured parameter. An intrusion is detected when the value of the configured
parameter matches one of the specified Attack Types and the request is blocked.
• Custom Blocked Attack Types. Select the custom attack type check box(es) to be used
to detect the intrusions.
ADVANCED > Libraries > Custom Parameter
ADVANCED > View Internal
The added custom parameter class becomes available under
Profile > Param Profile
“<CUSTOM>” and click the
. When you add/edit a param profile, select the Parameter Class as
Custom Parameter Class, which lists out all the newly added custom
parameter classes.
92 Barracuda Web Site Firewall Administrator’s Guide
WEBSITES > Web Site Profile > URL
Creating a Customized Response Page for Errors
The ADVANCED > Libraries > Response Pages allows you to create a customized HTML response
page for HTTP requests that violate security policies on the Barracuda Web Site Firewall. You can
either edit the available default response page or add customized response pages that can be shared
among multiple services.
• Response Page Name. Enter the name for this response page.
• Status Code. Enter the HTTP status code for this response page.
• Headers. Enter the response headers for this response page.
• Body. Enter the response body for this response page.
3. Click Add to add the above configurations.
The added custom response page becomes available under
a new URL ACL, select the
lists out all the newly added response pages. Also it is available under
. Click Edit against any action policy, the Response Page lists out all the newly added response
Policy
pages.
View Internal Patterns
The ADVANCED > View Internal Patterns page displays the details of different regex patterns grouped
under Identity Theft Patterns, Attacked Types, Input Types and Parameter Classes. For detailed
information refer Security on page 90. This is a read only page.
WEBSITES > Allow/Deny. When you add
Deny Response as "Response Page" and click Response Page, which
SECURITY POLICIES > Action
Advanced Concepts 93
94 Barracuda Web Site Firewall Administrator’s Guide
Chapter 10
Administrating the Barracuda Web Site Firewall
This chapter provides general instructions for administrating and maintaining the Barracuda Web Site
Firewall. This chapter covers the following topics:
• Administrative Settings on page 96
• Maintaining the Barracuda Web Site Firewall on page 99
Administrating the Barracuda Web Site Firewall 95
Administrative Settings
This section covers the basic administrative settings for your Barracuda Web Site Firewall.
Controlling Access to the Administration Interface..............................96
Customizing the Appearance of the Web Interface............................ 96
Setting the Time Zone of the System.................................................. 96
Enabling SSL for Administration....................................................... 96
Controlling Access to the Administration Interface
The BASIC > Administration page allows you to perform the following tasks:
•Change the password of the administration account.
•Specify the IP addresses or netmask of the systems that can access the Web interface. All other
systems will be denied access. This is configured in the Administrator IP/Range section.
•Change the port used to access the Web administration interface.
•Change the length of time users can be logged into the Web interface (default is 60 minutes).
Customizing the Appearance of the Web Interface
The ADVANCED>Appearance page allows you to customize the default images used on the Web
interface.
Setting the Time Zone of the System
The BASIC > Administration page allows you to set the time zone of your Barracuda Web Site
Firewall. The current time on the system is automatically updated via Network Time Protocol (NTP).
It is important that the time zone is set correctly because this information is used to coordinate traffic
distribution and in all logs and reports.
Note: The Barracuda Web Site Firewall automatically reboots when you change the timezone.
Enabling SSL for Administration
The ADVANCED>Secure Administration page allows you to configure SSL for the administration
Web interface for your Barracuda Web Site Firewall. Click
SSL not only ensures that your passwords are encrypted, but also ensures that the rest of the data
transmitted to and received from the administration interface is encrypted as well. For users who want
to only allow secured connection, set up SSL.
Save Changes after making any changes.
96 Barracuda Web Site Firewall Administrator’s Guide
Note
The SSL configuration referred to here is related only for the Web-based administrative interface.
To enab le S SL
1. Select ADVANCED > Secure Administration.
2. Select Yes to enable HTTPS/SSL access only.
3. Enter the HTTPS port. The default is 443.
The following table describes the fields on the
Advanced > Secure Administration page
Table 10.1: SSL Fields
FieldDescription
Web Interface HTTPS/SSL Configuration
HTTPS/SSL access onlySelect Ye s to enable SSL and only allow access to the Web
administration interface via SSL. Select No to use standard
HTTP access.
Web Interface HTTPS/SSL portThe SSL port used by the Barracuda Web Site Firewall.
Default port for SSL is 443.
SSL Certificate Configuration
Certificate TypeSelect one of the following certificates for SSL:
• Default (Barracuda Networks) certificates are free but
generate browser alerts. The default certificate is signed
by Barracuda Networks and provided free as the default
type of certificate.
• Private (self-signed) certificates provide strong
encryption without the cost of purchasing a certificate
from a trusted certificate authority (CA). However Web
browsers cannot verify the authenticity of the certificate
and therefore display a warning every time a user
accesses the administration interface.
• Tr us ted certificates are issued by trusted Certificate
Authorities (CA), which are usually recognized by your
Web browser so no additional configuration is required.
Administrating the Barracuda Web Site Firewall 97
Table 10.1: SSL Fields (Continued)
FieldDescription
Certificate Generation
Organization InfoThe information stored in your certificates and Certificate
Signing Requests. Provide the following information:
• Common Name is the fully qualified domain name used
to access the administration interface. For example:
“barracuda.yourdomain.com”
• Country is the two-letter country code where your
organization is located.
• State or Province Name is the full name of the state or
province where your organization is located.
• Locality Name is the city where your organization is
located.
• Organization Name is the legal name of your company
or organization.
• Organization Unit Name is an optional field in which to
specify a department or section within your organization.
Trusted Certificate
Upload Signed CertificateAfter purchasing the certificate, browse to the location of the
certificate and click Upload Now. Once you upload the
certificate, your Barracuda Web Site Firewall automatically
begins using it.
Once you have uploaded your signed certificate, make sure
Tru st ed is selected for the Certificate Type (described above).
Upload Backup SSL Private keyAfter downloading the corresponding private key, browse to
the location of the key and click Upload Now.
98 Barracuda Web Site Firewall Administrator’s Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.