All rights reserved. Use of this product and this manual is subject to license. Information in this document is subject to change without notice. Trademarks Barracuda NG Firewall is a trademark of Barracuda Networks. All other brand and product names mentioned in this document are registered trademarks or trademarks of their respective holders.
War r an ty an d So f t w ar e L i c e n s e Agr e e m e nt ..2 22 Barracuda Networks Limited Hardware Warranty ......222 Barracuda Networks Software License Agreement .
Introduction to Barracuda NG Network Access Client Barracuda NG Network Access Client denotes Barracuda Networks' endpoint security and network access control (NAC) framework. Administered endpoint integrity and endpoint access is what Barracuda NG Network Access Client provides.
Before we have a closer look at the interplay of the various components and their roles let us briefly study what has inspired the design of the Barracuda NG Network Access Client endpoint security framework. The originally very long list of requirements reads as follows in a slightly more condensed fashion: •...
Fig. 1–1 Barracuda NG Network Access Client environment Since the NG Network Access Clients are communicating with the Access Control Server in cyclic intervals, the Access Control Server should be placed as close as possible to the NG Network Access Clients. This helps reducing network traffic and getting better response times.
The remediation server is the component from which policy attributes, such as firewall rule sets, welcome messages, and bitmaps as well as client software components required for updates can be obtained. It can be run on the same Barracuda NG Firewall system as the SHV or, for load balancing reasons, it can be spread out over several Barracuda NG Firewall systems.
seemingly complex procedure is rather straightforward and easy to understand. As autonomous machine authentication is rather uncommon in the VPN context, the "limited access" and the "local machine" firewall rule sets and policies need to be provided together with the actual VPN rule set. The "local machine"...
"untrusted access" firewall rule set and client message applies. Nevertheless, Barracuda Networks recommends to configure a catch-all rule at the end of the policy rule set. An explicit catch-all rule allows a better control of the required client health-state and gives more details to the end user.
Page 12
Fig. 1–2 Client-Server actions during connection, health validation and assigning network access Client connection to server Client mode Local Machine Client collects and sends user & system information to Access Control Service Matching Identity? exception No Rule Automatic revalidation (configurable) Health state change to Untrusted Access Ctrl Service sends...
Page 13
1.) Determine the applicable rule set First of all, the NG Network Access Client determines in which context it is started and how it connects to the Access Control Service. The following three contexts are available: • Local Machine context The local machine context is available in case no user has logged in.
The available identity information is sequentially matched from top to bottom with the identity conditions of the individual policies. Each policy can be configured to match if all configured identity criteria apply or if only one of the configured criteria applies. Table 1–2 Matching Criteria Client Connection Type...
1.4.1 Health State "Untrusted" As soon as the identity match is finished and the client's identity can not be validated, the health state changes to "Untrusted". Untrusted does not necessarily mean that the client may be a guest client but only that the Access Control Service can not determine the client's identity.
To verify these requirements, each Access Control Service depends on up-to-date information of AV and AS products. Barracuda Networks provides an online update service that helps Barracuda NG Network Access Client Clients to recognize and activate AV and AS products.
Furthermore the update service provides the information necessary to diagnose the up-to-dateness of the client's signature databases and engine versions.. As a prerequisite, either the Access Control Service (standalone Barracuda NG Firewall) or the CC (for managed Barracuda NG Firewalls) must have access to the internet. Endpoint Security Policy Introduction Practices (Analyse, Enforce, Monitor) For implementing firewalls at formerly unrestricted network transitions like LAN-segments or endpoint...
Page 18
An important aspect related to trust zone crossing is the synchronization of authentication data. Basically, trust zones need to have a consistent and up-to-date view of the clients' authentication information that is shared across the whole network. In this line the CC ensures that changes are replicated and synchronized across the various available servers and databases, so that identity federation is achieved.
AV and AS products. Barracuda NG Firewall includes an automatic software downloader which periodically connects to the Barracuda Networks website. To reduce the need for permanent internet connection for Barracuda NG Firewalls the Barracuda Networks update service behaves differently on stand-alone-managed boxes and CC-administered boxes.
Page 20
List 2–2 Access Control Server - Access Control Server Settings - System Health-Validator – section General Parameter Description Setting to yes starts the Access Control Server module before VPN health validation. Start System Health-Validato Health State This value restricts validity time of a health state. If the client does not re-evaluate its health state within that period, all assigned Validity (min.) “network access rights”...
List 2–6 Access Control Server - Access Control Server Settings - System Health-Validator – section Referrals Parameter VPN Remediation Service IPs Sync authentication to Trustzone 2.2.2 Remediation Service List 2–7 Access Control Server - Access Control Server Settings - Remediation Server – section General Parameter Description Start...
List 2–9 Access Control Server - Access Control Server Settings - 802.1X – section 802.1X Parameter Description Debug Log Enable debugging log here. A service restart is required. (parameter is only visible in Advanced View mode) List 2–10 Access Control Server - Access Control Server Settings - 802.1X – section Radius Clients Parameter Description NAS identifiers...
List 2–15 Access Control Server - Access Control Server Settings - Advanced – section General Parameter Sync Access Cache to CC List 2–16 Access Control Server - Access Control Server Settings - Advanced – section TLS/SSL Parameter Description TLS/SSL Certificate The X.509 certificate which is used with TLS.
Page 24
For those already familiar with Barracuda NG VPN, the Access Control Objects are similar to the objects available for Client to Site VPN. Fig. 2–1 Access Control Objects – Configuration tree - Access Control Objects • Welcome Messages can be used to display customized messages to welcome end-users to the corporate net- work, inform them about security policies, or display administrator contact details.
Page 25
Assigned pictures are displayed in the client after successfully connecting to the Access Control Service. Fig. 2–3 Access Control Objects – Access Control Service Bitmaps Keep the size of your picture small since the picture will be transferred to all clients. Pictures larger than 167x90 pixels are scaled down on the Barracuda NG NAC anyway.
Page 26
• Registry Check Objects These objects allow an administrator to define registry checks to be performed on the client. This allows to validate registry keys and values just like taking action in case of failed vali- dation. Available actions are " cess Control Service health validation will fail if the specified registry keys are not set appropriately.
Access Control Objects provide an hierarchical override mechanism. Objects on cluster level sharing the same name as global or range objects override the global definition(s). This mechanism works like the one using global firewall objects for the Barracuda NG Firewall. Access Control Service Trustzone Each Access Control Service belongs to a so-called trustzone.
Page 28
The pre-defined Access Control Service Trustzones > <servername> > Virtual Servers > Control Service Settings Fig. 2–8 Access Control Service Trustzone - Configuration dialogue The Barracuda NG Control Center automatically links the Trustzone to the appropriate global / range / cluster object. As mentioned in the introduction above, each trustzone contains three policy rule sets.
2.4.1 Rules The main window of a Access Control Service Trustzone is split up into a navigation bar on the left and three policy rule sets on the right (1.3 What is a Policy Rule Set?, page 8). Fig. 2–9 Access Control Service Trustzone - Rules 2.4.2 Identity Matching - Basic The first step when processing a policy rule set (either local machine, current user, or VPN) is to...
Page 30
If the identity match fails, the next rule is taken into account. Fig. 2–10 Access Control Service Trustzone - Rules - Identity Matching Basic List 2–20 Access Control Service Trustzone - Rules - Identity Matching Basic – section Basic Identity Matching Parameter Description Policy Name...
Page 31
List 2–21 Access Control Service Trustzone - Rules - Identity Matching Basic – section Basic Matching Parameter Description Policy Matching • All-of-following • One-of-following Set this option to match for a successful identity verification. If just one field does not match, the identity is not verified successfully within this policy rule and the health match process will proceed with the next policy rule in the policy rule set.
Page 32
2.4.3 Identity Matching - Advanced Fig. 2–11 Access Control Service Trustzone - Rules - Identity Matching Advanced List 2–22 Access Control Service Trustzone - Rules - Identity Matching Advanced – section Advanced Identity Matching Parameter Description MAC Addresses Enter MAC addresses here. Patterns may be used. Microsoft Enter Microsoft Machine SIDs here.
Page 33
2.4.4 Required Health State - Basic Fig. 2–12 Access Control Service Trustzone - Rules - Required Health State Basic After successful verification of the client’s identity, this configuration entity is used for determining the client’s health state. Some of the parameters provide the following options: •...
Page 34
In case of third-party products (for example Virus scanner), Auto-Remediation may not work with all available engine versions. As fallback, the client always requests manual action. List 2–24 Access Control Service Trustzone - Rules - Required Health State Basic – section Service Settings Parameter Description NG Personal...
