Default Host Firewall Rules

Default Host Firewall Rules

The Host Firewall rule set contains default rules that fit most applications and services that are handled by the Barracuda CloudGen Firewall. The following tables list all Host Firewall rules that are preconfigured.

Default Host Rules of the Barracuda CloudGen Firewall

The default Host Firewall rule set of the Barracuda CloudGen Firewall is divided into the following tabs:

  • Inbound – Displays all inbound Host Firewall rules.

  • Inbound-User – (Bound to the Inbound set) Shows a subset of inbound Host Firewall rules.

  • Outbound – Displays all outbound Host Firewall rules.

  • Outbound-User tab – (Bound to the Outbound set) Shows an subset of outbound Host Firewall rules.

Host Firewall Rules - Inbound

#

Default State

Name

Comment

#

Default State

Name

Comment

0

Enabled

NO-ACCESS

Blocks external access to local IP used for local redirection in forwarding ruleset.

1

Enabled

MGMT-ACCESS-S

Allows management access via serial line, i.e., device=ppp0

2

Enabled

MGMT-ACCESS-CC

Allows management access from the CC IPs.

3

Enabled

MGMT-ACCESS-CC-LIC

Allows management access from the CC IPs.

4

Enabled

HA-S-STATUS

Allows ICMP based HA-probing of server IPs.

5

Enabled

HA-B-STATUS

Allows control-control HA status check communication.

6

Enabled

HA-CONF

Allows configuration sync between HA partners (dedicated HA).

7

Enabled

HA-SYNC

Allows sync of optional services between HA partners.

8

Enabled

MGMT-ACCESS-R

Allows exclusive management access for addresses within the ACL.

9

Enabled

MGMT-ACCESS-REST

Allows exclusive management access for addresses within the ACL.

10

Enabled

MGMT-ACCESS-WEBUI

Allows exclusive management access for addresses within the ACL.

11

Enabled

MGMT-ACCESS

Allows exclusive management access for addresses within the ACL.

12

Enabled

BOX-MGMT-SNMP

Allows exclusive SNMP access for addresses within the ACL.

13

Enabled

LL-IP-TUNNELS

Allows low level IPIP and GRE tunnels between tunnel endpoints.

14

Enabled

OP-SRV-L2TP

Blocks direct external access to the L2TP daemon. L2TP/IPSEC is not affected.

15

Enabled

OP-SRV-VIRSCAN

Allows global access to optional Virus Scanner Service.

16

Enabled

OP-SRV-VPN

Allows global access to optional VPN service incl. PPTP variant.

17

Enabled

OP-SRV-DHCP

Allows global access to optional DHCP server service.

18

Enabled

OP-SRV-DNS

Allows global TCP/UDP access to optional DNS service.

19

Enabled

OP-SRV-OSPF

Allows global access to OSPF for the optional OSPF-RIP-BGP service.

20

Enabled

OP-SRV-RIP

Allows global access to RIP for the optional OSPF-RIP-BGP service.

21

Enabled

OP-SRV-BGP

Allows global access to BGP for the optional OSPF-RIP-BGP service.

22

Enabled

OP-SRV-SIP

Allows global access to optional SIP proxy service.

23

Enabled

OP-SRV-SAPRT

Allows global access to optional SAP-Router gateway service.

24

Enabled

OP-SRV-SNMP

Allows global access to optional SNMP gateway service.

25

Enabled

OP-SRV-PX

Allows global access to optional HTTP/S proxy service.

26

Enabled

OP-SRV-NTP

Allows exclusive access to optional local NTP service from local networks.

27

Enabled

OP-SRV-ICMP

Allows ICMP ECHO requests to Server IPs.

28

Enabled

BOX-ICMP-PING

Allows ICMP ECHO requests local box addresses.

29

Enabled

BOX-PPTP-IN

Allows box communication with ADSL/PPTP modem.

30

Enabled

BOX-DHCP-IN

Allows exclusive access to optional DHCP client service (device=dhcp).

31

Enabled

BOX-AUTH-MSAD-SYNC-IN

Allows access to configured MSAD user authentication sync type servers. Requires installation of DCAgent on specified MSAD servers. 

32

Enabled

BOX-AUTH-TSAGENT-SYNC-IN

Allows access to configured TSAgent sync type servers. Requires installation of TSAgent on specified terminal servers.

