It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda NextGen Firewall X

This Product is End-of-Life and End-Of-Support

End-Of-Life and End-Of-Support on December 1st, 2020: All Barracuda Firewall X-Series sales will cease; neither new sales nor any renewals will be available. If you currently hold a maintenance and support contract, you will continue to receive our award-winning support and services until your contract expires. Please see the End-Of-Life definition as described in the End of Support and End of Life Information.

How to Configure ATP/ATD in the Firewall

  • Last updated on

Configure when and which types of files are uploaded to the Barracuda ATP Cloud. You can also configure if users will receive files immediately or have to wait until the file analysis is completed to continue with the download. Users who downloaded files with a risk factor higher than the defined risk threshold are placed in quarantine. Create access rules to define what is blocked for the infected users and/or IP addresses.

virus_scanning_https_traffic_ATP-01.png

Before you begin

Step 1. Enable ATD in the firewall and configure scan policies

Enable ATD and configure the ATD scan policies for HTTP, HTTPS, SMTP and SMTPS connections. Depending on the policy, the user will have to wait for scanning to complete before the file is forwarded. FTP traffic is always scanned with the Deliver before scan complete policy.

  1. Go to the FIREWALL > Settings page.

  2. In the Advanced Threat Detection section, enable Advanced Threat Detection.
  3. Next to Deliver before scan complete, select the global scan policy:

    • Yes – The user receives the file or email immediately. If malware is found, the quarantine policy applies.
    • No – The user is redirected to a scanning page. If no malware is found during the scan, the download starts.
  4. Select the Block Threats policy:
    • High only – Files classified as high risk are blocked. 
    • High and Medium only – Files classified as high or medium risk are blocked.
    • High, Medium and Low – Files classified as high, medium or low risk are blocked. Only files with classification None are allowed.
  5. Configure automatic blacklisting for HTTP and HTTPS traffic:
    • From the Quarantine Policy drop down, select the policy for automatic blacklisting:
      • No automatic blacklisting – No connections are blocked.
      • User – All connections by the infected user are blocked regardless of the source IP address.
      • IP – All connections by the infected source IP address are blocked regardless of the user.
      • User AND IP – All connections originating from the infected source IP address and the infected user are blocked. If a different user logs in to the infected computer, all connections are allowed because only one criteria, the source IP address, matches. If the username for the connection is unknown, only the IP address is blocked.
      • User OR IP – All connections coming from the infected source IP address and/or the infected user are blocked. If a different user logs into the infected computer, all connections are blocked because the source IP is blocked. If the infected user logs in to a different workstation, connections are blocked because the infected user is blocked.
  6. Click Save. 

Step 2. Configure advanced scan settings

If needed, set the individual scan policies for each file type:

  1. Go to the FIREWALL > Settings page.

  2. In the Advanced Threat Detection section, select Show next to Advanced Options.
  3. In the General section, configure the following settings:
    • Encrypted Archives handlingSpecify what happens if encrypted archives were detected. Default: Report only

    • Max. Archive sizeMaximum allowed archive size. Default: 1024. Set to 0 to disable.

    • Large Archives handlingSpecify what happens if Max. Archive size is exceeded. Default: Report only

    • Send Notification E-mailsTo system settings Address sends a notification mail for every malicious file found by ATP.

    • ATD Report Page sizeSelect the page format for ATP reports.

  4. If needed, set the individual HTTP and HTTPS scan policies for each file type:
    • Apply Global Policy (default) – This file type is scanned according to the policy configured in the basic ATD settings.
    • Do not scan – The file is not scanned and immediately forwarded to the user.
    • Deliver First, then Scan – The user receives the file immediately. If malware is found, the quarantine policy applies.
    • Scan First, then Deliver – The user is redirected to a scanning page. After the scan is complete, the download starts.
  5. Click Save.

After specifying the ATD settings, click Save to save your configuration changes.

Step 3. Create two quarantining access rules

To block users and/or IP addresses, you must create access rules using the ATD User Quarantine network object. Place the Block rules before any other access rules handling traffic for these IP addresses and/or users. Enable HTTP Block Page to redirect HTTP traffic from quarantined users or IP addresses to the custom quarantine block page. You must allow DNS queries from quarantined users to display the HTTP block page. Non-HTTP traffic is simply blocked or denied.