Page 35
List 2–27 Access Control Service Trustzone - Rules - Required Health State Basic – section Antivirus Parameter Description Last AV Scan Action • Manual • Auto Remediation Depending on this parameter either the user gets informed to manually perform a full AV system scan or that the client tries to execute a full system scan automatically.
Page 36
List 2–28 Access Control Service Trustzone - Rules - Required Health State Basic – section Antispyware Parameter Description AS Pattern • Ignore Definitions • Latest (default) Required • Previous • Last-2 Set to Ignore client may be healthy without having any anti spyware patterns installed. Set to Latest Set to...
Page 37
Select (context menu) to create a new entry. The configuration dialog provides following entries: Fig. 2–14 Access Control Service Trustzone - Rules - Required Health State Advanced - Allowed Health Suite Versions List 2–29 Access Control Service Trustzone - Rules - Required Health State Advanced - Allowed Health Suite Versions Parameter Description Name...
Page 38
2.4.6 Policy Assignments Fig. 2–15 Access Control Service Trustzone - Rules - Policy Assignments List 2–30 Access Control Service Trustzone - Rules - Policy Assignments – section Attributes Parameter Description Personal • Ruleset Name Firewall Settings Choose one of the created Personal Firewall Rule objects here. If the client does not already have this rule set installed, the health state will be set to unequal "healthy"...
List 2–31 Access Control Service Trustzone - Rules - Policy Assignments – section Exceptions Parameter Description User • Yes Authentication • No Required • Like Service Settings (Default) Only available for local machine rule set. If set to "No", user authentication is not performed even if a user logs in. List 2–32 Access Control Service Trustzone - Rules - Policy Assignments –...
Page 40
Fig. 2–16 Access Control Service Trustzone - Settings List 2–33 Access Control Service Trustzone - Settings – section No Rule Exception Parameter Description Bitmap Here choose one of the Limited Access Description see parameter Ruleset Name Limited Access Message List 2–34 Access Control Service Trustzone - Settings – section Identity Parameter Description Health Passport...
Page 41
List 2–34 Access Control Service Trustzone - Settings – section Identity Parameter Description Health Passport Here set the RSA public key for verifying a digital passport signature. Verification Key If one Access Control Server instance is a remediation server exclusively it is not necessary to set the Passport Verification List 2–35 Access Control Service Trustzone - Settings –...
This view provides information concerning Antivirus and Antispyware vendors and versions that are supported. The Support Chart is automatically downloaded from the Barracuda Networks update service mentioned above and distributed to Barracuda NG Admin on connect. Thus, the Support Chart reflects the current capabilities of the Access Control Service.
Server Config – Personal Firewall Rules General To configure the personal firewall rules browse to > > Config Virtual Servers Client to Site Double-click the appropriate VPN Firewall Rule Set. <Rule Set Name> Tab This tab allows manual rule configuration, testing, and setting the options. Personal Firewall rule sets do not support Revision Control System (RCS).
Page 44
Fig. 3–1 Rules Incoming 42 Server Config – Personal Firewall Rules...
3.2.1 Rules Incoming / Outgoing Rules controlling incoming traffic are arranged in the traffic are arranged in the Fig. 3–2 Rules Outgoing 3.2.2 Context Menu Select and right-click a list entry to display the following context menu: Table 3–1 Rule window - Context menu Item Description Show Source...
Table 3–1 Rule window - Context menu Item Description New … Opens the rule configuration dialog for a new rule (3.2.4 Rule Configuration, page 45). Delete Deletes the selected rule(s). Copy Copies the selected rule(s) to the clipboard. Paste Pastes the selected rule(s) from the clipboard. 3.2.3 Button Bar Fig.
3.2.4 Rule Configuration Select from the context menu to create a new rule. New … Fig. 3–4 Edit/Create Rule Object Configure the following connection details in the List 3–1 Edit/Create Rule Object - Options in the Rules view Item / Parameter Description Action Select...
Page 48
Modifying an object is a global action. For example, any other rule using the specific object will be affected by the mod- ification. This applies only for referenced objects, not for objects of type <explicit>. Explicit objects are only available for the current rule. Table 3–2 Edit/Create Rule Object –...
The following entities are available for rule testing: List 3–4 Rule Tester parameters – section TEST CONNECTION Parameter Description Direction This is the direction of the traffic policy Application To query for an arbitrary application leave the asterisk (*), which is set as default value. Click the Update Applications From: IP / Port Insert Source IP and corresponding connection port.
Changing any parameter in any configuration area that influences the result of a test report leads to a status icon change in the overview window. Green icons ( ) will become red ( ). To apply the new conditions to an already existing test report, select the data set in the overview window of the window and click Reports Subsequently to this action, the status icons will no longer indicate if an action has been successful or not, but instead...
Page 52
List 3–6 Barracuda NG Network Access Client Parameter Description ICMP Parameters This tab allows you to configure blocking of ICMP packets. Connect to the Internet Setting to yes creates a pass rule named ADSL in the Outgoing tab of the firewall configuration that is needed for Internet with ADSL (PPTP) connections via ADSL.
Adapters The Adapters tab allows you to view and configure network adapters available on the system. Adapters may be employed in firewall rules, in order to restrict rule processing to a specific adapter or a set of adapters only. Fig. 3–8 Adapter view The listing is divided into the following columns: Table 3–4 Adapter view details...
Page 54
This object summarizes all wireless adapters available on the system (for example, WLAN cards). Adapters available on the system are automatically assigned to the appropriate adapter object with status type multi. These objects may be used to construct abstract rule sets, for example, to configure a rule blocking access to all avail- able dial-up or wireless adapters.
Page 55
List 3–7 Edit/Create Adapter Object options Parameter Description Comment Optionally, insert an adapter description Trust Type Select Trusted to add a reference to the adapter object to the network object that has been defined as Trusted Network in the Administration >...
User Objects tab allows you to create User and User Group objects, which may be employed in User Objects rule sets. Click to open the New … Fig. 3–10 User Object dialog An user object is automatically created when a connection attempt is processed by the firewall. The object is then inserted into the corresponding rule.
Net Objects tab facilitates IP address/network management. Use this tab for the following Net Objects purposes: • Assigning of names to single IP addresses • Combining multiple IPs/networks/references into networking objects For a clearly arranged network management rather make use of referencing Network Objects than explicit IPs when configuring firewall rule sets.
Page 58
Net-[Network Connection name] • InterNet InterNet 0.0.0.0/0). • TrustedNet Use the TrustedNet pendent on assignment of an adapter as trusted or untrusted (3.3 Adapters, page 51). When an adapter is specified as trusted the IP addresses living on it are added to the Trust- edNet object.
Page 59
Click to open the New … Fig. 3–12 Net Object dialog Insert Name Description In the section insert IP/network address(es) of the new Net Object and/or specify a Entry the Net Object, for example select an existing Net Object to refer to a new one. section allows excluding specific networks from a network object.
Service Objects tab facilitates port and protocol management. Use the Services window to Service Objects • assign port and protocol to specific services • and merge multiple services to one service object using references. Properties of Service Objects are described in detail in the Barracuda NG Firewall Administrator’s Guide. Fig.
The following services are available in the Barracuda NG Personal Firewall by default: Table 3–5 Service Objects available in the Personal Firewall Service Name Port Protocol TCP/UDP BOOTPS Kerberos TCP/UDP LOC-SRV/EPMAP NETBIOS-NS NETBIOS-DGM NETBIOS-SSN SNMP LDAP TCP/UDP CIFS MSTASK 1026 Application Objects Application Objects sets.
Page 62
Fig. 3–14 Application Object dialog • Insert Name • Again, click window opens. • Click Browse selection, the path to the file and its inherent file description will be displayed in the Path • Optionally, insert a file description into the •...
Page 63
Consider that when an application equipped with an MD5 Hash is used on multiple clients, file versions need to match exactly. Otherwise, the application object will not be applicable. Click Clear to delete the hash. In addition to the application, first level DLLs are taken into consideration. This provides additional security. However, DLLs used by first level DLLs are not monitored.
Operating & Monitoring Barracuda NG NAC Box – Monitoring and Real-time Information The Access Control Service provides extensive information about the currently available endpoints and their status. Both, real-time and historical information are displayed when logging into the status window. The following tabs are available for operational purposes: •...
