User`s guide
2.
3.
4.
1.
2.
3.
In the section, click the edit symbol ( ) for the custom service object that you want to edit.Custom Service Objects
In the window, edit the services for the object. Edit Service Object
Click .Save
Delete a Custom Service Object
To delete a custom service object:
Go to the page.FIREWALL > Service Objects
In the section, click the trash can icon ( ) for the custom service object that you want to delete.Custom Service Objects
When a window opens to ask if you want to delete the service object, click .OK
Interface Groups
In a firewall rule, the interface group specifies the interface that the source address is allowed to use. The following
table describes the predefined interface groups:
Interface Group Description
Matching
Ensures that arriving packets are processed through the same
interface that is used to forward the corresponding reply packets. The
source and destination addresses are the same. This method helps
prevent a network attack in which an attacker might try using internal
addresses from outside the internal network (IP spoofing).
Any
Uses the first interface matching the request, according to the routing
table. The packet source is not verified. Reply packets might be
forwarded through another interface, if another interface that is
capable of doing so is available. In very special configurations,
checking the physical source of packets cannot be required. For
security reasons, this option should only be used in very limited
situations.
DSL/DHCP
Explicitly restricts rule processing to the specified dynamic network
interface (if installed and configured).
WIFI/WIFI2/WIFI3
Explicitly restricts rule processing to the specified Wi-Fi network
interface (if installed and configured).
VPNClients
Explicitly restricts rule processing to the specified virtual network
interface of a VPN client (if installed and configured).
3G
Explicitly restricts rule processing to the specified 3G network
interface (if installed and configured).
On the page, you can see the existing interface groups and create new groups.NETWORK > Interface Groups
Link Balancing
On the Barracuda Firewall, you can configure inbound link balancing, outbound link balancing, and inbound load balancing. Link balancing is also
sometimes called "link aggregation."
In this article:
Inbound Link Balancing
Outbound Link Balancing
Inbound Load Balancing
Inbound Link Balancing
You can use DNS to balance inbound traffic among multiple links. You can associate your domain name (or names) with multiple IP addresses,
each of which represents an external interface. When the DNS request for the domain name is resolved, all of these IP addresses are included in
the answer. The resolver can vary the order of the addresses, and the requester uses the first entry in the list to access your site.