n o i t a t n e m u c o D l a c i n h c e T s k Barracuda Spam & Virus Firewall r o w t e N a d u c a Administrator’s Guide r r a B Version 5.1 RECLAIM YOUR NETWORK™ Copyright Notice Copyright (c) 2004-2012, Barracuda Networks, Inc., 3175 S. Winchester Blvd, Campbell, CA 95008 USA www.barracuda.com v5.1-111018-11-0314 All rights reserved. Use of this product and this manual is subject to license. Information in this document is subject to change without notice. Trademarks Barracuda Spam & Virus Firewall is a trademark of Barracuda Networks. All other brand and product names mentioned in this document are registered trademarks or trademarks of their respective holders. Contents Chapter 1 – Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 9 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 What This Guide Covers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Easy Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 IPv6 Network Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 12 Layers of Virus and Spam Protection . . . . . . . . . . . . . . . . . . . . 11 Inbound Message Filtering . . . . . . . . . . . . . . . . . . . . . . . . . 11 Outbound Message Filtering and Encryption . . . . . . . . . . . . . . . . 11 Internal Virus Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Energize Updates Maximize Protection. . . . . . . . . . . . . . . . . . . . . 12 Barracuda Central . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 How Energize Updates Defeat Spam . . . . . . . . . . . . . . . . . . . 13 Barracuda Spam & Virus Firewall Models . . . . . . . . . . . . . . . . . . . . . 14 Contacting Technical Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Chapter 2 – Barracuda Spam & Virus Firewall Concepts . 17 Twelve Layers of Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Maximizing Efficiency and Performance of Spam Scanning . . . . . . . . . . 18 Connection Management Layers. . . . . . . . . . . . . . . . . . . . . . . . . . 19 Denial of Service Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Rate Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 IP Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Sender Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Recipient Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Mail Scanning Layers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Virus Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 User-specified rules (custom policy) . . . . . . . . . . . . . . . . . . . . . . 21 Fingerprint Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Intent Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Image Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Bayesian Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Spam Scoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Predictive Sender Profiling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Chapter 3 – Getting Started . . . . . . . . . . . . . . . . . . . . . . 25 Initial Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Virtual Machine Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Best Practices for Configuring Your Hypervisor . . . . . . . . . . . . . . 26 Checklist for Unpacking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Installation Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Barracuda Spam & Virus Firewall Behind Corporate Firewall . . . . . . . 27 Barracuda Spam & Virus Firewall in the DMZ . . . . . . . . . . . . . . . 27 Clustering the Barracuda Spam & Virus Firewall . . . . . . . . . . . . . . 28 Install the Barracuda Spam & Virus Firewall . . . . . . . . . . . . . . . . . . 29 3 APC UPS Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Configure IP Address and Network Settings . . . . . . . . . . . . . . . . . . 30 Configure your Corporate Firewall . . . . . . . . . . . . . . . . . . . . . . . 30 Initial Configuration of the System . . . . . . . . . . . . . . . . . . . . . . . . . 31 Activate Your Subscriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Update the Barracuda Spam & Virus Firewall Firmware . . . . . . . . . . . . 33 Update Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Routing Email. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Route Incoming Email to the Barracuda Spam & Virus Firewall . . . . . . . . 34 Testing Spam and Virus Scanning With a Local User Set . . . . . . . . . 35 Configure Scanning of Outgoing Mail. . . . . . . . . . . . . . . . . . . . . . 35 Outbound Message Footer - Global or Domain-level . . . . . . . . . . . 36 Administrative Settings and the Web Interface. . . . . . . . . . . . . . . . . . . 36 Global Versus Domain Level Administration . . . . . . . . . . . . . . . . . . 