Summary of the client's health status or more details of a failed connection. Values could be "Client is healthy". If the client is unhealthy, the column "Information" contains details about the failed health checks. "No rule matched", another possible information, means that identity matching failed.
• Isolation The categories "Not restricted", "Restricted", and "Probation" are available as filter criteria. • Filters the list for specific IP addresses. • User Filters the list for specific user entries. • Type Filters the list for entries of type "Health Evaluator", "Authenticator", or "Remediation", depending on the Access Control Service module which created the entry.
Page 67
By selecting this context menu entry on a selected entry all entries with the selected client are displayed in a new tab. Criteria for identifying a computer is the computer's local machine secure identifier (SID). • Visualize this Computer … This entry visualizes the health state of the selected client.
• • • Removes either the selected entry, or all entries belonging to the selected client, or all entries from the cache. • Ungroup Displays all entries in a flat list instead of the default group view. • Group by > For better lucidity, status entries may be grouped by their essential attributes such as time, IP address, or rule name.
modifications or re-installation of the operating system. This means that the Access Control Service can assign health states to the proper client even if the IP address changes or a user performs a logout. The status tab displays only the last health status of a client. To get an overview of historical information, e.g.
Barracuda NG Network Access Client is not intended to work as complement to VPN clients and/or personal firewalls provided by other vendors. Thus, Barracuda Networks recommends to uninstall any other VPN client and/or personal firewalls prior to installation of Barracuda NG Network Access Client.
• Barracuda NG VPN Client • Barracuda NG SSL VPN and NAC Client • Custom A way to perform remote installation procedures is provided through customizable script files. Refer to the following chapters if you intend installing and configuring multiple clients remotely. •...
List 5–1 Complete Installation — section Barracuda NG Access Monitor – default settings Parameter 802.1x Enable DHCP Renew List 5–2 Complete Installation — section NG Personal Firewall – default settings Parameter Trusted Network Connect to the Internet with ADSL (PPTP) Allow others to access my files and printer(s) Disable Barracuda NG Personal Firewall Firewall Always ON...
Page 73
Enable/disable 802.1X Firewall Always ON, page 72 Install Barracuda Networks GINA This option is for SMART-clients only, although SMART-clients still also work with installed firewall. Defines the installation path (C:\Program Files\BarracudaNG) Defines the IP address of the Access Control Server.
Page 74
NG Personal Firewall rule set is modified automatically (9.9.2 Automatic Rule Configuration, page 122). • Disable Barracuda Networks Secure Mode (Firewall off) Selecting this checkbox results in a "pass-all-behavior" of the NG Personal Firewall. Use this option for unattended setups.
Customer Setup The customer setup is only available for NG VPN Client Customer setup is a comprehensive installation method, allowing you to fully preconfigure all NG Network Access Client settings on multiple installation systems remotely. Customer setup addresses the experienced system administrator. In addition to pure installation and basic configuration, it allows you to: •...
Page 76
file directs copying of required files and insertion of registry entries. It is divided into customer.inf three sections of interest (" • Customer Area [CustomerCopyFiles], page 74 • Customer Area [CustomerReg], page 75 • Customer Area [SourceDisksFiles], page 78 The content of the customer.inf Do NOT rename the customer.inf file.
Page 77
0x00000002 (COPYFLG_NOSKIP) Do not change the name of the firewall rule set entry (active.i_fwrule). If you do not intend installing the Barracuda Networks Firewall R8 with a predefined rule set meeting company policy, uncomment or delete this line. 5.4.3 Section "2. Customer Area" / [CustomerReg] This section controls the configuration of profiles set up during installation.
Page 78
This section is used for creating profiles and defining default values. Table 5–4 Directives applicable in the "Customer Area" / [CustomerReg] Directive reg-root HKCR HKCU HKLM subkey value-entry-name flags 0x00000001 (FLG_ADDREG_BINVALUETYPE) 0x00000002 (FLG_ADDREG_NOCLOBBER) 0x00000004 (FLG_ADDREG_DELVAL) 0x00000008 (FLG_ADDREG_APPEND) 0x00000010 (FLG_ADDREG_KEYONLY) 0x00000020 (FLG_ADDREG_OVERWRITEONLY) 0x00001000 (FLG_ADDREG_64BITKEY)
Page 79
Table 5–4 Directives applicable in the "Customer Area" / [CustomerReg] Directive value The following describes only the minimum required information. You may add any other Barracuda Networks registry entry. 1.) Edit default entry HKU, .DEFAULT\Software\Phion\phionvpn\Profile\1, Default, 0x00010001, 1 Value "1" sets a profile to the default profile of the Barracuda NG VPN Client. All other profiles take the value "0".
5.4.4 Section "3. Customer Area" / [SourceDisksFiles] Fig. 5–5 Example for section [SourceDisksFiles] [SourceDisksFiles] ; Files for disk Customer Files #1 ; filename = diskid[,[ subdir][, size]] customer.inf,,,1 customer.lic,,,1 ; if a license file is imported active.i_fwrule,,,1 ; if a firewall rule set is imported A SourceDisksFiles section names the source files used during installation, identifies the installation disks that contain these files, and provides the path to the subdirectories, if any, on the distribution disks containing individual files.
Page 81
For an overview of specific properties see table 5–1, page 71. 79 Barracuda NG Network Access Client - Administrator’s Guide...
System Restore Barracuda NG Network Access Clients installation and removal processes create Windows System Restore Fig. 5–7 System Restore Refer to the OS help for details. 80 Client Installation area that you may use to restore your system to a previous state. in the restore points...
General In case you are updating from predecessor versions, simply execute the setup executable and follow the on-screen instructions. If you have particular questions regarding the migration process, then please contact the Barracuda Networks support. For migration, it is mandatory to have the setup file locally on your system. A network installation is NOT possible. If the Personal Firewall is installed, make sure to disable the Internet connection prior to migration.
General Close all applications including the VPN client before uninstalling. You will be prompted to restart the system after uninstallation has completed. Procedure To uninstall the client, browse to and click Access Client Remove 82 Uninstall Start > Control Panel > Add or Remove Programs > Barracuda NG Network Chapter 7 Uninstall...
Client IP IP Address Address Source Peer Barracuda Networks provides two types of VPN client licenses: • Barracuda NG VPN Client • Barracuda NG SSL VPN and NAC For detailed information concerning the different features of the two licenses, have a look at 8.2 Facts and Figures, page 83.
Page 86
Optionally, the Barracuda NG SSL VPN and NAC functionality and includes Barracuda NG Network Access Client with the full client including the centrally managed Barracuda NG Personal Firewall. • Authentication support Table 8–1 Authentication support Function Supported Active Directory LDAP ...
Page 87
Table 8–3 Policy matching capabilities Function Antivirus (AV) product installed AV active AV realtime protection active Last AV scan time Enforce overdue AV scan AV engine version AV pattern version AV pattern max age Enforce overdue AV engine/pattern update AntiSpyware (AS) product installed AS active AS realtime protection active...
Page 88
• Architecture Table 8–5 Architecture Function Integrated health agent Integrated VPN client Integrated personal firewall Full entegra policy support • OS requirements Table 8–6 OS Requirements Function Operation systems Disk space Processor 86 VPN Configuration Barracuda NG VPN Client Barracuda NG SSL VPN and NAC –...
Selection between the following functional firewall modes is available in the context menu of the system tray icon: • Block All • Barracuda Networks Secure Mode • Disable Firewall (Allow all Traffic) The active operational mode is selected. To change the mode, click another item in the menu. DO NOT directly switch from Secure Mode as intermediate step.
• Modify objects and rules that have been created in the Add Pass/Block - Traffic Policy … Firewall administration experience is recommendable before manipulating the Barracuda NG Personal Firewall manually. 9.1.1 Integration within Windows 7 The Barracuda NG Personal Firewall integrates with Windows 7’s intrusion control system. If configured to do so in replace the built-in Windows Firewall as long as it is enabled.
Rule Set Selection Fig. 9–2 Rule set selection Click Rule Set Selection … selected by default. Only the Local Rule Set may be edited in the Barracuda NG Personal Firewall. 89 Barracuda NG Network Access Client - Administrator’s Guide to select one of the available rule sets for viewing. The Local Rule Set is...
User Interface The graphical user interface of the Barracuda NG Personal Firewall is built up of the following items: Fig. 9–3 Graphical Interface of the Barracuda NG Personal Firewall Content window Left navigation bar 90 Barracuda NG Personal Firewall Menu bar, page 91 Configuration Item bar Load display, page 94...
