It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

This Firmware Version Is End-Of-Support

Documentation for this product is no longer updated. Please see End-of-Support for CloudGen Firewall Firmware for further information on our EoS policy.

How to Configure Virus Scanning in the Firewall for Outbound SMTP and POP3 Traffic

  • Last updated on

To scan SMTP and POP3 traffic from clients behind the firewall to SMTP and POP3 servers in the Internet, configure an access rule to match your web traffic and enable Application Control, SSL Inspection (optional, but mandatory for SMTPS and POP3S), and the Virus Scanner. If malware is detected, the file is discarded and the connection is reset. If ATP is enabled, files passed by the Virus Scanner are then uploaded to be analyzed in the Barracuda ATP Cloud.

Before You Begin

Step 1. Configure the Virus Scanner Engine(s)

Select and configure a virus scanner engine. You can use Avira and ClamAV either separately or together. The CloudGen Firewall F100 and F101 can only use Avira.

Using both virus scanner engines significantly increases CPU utilization and load.

  1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Virus-Scanner > Virus Scanner Settings.
  2. Click Lock.
  3. Enable the virus scanner engines of your choice:
    • Enable the Avira AV engine by selecting Yes from the Enable Avira Engine list.
    • Enable the ClamAV engine by selecting Yes from the Enable ClamAV list.
  4. Click Send Changes and Activate.

Step 2. Enable Virus Scanning for SMTP and POP3

Enable support for virus scanning SMTP and POP3 connections in the Firewall service.

  1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Security Policy.
  2. Click Lock.

  3. In the Virus Scanner Configuration section, select the SMTP and POP3 check box. 
    AV_SMTP_08.png
     

  4. (optional) Change the Action if Virus Scanner is unavailable.
    AV_FTP_06.png

  5. (optional) Click Advanced:
    AV_SMTP_02.png

    • Large File Policy – Action taken if the file exceeds the size set as the Large File Watermark. Select Allow to forward the files unscanned; select Block to discard files that are too big to be scanned.
    • Large File Watermark (MB) – The large file watermark is set to a sensible value for your appliance. The maximum value is 4096 MB.
    • Stream Scanning Buffer – Select the buffer size for HTTP/HTTPS streaming media using chunked transfer encoding. Select Small for faster response times, Big to scan larger chunks before forwarding the stream to the client.
    • Data Trickling Settings – Change how fast and how much data is transmitted. Change these settings if your browser times out while waiting for the file to be scanned.
      FW_virus_scan_advanced.png
  6. Click Send Changes and Activate.

Step 4. Create Access Rule for SMTP and POP3 Client Downloads

To scan connections to external SMTP, SMTPS, POP3, and POP3S servers, configure a Pass access rule and enable Application Control, SSL Inspection, Virus Scanning, and (optional) ATP.

  1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Forwarding Rules.
  2. Click Lock.
  3. Either click the plus icon (+) at the top right of the ruleset, or right-click the ruleset and select New > Rule.
    FW_Rule_Add01.png
  4. Select Pass as the action.
  5. Enter a Name for the rule.
  6. Specify the following settings to match your outbound SMTP and POP3 connections:
    • Action – Select Pass.
    • Source – Select Trusted Networks.
    • Destination – Select Internet.
    • Service – Select SMTP+S, POP3, and POP3S.
    • Connection Method – Select Dynamic NAT.
    STMP_AV_02.png
  7. Click on the Application Policy link and select:
    • Application Control – required.
    • SSL Inspection – required.
    • Virus Scan – required.
    • ATP – optional. 
    STMP_AV_01.png
  8. Select a policy for outbound SSL Inspection from the SSL Inspection Policy drop-down list. For more information, see How to Configure an SSL Inspection Policy for Outbound SSL Inspection.
  9. Click Send Changes and Activate.

Next Steps