It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda Web Security Gateway

Securing the Barracuda Web Security Gateway

  • Last updated on

Secure Deployment

You can deploy your Barracuda Web Security Gateway either behind your corporate firewall or in front of your corporate firewall in the DMZ. However, for maximum security, Barracuda Networks recommends deploying the Barracuda Web Security Gateway behind a corporate firewall. See Deployment Options.

Securing Network Access

To secure your Barracuda Web Security Gateway on your network, begin by locking down the user interface ports. Barracuda Networks recommends using the non-standard port 8000 for internal access to the web interface, which is configured on the BASIC > Administration page. From that page you can also further limit access to the web interface by IP address with the Administrator/IP Range setting. If no IP address is specified in this field, all systems are granted access with the correct administrator password.

Integration with External Systems and Services - Security Considerations

The Barracuda Web Security Gateway integrates with other systems and services in your environment, like your LDAP server and mail servers. Barracuda Networks recommends creating separate service accounts for these integration points, rather than personal accounts, and then using the principle of least privilege. This integration strategy is part of an overall security policy. For more information, see Security for Integrating with Other Systems - Best Practices.

SSL Certificates

As described above, limiting user interface access to HTTPS provides further security and can also be configured on the ADVANCED > Secure Administration page along with the use of SSL certificates. There are three types of SSL certificates to choose from:

  • Default (Barracuda Networks)
  • Private (self-signed)
  • Trusted certificate - a certificate signed by a trusted certificate authority (CA)

For more information about the types of certificates and how to configure them, click Help on the ADVANCED > Secure Administration page.

Limiting Access to the API

The Barracuda Networks set of APIs provides for remote administration and configuration of the Barracuda Web Security Gateway. By using the Barracuda Web Security Gateway APIs, IT administrators can easily manage large blocks of usernames, create local or IP groups, and configure some single global variables. For more information, see Barracuda Web Security Gateway API Guide.

To limit access to the API, use the Allowed SNMP and API IP/Range setting on the BASIC > Administration page. The IP addresses you enter in that field can also establish an SNMP connection to the system.To secure use of the API, you must also create an API password, which can be entered on the same page.

Firmware Updates and Patch Management

Barracuda Networks recommends these best practices for keeping your Barracuda Web Security Gateway up to date:

  • Firmware updates – Use the ADVANCED > Firmware Update page to manually update the firmware version of the system or revert to a previous version. If you have the latest firmware version already installed, Download Now is disabled. See Updating Your Firmware and Definitions for details on how to install.
  • Energize updates – Keeping your Barracuda Web Security Gateway Energize Updates (spyware, virus and other definitions) subscription up to date is critical for providing the best protection for your network and user web traffic. The Barracuda Web Security Gateway will prompt you with a message at the top of the BASIC > Dashboard page before the subscriptions expire. If they do expire, the change in functionality of the system is described in the article When Your Energize Updates Subscription Expires. Barracuda Networks recommends setting Automatic Updates to ON on the ADVANCED > Energize Updates page.
  • Product patch management – Set Enable/Disable Product Patches to ON to keep your Barracuda Web Security Gateway up to date with the latest firmware patches, which may include security updates.