General Firewall Settings and Tasks (Menu Bar) The following configuration items of the Barracuda NG Personal Firewall are accessible through the Menu Bar (use the ALT key to open/close the menu bar): • Firewall see 9.4.1 Firewall Menu, page 91 •...
Page 94
List 9–3 Firewall Settings > Network Objects Parameter Automatic Adapter Assignment List 9–4 Firewall Settings > Firewall Settings Parameter Disable Windows Firewall Block all IP Fragments Passthru all IPv6 Packets ICMP Parameters This tab allows you to configure blocking of ICMP packets. Fig.
• Export Firewall Rule Set … This item allows you to export the rule set from the Barracuda NG Personal Firewall to a text file. • Import Firewall Rule Set … This item allows you to import a rule set into the NG VPN client. The rule set may either orig- inate from another Barracuda NG Personal Firewall or from a firewall configured on a Bar- racuda NG Firewall.
• Disable Firewall (Allow All Traffic) Turn the firewall off and allow all traffic. • Barracuda Networks Secure Mode Activate customized firewall rule sets. • Process Monitor Generate an entry in the event monitor for every process initiation (9.6.2 Events, page 96).
NG Control Center - Monitoring Firewall Activities Items arranged in the NG Control Center give a review of application activities in the Barracuda NG Personal Firewall. The NG Control Center is divided into the following sub-items: • Summary see 9.6.1 Summary, page 95 •...
9.6.2 Events view details all applications that are currently or have been executed on the machine, Events irrespective, if they have requested passing the firewall. Double-click a list entry to view event details. Select from the context menu to reload the display of logged entries. Reload Logs Fig.
9.6.3 History view details the entire network traffic (established connections and connection attempts) History since the last system boot. Fig. 9–11 NG Control Center: History window 9.6.4 Listing and Context Menu The listing is divided into the following columns: Table 9–2 History window details Column Description...
Page 100
Table 9–2 History window details Column Description Destination Destination IP of the connection. Port Connection port. User Name of the user who has initiated the connection attempt. Traffic Policy Name of the effective firewall rule. Info Connection status (passed, blocked, failed). Count Total number of connections processed over this slot.
Page 101
Translates IP addresses into hostnames, if possible. After each selection change, click entries by topic. 9.6.6 History Filter Tab In the tab, filter conditions can be set to confine the view to the minimum wanted amount History Filter of entries. If filters apply, the Select the checkbox on the right side of an available filter to activate it and insert the condition to apply.
9.6.7 Live Activity view details all currently active connections. Live Activity Fig. 9–12 NG Control Center: Live Activity window Refresh 100 Barracuda NG Personal Firewall...
Page 103
9.6.8 Listing and Context Menu The listing is divided into the following columns: Table 9–4 Live Activity window details Column Description Direction Flags the connection direction ( Load Displays the current connection load ( to Date/Time Date and time of traffic initiation. Application Application name and its PID (Process ID).
9.6.9 Filter Conditions Click the filter button ( ) to open the in order to confine the view to the minimum wanted amount of entries. Fig. 9–13 Filter condition Click to activate the filter settings. Click Activate After having specified a filter, click Click to record traffic processed over the network interface.
The data acquired is saved as a CAP file in the local folder of the VPN client (C:\Program Files\BarracudaNG). A special viewer is needed (for example wireshark; www.wireshark.org, for viewing network traffic recorded in .cap files. Current State - Setting the Security Mode Clicking the link below this navigation item changes the effective state of the Barracuda NG Personal Firewall.
9.8.2 Rules The Rules view allows manual rule configuration. Rules controlling incoming traffic are arranged in the tab, rules controlling Outgoing traffic are arranged in the Incoming Personal Firewall rule sets are not capable of RCS. Fig. 9–16 Rules window 9.8.3 Context Menu Select and right-click a list entry to display the following context menu:...
Page 107
Table 9–6 Rule window - Context menu Item Paste 9.8.4 Button Bar In the button bar, the Select a rule and click one of the buttons, to shift the rule further up or down within the rule set. Alternatively, you can use drag&drop. According to a regular Barracuda NG Firewall rule set, the Barracuda NG Personal Firewall rule set is processed rule by rule until an applicable rule is available.
Page 108
Configure the following connection details in the List 9–5 Rule Object - Options in the Rules view Item / Parameter Action Name Comment inactive checkbox A minimum specification of the following connection details is mandatory in the sections below: • •...
Page 109
Configure the following connection details in the List 9–6 Edit/Create Rule Object - Options in the Advanced view – section Rule Mismatch Policy Parameter Source / Service/ Destination / Application / User / Adapter List 9–7 Edit/Create Rule Object - Options in the Advanced view – section Miscellaneous Parameter Description Time Restriction...
9.8.6 Adapters view allows you to view and configure network adapters available on the system. Adapters Adapters may be employed in firewall rules, in order to restrict rule processing to a specific adapter or a set of adapters only. Fig. 9–19 Adapter objects window The listing is divided into the following columns: Table 9–8 Adapter Object view details...
Page 111
This object summarizes all wireless adapters available on the system (for example, WLAN cards). Adapters available on the system are automatically assigned to the appropriate adapter object with status type multi. These objects may be used to construct abstract rule sets, for example, to configure a rule blocking access to all available dial-up or wireless adapters.
The following options are available: List 9–8 Edit/Create Adapter Object options Parameter Description Name Specify a name for the adapter object. Comment Optionally, insert an adapter description Trust Type Select Trusted to add a reference to the adapter object to the network object that has been defined as Trusted Network in the Administration Untrusted.
Page 113
In the window, a number of Network Objects preconfigured. Dynamic objects are updated at runtime when network configuration changes and cannot be edited manually. For dynamic update to work, Automatic Adapter Assignment must be selected in the Firewall Settings (9.4.1 Firewall Menu, page 91).
This object includes the Multicast network 239.255.0.0/16. Click to open the New … Fig. 9–22 Net Object dialog Insert Name Description In the section insert IP/network address(es) of the new Net Object and/or specify a Entry the Net Object, for example select an existing Net Object to refer to a new one. section allows excluding specific networks from a network object.
Page 115
• Merging multiple services to one service object using references. Properties of Service Objects are described in detail in the Barracuda NG Firewall Administrator’s Guide. Fig. 9–23 Service Object dialog The following services are available in the Barracuda NG Personal Firewall by default: Table 9–9 Service Objects available in the Personal Firewall Service Name Port...
Table 9–9 Service Objects available in the Personal Firewall Service Name Port Protocol Connection Description BOOTPS Kerberos TCP/UDP LOC-SRV/EPMAP NETBIOS-NS NETBIOS-DGM NETBIOS-SSN SNMP LDAP TCP/UDP CIFS MSTASK 1026 9.8.9 Applications The Application Objects window allows creating predefined applications, which may be employed in rule sets.
Page 117
Fig. 9–24 Application Object dialog • Insert • Again, click window opens. • Click Browse selection, the path to the file and its inherent file description will be displayed in the Path • Optionally, insert a file description into the •...
Page 118
• Click Generate as soon as it is executed. MD5 Hash creation is recommended in order to avoid corrupt file and a vulnerable PC after an attack. Consider that when an application equipped with an MD5 Hash is used on multiple clients, file versions must match exactly.
9.8.10 Users The Users view allows you to create User and User Group objects, which may be employed in rule sets. Click to open the New … Fig. 9–25 User Object dialog An user object is automatically created when a connection attempt is processed by the firewall. The object is then inserted into the corresponding rule.
9.8.11 Rule Tester view allows testing rule sets for consistency. Rule Tester Fig. 9–26 Rule Tester The following entities are available for rule testing: List 9–9 Rule Tester parameters – section TEST CONNECTION Parameter Description Direction This is the direction of the traffic policy Application To query for an arbitrary application leave the asterisk (*), which is set as default value.
List 9–9 Rule Tester parameters – section TEST CONNECTION Parameter Description Test Click Test to test the connection and display the test result in the section below. List 9–10 Rule Tester parameters – section TEST RESULT Parameter Description Test Status Icon / A connection attempt with the given values can either have failed or have been successful if a rule is applicable.
Select a report and click Administration - Firewall Settings Wizard Options available in the Firewall Settings view allow you to adjust the preconfigured local rule set of the Barracuda NG Personal Firewall. Setting changes triggers either rule creation, deletion or traffic policy change.
Table 9–11 Services and protocols employed by the ADSL rule Port Protocol 1723 9.9.1 Automatic Adapter Configuration Set option Ask for adapter update confirmation if you would like to be notified, when adapter configurations change. A security alert window will then pop-up, asking for configuration change confirmation.