36 Domain Level Configuration . . . . . . . . . . . . . . . . . . . . . . . . 36 Controlling Access to the Web Interface . . . . . . . . . . . . . . . . . . . . 37 Customizing the Appearance of the Web interface . . . . . . . . . . . . . . . 37 Changing the Language of the Web Interface . . . . . . . . . . . . . . . 37 Setting the Time Zone of the System . . . . . . . . . . . . . . . . . . . . . . 37 Enabling SSL for Administrators and Users. . . . . . . . . . . . . . . . . . . 38 Tune and Monitor the Default Spam and Virus Settings . . . . . . . . . . . . . . 38 Spam Scoring - Block, Quarantine and Tag. . . . . . . . . . . . . . . . . . . 39 Monitor and Classify Incoming Emails . . . . . . . . . . . . . . . . . . . . . 39 Monitor and Classify Outgoing Emails . . . . . . . . . . . . . . . . . . . . . 40 Virus Checking and Notifications . . . . . . . . . . . . . . . . . . . . . . . . 40 Internal Virus Scanning For Your Microsoft Exchange Mail Server . . . . 40 Attachment Block Notifications . . . . . . . . . . . . . . . . . . . . . . . 41 Spam and Quarantine Notifications . . . . . . . . . . . . . . . . . . . . 41 Viewing Performance and Email Statistics . . . . . . . . . . . . . . . . . . . . . 41 Product Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Email Statistics - Inbound . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Email Statistics - Outbound . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Setting up Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Chapter 4 – Securing the Barracuda Spam & Virus Firewall45 Securing Network Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 SSL Certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Secure Links in Notification Emails . . . . . . . . . . . . . . . . . . . . . . . 46 Use the Cloud Protection Layer. . . . . . . . . . . . . . . . . . . . . . . . . 46 Limiting Access to the API . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Tracking Changes to the Configuration and User Login Activities . . . . . . . 47 Limiting User Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Securing User Access With Single Sign On. . . . . . . . . . . . . . . . . . . 47 User Account Authentication . . . . . . . . . . . . . . . . . . . . . . . . 48 LDAP and User Account Authentication . . . . . . . . . . . . . . . . . . 48 Limiting User Access to a Clustered System . . . . . . . . . . . . . . . . . . 48 Advanced Email Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . 48 SMTP/TLS (Transport Layer Security) encryption . . . . . . . . . . . . . . . 48 Securing the Outbound Relay of Email . . . . . . . . . . . . . . . . . . . . . 49 Invalid Bounce Suppression. . . . . . . . . . . . . . . . . . . . . . . . . . . 49 4 Barracuda Spam & Virus Firewall Administrator’s Guide Chapter 5 – Advanced Inbound Spam Filtering Policy . . 51 Rate Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 When Rate Control Takes Effect . . . . . . . . . . . . . . . . . . . . . . . . 52 Exemptions from Rate Control . . . . . . . . . . . . . . . . . . . . . . . . . 52 IP Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Trusted Forwarders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 IP Reputation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Barracuda Reputation (BRBL) . . . . . . . . . . . . . . . . . . . . . . . . . 53 Exempting IP Addresses from the BRBL and Other Blocklists . . . . . . . 54 Subscribing to External blocklist Services . . . . . . . . . . . . . . . . . 54 Sender Whitelisting - Precedence. . . . . . . . . . . . . . . . . . . . . . . . 54 Reverse DNS Blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Content Analysis - Inbound. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Custom Content Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Attachment Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Blocking Email by Country . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Fingerprint Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Intent Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Image Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Bayesian Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 How Bayesian Analysis Works . . . . . . . . . . . . . . . . . . . . . . . 57 Global Bayesian Filtering Versus Per-User . . . . . . . . . . . . . . . . 57 Getting the Best Accuracy From the Bayesian Database . . . . . . . . . 58 When to Use Bayesian Analysis . . . . . . . . . . . . . . . . . . . . . . 58 Outlook and Lotus Notes Plugins . . . . . . . . . . . . . . . . . . . . . 59 Chapter 6 – Outbound Filtering Policy . . . . . . . . . . . . . . 