It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda Web Application Firewall

Deploying and Provisioning the Barracuda Web Application Firewall in the Classic Microsoft Azure Management Portal

  • Last updated on

Before you proceed, it is recommended that you go through the Deployment Best Practices article.

Before deploying and provisioning the Barracuda Web Application Firewall in the Classic (old) Microsoft Azure Management portal, create a Microsoft Azure Virtual Network (Classic VNET) by following the steps below:

  1. Log into your Microsoft Azure Management Portal.
  2. In the left pane, click NETWORKS, and then click NEW at the bottom of the screen.

    New_azure_virtual_network.png
  3. Click NETWORK SERVICES > VIRTUAL NETWORK > CUSTOM CREATE. The CREATE A VIRTUAL NETWORK window appears.

    Custom_create.png
  4. On the Virtual Network Details page:
    1. Enter a unique name in the Name field. For example, AzureVirtualNet
    2. Select a location from the LOCATION drop-down list. The virtual network can only be used for Azure instances in this geographic region. E.g., South Central US
    3. Click Next arrow.png.

      Virtual_Network_Details.png
  5. Optional) On the DNS Servers and VPN Connectivity page, select or enter your DNS SERVERS.
  6. Click Next arrow.png
  7. On the Virtual Network Address Spaces page, configure the ADDRESS SPACE:
    1. STARTING IP: Enter the first IP address of the address space you want to use.
    2. CIDR: Select the subnet mask for the virtual network. The maximum number of instances for a virtual network is listed in parentheses.
  8. Add a SUBNET:
    1. STARTING IP: Enter the first IP address of the subnet. 
    2. CIDR: Select the subnet mask for the subnet.

      Address_Space1.png
  9. Click Finish check_mark.png.

The created virtual network gets displayed in the VIRTUAL NETWORKS lists.

After creating the virtual network, perform the following steps to deploy and provision the Barracuda Web Application Firewall in the Classic Microsoft Azure Management portal:

  1. Log into the Microsoft Azure Management Portal.
  2. On the VIRTUAL MACHINES page, click NEW at the bottom of the screen.

                 Virtual_Machines.png
  3. In the NEW window, navigate to COMPUTE > VIRTUAL MACHINE > FROM GALLERY.

                 Gallery.png
  4. On the Choose an Image page, search for Barracuda Web Application Firewall for Azure image. Select the Barracuda Web Application Firewall for Azure image and click Next (->) to continue.

    The Classic Portal allows you to deploy only the Barracuda Web Application Firewall BYOL. To deploy the Barracuda Web Application Firewall HOURLY, use the new portal and follow the instructions mentioned in Deploying and Provisioning the Barracuda Web Application Firewall Using the New Microsoft Azure Management Portal.


                  Choose_an_Image.png

  5. On the Virtual machine configuration page:
    1. Enter a name in the VIRTUAL MACHINE NAME field.
    2. Select the TIER (BASIC or STANDARD).
    3. Select a size for the virtual machine from the SIZE list based on the Barracuda Web Application Firewall license.
    4. In the NEW USER NAME field, enter a username. This entry is not used by the Barracuda Web Application Firewall.
    5. Clear the UPLOAD COMPATIBLE SSH KEY FOR AUTHENTICATION check box.
    6. Select the PROVIDE A PASSWORD check box and enter a password in NEW PASSWORD. Re-enter the password in CONFIRM and click Next (->). Note that this will be your password to access the Barracuda Web Application Firewall web interface.

            Virtual_Machine_Configuration.png
  6. On the second page of Virtual machine configuration:
    1. Select Create a new cloud service from the CLOUD SERVICE list.
    2. Enter a name in the CLOUD SERVICE DNS NAME field.
    3. Select a region from the REGION/AFFINITY GROUP/VIRTUAL NETWORK list.
    4. Select a subnet from the VIRTUAL NETWORK SUBNETS list.
    5. Select None for AVAILABILITY SET.
    6. Configure the ENDPOINTS to access the web interface of the Barracuda Web Application Firewall. By default, the Barracuda Web Application Firewall web interface listens on port 8000 for HTTP and port 8443 for HTTPS. Make sure these ports (8000 and 8443) are configured as ENDPOINTS on the Barracuda Web Application Firewall. Specify values for the following fields to configure the endpoints.
      1. NAME: a name of your choice.
      2. PROTOCOL: TCP
      3. PUBLIC PORT: 8000
      4. PRIVATE PORT: 8000

        Endpoints.png
    7. Follow the same steps to open other ports.
    8. Click Next (->) to continue.
    9. Read the legal terms and product description in the next page, and click the check mark (√) to complete the deployment.

               VM_Agent.png

After clicking on (√), Microsoft Azure begins provisioning the Barracuda Web Application Firewall. You can check the status of the provisioned Barracuda Web Application Firewall from the Microsoft Azure Management Portal under VIRTUAL MACHINES. You will see Starting (Provisioning) in the beginning on the Microsoft Azure Management Portal. Allow a few minutes before taking any further actions in the Portal. During this time, the Microsoft Azure Linux Agent and Barracuda Web Application Firewall image boot up.

Make sure you do not restart the Barracuda Web Application Firewall while it is provisioning.

Next Step

Continue with the Barracuda Web Application Firewall Quick Start Guide - Microsoft Azure for licensing and initial configuration of your virtual machine.