9.9.2 Automatic Rule Configuration Ask for unknown outgoing/incoming connections (9.9 Administration - Firewall Settings Wizard, page 120), an unknown application/service requesting network connection will trigger a Fig. 9–28 Security Alert windows Windows Vista: If you don’t have access to the dialog (figure 9–28), then please contact your system administrator. The following information is included in the Security Alert window: Table 9–12 Connection request details summarized in the Security Alert window...
Page 125
Selecting the checkbox also makes the tomize further connection details: Fig. 9–29 Security Alert - Advanced Policy Table 9–13 Security Alert – Advanced Policy options Column Only this Destination/Source All Destinations/Sources Only Port All activities for this application Port Range •...
10.1 Create a New Profile Using the Profile Wizard For your convenience, you may use the Profile Wizard to easily create and configure a new VPN profile. Fig. 10–1 VPN Profile Wizard Context Menu Item To start the wizard, right-click anywhere within the empty white space in the Barracuda NG VPN Control window, followed by choosing In the appearing Profile Wizard...
Page 127
Fig. 10–2 VPN Profile Wizard > Profile Wizard The next window is titled . You can later change a different method for Authentication Method authentication in case you have chosen the wrong one. Choosing will enable the button, allowing you to complete the Username and Password SecurID Finish...
Page 128
If you have chosen , you will see the following window of the same title. To Barracuda personal License finish the configuration wizard, browse for the license file, then click Finish Fig. 10–4 VPN Profile Wizard > Enter personal License If you have chosen , you will be taken to this dialog of the same title.
You can later call the wizard again by right-clicking profile entry. Fig. 10–6 VPN Profile Wizard - Modify Existing Profile Using the Wizard 10.2 Configure a New Profile Manually Double-click the Barracuda NG Network Access Client component. This will bring up the client’s status window which is attached to the tray. Fig.
Page 130
On the first start or If no working VPN profile for automated connecting has been defined before, the client will show up with the profile’s dialog als shown below: Default Connect Fig. 10–8 NG VPN client – Connect dialog The VPN profile can be chosen using the dropdown.
Page 131
Clicking will bring up the Barracuda NG VPN Control dialog wherein the necessary Preferences... configurations can be made: Fig. 10–10 NG VPN client – Connect dialog The space on the right side of this screen is reserved for a list of VPN profiles. It will be empty on the first start.
• a browse button including a context menu • a dropdown list (figure 10–11) Fig. 10–11 Editing options of the VPN client dialog 10.2.1 Functional Elements of the Barracuda NG Network Access Client’s System Tray Icon Installing Barracuda NG Network Access Clients adds a new access to the main elements of VPN client and Barracuda NG Firewall R8.
Fig. 10–13 Close NG VPN Client informational window Shutting down the client will also disable the personal firewall, Take that into account especially if this is the only local firewall you’re using. The whole Windows system needs to be restarted in order to restart the services. •...
• list Profile Select a preconfigured profile for login here. The creation of new profiles is described in 10.6 Barracuda Networks Control / Preferences Dialog, page 137. • Username Depending on the chosen authentication method, username and/or password must be inserted here.
Page 135
• Use a proxy server to connect When use of a proxy server has been defined at profile creation time (10.6 Barracuda Networks Control / Preferences Dialog, page 137), then this checkbox will be selected by default, User/Password time. If the proxy server requires a password, you need to insert it into the respective field. You can make use of the proxy server checkbox to override settings that have been defined at creation time of the profile.
10.4 Status Dialog Use the Status dialog window to view properties of an established connection. Click establish a connection through the Status dialog. A profile for the connection needs to be chosen in the Connection dialog (10.3 Connection Dialog, page 132), though. Fig.
Page 137
section: Secure Routes If secured routes have been assigned to the client by the VPN server, then their values will be displayed in the fields tab: Connection section: Connection • Status Status information on the current connection, may it be active, initiating or shutting down. •...
• Tunnel Mode The currently used transport mode for the VPN tunnel. Can display a value of TCP, UDP or Hybrid. button: Cancel Use this button to terminate a connection. Only shown if a connection is currently active. button: Connect Click this button to initiate a connection.
Preferences Barracuda Networks Control is the user interface for configuration of profiles and Barracuda NG VPN adapter settings and the management of certificates. Barracuda Networks Control is also accessible via the Windows Control panel. Shortcut icons reside...
138 VPN Component Configuration in the context menu to terminate a connection. to connect to a VPN server. Connect Connection Entries Barracuda Networks Control configuration area. The following actions are Certification Authorities in the context Connect … tabs (see Advanced Settings context menu.
section: Options • View … Opens a window with detailed certificate information. • Remove … Deletes the selected certificate from the certificate store. • Import … Imports the certificate to the certificate store. Supported certificate types are: binary x.509 PKCS #12 certificates Export Certificate To •...
Page 142
section: General VPN Settings • Direct Access The VPN client can be configured so that it automatically reconnects to different gateways, if available. Upon an unwanted disconnection, reconnecting to the same gateway will be tried for three times. If this fails, a so-called "path finder connection" will be initiated, trying a variety of pre-defined gateways and finding the fastest one.
10.6.4 Connection Entries Tab Fig. 10–19 Connection Entries tab • Enter a description of this connection entry Insert a profile name into this field. The name entered will be displayed as profile name in the Connection dialog window. section: Certificate Choose the authentication method required by the VPN server.
10.6.5 Barracuda Authentication Barracuda Authentication requires a valid certificate file (*.lic). The .lic file must be saved locally on the client system using it. The following parameters are available for Barracuda Authentication: List 10–1 Parameters used with Barracuda NG authentication Parameter Description File...
List 10–2 Parameters available for use with X509 authentication Description Description External File Path to the external X.509 certificate. 10.6.7 User / Password The following parameter is available for User / Password authentication: List 10–3 Parameters used with User/Password authentication Parameter Description Temporary...
Page 146
List 10–5 Advanced Settings tab – Data integrity and encryption (ESP) section Parameter Encryption algorithm [AES] Tunnel Mode [Response (UDP)] section: Tunnel Settings List 10–6 Advanced Settings tab – Tunnel Settings section Parameter Virtual Adapter Configuration [Default: Direct assignment] Compression [Yes] Use Access Control Service NAC intercept VPN connection...
Page 147
List 10–6 Advanced Settings tab – Tunnel Settings section Parameter Terminate Countdown (sec.) After reconnect adapter reset Connect retry time (sec) [Default: 60] Fallback Profile section: Always Connect List 10–7 Advanced Settings tab – Always Connect section Parameter Disable Active Directory Scan [Default: No] section: User Interface Settings...
10.6.9 Adaptation of Profile Creation using an .ini file (Barracuda NG Authentication only) Some parameters configurable in the page 139) tabs can be passed to the NG VPN Client through an .ini file. When a profile with Barracuda NG authentication the same directory as the .lic file is retrieved from.
Behavior of a DHCP client. Possible options are: IP address is assigned directly (using IP address is assigned dynamically (DCHP) IP address is configured statically • connectmode Settings tab] This parameter specifies the used connection mode. By default, this parameter is set to The alternatively available modes are shown in brackets ( its entries in order the get a working setup file.
Page 150
• Module The module the respective log entry refers to. • Status The status of several actions such as (client IP), etc. 148 VPN Component Configuration (added routes), Internal loop Add Routes Refresh IP...
11.1 Overview 11.1.1 Access Monitor is the key component of Barracuda NG Network Access Client. Its responsibilities Access Monitor include: • Collecting information from the client computer necessary for health evaluation, including • • • • Communication with the Access Control Server •...
11.2 Monitoring 11.2.1 Health Agent Fig. 11–1 Barracuda NG Access Monitor Barracuda NG Access Monitor health state and network restriction. Table 11–1 Barracuda NG Access Monitor Property Health Condition 150 Barracuda NG Access Monitor provides all necessary information regarding the client computers Description There are 3 different health states: •...
Page 153
Table 11–1 Barracuda NG Access Monitor Property Client Origin Last Health Check Next Health Check Quarantine Status Access Control Server Emergency Network Adapter Repair Image of the day Message of the day Health evaluation result 151 Barracuda NG Network Access Client - Administrator’s Guide Description •...
Page 154
11.2.2 Advanced Status information If more information is required, the Barracuda NG Access Monitor provides additional information through the Barracuda NG Access Monitor Advanced dialog. This can be opened by either clicking the link (see: Health Condition , same table) in the Health Agent view. Quarantine Status Fig.
