It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda SecureEdge

How to Configure the SecureEdge Environment for Web Security Gateway (WSG) Migration

  • Last updated on

This article provides a recommended way to deploy a SecureEdge Site device in preparation for replacing a Barracuda Web Security appliance and migrating Web Filter policies from the Barracuda Web Security Gateway to the Barracuda SecureEdge Site device. The Barracuda SecureEdge Site device provides Web Filtering capabilities, including Advanced Threat Protection and deep SSL Inspection, with quick and easy configuration steps for every device.

The following table displays the recommended SecureEdge T appliances with respect to the Web Security Gateway model you are running.

Web Security Gateway Model

SecureEdge T Appliance

210 (EoS)

T100

310

T100

410

T200

610

T400

810

T600

910

T600

1010/1011

T900

Before You Begin

  • Back everything up locally on your Web Security Gateway.

  • Ensure that you have the latest firmware installed on your SecureEdge appliances. For more information on the update process, see Updates.

  • You must have a working SecureEdge account. For more information, see How to Create a Barracuda Cloud Control Account for Barracuda SecureEdge.

  • You must have Identity Management / User Directories configured for the selected workspace, otherwise user and group-based policies will not work. You must use one of the identity providers that are supported in SecureEdge. Note that the Microsoft Entra ID and LDAP identity providers / user directories are supported on both the Web Security Gateway and SecureEdge. Please follow the instructions in Identity Management to enable Identity Management for your workspace in SecureEdge.

  • If you are running 15.X firmware, you must back up everything locally on the Web Security Gateway and send the backup file to support. For more information, see How to Back Up and Restore Your System Configuration.

SecureEdge Site Device Configuration

To connect the Secure Edge Site device to your network, see Hardware Deployment. In addition, this article shows how to run a high availability cluster with two SecureEdge Site devices.

Deployment Modes

The migration works with both deployment types of the Web Security Gateway, the inline (or bridge) deployment and the forward proxy deployment. However, it is highly recommended to use the inline deployment mode.

Inline deployment

Inline deployment provides the highest level of security because the SecureEdge Site device is directly integrated into the network pathway. Consequently, all network traffic is required to pass through the Site device.

The figure below illustrates a basic installation using inline deployment.

wsg-inline.png

For more information on how to set up your SecureEdge Site device in bridge mode, see How to Create an Inline Bridge on a Stand-Alone Site.

Forward Proxy Deployment

To create a basic Site device configuration, see How to Create a T/VT Site Configuration in Barracuda SecureEdge.

The figure below illustrates a basic installation using the Forward Proxy deployment.

wsg-fw-proxy.png

To configure a SecureEdge Site device as a proxy, you need to enable and configure the Proxy Connect feature. For more information on Proxy Connect, see How to Configure Proxy Connect.

Note that ports and hostnames are necessary for the service to work. If traffic to those services is forwarded over another firewall, all traffic must be allowed without content inspection or TLS inspection.

Policy Migration

Barracuda Networks Technical Support will take care of the migration for you. To contact our technical support, visit the following link: https://www.barracuda.com/support/contact. When transitioning from Web Security Gateway to SecureEdge, the following components will be seamlessly migrated:

  • BLOCK/ACCEPT > Exceptions  – Applications used to set policy exceptions for specific users or groups.

  • BLOCK/ACCEPT > Content Filter – Used to apply content category filters to control Internet access for users based on the content of the websites they visit.

  • BLOCK/ACCEPT > Custom Category – Used to create custom categories from selected domains or built-in web content categories.

  • Users/Groups – IP subnets/groups used to create a group for a range of IP addresses.

In SecureEdge, unauthenticated users are not supported. The Web Security Gateway policies that apply to unauthenticated users will therefore not be migrated. This applies to both Exceptions and Content Filtering.

Use Cases

After you have replaced your existing Barracuda Web Security Gateway, you can expand the usage of your SecureEdge Site device at no additional cost to cover the following use cases:

Next-Generation Firewall

Every SecureEdge Site device also includes a powerful next-generation firewall with Application Control, Advanced Threat Protection, and a powerful Intrusion Prevention System (IPS). To set up your SecureEdge Site device as a next-generation firewall, see Policies.

Zero Trust Network Access

Every SecureEdge Site device* includes five licenses for ZTNA access to start your transition from VPN-based remote access to a much more secure and easy-to-use ZTNA-based approach. For more information on using ZTNA with SecureEdge, see ZTNA.

*Does not apply to SecureEdge devices deployed via the MSP licensing  model.

SD-WAN

If you have two or more SecureEdge Site devices deployed, you can make use of the built-in SD-WAN functionality for better application performance and enhanced connectivity throughout your organization. For more information, see SD-WAN.

Further Information

For more information on how to configure the modern security features on SecureEdge, see Secure Web Gateway (SWG).