Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Current »

About the Device

The Barracuda Web Application Firewall blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target applications hosted on web servers and in the cloud. The Barracuda Web Application Firewall scans all inbound web traffic to block attacks and inspects the HTTP responses from the configured back-end servers for Data Loss Prevention (DLP). The integrated access control engine enables administrators to create granular access control policies for Authentication, Authorization & Accounting (AAA) without requiring application changes.

Device Information

 Entity

Particulars

Vendor Name

Barracuda

Product Name

Web Application Firewall

Type of Device

Cloud/Hosted

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log collection method

 Barracuda WAF

BARRACUDA_WAF

Syslog - CEF

CyberHub

Port Requirements

Source

Destination

Port

 Barracuda WAF

CyberHub

6514 (TCP)

o facilitate secure communication and align with our best practice, we strongly encourage the use of Transport Layer Security (TLS) between your security devices and our Adaptive MxDR platform for event forwarding.

While we understand that TLS support may not be available on all devices, if your devices do support TLS communication, we recommend utilizing port 6514 for seamless integration.

In some cases, the upgraded version of the device might incorporate TLS support without prior notice. If you come across such a scenario or for further assistance in configuring TLS, we kindly ask you to reach out to your dedicated Adaptive MxDR Service Delivery Lead.

Device Configuration

To Adding a Syslog server

  1. Log in to the Barracuda WAF portal with your credentials.

  2. On the dashboard, click ADVANCED and then click Export Logs.

  3. In Export Logs, click Add Export Log Server and specify values for the following:

    1. Name: Enter a name for the CyberHub

    2. Log Server Type: Select Syslog NG.

    3. IP Address or Hostname: Enter the CyberHub IP address or the hostname

    4. Port: Enter the port associated with the IP address of CyberHub.

    5. Connection Type: Select SSL.

    6. Validate Server Certificate: Set to Yes to validate the syslog server certificate using the internal bundle of Certificate Authority's (CAs) certificates packaged with the system. If set to No, any certificate from the syslog server is accepted.

    7. Client Certificate: When set to Yes, the Barracuda Web Application Firewall presents the certificate while connecting to the syslog server.

    8. Certificate: Select a certificate for the Barracuda Web Application Firewall to present when connecting to the syslog server. Certificates can be uploaded on the BASIC > Certificates page. For more information on how to upload a certificate, see https://campus.barracuda.com/product/webapplicationfirewall/doc/4259930/how-to-add-an-ssl-certificate

    9. Log Timestamp and Hostname: Set to Yes if you want to log the date and time of the event, and the hostname configured on the BASIC > IP Configuration > Domain Configuration section.

  4. Click Add.

To Select Log format

  1. Log in to the device dashboard.

  2. Navigate to ADVANCED > Export Logs.

  3. Select ArcSight Log header and HPE Arcsight CEF:0 for all logs as mentioned below.

    1. In Syslog Header, select ArcSight Log Header.

    2. In Web Firewall Logs Format, select HPE Arcsight CEF:0.

    3. In Access Logs Format, select HPE Arcsight CEF:0.

    4. In Audit Logs Format, select HPE Arcsight CEF:0.

    5. In Network Firewall Logs Format, select HPE Arcsight CEF:0.

    6. In System Logs Format, select HPE Arcsight CEF:0.

image-20240215-052512.png

Integration Parameters

Parameters required from customer for Integration.

Property

Default Value

Description

IP Address

Barracuda WAF interface IP address

Hostname or IP address of the device which forwards logs to the CyberHub

  • No labels