Barracuda Web Application Firewall Best Practices Guide PDF
Barracuda Web Application Firewall Best Practices Guide PDF
US 1.0
Copyright 2011 Barracuda Networks Inc. 3175 S. Winchester Blvd., Campbell, CA 95008 1-888-268-4772 www.barracuda.com
Proxy Mode
Full Reverse Proxy In full reverse proxy mode, the Barracuda Web Application Firewall is deployed in-line, using both the physical ports (WAN and LAN) of the
device. This is the recommended configuration as it provides the best security.
One-Arm Proxy
Deployed in One-armed proxy mode, incoming and outgoing network traffic to the Application Firewall passes through the WAN port. Virtual
IP addresses of the services on the Web Application Firewall and backend real server IPs are on the same subnet. A high level of security is
achieved with this configuration, but a network firewall is recommended to restrict direct access to the backend servers.
Bridge Mode
Bridge Path
Deployed as an in-line Bridge Path, the Barracuda Web Application Firewall uses the same address for the VIP and back-end server, so data
is passed through to the Web Application, including potential attacks, even as the security checks are performed. This configuration does not
require changes to the existing network infrastructure but the WAN and LAN need to be on a different switch.
InstantSSL that converts an HTTP site to HTTPS without any code changes
Barracuda Networks highly recommends that administrators configure the administrator email account on the account to receive
important notifications.
Firewall Logs Logs all actions/events on the Barracuda Web Application Firewall. These logs help the administrator analyze traffic for suspicious activity
and fine tune the security settings
Access Logs
Logs all Web traffic activities. These logs provide information about the Web site traffic and performance.
Audit Logs
Logs all administration and configuration activities. This information assists in audits
System Logs
Logs are stored in a circular queue and are overwritten once the logs file reaches the maximum size. Log data can be exported
using FTP to an external storage system for archival or exported using syslog to a Security Information and Event Management
(SIEM) for analysis and storage. Barracuda Web Application Firewalls supports syslog exports to popular SIEM tools including
ArcSight, Splunk, Q1Labs QRadar, RSA enVision, Symantec SIEM, eIQ Networks SecureVue and TriGeo SIM. To set up an external
FTP or syslog server, go to Advanced > Export Logs.
Barracuda highly recommends that administrators set up an external storage or SIEM system to store log data.
It is possible to designate more than one NTP servers. When multiple servers are defined, NTP uses the server whose time is most
accurate based on various factors like the time variation and distance to the server.
Use the MGMT port on the Web Application Firewall to connect to the management domain.
Login into the Web Application Firewall
Go to Basic > IP Configuration
Configure the Management IP Configuration section of the page and select Yes on for Allow administration access.
Save the configuration
Test to see if you can reach the console using the management network. Once you have confirmed you can reach the Web
Application Firewall, log back into the Web Application Firewall.
1.
2.
3.
4.
Role
Description
Admin
This is the super administrator role. The default 'admin' user is assigned this role. This role has the privilege to perform all
system operations. An admin is responsible for creating and assigning roles.
Audit-Manager
User assigned to this role can perform auditing tasks. This role has the privilege to view logs, but is exempted from exporting
logs. The roles responsibility is:
View logs
Generate reports
Certificate-Manager
User assigned to this role can perform certificate management tasks. The roles responsibility include:
Uploading certificates
Creating certificates
Uploading trusted certificates
Guest
User assigned to this role can view all configurations, but is exempted from modifying the configuration.
Monitoring-Manager User assigned to this role can monitor system activities. The roles responsibility include:
View logs
Configuring email notifications
Exporting System logs, Application Logs and FTP access Logs
Generating and scheduling reports
Network-Manager
User assigned to this role can perform network related operations. The roles responsibility include:
Advanced IP configuration
Configuring SNAT and ACLs
Network troubleshooting
Policy-Manager
User assigned to this role can manage security policies on the Web Application Firewall.
Service-Manager
User assigned to this role can manage services on the Web Application Firewall.
