Barracuda Web Application Firewall

Protect Applications and Data from Advanced Threats

Download PDF

Overview

The Barracuda Web Application Firewall blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target the applications hosted on your web servers—and the sensitive or confidential data to which they have access.

The Barracuda Advantage

  • State-of-the-art security utilizing full reverse-proxy architecture
  • Malware protection for collaborative web applications
  • Employs IP Reputation intelligence to defeat DDoS attacks
  • No user-based or module-based licensing
  • Designed to make it easier for organizations to comply with regulations such as PCI DSS and HIPAA
  • Cloud-based scan with Barracuda Vulnerability Manager
  • Automatic vulnerability remediation

Product Spotlight

  • Comprehensive inbound attack protection including the OWASP Top 10
  • Built-in caching, compression and TCP pooling ensure security without performance impacts
  • Identity-based user access control for web applications
  • Built-in data loss prevention
  • ICSA certified

Constant Protection from Evolving Threats

The Barracuda Web Application Firewall provides superior protection against data loss, DDoS, and all known application layer attack modalities. Automatic updates provide defense against new threats as they appear. As new types of threats emerge, it will acquire new capabilities to block them.

Identity and Access Management

The Barracuda Web Application Firewall has strong authentication and access control capabilities that ensure security and privacy by restricting access to sensitive applications or data to authorized users.

Affordable and Easy to Use

Pre-built security templates and intuitive web interface provide immediate security without the need for time-consuming tuning or application learning. Integration with security vulnerability scanners and SIEM tools automates the assessment, monitoring, and mitigation process.

"With the Barracuda Web Application Firewall in place, we are demonstrating to our customers and partners that we are serious about the security of their data. It lets our staff to worry less about backend security and concentrate more on providing quality services to our partners and customers."
- Michael Fainshtein, Chief Technology Officer CredoRax

Technical Specs

Technical Specs

Web Application Security

  • OWASP top 10 protection
  • Form field meta-data validation
  • Adaptive security
  • Website cloaking
  • URL encryption
  • Response contro
  • JSON payload inspection
  • XML firewall
  • Web scraping protection
  • Granular policies to HTML elements
  • Protocol limit checks
  • File upload control
  • Tor Blocking
Protection against common attacks:
  • SQL injection
  • Cross-site scripting
  • Cookie or forms tampering
Outbound data theft protection:
  • Credit card numbers
  • Custom pattern matching (regex)
Geo IP location:
  • Anonymous Proxy

Networking

  • VLAN, NAT
  • Network ACLs
  • Advanced routing

Supported Web Protocols

  • HTTP/S 0.9/1.0/1.1/2.0
  • WebSocket
  • FTP/S
  • XML
  • IPv4/IPv6

Authentication

  • LDAP/RADIUS
  • Client Certificates
  • SMS Passcode
  • Single Sign-On
  • Multi-Domain SSO

Advanced Authentication (660 & above)

  • Kerberos v5
  • SAML
  • Azure AD
  • RSA SecurID

Application Delivery and Acceleration

  • High availability
  • SSL offloading
  • Load balancing
  • Content routing

DDoS Protection

  • Integration with Barracuda NextGen Firewall to block malicious IPs
  • Barracuda IP Reputation Database
  • Heuristic Fingerprinting
  • CAPTCHA challenges
  • Slow Client protection
  • ToR exit nodes
  • Barracuda blacklist
  • Volumetric DDoS protection3

SIEM Integrations

  • HPE ArcSight
  • RSA enVision
  • Splunk
  • Symantec
  • Microsoft Azure Event Hub
  • Custom

Logging, Monitoring and Reporting

  • Barracuda IP Reputation Database
  • Heuristic Fingerprinting
  • CAPTCHA challenges
  • Slow Client protection

Models & Options

Models

360

  • 1 - 5 Backend Servers
  • 25 Mbps Throughput
  • 8,000 HTTP Transactions/Sec.
  • 2,500 SSL Transactions/Sec.

+ Show more - Show less

  • Hardware

  • Form Factor 1U Mini
  • Ethernet Ports 2 x 10/100 w/bypass Cu
  • Gigabit Ethernet Ports **
  • 10 Gigabit Ethernet Ports **
  • Management Port 10/100
  • Features

  • HTTP/S, FTP Protocol Validation
  • Form Field Meta Data Validation
  • Bot Protection
  • Web Scraping Protection
  • Web Site Cloaking
  • JSON Protection
  • Response Control
  • Outbound Data Theft Protection
  • File Upload Control
  • Logging, Monitoring and Reporting
  • High Availability
  • SSL Offloading
  • Authentication and Authorization
  • Vulnerability Scanner Integration
  • Centralized Management
  • Client IP Reputation
  • Network Firewall
  • High Availability: Active/Passive
  • Rest API
  • Vulnerability Remediation Service
  • Caching and Compression
  • LDAP/RADIUS
  • Load Balancing
  • Content Routing
  • ECC Memory
  • Adaptive Profiling
  • AV for File Uploads
  • XML Firewall
  • Advanced Routing
  • URL Encryption
  • SAML v2 SP Support
  • Barracuda Advanced Threat Protection *

460

  • 5 - 10 Backend Servers
  • 50 Mbps Throughput
  • 15,000 HTTP Transactions/Sec.
  • 4,000 SSL Transactions/Sec.

