Fortinet white logo
Fortinet white logo

External Systems Configuration Guide

Barracuda Networks Spam Firewall

Barracuda Networks Spam Firewall

What is Discovered and Monitored

Protocol

Information discovered

Metrics collected

Used for

SNMP

Host name, Interfaces, Serial number CPU utilization, Memory utilization, Interface Utilization Performance Monitoring

Syslog

Various syslog - scenarios include - mail scanned and allowed/denied/quarantined etc; mail sent and reject/delivered/defer/expired; mail received and allow/abort/block/quarantined etc. Security Monitoring and compliance

Event Types

In ADMIN > Device Support > Event Types, search for "barracuda" to see the event types associated with this device.

Rules

There are no predefined rules for this device.

Reports

There are no predefined reports for this device.

Configuration

SNMP

FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide.

Syslog

FortiSIEM processes events from this device via syslog sent by the device. Configure the device to send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.

  • For Syslog Server, or the server where the syslog should be sent, enter the IP address of your FortiSIEM virtual appliance.
  • For Port, enter 514.
  • Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that shown in the example.
Sample Parsed Barracuda Spam Firewall Syslog Message

<23>inbound/pass1[923]: 127.0.0.1 1300386119-473aa6a90001-sB89EM 0 0 RECV - 1 4D760309475 250 2.6.0  <E6BB7C56C6761D42AEAFBF7FC6E17E920156A38D@USNSSEXC174.us.world.example.com> Queued mail for delivery

<23>scan[9390]: mail.example.net[207.65.119.227] 1300386126-4739a8be0001-R6OEVB 1300386126 1300386128 SCAN - release@subject.example.net user1@example.com - 7 61 - SZ:34602 SUBJ:Email Subject Information April 24, 2012

Settings for Access Credentials

Set these Access Method Definition values to allow FortiSIEM to communicate with your device.

Setting Value
Name <set name>
Device Type Barracuda Spam Firewall
Access Protocol See Access Credentials
Port See Access Credentials
Password config See Password Configuration

Barracuda Networks Spam Firewall

Barracuda Networks Spam Firewall

What is Discovered and Monitored

Protocol

Information discovered

Metrics collected

Used for

SNMP

Host name, Interfaces, Serial number CPU utilization, Memory utilization, Interface Utilization Performance Monitoring

Syslog

Various syslog - scenarios include - mail scanned and allowed/denied/quarantined etc; mail sent and reject/delivered/defer/expired; mail received and allow/abort/block/quarantined etc. Security Monitoring and compliance

Event Types

In ADMIN > Device Support > Event Types, search for "barracuda" to see the event types associated with this device.

Rules

There are no predefined rules for this device.

Reports

There are no predefined reports for this device.

Configuration

SNMP

FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide.

Syslog

FortiSIEM processes events from this device via syslog sent by the device. Configure the device to send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.

  • For Syslog Server, or the server where the syslog should be sent, enter the IP address of your FortiSIEM virtual appliance.
  • For Port, enter 514.
  • Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that shown in the example.
Sample Parsed Barracuda Spam Firewall Syslog Message

<23>inbound/pass1[923]: 127.0.0.1 1300386119-473aa6a90001-sB89EM 0 0 RECV - 1 4D760309475 250 2.6.0  <E6BB7C56C6761D42AEAFBF7FC6E17E920156A38D@USNSSEXC174.us.world.example.com> Queued mail for delivery

<23>scan[9390]: mail.example.net[207.65.119.227] 1300386126-4739a8be0001-R6OEVB 1300386126 1300386128 SCAN - release@subject.example.net user1@example.com - 7 61 - SZ:34602 SUBJ:Email Subject Information April 24, 2012

Settings for Access Credentials

Set these Access Method Definition values to allow FortiSIEM to communicate with your device.

Setting Value
Name <set name>
Device Type Barracuda Spam Firewall
Access Protocol See Access Credentials
Port See Access Credentials
Password config See Password Configuration