Beyond the predefined roles, the Barracuda Web Application Firewall gives administrators fine grain access control
capabilities to create custom roles that best represent what is needed for their teams. Administrators can create their own
custom role using under the Advanced > Admin Access Control tab.
Always assign the least amount of privileges required when creating new users.
Restrict IP Access
In addition to creating a management network and fine grained user roles for access control, it is recommended that
administrators restrict IP access on the management network to a limited subnet. This ensures that only a small set of users
utilizing designated devices can access the management console of the Barracuda Web Application Firewall.
NOTE: Be careful when setting up the IP subnet of the management network. Incorrect configurations can lock out access to the
Barracuda Web Application Firewall. If locked out, administrators will need to access the Barracuda Web Application Firewall via the
serial console.
If you are concerned about Web Server performance, Barracuda Web Application Firewalls can offload SSL traffic. When
deployed as a reverse proxy, the Barracuda Web Application Firewall can perform HTTPS encryption on behalf of the web
server when communicating with client browsers. Since all traffic terminates on the Barracuda Web Application firewall,
backend traffic with the Barracuda Web Application Firewall can continue using HTTP resulting and thereby not adding
additional encryption burdens on the web server.
If your web application is not written for HTTPS, Barracuda Web Application Firewalls provides an innovative feature called
InstantSSL that transforms plain vanilla HTTP sites into secure HTTPS sites without requiring any application changes. This
solves the obstacle of having to rewrite applications to support HTTPS by offloading the transformation to the Barracuda
Web Application Firewall.
If clients have bookmarked or continue to use the HTTP site, the Barracuda Web Application firewall can seamlessly redirect
the clients to the HTTPS site.
Configure Default policy or a Custom Security Policy to set Global Values for a Service. The Barracuda Web
Application Firewall security policies enable administrators to set global values on request limits, URL parameters, and
other input values of what is allowed.
Use Adaptive Profiling to build URL and input profiles on high value pages. Certain areas of web applications like
online shopping carts or address update pages are extremely important and should be profiled so that administrators
explicitly define what inputs can be entered into each field. This limits the scope of valid entries and prevents any
deviations that may introduce vulnerabilities.
Stay up to date on Energized Updates and Firmware Updates. Barracuda Networks continually adds new pattern
definitions and anti-virus signatures to the Web Application Firewall. Ensuring that Web Application Firewall receives the
latest updates is important in keeping the negative security definitions effective.
LDAP
RADIUS
RSA SecurID (for two-factor authentication)
CA Siteminder (for Single Sign On)
Client Certificates
Client certificate authentication can be configured under Access Control > Client Certificates. All other authentication methods
can be configured under Access Control > Authentication Services menu.
If your organization does not support any of the authentication services, the Barracuda Web Application Firewall has the
ability to acts as an authentication gateway. It is possible to define user accounts and groups locally on the Barracuda Web
Application Firewall to use for authentication and authorization. To define your own user groups, go to Access Control > Local
User/Groups.
For all interactive Web Applications, Barracuda recommends organizations to configure at least authentication service.
It is important to define granular access control rules to only allow users with the right credentials and roles to access the
different areas of the website. For example, the Barracuda Web Application Firewall to configure granular authorization rules to:
All of the rules can managed under Access Control > Authorization.
It is highly recommended that authorization rules should be configured for pertinent sections of the Web Application.
Passive Mode
Barracuda Web Application Firewalls can be deployed in Passive-mode where the Web Application Firewall applies the
selected Security Policy in Log Only mode to the service. This allows traffic to pass without interruptions while logging
possible violations in the Firewall logs.
These logs are stored under Basic > Web Firewall Logs and should be used to analyze Security Policy violations. Violations will
be flagged in red and administrators can look at the details of why that request was flagged. If a false positive is detected
in the Web Firewall Logs, it is possible to issue by clicking on the Fix hyperlink on the log entry and the Barracuda Web
Application Firewall will modify the Security Policy configuration to prevent future false positives.
