Barracuda Primary Firewall Entry-list Coverage Lab – CyberSecurity Memo

This publish is a steady publish from earlier one Barracuda CloudGen Firewall F12 Preliminary Configuration Lab.
On this publish, I’m gonna present you the best way to configure WAN / LAN interfaces, the best way to create your individual forwarding entry rule, plus Vacation spot NAT rule.
Associated publish:
Topology
On-line PNG Format Topology Diagram:
Configure Interfaces
- LAN – Port 2
- WAN – Port 4
Go to Configuration – IP Configuration – Shared Networks and IPs:
Add LAN and WAN interfaces in with corresponding configuration:
For straightforward troubleshooting objective, don’t neglect allow the choice: Responds to ping, if you end up configuring LAN/WAN port. That may make your firewall LAN/WAN port ping-able.
Firewall Rule Settings
Traffic Standards
These settings define the traffic that will be dealt with by the rule:
Setting |
Description |
Bi-Directional |
If the rule should |
Supply |
The supply IP addresses of the traffic. |
Service |
The IP protocol used |
Vacation spot |
The vacation spot IP addresses/netmask of the traffic. |
Authenticated Consumer |
The the Identify column in the rule overview window. |
Rule Activation
These settings specify if the rule is lively and how lengthy it ought to be lively:
Setting |
Description |
Dynamic Rule |
If the rule should |
Deactivate Rule |
To deactivate the rule, choose
To conceal inactive guidelines in the rule set, click on the Present/Cover Inactive Guidelines icon |
Motion and Connection
The Motion setting specifies how the Barracuda NG Firewall handles traffic that matches the rule standards. These are the choices that you can choose:
There are fairly a couple of completely different actions to your guidelines,
- Block
- Deny
- Go
- DST NAT
- MAP
- App Redirect
- Broad-Multicast
- Cascade
Motion |
Description |
Block |
Ignores the traffic and does not reply any matching packets. |
Deny |
Dismisses traffic and sends the following: • TCP-RST (for TCP requests) • ICMP Port Unreachable (for UDP requests) • ICMP Denied |
Go |
Passes the |
Dst NAT |
Rewrites |
Map |
Maps one For this |
App Redirect |
Redirects the
Superior parameters and timeouts of this kind |
Broad Multicast |
Propagates the traffic to a number of interfaces. This motion is solely wanted |
Cascade |
Specifies that the traffic |
Cascade Again |
If the traffic does not match any guidelines in a rule subset specified by a Cascade rule, use this motion |
Execute |
The traffic is piped into the STanDard IN (STDIN) of a program |
Relying on the Motion of the rule, you can choose a Connection
Methodology that specifies how the supply,
vacation spot, or service of the traffic is manipulated because it passes the Barracuda
NG Firewall. This setting sometimes
specifies the outgoing supply IP handle for handle translation. The following Connection Methodology choices are accessible:
Connection Methodology |
Description |
<explicit-conn> |
Lets you define the IP handle |
Dynamic Scr NAT |
Performs |
Loopback |
Performs supply |
No Src NAT |
No supply NAT is |
Supply |
Performs supply NAT with the IP handle of the specified |
Supply NAT with VIP |
Performs supply |
Src NAT 1st Server |
Performs |
Src NAT 2nd Server |
Performs |
Traffic Modification and Inspection
These settings specify if the traffic
is modified or inspected:
Setting |
Description |
Redirect Goal |
This setting |
|
You can choose |
|
• |
|
IPS Coverage – The traffic is inspected by the IPS engine in accordance to the chosen |
|
IPS coverage. |
|
• |
|
Utility Coverage – The traffic is inspected in accordance to the chosen software |
|
coverage. For extra data, see |
Coverage |
• |
|
Time Objects – If Dynamic |
|
• |
|
QoS Band (Fwd) – |
|
chosen QoS Band. For extra data, |
|
• |
|
QoS Band (Reply) – Traffic in the reverse route is dealt with in accordance to the |
|
chosen QoS Band. |
Configure Go Forwarding Firewall Rule
On this lab, we’re gonna create a move motion rule, which is Enable rule in different vendor’s firewall.
Observe: https://campus.barracuda.com/product/cloudgenfirewall/doc/79462929/how-to-create-a-pass-access-rule/
Configure Vacation spot NAT Firewall Rule
A Dst NAT entry rule redirects visitors that’s despatched to an exterior IP handle to a vacation spot within the inside community. The next instance reveals a Dst NAT rule permitting HTTP and HTTPS entry from the Web to a server within the DMZ (172.16.0.10). The redirect goal could be a single IP handle or hostname, or a community object. Hostnames and IP addresses will be appended with a port quantity to redirect the visitors to a unique port.
Observe: https://campus.barracuda.com/product/cloudgenfirewall/doc/79462926/how-to-create-a-destination-nat-access-rule/