11.2.4 Communication Status Whenever the Barracuda NG Access Monitor is working, a status message is displayed below the message of the day group (figure 11–4). While the Barracuda NG Access Monitor is communicating it is not possible to start a health evaluation. There are following communication states for the Barracuda NG Access Monitor: Table 11–2 Health Agent states...
Page 156
• Configure a valid Access Control Server IP address locally ( see 11.3.2 Access Control Server IPs from Registry, page 160) Use these instead if the Access Control Server IP addresses are distributed by DHCP: • By using the 11.3.12 Allow Emergency Network Adapter Repair, page 163) •...
Page 157
Fig. 11–6 Connection error because no Access Control Server IP addresses are configured 155 Barracuda NG Network Access Client - Administrator’s Guide...
11.2.6 802.1X Authentication - Port Security 11.2.7 Network Interfaces As seen in figure 11–7, the authentication in two groups: • Managed • Unmanaged Fig. 11–7 Port Security Managed network interfaces have been activated for the use of 802.1X authentication. The Barracuda NG Access Monitor provides several actions for all managed network interfaces when a wpa_supplicant is running for the network interface.
Table 11–4 Barracuda NG Access Monitor information for unmanaged network interfaces Column Description Status Shows the device status of the network interface, these include: • Network cable unplugged • Not connected • Disconnected • Connecting • Connected PAE state Port Access Entity status EAP state Extensible Authentication Protocol status Device Name...
Page 160
11.2.9 EAP Tracer Fig. 11–9 EAP Tracer The EAP Tracer allows you to view EAP and EAPOL packets captured by the Barracuda NG Access Monitor for every network interface which has the option Trace EAP Packets enabled (see 11.3.13 Capture 802.1X Traffic (EAP), page 164). 158 Barracuda NG Access Monitor...
11.3.3 Access Control Server IPs from DHCP When the Barracuda Networks DHCP server is configured to distribute the Access Control Server IPs using DHCP, these are listed in an advanced dialog, see figure 11–12. To open the dialog click the...
Page 163
button. If required, clear the Access Control Server IP addresses, which are received through Edit… DHCP, with the button Clear Policy IPs Fig. 11–12 Access Control Server IP addresses, received by DHCP. 11.3.4 ICMP Connectivity Checking As an advanced feature, the Barracuda NG Access Monitor is able to determine the connectivity to the Access Control Server using ICMP packets.
To edit this option manually, modify the following registry key: Table 11–7 Registry entry for ICMP connectivity Item Description Path .DEFAULT\Software\Phion\phionha\settings\ UseConnectionState Value (Default=1) 0 - disabled 1 - enabled 11.3.6 Health Agent Authentication 11.3.7 Use Basic Authentication This option specifies if basic user-password or certificate authentication should be used, in case the NTLM authentication fails.
11.3.9 802.1X Settings 11.3.10 IEEE 802.1X Authentication This option enables or disables the use of 802.1X authentication. When enabled, the Client will automatically start a wpa_supplicant for all network interfaces configured to use 802.1X authentication. To edit this option manually, modify the following registry key: Table 11–10 Registry entry for 802.1X authentication Item...
Page 166
Table 11–12 Registry entry for emergency network adapter repair Item Description AllowEmergencyRepair Value (Default=1) 0 - disabled 1 - enabled 11.3.13 Capture 802.1X Traffic (EAP) If enabled, the Barracuda NG Access Monitor will capture all EAP (Extensible Authentication Protocol) and EAPOL (Extensible Authentication Protocol) packets and save them in the log directory located in the Barracuda NG Network Access Client installation directory.
11.3.14 Log Settings For proper analysis verbose output is essential, thus it is possible to enable logging for both the Health Agent service and the Barracuda NG Access Monitor service to receive detailed information, see 11.4 Log Files, page 165 for more information. 11.3.15 Barracuda NG Health Agent Logging To edit this option manually, modify the following registry key:...
Page 168
Table 11–16 Log Files File Description client.xml Xml file containing the information sent to the Access Control Server containing information about the client computer when perform user based health evaluation. connect.xml Information about connectivity and connection errors. download.xml Contains data from the last download such as rule set, message of the day, … downloadLocal.xml Contains data received when a local computer based health evaluation succeeded.
12.1 General Pre-connectors and Remote VPN are tools that are meant to simplify/automate logon procedure. Optionally, combined with a prior dial-up connection, they may also be used to log on to a domain remotely. 12.2 VPN Connector Create a connector to achieve following: •...
12.2.1 Creating a Connector Prior to creating a Barracuda NG VPN connector, the connection profile must be configured (10.6.8 Advanced Settings Tab, page 143). The connector may then be created using one of two possible methods. Fig. 12–1 Creating a Connector •...
12.3 Remote VPN (rvpn) Remote VPN allows connecting/disconnecting automatically via script. rvpn.exe is downloadable from Barracuda Networks. 1.) Create a VPN Profile First, you must configure the required profile as described in the previous chapter ( VPN Component Configuration, page 124).
List 12–1 Parameters contained in an rvpn profile Parameter Description Local password [Certificate Password] (if any) -a [X, *] Pop-up for local password Client shutdown password protection. Prompts for the password definied in [X] whenever a user tries to shut down the VPN client. -cs [X] Leaving the password value blank deactivates this feature.
Page 173
SPAC DHCP Kernel Device Virtual Adapter Hardware 171 Barracuda NG Network Access Client - Administrator’s Guide Step 1 Step 2 Step 3 Step 4 Step 5 Barracuda Networks VPN server Port 691 or 443 via Proxy NG VPN Ethernet...
Chapter 13 Example Configuration Introducing an up-and-running Barracuda NG Network Access Client environment involves several components, like global objects, trustzone settings, Access Control Service and gateway firewall configuration. This section presents an overview how simple an environment can be set up. For further details of individual parameters please refer to the appropriate sections.
Like welcome messages, customized pictures are not really necessary for a Barracuda NG Network Access Client infrastructure. Nevertheless, companies usually want to display their own logo instead of the Barracuda Networks logo. The most important part which is also required for proper operation is to set up Personal Firewall Rules.
• Allow HTTP/HTTPS connections to the internet. Some antivirus products use HTTP/HTTPS to download up-to-date engines and patterns. Fig. 13–2 Example configuration – Personal Firewall rule set – Access Control Service - Rules – Outgoing tab example view Next create and edit the unrestricted rule set: •...
Page 177
Administrators of stand-alone Barracuda NG Firewalls can avoid making this decision - you simply configure your trustzone within the As a guideline for a simple setup using a CC, we recommend to use global trustzones or alternatively switch to range trustzones. For range or cluster based Access Control Services note that they can only reference trustzones within the same administrative scope (not from another range/cluster).
13.4 Configure an Access Control Service Trustzone The main window of a Access Control Service Trustzone is split up into a navigation bar on the left and the three policy rule sets on the right. To guarantee that our policy trustzone has a public/private key pair to properly authenticate clients to all participating Access Control Services, we initially need to create a Health Passport Signing Key (Settings >...
Page 179
For the views, configuration dialogs Identity Matching Required Health State Basic Advanced exist. Fig. 13–4 Example configuration – Configure an Access Control Service Trustzone – Local Machine: Create Policy Rule: catch-all 177 Barracuda NG Network Access Client - Administrator’s Guide...
Page 180
First start with defining the criteria for Since the Access Control Service in this sample setup is only reachable using private IP addresses we can restrict the Networks The option Policy Matching further matching criteria. As a next step define the required health conditions. For the catch-all rule you can define the same policies you require for known clients, as security policies usually further restrict unknown clients instead of granting them lower health requirements.
Page 181
For the AV engine and for the AV patterns the settings above accept the current version and also two versions before. Usually companies already have mechanisms to perform regular updates of their AV engines and patterns - in the sample you can thus leave the setting Fig.
Page 182
In the sample you are not required to manually add "Network Access Policies". Instead you can set up your firewall rules of the gateway firewall using the implicit roles unhealthy healthy probation untrusted Fig. 13–6 Example configuration – Configure a Access Control Service Trustzone – Local Machine: Edit Policy Rule – catch-all 180 Example Configuration...
13.5 Configure Forwarding Firewall Rule Set Enforcement of the security policy is provided by the Barracuda NG Network Access Client software installed on the endpoint itself. Whenever leaving the local collision domain, Barracuda NG Firewalls can provide additional protection. To enforce the health policy, Barracuda NG Firewalls may interpret the access policy attribute assigned to the endpoint within their rule sets.