+ Show more - Show less

  • Hardware

  • Form Factor 1U Mini
  • Ethernet Ports
  • Gigabit Ethernet Ports ** 2 x 1 GbE w/bypass Cu
  • 10 Gigabit Ethernet Ports **
  • Management Port 10/100/1000
  • Features

  • HTTP/S, FTP Protocol Validation
  • Form Field Meta Data Validation
  • Bot Protection
  • Web Scraping Protection
  • Web Site Cloaking
  • JSON Protection
  • Response Control
  • Outbound Data Theft Protection
  • File Upload Control
  • Logging, Monitoring and Reporting
  • High Availability
  • SSL Offloading
  • Authentication and Authorization
  • Vulnerability Scanner Integration
  • Centralized Management
  • Client IP Reputation
  • Network Firewall
  • High Availability: Active/Passive
  • Rest API
  • Vulnerability Remediation Service
  • Caching and Compression
  • LDAP/RADIUS
  • Load Balancing
  • Content Routing
  • ECC Memory
  • Adaptive Profiling
  • AV for File Uploads
  • XML Firewall
  • Advanced Routing
  • URL Encryption
  • SAML v2 SP Support
  • Barracuda Advanced Threat Protection *

660

  • 10 - 25 Backend Servers
  • 200 Mbps Throughput
  • 30,000 HTTP Transactions/Sec.
  • 12,000 SSL Transactions/Sec.

+ Show more - Show less

  • Hardware

  • Form Factor 1U
  • Ethernet Ports
  • Gigabit Ethernet Ports ** 2 x 1 GbE w/bypass Cu
  • 10 Gigabit Ethernet Ports **
  • Management Port 10/100/1000
  • Features

  • HTTP/S, FTP Protocol Validation
  • Form Field Meta Data Validation
  • Bot Protection
  • Web Scraping Protection
  • Web Site Cloaking
  • JSON Protection
  • Response Control
  • Outbound Data Theft Protection
  • File Upload Control
  • Logging, Monitoring and Reporting
  • High Availability
  • SSL Offloading
  • Authentication and Authorization
  • Vulnerability Scanner Integration
  • Centralized Management
  • Client IP Reputation
  • Network Firewall
  • High Availability: Active/Passive
  • Rest API
  • Vulnerability Remediation Service
  • Caching and Compression
  • LDAP/RADIUS
  • Load Balancing
  • Content Routing
  • ECC Memory
  • Adaptive Profiling
  • AV for File Uploads
  • XML Firewall
  • Advanced Routing
  • URL Encryption
  • SAML v2 SP Support
  • Barracuda Advanced Threat Protection *

860

  • 25 - 150 Backend Servers
  • 1 Gbps Throughput
  • 90,000 HTTP Transactions/Sec.
  • 30,000 SSL Transactions/Sec.

+ Show more - Show less

  • Hardware

  • Form Factor 2U
  • Ethernet Ports
  • Gigabit Ethernet Ports ** 8 x 1GbE
  • 10 Gigabit Ethernet Ports **
  • Management Port 10/100/1000
  • Features

  • HTTP/S, FTP Protocol Validation
  • Form Field Meta Data Validation
  • Bot Protection
  • Web Scraping Protection
  • Web Site Cloaking
  • JSON Protection
  • Response Control
  • Outbound Data Theft Protection
  • File Upload Control
  • Logging, Monitoring and Reporting
  • High Availability
  • SSL Offloading
  • Authentication and Authorization
  • Vulnerability Scanner Integration
  • Centralized Management
  • Client IP Reputation
  • Network Firewall
  • High Availability: Active/Passive
  • Rest API
  • Vulnerability Remediation Service
  • Caching and Compression
  • LDAP/RADIUS
  • Load Balancing
  • Content Routing
  • ECC Memory
  • Adaptive Profiling
  • AV for File Uploads
  • XML Firewall
  • Advanced Routing
  • URL Encryption
  • SAML v2 SP Support
  • Barracuda Advanced Threat Protection *

960

  • 150-300 Backend Servers
  • 5 Gbps Throughput
  • 180,000 HTTP Transactions/Sec.
  • 50,000 SSL Transactions/Sec.

+ Show more - Show less

  • Hardware

  • Form Factor 2U
  • Ethernet Ports
  • Gigabit Ethernet Ports ** 8 x 1GbE
  • 10 Gigabit Ethernet Ports ** 2x 10 GbE
  • Management Port 10/100/1000
  • Features

  • HTTP/S, FTP Protocol Validation
  • Form Field Meta Data Validation
  • Bot Protection
  • Web Scraping Protection
  • Web Site Cloaking
  • JSON Protection
  • Response Control
  • Outbound Data Theft Protection
  • File Upload Control
  • Logging, Monitoring and Reporting
  • High Availability
  • SSL Offloading
  • Authentication and Authorization
  • Vulnerability Scanner Integration
  • Centralized Management
  • Client IP Reputation
  • Network Firewall
  • High Availability: Active/Passive
  • Rest API
  • Vulnerability Remediation Service
  • Caching and Compression
  • LDAP/RADIUS
  • Load Balancing
  • Content Routing
  • ECC Memory
  • Adaptive Profiling
  • AV for File Uploads
  • XML Firewall
  • Advanced Routing
  • URL Encryption
  • SAML v2 SP Support
  • Barracuda Advanced Threat Protection *
* Requires separate license
** Copper/Fiber (MM) NIC options and Hard Bypass options available

Support Options

Instant Replacement Service

  • Replacement unit shipped next business day
  • 24/7 technical support
  • Free hardware refresh every four years

Barracuda Energize Updates

    Standard technical support
    Firmware and capability updates as required
    Automatic application definitions updates

Hardware Options

  • Optional Ethernet Bypass

Management Options

  • Customizable role-based administration
  • Vulnerability scanner integration
  • Trusted host exception
  • Rest API
  • Custom Templates
  • Interactive and scheduled reports