Barracuda SecureEdge allows administrative users with appropriate permissions to configure policies to protect internal resources and to secure access from and to the company network. Policies, rules, and access control lists are (pre-)defined rules for handling network traffic and are centrally managed through https://se.barracudanetworks.com. Policies are automatically applied to all site appliances. Since updates are pulled from the site appliances in one-minute intervals, it might take up to 8 minutes until the updates apply.
Network Policies
Configure network policies to allow or deny access based on source and destination. You can create access control lists (ACLs) for networks, users, and sites, using either predefined or custom applications. For more information on custom applications, see How to Create Custom Applications. If you want to select users or groups in the policies, you must first connect your Microsoft Entra ID. For more information, see How to Connect Microsoft Entra ID with Barracuda Cloud Control.

The following access control lists are available:
Edge Service ACL
Site ACL
For more information, see Network Policies.
Security Policies
The default action of a security policy can, for example, be either to block all and define exceptions that are allowed, or to allow all and define exceptions that are blocked. You can change the default action for all security polices individually. For example, web filtering is set to allow all and define exceptions that are blocked, and ACL is set to block all with exceptions that are allowed.

The following security policies are available:
Advanced Threat Protection
SSL Inspection
IPS
Some policies come with preconfigured default rules. In this case, explicit rules have precedence over predefined ones.
The matching algorithm of the rules works as follows:
All rules (explicit and default) apply top down. That means the first rule in the list that matches applies. Rules below the first match will not apply.
First, the explicit rules are searched for matches. If there is an explicit rule that matches, this explicit rule will be used.
Otherwise, the default rules are searched, and if there is a rule that matches, this rule will be used.
For more information, see Security Policies.
Apps and Resources
You can create custom applications that allow you to extend the predefined applications used by the defined policies. There are two types of custom applications:
Custom Network Applications
Custom Web Applications

For more information, see Apps and Resources.