Page 184
("healthy") or clients being in "probation" state are allowed to access the protected network. Barracuda Networks allows access even for clients in "probation" since we do not want to block new connections or even terminate existing connections only because the antivirus patterns are not up-to-date for a few minutes.
14.1 Overview Barracuda NG Network Access Client features the IEEE 802.1X standard for port-based network access control. The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that prevents unauthorized clients from connecting to a LAN through publicly accessible ports unless they are properly authenticated.
Necessary for authentication, validates the client computer's identity information forwarded by the switch and notifies the switch which VLAN the client computer is assigned to. Due to the switch's functionality as proxy the authentication service is transparent to the client. •...
14.2.2 Using the Barracuda NG Access Monitor for Analysis The Barracuda NG Access Monitor provides within its port security section a listing of all network interfaces capable of 802.1X, displaying the current status. Additionally, the Barracuda NG Access Monitor allows opening a command-line interface for the selected device.
To enable or disable verbose the below registry needs to be set: Table 14–4 Key Logging Item Description Path HKEY_USERS\.Default\Software\phion\phionvpn\settings Logging Value Enables or disables verbose output to be written (Default=0). • 0 - disabled • 1 - enabled Changing this value takes effect immediately. This value may also be changed through the 14.2.4 Switch Web Interface...
Page 189
• ReAuthPeriod see 14.3.9 Periodic client re-authentication by the switch, page 193 • Guest-Vlan see 14.3.11 Authentication Message Exchange, page 194 • AuthFail-Vlan see 14.3.11 Authentication Message Exchange, page 194 • AuthFail-Max-Attempts see 14.3.11 Authentication Message Exchange, page 194 • QuietPeriod see 14.3.12 VLAN Assignment, page 195 The output following is the status of a network interface on the switch a client computer is connected...
14.2.5 Switch Console Interface For either administrative or informative purposes it is possible to connect to the switch using a telnet session. By default the console interface shows only little output. To enable higher verbosity it is recommended to enable debug information, as seen in the example, for various topics. To enable or disable debug logs it is required to enter the privileged exec mode.
• • • 14.3.2 Operational Sequence 14.3.3 Startup 1.) NG NAC services start 2.) Disabling Microsoft Windows 802.1X compliant software 3.) Starting the WPA supplicant 4.) WPA supplicant configuration 5.) WPA supplicant running 14.3.4 Runtime 1.) Re-authentication by the Client Service 2.) Re-authentication by the switch 3.) Re-authentication by the user using the command line 4.) Authentication Message Exchange...
Page 192
2.) Disabling Microsoft Windows 802.1X compliant software Since Microsoft Windows ships with its own 802.1X compliant client software, the Client service needs to disable it before starting the WPA supplicant. The Microsoft 802.1X compliant client software consists of: Table 14–5 Microsoft 802.1X compliant client software Service Friendly Name Wired AutoConfig...
Page 193
If verbose output is enabled: wpa_supplicant_{adapter_uid}.log: Line X: Invalid configuration file … 191 Barracuda NG Network Access Client - Administrator’s Guide Advanced Settings of the Barracuda NG Access Monitor, Barracuda Networks Personal Access Client 802.1X Authentication Use 802.1X Authentication IEEE 802.1X within option.
To resolve this problem proceed following steps: • Delete the corrupted configuration file You will require elevated privileges to perform this step. • Kill the process wpa_supplicant.exe You will require elevated privileges to perform this step. The Client service will generate the configuration file based on the template. 5.) wpa-supplicant running A successful start of the wpa-supplicant can be verified by: •...
14.3.8 Re-authentication by the client service The client service is able to enforce a re-authentication, given the configured interval (see 2.0.A), independent of the switch's configuration. After the configured amount of seconds elapsed the Client service will start the authentication sequence. By sending a EAPOL Start packet (see: 2.3.I) and waiting for the identity request starting the authentication sequence (see: 2.3.II).
Page 196
To disable periodic re-authentication, use the no configuration command. To return to the default number seconds between re-authentication attempts, use the no dot1x timeout reauth-period interface configuration command. Fig. 14–5 Example Switch(config-if)# dot1x reauthentication Switch(config-if)# dot1x reauth-period 4000 The re-authentication started by the switch is illustrated in 2.3.II. 14.3.10 Manually re-authenticating using the command line You can manually re-authenticate the client connected to a specific port at any time by entering the...
• A re-authentication is triggered manually on the switch by a user through the command-line interface. Finally, section III shows the way the logoff command is sent to the switch in order to disable the line protocol on the port. There are several possibilities for the log-out process: •...
• interface <interface-id> Specify the port to be configured, and enter the interface configuration mode • dot1x timeout quiet-period <seconds> Set the number of seconds that the switch remains in the quiet state following a failed au- thentication exchange with the client. The range is from 1 to 65535 seconds, the default is 60.
Page 199
This value may also be changed by using the To enable "DHCP Renew" on the Access Control Server enforcing it on all clients matching the rule it is configured, follow these steps: • Enter the Access Control Server trustzone configuration using the Barracuda NG Admin administration tool •...
14.3.16 Shutdown 14.3.17 Operating System Shutdown When the client computer is been shut down, the Barracuda NG Access Monitor will send a logoff command to switch, causing the line protocol being disabled by the switch. 14.3.18 Operating System Logoff When a user logs off his account from the operating system, the Barracuda NG Access Monitor follows the same procedure as above.
14.4 Addendum 14.4.1 Packets The table shows an EAPOL packet frame: Table 14–16 EAPOL packet frame Field Name Size Purpose Version 1 Byte Protocol version 1 Byte 1 Start Type 2 Logoff Length 2 Bytes Length of the EAP packet Data (EAP) N Bytes EAP packet...
Page 202
Table 14–18 WPA Supplicant Log File Identifiers starting to reset 802.1x registry setting stating session live time finished resetting 802.1x registry settings class C8021X Monitor constructor starting constructor leaving constructor reloading adapters adding adapter to list to start supplicants removing adapter from list to start supplicants thread-id's of 802.1x threads user logon/logoff reassociating user (logon value %d)
Page 203
Table 14–18 WPA Supplicant Log File Identifiers starting CheckAndStopService error opening service manager service %s not running error opening service %s service status for service %s error in status query for service %s stopped service %s error stopping service %s finished waiting for service to stop error in status query for service %s while waiting to stop leaving CheckAndStopService...
Page 204
Table 14–18 WPA Supplicant Log File Identifiers user authentication logging in as user username reassociation loop VLAN changed/unchanged, reassociate switched 802.1x authentication successfully waiting %d ms to retry new authentication logging in as user username (set user event) logging in as user username (reassociate event) received killed event starting ip renew helper error allocating memory for GetAdaptersInfo...
This technical guideline is based on an engineering environment using following components: Table 14–19 Technical Guideline – Engineering Environment Switch Access Control Server Barracuda Networks Secure Client Radius Server Additionally following tools have been used for analysis: Table 14–20 Technical Guideline – Tools...
Page 206
In order for the RADIUS authentication to succeed with the above mentioned switch and software, "Authentication, Authorization and Accounting" need to be disabled. This can be done by following procedure: Command: • configure terminal Enter global configuration mode • no aaa accounting dot1x default group Disable accounting for 802.1X.
Page 214
• The message VPN Gateway not reachable via VPN tunnel is logged to the events window Open the Expert tab (10.6.8 Advanced Settings Tab, page 143) and change from Adapter Configuration • The message Session PHS: signature check failed (bad decrypt) is logged to the events window.
15.6 Parameter Lists Chapter 1 Introduction Chapter 2 Server Config – Access Control Service List 2–1 Access Control Server - Access Control Server Settings - System Health-Validator – section Trustzone (only available on CC) ..List 2–2 Access Control Server - Access Control Server Settings - System Health-Validator –...
Page 220
Chapter 6 Update or Migration Chapter 7 Uninstall Chapter 8 VPN Configuration Chapter 9 Barracuda NG Personal Firewall List 9–1 Firewall Settings > Protocol Option ..................List 9–2 Firewall Settings >...
15.7 Figures Chapter 1 Introduction Figure 1–1 Barracuda NG Network Access Client environment ..............Figure 1–2 Client-Server actions during connection, health validation and assigning network access .
Page 222
Chapter 9 Barracuda NG Personal Firewall Figure 9–1 Windows 7 Windows Firewall and Action Center screens ............. . Figure 9–2 Rule set selection .
