We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

Attention

Barracuda CloudGen Firewall version 8.0 is a cloud-only version. It is currently not available for on-premises deployments and can only be deployed in Microsoft Azure, Amazon Web Services, or Google Cloud Platform public clouds.

Service Objects

  • Last updated on

Service objects, when applied to an access rule, define which destination and client TCP/UDP ports and/or IP protocols that the service applied to the rule can use. By default, the Barracuda CloudGen Firewall contains a set of pre-configured service objects. You can edit these service objects for a custom setup or a non-standard port, or you can create new services objects to reference IP protocols and, if TCP/UDP is used, the destination port numbers.

A service object can consist of the following:

  • IP Protocol – The required protocol (e.g., TCP) for the service used by an access rule.
  • Ports and Port Ranges – The ports or port ranges that the service can use for the protocol.
  • Dynamic Services – Dynamic services.
  • Plugin Modules – Plugins for shared service objects (see Shared Service Objects).
  • Port Protocol Protection – Policies for handling prohibited services. 

Shared Service Objects

Shared service objects refer to services using dynamic port allocation. The Firewall service uses firewall plugin modules to dynamically open and close required ports.

For more information, see Firewall Plugin Modules.

Create a New Service Object 

For instructions on how to create a new service object, see How to Create Service Objects.

Port Protocol Protection

Port Protocol Protection can be configured as a part of every service object entry. It uses deep packet inspection to enforce the used protocol on a specific port or port range.

Fore more information, see How to Configure Port Protocol Protection.

Last updated on