Barracuda recommends that prior to deploying any Security Policy to use Passive Mode on QA or Production traffic to tune the
policy based on live traffic.
Exception Profiling
The concept of Exception Profiling in the Barracuda Web Application Firewall is to apply a set of heuristics on the violations
generated by clients, and either recommend or auto create exceptions to the policies existing on the Barracuda Web
Application Firewall, so as to minimize the false positives by providing a mechanism to adjust the originally created policies.
The controls for enabling and configuration exception profiling can be found on the Advanced > Exception Profiling page.
Security policies that incur a large number of false positives can indicate a mismatch between Security Policy rules and
application traffic. The Barracuda Web Application Firewall will flag and make exception recommendations based on the
threshold configured on Exception Profiling tool. If it is determined that the result is a false positive, administrators can accept
the recommendation and create an exception for that particular pattern for that specific page. Once accepted, the exception
pattern can be found under the Websites > Web Site Profile as a URL entry. This ensures that the exception is applied only to
that particular URL and not globally to the security policy. For global changes, administrators must add the exception pattern
at the Security Policy level under the Security Policies tab.
Before the deployment of any new or modified Security Policy, it is recommended that organizations engage in a round of
Exception Profiling.
Default
Baseline security policy that protects web applications from the most common attacks. All new services start with Default policy.
OWA
The predefined security policies represent some of the most common applications used by organizations and are preconfigured
by Barracuda Networks to enforce the most common security settings applicable to the application.
Some web applications use JavaScript or other client side scripting language to manipulate data stored in cookies. In this
situation, it may be difficult to enforce a policy of using encrypting cookies without a redesign of the web application. In this
situation, it is possible to use signed cookies to guard against cookie tampering on the client side but this will leave cookie
content exposed in plain text.
To set cookie security mode:
1.
2.
3.
Barracuda Networks recommends using Signed Cookies over HTTPS to protect against man-in-the-middle attacks and to
protect against cookie tampering on the client side.
Barracuda Networks recommends enable Secure Cookie to protect against man-in-the-middle cookie theft or cookie sniffing.
10
11
Header
Description
Server
Server name information. Often includes HTTP server and underlying OS information
X-Powered-By
Specifies the technology (PHP, JBoss, e.g.) supporting the web application
X-AspNet-Version
X-Runtime
6.
7.
It is possible to add any type of browser using the Global ACLs capabilities of the Barracuda Web Application Firewall. As
a best practice, Barracuda Networks recommend administrators perform a risk-to-usability analysis and make decision on
allow/ deny ACLs based on the results of the assessment.
12
Bridge Mode
Bridge Path
Deployed as an in-line Bridge Path, the Barracuda Web Application Firewall uses the same address for the VIP and back-end server, so
data is passed through to the Web Application, including potential attacks, even as the security checks are performed. This configuration
does not require changes to the existing network infrastructure.
Proxy Mode
Full Reverse Proxy
In full reverse proxy mode, the Barracuda Web Application Firewall is deployed in-line, using both the physical ports (WAN and LAN) of
the device. This is the recommended configuration as it provides the best security.
One-Arm Proxy
Deployed in One-armed proxy mode, incoming and outgoing network traffic to the Application Firewall passes through the WAN port. A
high level of security is achieved with this configuration, but because traffic is limited to the WAN port, network throughput is decreased.
Real Server
Identifies the server (IP address, port) that hosts the Web application that will be protected by the Barracuda Web Application Firewall.
Services
A user-designed entry point for controlled access to the Web site. A service sets the front-end interface (VIP) and a variety of possible
controls (such as SSL encryption, authentication, load balancing, and caching policies) for the Web site.
Virtual IP address (VIP) The user-defined IP address on which the Barracuda Web Application Firewall accepts traffic for a configured Web application. In a
redundant configuration it is a virtual address that applies regardless of which Barracuda Web Application Firewall is managing the
application at any given time.
13