Barracuda SecureEdge allows administrators to enroll Barracuda CloudGen Firewall units with the cloud service. CloudGen Firewalls can be registered with Barracuda SecureEdge as a point of enforcement for Resource Access policies and can be either stand-alone or CC-managed boxes. The registration process of a CloudGen Firewall with Barracuda SecureEdge is similar to the way Azure Cloud Gateways are registered with the service. All enrolled appliances are directly connected to the cloud service to fetch policies and endpoint configurations.
Requirements
On CloudGen Firewall boxes, Barracuda SecureEdge requires the Policy Profiles rule set.
During this setup, VPN configuration (connectivity) and Remote Access policies are applied. Web Filter policies must be configured on the CloudGen Firewall.
For HA pairs, enter the token only in the primary box. The secondary box does not require any additional configuration.
On CloudGen Firewall boxes, Barracuda SecureEdge requires the Caching DNS to be enabled. For more information, see How to Configure a Caching DNS Service.
On CloudGen Firewall boxes, you must enable the VPN service. For more information, see How to Assign Services.
Step 1. Retrieve the Registration Token from SecureEdge
The token is valid for 30 minutes only, and you need a separate token for each CloudGen Firewall appliance you want to enroll.
Go to https://se.barracudanetworks.com and log in with your existing Barracuda Cloud Control account.
In the left menu, click the Tenants/Workspaces icon.
From the drop-down menu, select the workspace your appliance should be assigned to.
In the left menu, click the Integration icon, and select CloudGen Firewalls.
The CloudGen Firewalls page opens. In the top-right corner of the window, click Registration Token.
The Generate Registration token window opens.
Click on the clipboard icon to copy the token to your clipboard.
Paste the token into a text file.
Step 2. Log into the Barracuda CloudGen Firewall
Connect to your firewall using Barracuda Firewall Admin.
On the Firewall Admin Dashboard page, the appliance details are displayed and can be noted. For example, host name and serial number.
Click the SecureEdge icon.
In the Connect to SecureEdge window, enter the registration token that you retrieved in Step 1.
Click OK.
Go back to the Barracuda SecureEdge configuration, and click OK.
After the configuration is finished, the appliance automatically appears in the SecureEdge Cloud UI. You can see the new appliance with host name and serial number enrolled on the CloudGen Firewalls page and that the connection is established between the CloudGen Firewall and Barracuda SecureEdge.
Step 3. (Optional) Verify that the Barracuda CloudGen Firewall Appliance Is Enrolled
Go to https://se.barracudanetworks.com and log in with your existing Barracuda Cloud Control account.
Select the workspace containing your appliance.
In the left menu, click the Integration icon, and select CloudGen Firewalls.
All appliances enrolled in the selected workspace are displayed.
Remove Existing Enrolled Appliances
If you want to remove an existing enrolled appliance,
Go to https://se.barracudanetworks.com and log in with your existing Barracuda Cloud Control account.
Select the workspace containing your appliance.
In the left menu, click the Integration icon, and select CloudGen Firewalls.
Click on the trash can icon next to the enrolled appliance you want to remove.
Click OK to confirm.
Click Save.
Verify the Status of Barracuda SecureEdge in Barracuda Firewall Admin
Log into the CloudGen Firewall using Barracuda Firewall Admin.
The Barracuda Firewall Admin page opens.
Click the Barracuda SecureEdge icon and verify the status.
Monitoring ZTNA Access Rules and RAC Policies in the Firewall
On a Barracuda CloudGen Firewall, ZTNA access rules are auto-generated and cannot be moved. However, if you introduce the section separators PRE-BEGIN and PRE-END and place your own rule in between, this rule is placed before the ZTNA auto-generated rules.
To view ZTNA access rules and RAC policies deployed via Cloud UI in Firewall Admin:
Log into the CloudGen Firewall using Barracuda Firewall Admin.
Go to FIREWALL > Forwarding Rules.
Next to the Main Rules tab, a new tab <RACPOL> has been introduced (if applicable).
The <RACPOL> tab shows the policies the administrator has configured in the cloud service as Zero Trust Access rules.
Enable Security Inspection for Connected Firewalls
On Barracuda CloudGen Firewall version 9.0.1, the forwarding ruleset blocks UDP port 443 per default via rule BOX-BLOCK-UDP443. However, for security inspection to work on CloudGen Firewalls used as SecureEdge Point of Entry, QUIC traffic must be denied manually. To block the QUIC protocol on UDP 443, you must create a new rule and place it on top of the cloud-maintained/autogenerated rules. For more information, see: How to Block UDP Port 443 on CloudGen Firewalls.
Additional Information
On a CloudGen Firewall box, enabling SecureEdge will replace the original VPN server certificate. The new root certificate can be downloaded via the Cloud UI, if needed (i.e., to import it into Trusted Root Cert stores on computers running NAC/VPN Client).
When enabling SecureEdge on a box with an existing X.509-based C2S-VPN configuration, the VPN server will always try to extract the username from the Common Name (CN) field.
When you are using a CloudGen Firewall as a point of entry for SecureEdge Access and want to keep the traffic from going out to the public internet and back, you must define an additional access rule on your CloudGen Firewall. To add a rule, follow the instructions below:
To ensure that VPN clients behind CloudGen Firewall sites do not connect to a SecureEdge Cloud Service, you must manually configure a local redirect rule for VPN port
691
on the firewall.The redirect rule for VPN on Point of Entry(PoE) is needed so that a SecureEdge Access VPN connection is terminated on the nearest PoE. Note that if not configured with a CloudGen Firewall as PoE, SecureEdge Access connects to any existing SecureEdge Cloud service by ignoring the nearby CloudGen Firewall as PoE.
For example, to create an access rule on the CloudGen Firewall, go to FIREWALL > Forwarding Rules and specify the following settings:
Select App Redirect as the action.
Enter a Name for the rule, e.g.:
RAC-ZTNA-VPN-LOCAL-REDIR
Source – Select Any
Service – Select <explicit> and create or select the service object for TCP/UDP 691 as shown below. For more information, see How to Create Service Objects in the CloudGen Firewall documentation.
Destination – Instead of using “Any” as a destination, you may create a network object containing all the Edge Service (PoE) IPs, e.g.,
PoEsAddressList
that contain a list of all IP addresses with respect to the PoEs that are available on the SecureEdge Manager, or you can add the PoE IPs explicitly. To obtain a PoE address list, go to the Zero Trust Access > Point of entry table and note down the IP addresses under the field name Public IPs. For more information, see How to Configure Points of Entry. For CloudGen Firewalls, the Edge Service's public IP can be found on the Infrastructure > Edge Services <Name of Your Edge Service> dashboard page. For more information, see the section Accessing Information on the Edge Services Dashboard. Note: As soon as you remove the CloudGen Firewall as a point of entry, you must manually remove the existing local redirect rule for the VPN that you have created.