It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda NextGen Firewall X

This Product is End-of-Life and End-Of-Support

End-Of-Life and End-Of-Support on December 1st, 2020: All Barracuda Firewall X-Series sales will cease; neither new sales nor any renewals will be available. If you currently hold a maintenance and support contract, you will continue to receive our award-winning support and services until your contract expires. Please see the End-Of-Life definition as described in the End of Support and End of Life Information.

Example - Blocking ICMP Traffic

  • Last updated on

If you use the default rule set, all traffic is allowed from the LAN to the Internet. If you keep the rules that include the parameter Service set to Anyyou might want to add access rules that BLOCK or RESET traffic with specific profiles. For example, you can deny specific service types or traffic from certain users. Using BLOCK causes the Barracuda NextGen Firewall X-Series to simply not respond to the connection request. The source client will then receive a timeout. To actively deny access, select RESET. The connection is then closed by the X-Series Firewall as soon as a connection attempt is made.

This article provides an example of how to configure an access rule that blocks all ICMP traffic from the local LAN to the Internet.

Step 1. Create an Access Rule to Block ICMP Traffic

  1. Go to the FIREWALL > Firewall Rules page.
  2. Click Add Access Rule to create a new access rule.
  3. In the Add Access Rule window, enter a name and description for the rule.
  4. Specify the following settings:

    Action SourceNetwork ServicesDestination
    BlockTrusted LANICMPInternet

    block_icmp.png

  5. At the top of the Add Access Rule window, click Save.

Step 2. Verify the Order of the Access Rules

New rules are created at the bottom of the firewall rule set. Rules are processed from top to bottom in the rule set. Drag your access rule to a slot in the rule list so that no access rules before it matches this traffic. Verify that your rules are placed above the BLOCKALL rule. Otherwise, the rule never matches.

After adjusting the order of rules in the rule set, click Save.