Create a new access rule to allow DNS queries:

  1. Go to FIREWALL > Firewall Rules.
  2. Click Add Access Rule to create a new access rule.

  3. In the Add Access Rule window, enter a name and description for the rule.

  4. Specify the following settings: 

    ActionConnectionServiceSourceDestination
    AllowSelect a connection object to allow you to connect to the DNS server.DNSSelect ATD Quarantine network object.
    Enter the IP addresses of your DNS servers.

    atd_quarantine_01.png

  5. Click Save.
  6. Place the access rule so that no rule before it matches the same traffic.

Create a second access rule:

  1. Go to FIREWALL > Firewall Rules.
  2. Click Add Access Rule to create a new access rule.

  3. In the Add Access Rule window, enter a name and description for the rule.

  4. Specify the following settings:

    ActionConnectionServiceSourceDestination
    BlockSelect a connection object to allow you to connect to the DNS server.Select Any.Select ATD Quarantine network object.
    Select Any (0.0.0.0/0) network object.

    atd_quarantine_02.png

  5. In the Add Access Rule window, click the Advanced tab.
  6. In the Other section, set HTTP Block Page to Quarantine Page.
    atd_quarantine_03.png
  7. Click Save
  8. Place the access rule directly below the rule allowing DNS queries from the quarantine so that no rule before it matches the same traffic.

Quarantined users or users connecting via HTTP from quarantined IP addresses are automatically redirected to the customizable quarantine page. For more information, see Custom Block Pages.

atd_quarantine_block_page.png

Step 4. Edit access rules to use ATP

Enable ATD by editing the access rules handling traffic you want to be scanned. E..g, LAN-2-INTERNET

  1. Go to FIREWALL > Firewall Rules.
  2. Create or edit an access rule.

  3. Edit the access rule handling the traffic you want analyzed by ATP.
  4. On the General page, select the following options:
    • Application Control – required.
    • SSL Inspection – optional.
    • Virus Protection – required.
    • ATD – required.
    atd_rule.png
  5. Click Save.

All traffic handled by access rules with ATD enabled are now scanned by the ATP service. Blocked files are listed on the BASIC > Recent Threats page. To view scan results, go to BASIC > ATD.

File scanning on the ATD page

The ATD page displays results and processes file scanning via Advanced Threat Protection. Use the global filter settings to adjust the amount of displayed files. To access the information about the files scanned by ATP, click the tabs.

Files in Progress tab

This tab displays all files that are currently scanned or waiting in the queue. The information displayed on this page is listed in columns. The State column shows the ATP scan status.

atd_fp.png

Scanned Files tab

Clicking this tab queries the ATP list and displays all files that were scanned by ATP.

atd_sf.png

The Action column provides a set of icons, offering the following options:

  • Details – Opens the ATD File Details window.
  • Download – Offers the option to download a scan report.
  • Move to Quarantine – Moves the file to the Quarantine page.
  • Delete Entry – Deletes the file entry.
Download a scan report

Scanned files are displayed on the Scanned Files page. You can download a basic or detailed version of the scan report.

  1. Go to BASIC > ATD.
  2. Select the scanned file.
  3. From the Action menu, select the Download Report icon.
  4. Select the report type: 
    • Summary Report – Download a basic summary report
    • Full Report – Download a detailed report
      atd_report.png 
  5. Save the report to your desired location.

Malicious Files tab

This tab displays all files that were blocked by ATP.

atd_mf.png

The Action column provides the same options as on the Scanned Files tab. If you want to remove a file from the list, click the trash can icon and choose the action Delete Entry to delete the file entry. To remove all files, select Remove all entries on this page.

Quarantine tab

Displays all files that are quarantined due to the Quarantine Policy.

atd_qu.png

If you want to remove a file from the quarantine, click the trash can icon and choose the action Remove from Quarantine. To remove all files from the list, select Remove all entries on this page.

Quarantined users and/or IP addresses are also shown on the BASIC > Status page.

atd_qustat.png

Manual File upload

If you want to manually check a local file using ATP, you can upload the file to the ATP Cloud. After the file has been scanned, you are mailed a report with the scan results.

For more information, see How to Manually Upload Files to ATP/ATD.

Next step

(Optional) To protect SMTP and SMTPS traffic, enable ATD in the Mail Security settings. For more information, see Mail Security in the Firewall.