61 Encryption of Outbound Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Secured Message Contents. . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Configuring and Using Encryption. . . . . . . . . . . . . . . . . . . . . . . . 62 Requirements for Using Encryption . . . . . . . . . . . . . . . . . . . . 62 Setting Encryption Policy for Outbound Mail . . . . . . . . . . . . . . . . 62 Branding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Encryption and Quarantine, Blocking and Queuing . . . . . . . . . . . . 63 Sending and Receiving Encrypted Messages. . . . . . . . . . . . . . . . . . 63 Spam Filtering and Quarantine of Outbound Mail . . . . . . . . . . . . . . . . . 64 Spam Scoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Managing Outbound Quarantine . . . . . . . . . . . . . . . . . . . . . . . . 64 Rate Control for Outbound Mail. . . . . . . . . . . . . . . . . . . . . . . . . . . 65 IP, Domain and Email Address Filtering of Outbound Mail . . . . . . . . . . . . . 65 IP Address Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Sender and Recipient Filtering . . . . . . . . . . . . . . . . . . . . . . . . . 66 Reverse DNS Blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Attachment Filename and Type Filtering . . . . . . . . . . . . . . . . . . . . 66 Content Analysis - Outbound Mail . . . . . . . . . . . . . . . . . . . . . . . . . 67 Custom Content Filters - Outbound. . . . . . . . . . . . . . . . . . . . . . . 67 Attachment Content Filtering - Outbound . . . . . . . . . . . . . . . . . 67 Fingerprint Analysis - Outbound. . . . . . . . . . . . . . . . . . . . . . . . . 67 Intent Analysis - Outbound . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Image Analysis - Outbound . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 5 Chapter 7 – Cloud-Based Protection . . . . . . . . . . . . . . . 69 Advantages of Using Cloud-Based Protection . . . . . . . . . . . . . . . . . . . 70 Setting Up Your Cloud Protection Layer . . . . . . . . . . . . . . . . . . . . . . 70 Configuring Cloud Protection Layer Spam & Virus Settings. . . . . . . . . . . 71 Viewing Email Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Monitor Incoming Emails . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Integration With the Barracuda Spam & Virus Firewall . . . . . . . . . . . 72 Chapter 8 – Advanced Configuration . . . . . . . . . . . . . . . 73 Sender Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Mail Protocol (SMTP) Checking. . . . . . . . . . . . . . . . . . . . . . . . . 74 Sender Spoof Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Invalid Bounce Suppression. . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Sender Policy Framework (SPF) . . . . . . . . . . . . . . . . . . . . . . . . 75 Exemptions from SPF Checking - Trusted Forwarders . . . . . . . . . . 75 Domain Keys (DKIM) Inspection . . . . . . . . . . . . . . . . . . . . . . . . 75 Custom policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Recipient Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 LDAP lookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Explicit Users to Accept For (Valid Recipients) . . . . . . . . . . . . . . . . . 76 Alias Linking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Remote IMAP/POP Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Clustering the Barracuda Spam & Virus Firewall . . . . . . . . . . . . . . . . . . 77 Setting Up Clustered Systems . . . . . . . . . . . . . . . . . . . . . . . . . 78 Removing a Barracuda Spam & Virus Firewall From a Cluster . . . . . . . . . 79 Centralized Policy Management With a Quarantine Host. . . . . . . . . . . . 79 Redundancy of user quarantine data on the cluster . . . . . . . . . . . . 79 Data Not Synchronized Across the Cluster . . . . . . . . . . . . . . . . . . . 79 Advanced Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Port Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Configuring the Network Interfaces . . . . . . . . . . . . . . . . . . . . . . . 80 Static Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Loopback Adapter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Non-Delivery Reports (NDRs) . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Spam Bounce Non-Delivery Reports (NDRs) . . . . . . . . . . . . . . . . . . 81 Reducing Backscatter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Remote Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Chapter 9 – Managing Inbound Quarantine . . . . . . . . . . 83 How Quarantine of Inbound Mail Works . . . . . . . . . . . . . . . . . . . . . . 