We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

This Firmware Version Is End-Of-Support

Documentation for this product is no longer updated. Please see https://campus.barracuda.com/doc/71862301/ for further information on our EoS policy.

How to Deploy the Barracuda NG Firewall Azure on Microsoft Azure

  • Last updated on

The Barracuda NG Firewall firmware version 6.0 is no longer available in the Microsoft Azure Marketplace. Deploy the version 6.2.1 instead. For more information, see How to Deploy an F-Series Firewall in Microsoft Azure using Azure Portal and ARM.

To deploy the Barracuda NG Firewall with advanced networking features such as multiple Network Interfaces, you must use Azure PowerShell scripts. For more information, see How to Deploy the Barracuda NG Firewall on Microsoft Azure via PowerShell

The Barracuda NG Firewall Azure can be deployed as a virtual machine in the Microsoft Azure cloud. You can use up-to-date Application Control 2.0, user awareness, integrated malware protection, and VPN services to securely handle and manage all traffic in your virtual network.

Microsoft Azure charges apply. For more information, see the Microsoft Azure Pricing Calculator.

AzureDeploymentStore.png

In this article

Before you Begin

  • Create a Microsoft Azure account.
  • Get a Barracuda NG Azure license from the Barracuda Networks Evaluation page:
    1. From the Select a Product list, select Barracuda NG Firewall Azure under the Public Cloud Solutions category. 
    2. From the Select Edition list, select the Level that you want.
    3. Complete and submit the rest of the form. You will receive an email containing your serial number and license token.

Step 1. Create an Azure Virtual Network

  1. Log into your Microsoft Azure Management Portal (https://manage.windowsazure.com)
  2. In the left pane, click NETWORKS.
    AzureNetwork01.png
  3. In the bottom left corner, click + NEW.
    AzureStorage02.png
  4. Click CUSTOM CREATE. The CREATE A VIRTUAL NETWORK window opens.
    AzureNetwork02.png
  5. Enter a unique NAME. E.g., AzureVirtualNet
  6. Select a LOCATION. The virtual network can only be used for Azure VMs in this geographic region. E.g., West Europe
    AzureNetwork03.png
  7. Click Next.
  8. (Optional) Select or enter your DNS SERVERS.
  9. Click Next.
  10. On the Virtual Network Address Space configure the ADDRESS SPACE:
    • STARTING IP – Enter the first IP address of the address space you want to use. E.g., 10.0.0.0
    • CIDR – Select the subnet mask for the virtual network. The maximum number of VMs for a virtual network are listed in parentheses. E.g., /16 (65536)
  11. Add a SUBNET
    • STARTING IP – Enter the fist IP address of the subnet. E..g, 10.0.21.0
    • CIDR – Select the subnet mask for the subnet. E.g., /24 (256)
    AzureNetwork04.png
  12. Click FINISH.

The virtual network is now listed in VIRTUAL NETWORKS.

AzureNetwork05.png

Step 2. Launch the Barracuda NG Virtual Machine Instance 

  1. Log into your Microsoft Azure Management Portal (https://manage.windowsazure.com).
  2. In the left pane, click VIRTUAL MACHINES.
    AzureInstance01.png
  3. Click NEW in the bottom left-hand corner.
  4. Click FROM GALLERY. The CREATE A VIRTUAL MACHINE windows opens.
  5. In the search bar on the top left enter Barracuda NG Firewall. The Barracuda NG Firewall 6.0 image is displayed in the Featured column.
  6. From the FEATURED column in the middle pane, select Barracuda NG Firewall 6.0.
    AzureInstance02.png
  7. Click NEXT.
  8. Enter the following settings in the Virtual machine configuration:
    • VIRTUAL MACHINE NAME – Enter the name for the virtual Barracuda NG Firewall (e.g., BNG). The name must be unique in the domain.
    • SIZE – Select an instance level that matches your Barracuda NG Firewall Azure license (e.g., Level 2 (1 CPU cores), Level 4 (2 CPU cores)).
    • NEW USER NAME – This entry is not used by the Barracuda NG Firewall. You may enter a random username.
    • PASSWORD – Select PROVIDE A PASSWORD and enter the root password for the Barracuda NG Firewall.

      After deploying your Barracuda NG Firewall the initial, three day, grace period starts. You must complete licensing during the initial grace period or the unit will switch into demo mode and the default root password (ngf1r3wall) is enabled.

      AzureInstance03.png

  9. Click Next.
  10. Enter a CLOUD SERVICE DNS NAME The name must be unique for the used domain. (e.g., barracudaNG60).
    AzureInstance04.png
  11. Enable Barracuda NG Admin access to the new Barracuda NG Firewall instance by adding the following endpoints:

    NAMEPROTOCOLPUBLIC PORTPRIVATE PORT
    SSHTCP2222
    NG Admin TCPTCP807807
  12. Click FINISH.

Step 3. Configure Barracuda NG Admin

You must use the latest version of Barracuda NG Admin to connect to your Barracuda NG Firewall Azure.

Enable support for Microsoft Azure in NG Admin.

  1. Launch NG Admin.
  2. In the upper left hand corner, click Options and select Settings.
    SPoE02.png
  3. In the Client Settings section, verify that the check box for SPoE as default is ticked.
    SPOE.png

Next Steps

To continue setting up your Barracuda NG Firewall, see Getting Started.

Last updated on