Page 223
Chapter 13 Example Configuration Figure 13–1 Example configuration – environment ................Figure 13–2 Example configuration –...
Barracuda Networks published specifications in effect as of the date of manufacture. Except for the foregoing, the software is provided as is. In no event does Barracuda Networks warrant that the software is error free or that Customer will be able to operate the software without problems or interruptions.
Page 225
If you have purchased a Barracuda Networks Virtual Machine you may use the software only in the licensed number of instances of the licensed sizes and you may not exceed the licensed capacities. You may make a reasonable number of backup copies of the Software. If you have purchased client software you may install the software only on the number of licensed clients.
Page 226
10. Trademarks. Certain portions of the product and names used in this Agreement, the Software and the documentation may constitute trademarks of Barracuda Networks. You are not authorized to use any such trademarks for any purpose. 11. Export Restrictions. You may not export or re-export the Software without: (a) the prior written consent of Barracuda...
Energize Updates typically include Basic support. 20. Changes. Barracuda Networks reserves the right at any time not to release or to discontinue release of any Software or Subscription and to alter prices, features, specifications, capabilities, functions, licensing terms, release dates, general availability or other characteristics of any future releases of the Software or Subscriptions.
Page 228
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
Page 229
227 Barracuda Networks Warranty and Software License Agreement...
Page 231
(if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it. 229 Barracuda Networks Warranty and Software License Agreement...
Page 232
The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work.
Page 233
Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the 231 Barracuda Networks Warranty and Software License Agreement...
Page 234
Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions. When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it.
Page 235
3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of 233 Barracuda Networks Warranty and Software License Agreement...
Page 236
Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee. END OF GNU TERMS AND CONDITIONS Barracuda Networks Products may contain programs and software that are covered by the Lesser General Public License The Lesser General Public License is re-printed below for you reference Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc.
Page 237
"this License"). Each licensee is addressed as "you". A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. 235 Barracuda Networks Warranty and Software License Agreement...
Page 238
The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language.
Page 239
Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. 237 Barracuda Networks Warranty and Software License Agreement...
Page 240
b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License.
Page 241
OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS Barracuda Networks Products may contain programs and software that are covered by the Artistic License The Artistic license is re-printed below for you reference. Preamble...
Page 242
BSD license at: www.opensource.org/licenses/bsd-license.html, substituting the appropriate references in the template.) (end) Barracuda Networks Software may include programs that are covered by the Mozilla Public License Version 1.1 1. Definitions. 1.0.1 "Commercial Use" means distribution or otherwise making the Covered Code available to a third party.
Page 243
Modifications made by that Contributor with its Contributor Version (or portions of such combination). (c) the licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first makes Commercial Use of the Covered Code. 241 Barracuda Networks Warranty and Software License Agreement...
Page 244
(d) Notwithstanding Section 2.2(b) above, no patent license is granted: 1) for any code that Contributor has deleted from the Contributor Version; 2) separate from the Contributor Version; 3) for infringements caused by: i) third party modifications of Contributor Version or ii) the combination of Modifications made by that Contributor with other software (except as part of the Contributor Version) or other devices;...
Page 245
30 days of becoming aware of the breach. All sublicenses to the Covered Code which are properly granted shall survive any termination of this License. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive. 243 Barracuda Networks Warranty and Software License Agreement...
Page 246
8.2. If You initiate litigation by asserting a patent infringement claim (excluding declatory judgment actions) against Initial Developer or a Contributor (the Initial Developer or Contributor against whom You file such action is referred to as "Participant") alleging that: (a) such Participant's Contributor Version directly or indirectly infringes any patent, then any and all rights granted by such Participant to You under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively, unless if within 60 days after receipt of notice You either: (i) agree in writing to pay Participant a mutually agreeable reasonable royalty for Your past and future use of Modifications made by such Participant, or (ii) withdraw Your...
Page 247
LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE." Barracuda Networks Products may include the libspf library which is Copyright (c) 2004 James Couzens & Sean Comeau, All rights reserved. It is covered by the following agreement: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
Page 248
States and Austrian copyright laws and international treaty provisions. You may not remove any copyright, patent, or other proprietary notices from the Software. AMCC and Barracuda Networks or its suppliers may make changes to the Software, or to items referenced therein, at any time without notice, but is not obligated to support or update the Software. Except as otherwise expressly provided, AMCC grants no express or implied right under AMCC patents, copyrights, trademarks, or other intellectual property rights.
Page 249
Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the 247 Barracuda Networks Warranty and Software License Agreement...
Page 250
Contributor by reason of your accepting any such warranty or additional liability. Barracuda Networks Products may contain programs and software that are copyright (c) 1990, 1993, 1994, 1995;The Regents of the University of California. All rights reserved.
Page 251
INCLUDING, WITHOUT LIMITATION, ITS CORRECTNESS, ACCURACY OR RELIABILITY. Barracuda Networks Software may include programs that are covered by the The Code Project Open License. The The Code Project Open License is re-printed below for you reference. These programs are copyrighted by their authors or other parties, and the authors and copyright holders disclaim any warranty for such programs The Code Project Open License (CPOL) 1.02...
Page 252
THE WORK (AS DEFINED BELOW) IS PROVIDED UNDER THE TERMS OF THIS CODE PROJECT OPEN LICENSE ("LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED. BY EXERCISING ANY RIGHTS TO THE WORK PROVIDED HEREIN, YOU ACCEPT AND AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE.
Page 253
Work not specified herein. The Author shall not be bound by any additional provisions that may appear in any communication from You. This License may not be modified without the mutual written agreement of the Author and You. 251 Barracuda Networks Warranty and Software License Agreement...
Page 254
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Barracuda Networks Products may include programs that are covered by the OpenLDAP Redistribution and use of this software and associated documentation ("Software"), with or without modification, are permitted provided that the following...
Page 255
[including the GNU Public License.] Barracuda Networks Products may contain programs and software that are Copyright (c) 1999 - 2002 The PHP Group. All rights reserved. Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met: 1.
Page 256
PHP project, please see <http://www.php.net>. This product includes the Zend Engine, freely available at <http://www.zend.com>. Barracuda Networks Products may contain programs and software that are Copyright (c) 1996-2005, The PostgreSQL Global Development Group Portions Copyright (c) 1994, The Regents of the University of California Permission to use, copy, modify, and distribute this software and its documentation for any purpose, without fee, and without a written agreement is hereby granted, provided that the above copyright notice and this paragraph and the following two paragraphs appear in all copies.
Page 257
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Barracuda Networks Products may contain SNMP programs and software that are covered in part by the license below: Various copyrights apply to this package, listed in 3 separate parts below. Please make sure to take note of all parts. Up until 2001, the project was based at UC Davis, and the first part covers all code written during this time.
Page 258
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Barracuda Networks Products may contain programs and software that are covered by the License below. Preamble The intent of this document is to state the conditions under which a Package may be copied, such that the Copyright Holder maintains some semblance of artistic control over the development of the package, while giving the users of the package the right to use and distribute the Package in a more-or-less customary fashion, plus the right to make reasonable modifications.
Page 259
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Barracuda Networks Products may contain programs and software that are Copyright (c) 1999 - 2005 NetGroup, Politecnico di Torino (Italy). Copyright (c) 2005 - 2008 CACE Technologies, Davis (California). All rights reserved.
Page 260
HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
Page 261
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. -------------------------------------------------------------------------------- 259 Barracuda Networks Warranty and Software License Agreement...
Page 262
It is provided "as is" without express or implied warranty. Barracuda Networks Products may contain programs and software that are copyright (c) 2003-2008, Jouni Malinen <j@w1.fi> and contributors All Rights Reserved. This program is dual-licensed under both the GPL version 2 and BSD license.
Page 263
IV) It is not allowed to remove this license from the distribution of the Vim sources, parts of it or from a modified version. You may use this license for previous Vim releases instead of the license that they came with, at your option. Barracuda Networks Products may contain programs and software that are covered by PSF LICENSE AGREEMENT FOR PYTHON 2.4 1.
Page 264
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Barracuda Networks Products may contain programs and software that are Copyright (c) 2010, Intel Corporation, All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
Page 265
Barracuda Networks makes available the source code used to build Barracuda products available at source.barracuda.com. This directory includes all the programs that are distributed on the Barracuda products. Obviously not all of these programs are utilized, but since they are distributed on the Barracuda product we are required to make the source code available.
Need help?
Do you have a question about the NG Network Access Client SP4 and is the answer not in the manual?
Questions and answers