84 Quarantine Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Turning Quarantine Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Using Global Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Using Per-user Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Where Do the Quarantined Messages Go? . . . . . . . . . . . . . . . . 86 Linking Domains for One Quarantine Inbox . . . . . . . . . . . . . . . . 86 The Quarantine Inbox . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Alias Linking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 6 Barracuda Spam & Virus Firewall Administrator’s Guide Controlling Access to Account Features . . . . . . . . . . . . . . . . . . . . 87 Overriding Default Account Features Settings . . . . . . . . . . . . . . . 88 Assigning Quarantine Inbox Permissions to Selected Users . . . . . . . . 88 Quarantine Notifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 How the Quarantine Digest Works . . . . . . . . . . . . . . . . . . . . . 89 Retention Policy and Purging Old Messages . . . . . . . . . . . . . . . . . . 89 Minimizing Excessive Storage of Email . . . . . . . . . . . . . . . . . . 89 Chapter 10 – Managing Accounts and Domains . . . . . . . 91 Creating and Managing Domains. . . . . . . . . . . . . . . . . . . . . . . . . . 92 Domain Level Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Creating and Managing Accounts . . . . . . . . . . . . . . . . . . . . . . . . . 93 Automatic Account Creation. . . . . . . . . . . . . . . . . . . . . . . . . . . 94 When to Disable Automatic Creation of Accounts . . . . . . . . . . . . . 95 Manually Creating User Accounts. . . . . . . . . . . . . . . . . . . . . . . . 95 Account Creation by Users . . . . . . . . . . . . . . . . . . . . . . . . . 95 Single Sign-On and User Authentication . . . . . . . . . . . . . . . . . . 95 Assigning Features to User Accounts. . . . . . . . . . . . . . . . . . . . . . 96 Role-based Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Roles and Navigating the Web Interface . . . . . . . . . . . . . . . . . . . . 96 Editing Accounts and Assigning Roles . . . . . . . . . . . . . . . . . . . . . 98 User Role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Helpdesk Role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Helpdesk Role - All_Domains Permissions . . . . . . . . . . . . . . . 100 Example Helpdesk Use Cases . . . . . . . . . . . . . . . . . . . . . . 102 Domain Admin Role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Domain Admin Role - All_Domains Permissions . . . . . . . . . . . . . 102 Use Case Scenarios For Role Assignments . . . . . . . . . . . . . . . . . 103 Auditor Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Chapter 11 – Monitoring the System . . . . . . . . . . . . . . 105 Viewing Performance Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . 106 Inbound and Outbound Message Queues . . . . . . . . . . . . . . . . . . 106 Retrying All Outbound Messages . . . . . . . . . . . . . . . . . . . . 106 The Message Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Setting up Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Setting up Emailed System Alerts. . . . . . . . . . . . . . . . . . . . . . . 109 Setting up SNMP Query and Alerts . . . . . . . . . . . . . . . . . . . . . . 109 Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111 Generating System Reports. . . . . . . . . . . . . . . . . . . . . . . . . . .111 Automating the Delivery of Scheduled System Reports . . . . . . . . . . . .111 Using the Barracuda Control Center . . . . . . . . . . . . . . . . . . . . . . . .112 Using the Task Manager to Monitor System Tasks. . . . . . . . . . . . . . . . .113 Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .114 Diagnostic Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .114 Testing Network Connectivity . . . . . . . . . . . . . . . . . . . . . . 114 Connect to Barracuda Support Servers . . . . . . . . . . . . . . . . . 114 Using a Syslog Server to Centrally Monitor System Logs. . . . . . . . . . . .114 Front Panel Indicator Lights. . . . . . . . . . . . . . . . . . . . . . . . . . .115 7 Chapter 12 – Maintenance . . . . . . . . . . . . . . . . . . . . . . 117 Updating the Firmware and Definitions. . . . . . . . . . . . . . . . . . . . . . .118 Updating the Firmware on your Barracuda Spam & Virus Firewall . . . . . . .118 Updating the Firmware of Clustered Systems . . . . . . . . . . . . . . 118 Updating the Definitions from Energize Updates . . . . . . . . . . . . . . . .118 Backing up and Restoring Your System . . . . . . . . . . . . . . . . . . . . . .119 Backup Up. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119 Three Types of Backups Available . . . . . . . . . . . . . . . . . . . . 