Barracuda CloudGen integration
You can integrate Barracuda CloudGen with Sophos Central so that it sends alerts to Sophos for analysis.
This page gives you an overview of the integration.
Barracuda CloudGen overview
Barracuda CloudGen Firewall offers comprehensive security solutions for cloud and hybrid networks. The firewall improves site-to-site connectivity and enables uninterrupted access to applications hosted in the cloud. With multi-layered defenses, including advanced threat protection and global intelligence networks, Barracuda ensures real-time protection against diverse cyber threats such as ransomware and zero-day attacks. Deployable across physical and cloud environments, it provides integrated SD-WAN capabilities for seamless connectivity and centralised management tools for simplified deployment and comprehensive network visibility.
Sophos documents
What we ingest
Sample alerts seen by Sophos:
Login from IP_ADDRESS: Denied: Firewall Rule RULErolled out network relevant configuration filesLoad Config from FILEPlug and Play ACPI device, ID (active)starting vpn clientFW UDP Connection Limit ExceededFW Rule WarningFW Flood Ping Protection Activated
Alerts ingested in full
We advise you to configure the Detailed Firewall Reporting syslog output from Barracuda CloudGen firewall, but this is subject to significant filtering so that it only only processes useful security alerts.
Most alerts are standardised with regex.
Filtering
We currently filter the noisiest alerts. Filters include the following:
UDP-NEW\\(Normal Operation,0\\)Session Idle Timeout\\[Request\\] Allow\\[Request\\] Remove\\[Sync\\] Changed: TransportSession PHS: Authentication request from userTunnel has now one working transportSession -------- TunnelAbort TCP transportInfo CHHUNFWHQ-01 Session: Accounting LOGINState: REM\\(Unreachable Timeout,20\\)read failed\\(IOStreamSock: Receive\\(\\) end of file\\) closing connectionDH attributes found in request, generating new key\\[Sync\\] Changed: Checking TransportsState: UDP-FAIL\\(Port Unreachable,3\\)DH key agreement successfulRequest Timeout \\(HandshakeRequest ReqState=Init RepState=Init\\) -> terminate session\\[Sync\\] Local: Update Transportsend fast reply\\[Sync\\] Session Command\\[HASYNC\\] updateTransport .* State changed toAccounting LOGOUTTCP.*close on commandRule: Authentication LoginRule: Authentication LogoutError.*Request TimeoutInfo.*Delete TransportInfo.*\\[HASYNC\\]Notice.*\\[HASYNC\\]Warning.*Tunnel Heartbeat failedInfo.*Worker Process.*timeoutError.*Operation: Poll.*TimeoutInfo.*\\(New RequestInfo.*\\(Normal Operation
Sample threat mappings
We use fields.message for threat mappings where it's present, or look up a code from the info field of standard event types. See Security Events.
"alertType": "=> searchRegexList(fields.message, [_.referenceValues.code_translation.regex_alert_type, _.globalReferenceValues.code_translation.regex_alert_type]) ? searchRegexList(fields.message, [_.referenceValues.code_translation.regex_alert_type, _.globalReferenceValues.code_translation.regex_alert_type]) : fields.message"
Samples:
{"alertType": "Number of child processes automatically set to N based on number of CPU cores and size of RAM", "threatId": "T1057", "threatName": "Process Discovery"}
{"alertType": "found no explicit phase1 aggressive configuration in IP_ADDRESS for client", "threatId": "T1573", "threatName": "Encrypted Channel"}