We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

This Firmware Version Is End-Of-Support

Documentation for this product is no longer updated. Please see End-of-Support for CloudGen Firewall Firmware for further information on our EoS policy.

Microsoft Azure Deployments using Azure Service Manager (ASM)

  • Last updated on

Azure Service Manager (ASM) is the classic deployment mode used in legacy Azure deployments. ASM offers a PowerShell for deployments. The following deployments are available:

Deploy an F-Series Firewall or Control Center via Azure PowerShell

For most advanced networking features in the Microsoft Azure Cloud, such as multiple network interfaces or reserved IP addresses for the Cloud Service, you must deploy the Barracuda NextGen Firewall F via PowerShell. Using a custom PowerShell script allows for rapid deployment and fast recovery in case of failure. The NextGen Control Center for Microsoft Azure is deployed just like the F-Series Firewall except that it is limited to one network interface. The number of network interfaces depends on the Instance size.

Fore more information, see How to Deploy the Barracuda F-Series Firewall in Azure via PowerShell and ASM.

Upload and Create Images from VHD Files using ASM

To create your own custom F-Series Firewall or NextGen Control Center images from the VHD disk images available in the Barracuda Download Portal, you must upload the VHD file to your Azure storage account. Then, you can create a custom image using the uploaded disk image.

For more information, see How to Create a Barracuda F-Series Firewall Azure Image from a VHD Disk Image using ASM.

Deploy an F-Series Firewall High Availability Cluster using ASM

To avoid downtime when the primary firewall is unavailable due to maintenance or hardware faults, configure a high availability cluster. Load-balanced endpoints forward the matching incoming traffic to the active firewall. The firewall then applies your policies and forwards the traffic to the backend VMs.

For more information, see High Availability in Azure.

Last updated on