33

Enabled

BOX-AUTH-WIFIAP-SYNC-IN

Allows access to configured Wi-Fi Access Point authentication sync type servers.

The Barracuda Firewall Control Center box provides the following additonal default rules:

#

Name

Comment

#

Name

Comment

2

HA-CONF-CC

Allows configuration sync between HA partners (dedicated HA)

6

CC-ACCESS

Allows access to CC services hosted by this box.

10

OP-SRV-CC

Allows for event and status delivery by managed boxes to CC services.

11

OP-SRV-AUDIT

Allows for audit data delivery by managed boxes to CC Audit service.

12

OP-SRV-PKI

Allows access to PKI service hosted by this box.

13

OP-SRV-VPN

Management tunnel (transport) acces to CC VPN server.

14

OP-SRV-DNS

Allows for queries of optional local DNS service.

15

OP-SRV-SYSLOG-SSL

Allows for secure and authenticated delivery of syslog from managed boxes via VPN tunnel.

16

OP-SRV-SYSLOG

Allows for secure and authenticated delivery of syslog from managed boxes via VPN tunnel.

Host Firewall Rules - Inbound-User

#

Name

Comment

#

Name

Comment

0

PASSALL

A catch-all rule to warrant free traffic flow. Adapt this to your needs.

Host Firewall Rules - Outbound

#

Default State

Name

Comment

#

Default State

Name

Comment

0

Enabled

OP-SRV-CLOUD-NTP

Allows NTP queries for cloud-based boxes.

1

Enabled

BOX-MGMT-CLOUD-CC

Allows traffic from cloud-based boxes to CC.

2

Enabled

NO-ACCESS

Block direct outbound access from unrouted loopback networks.

3

Enabled

HA-B-STATUS

Allows control-control HA status check communication.

4

Enabled

HA-S-STATUS

Allows ICMP based HA-probing of server IPs.

5

Enabled

HA-CONF

Allows configuration sync between HA partners (dedicated HA).

6

Enabled

HA-SYNC

Allows sync of optional services between HA partners.

7

Enabled

LL-IP-TUNNELS

Allows low level IPIP and GRE tunnels between tunnel endpoints.

8

Disabled

BOX-DNS-MGMT-NAT

Routes connections to the static configured DNS-servers via management tunnel. The explicit connection via interface tap3 routes DNS-requests to the static configured DNS-servers through the management tunnel. It is only useful if the box is using remote management to the MC.

9

Enabled

BOX-DNSFWD-OUT

Allows local DNS queries to configured DNS servers and root DNS servers.

10

Enabled

BOX-DNSSLV-OUT

Allows zone transfers initiated by local box DNS secondary server.

11

Enabled

BOX-DNSREC-OUT

Allows recursive local DNS queries.

12

Enabled

BOX-NTP-OUT-T

Allows NTP queries via box managent tunnel to CC.

13

Enabled

BOX-NTP-OUT

Allows NTP queries to configured NTP servers.

14

Enabled

OP-SRV-VPN

Allows global access for optional VPN service.

15

Enabled

OP-SRV-DNS

Allows global access for optional DNS service.

16

Enabled

OP-SRV-OSPF

Allows outgoing access for OSPF in an optional dyn. routing service.

17

Enabled

OP-SRV-RIP

Allows outgoing access for RIP in an optional dyn. routing service.

18

Enabled

OP-SRV-BGP

Allows outgoing access for BGP in an optional dyn. routing service.

19

Enabled

BOX-SYSLOG-AUDIT-OUT

Allows delivery of logfiles or audit data to CC.

20

Enabled

BOX-EVENT-OUT

Allows event notification delivery to CC.

21

Enabled

BOX-STATUS-CC

Allows status notification delivery to CC.

22

Enabled

BOX-CONFIG-CC

Allows config update delivery to CC.

23

Enabled

BOX-SYNC-CC

Allows sync to CC.

24

Enabled

BOX-GW-TEST

Allows ICMP gateway probing.

25

Enabled

BOX-MONIP-TEST

Allows ICMP monitoring IP probing.

26

Enabled

BOX-UMTS-TEST

Allows ICMP probing of Wireless WAN gateway and monitoring IPs.

27

Enabled

BOX-xDSL-TEST

Allows ICMP probing of ADSL link gateway and monitoring IPs.

28

Enabled