119 Restoring a Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Reloading, Restarting, and Shutting Down the System . . . . . . . . . . . . . 121 Using the Built-in Troubleshooting Tools . . . . . . . . . . . . . . . . . . . . . 122 Rebooting the System in Recovery Mode . . . . . . . . . . . . . . . . . . . . 123 Reboot Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Replacing a Failed System . . . . . . . . . . . . . . . . . . . . . . . . . . 124 Barracuda Instant Replacement Service . . . . . . . . . . . . . . . . . 124 Appendix A – About the Hardware . . . . . . . . . . . . . . . . 125 Hardware Compliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Notice for the USA . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Notice for Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Notice for Europe (CE Mark) . . . . . . . . . . . . . . . . . . . . . . . 125 Power Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Appendix B – Limited Warranty and License . . . . . . . . 129 Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Exclusive Remedy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Exclusions and Restrictions. . . . . . . . . . . . . . . . . . . . . . . . . . 130 Software License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Energize Update Software License . . . . . . . . . . . . . . . . . . . . . . 131 Open Source Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 8 Barracuda Spam & Virus Firewall Administrator’s Guide Chapter 1 Introduction This chapter provides an overview of the Barracuda Spam & Virus Firewall and includes the following topics: Overview............................................................................................10 Barracuda Spam & Virus Firewall Models.......................................14 Contacting Technical Support............................................................15 Introduction 9 Overview The Barracuda Spam & Virus Firewall is an integrated hardware and software solution that provides powerful and scalable spam and virus-blocking capabilities without affecting the performance of your mail servers. With no per-user license fee, the Barracuda Spam & Virus Firewall can be scaled to support hundreds of thousands of active email users. In addition to protecting your mail server from malware from the Internet, the Barracuda Exchange Anti-Virus add-in for the MS Exchange Server can secure your internal mail transactions as well, blocking infected messages on your internal network. What This Guide Covers This guide provides concepts and general guidance the administrator needs to understand how to best configure the Barracuda Spam & Virus Firewall according to the organization’s deployment needs, policies and email infrastructure. General discussion of the powerful features of the Barracuda Spam & Virus Firewall are presented here while detailed, procedural configuration steps are given in the rich online help of the Web interface. To view the online help, click the Help button on the right side of any page of the Web interface. When referring to specific feature settings, this guide will specify the name of the tab in the Web interface in uppercase letters, followed by a ( > ) and the actual page name. For example, you can view system email and performance statistics and subscription status on the BASIC > Status page. Easy Administration The powerful Web interface of the Barracuda Spam & Virus Firewall allows for convenient configuration and management of spam and virus filtering policies and email security settings from one central location. The administrator can elect to receive alerts and notifications from the Barracuda Spam & Virus Firewall at any email address and has message and system logs available to quickly assess the status of the system. Key email statistics and system performance can be viewed at a glance on the BASIC > Status page of the Web interface. To minimize ongoing administration associated with security, Barracuda Central, the 24x7 operations center operated by Barracuda Networks to monitor and block the latest Internet threats, automatically delivers Energize Updates to your Barracuda Spam & Virus Firewall (see below). These updates include the latest spam and virus definitions for the most current protection against viruses and other security threats. IPv6 Network Support Note that version 5.1 and later of the Barracuda Spam & Virus Firewall supports sending and receiving email over both IPv4 and IPv6 networks. While email sent over IPv6 networks will be scanned for viruses and spam, IP-based analysis and policies are not applied to IPv6 in this version. 10 Barracuda Spam & Virus Firewall Administrator’s Guide
Description: