Barracuda

LogZilla App Store application: Barracuda

Overview

The Barracuda Web Security Gateway is a web security appliance that provides advanced threat protection for organizations. It functions as a web proxy server that inspects HTTP and HTTPS traffic, blocking malware, viruses, spyware, and malicious websites while enforcing web usage policies. The gateway offers real-time content filtering, application control, and data loss prevention capabilities to protect networks from web-based threats and ensure compliance with organizational security policies.

App Function

The Barracuda app summarizes the proxy action, subject address, and reason for the action into user tags.

Vendor Documentation

Incoming Log Format

Barracuda logs use a fixed-format with space-separated fields (values only).

Parsed Metadata Fields

TaggedTag NameField NameExampleDescription
Epoch Time1158710827Seconds since 1970, UNIX timestamp.
SrcIPSrc IP11.22.33.44IP address of the client (source).
DstIPDest IP11.22.33.44(55.66.77.88)IP address for the page (destination) that was blocked by the Barracuda Web Security Gateway.
Content Typetext/htmlHTTP header designated content type.
Src IP11.22.33.44IP address of the (source).
Destination URLhttp://www.xxx.comThe URL the client tried to visit.
Data Size2704The size of the content.
ActionActionBYF ALLOWEDAction performed by the transparent proxy. "BYF" is a static string.
ReasonReasonCLEANReason for the action
DetailsStream=>Eicar-Test-Signature FOUND(only for blocked traffic:) the name of the virus or spyware that was detected
Format Version2The version of the policy engine output.
Match flag1Whether an existing policy matched the traffic. (1 Yes, 0 No)
TQ flag0Whether the rule is time-qualified. For example, during work hours 9am - 5pm. (1 Yes, 0 No)
Action Type1The action performed by the policy engine on this request
Src Type3If matched by source, what its type is
Src Detail-Any detail related to the matched source.
Dst Type1If matched by destination, what its type is
Dst DetailadultDetail of the matched destination (such as the first matched category)
Spy Type0If it is a spyware hit, what its type is
Spy IDSpy ID-The name of the spyware if matched due to spyware hit.
Infection Score0Weight of the infection. Currently, mostly 0.
Match PartMatched Partsex.comThe part of the rule that matched.
Match CategoryMatched Categoryadult,pornThe policy category that matched the traffic.
User InfoUser InfoANONUser information
Referer URLhttp://www.purple.com/purple.htmlIf enabled, displays URL of Referer. If disabled, displays a dash '–'
Referer Domainpurple.comIf enabled, displays domain of Referer. If disabled, displays a dash '–' .
Referer CategoryReferer Categorynews, adult, hosted-personal-pagesIf enabled, displays the category to which the Referer domain belongs. If disabled, displays a dash '–'.
WSA Remote User Type1Indicates whether traffic comes from a Barracuda WSA client (Windows or Macintosh) or is local traffic.

Field Notes

Action

This indicates the action the proxy server took in response to the HTTP request. Possible values are:

  • ALLOWED: Traffic was processed by the transparent proxy and no virus or spyware was detected.
  • BLOCKED: Traffic was blocked by the transparent proxy because the proxy detected virus or spyware.
  • DETECTED: Another process detected outbound spyware activity.

Reason

This is the reason the action was taken for the request. Possible values are:

  • CLEAN: Traffic does not contain any virus or spyware.
  • VIRUS: Traffic was blocked because it contains a virus.
  • SPYWARE: Traffic was blocked because it contains spyware.

Action Type

This indicates the action performed by the policy engine for the request:

ValueMeaning
0allowed
1denied
2redirected
3rewritten by add/set a new parameter in query
4rewritten by deleting an existing parameter in query
5matched a rule and allowed but marked as monitored
6branched to another rule set.

Src Type

If this value is matched by source its type is:

ValueType
0always, matches any source
1group, matched by group id
2IPv4addr, matched by an IPv4 address
3login, matched by login
4login any, matched any authenticated user
5min_score, matched due to minimum infection threshold breached.

Dst Type

If this value is matched by destination its type is:

ValueType
0always, matched any destination
1category, matched a particular category
2category any, matched any category
3domain, matched due to domain or subdomain
4mimetype, matched due to mime-type
5spyware hit, matched due to spyware hit
6URI path regex, matched URI path
7URI regex, matched any part of the URI
8application, matches an application characteristics

Spy Type

If the request is a spyware hit its type is:

ValueType
0allow
1block
2infection

User Information

User information is one of the following:

  • ANON: Anonymous, unauthenticated users
  • ldap: Username: LDAP user info
  • username: Non-LDAP user info (users created in the admin interface).

High-Cardinality (HC) Tags

  • SrcIP
  • DstIP

Log Examples

Example 1: Clean, Policy-Allowed Traffic

The following example shows a log message for clean traffic from a Barracuda WSA client going to an allowed website (cnn.com). The term "clean" represents traffic that does not contain viruses or spyware.

text
1158710819 1 11.22.33.44 55.66.77.88 image/gif 10.1.1.8 http://i.cnn.net/cnn/.element/img/1.3/video/tab.middle.on.gif 1744 BYF ALLOWED CLEAN 2 0 0 0 0 - 0 - 0 - 0 cnn.net news ANON http://www.cnn.com www.cnn.com news 1

Example 2: Virus-Infected Traffic Blocked

The following example shows inline traffic that has been blocked by the Barracuda Web Security Gateway because the traffic contains a known virus.

text
1158710880 1 11.22.33.44 127.0.0.1 - 11.22.33.44 http://www.eicar.org/download/eicar.com.txt 0 BYF BLOCKED VIRUS stream=>Eicar-Test-Signature FOUND 2 0 0 0 0 - 0 - 0 - 0 eicar.org computing-technology ANON http://www.somedomain.com/index.html somedomain.com news 0

Example 3: Inline Traffic Showing Simple Content

text
1480360415 1 11.22.33.44 55.66.77.88 - 11.22.33.44 https://self-repair.mozilla.org/ 7652 BYF ALLOWED CLEAN 2 0 0 0 0 (-) 0 - 0 - 0 self-repair.mozilla.org computing-technology,CUSTOM-142556317732606,CUSTOM-1425889735316,CUSTOM-1425890081323,CUSTOM-1425890385330,CUSTOM-1425890704337,CUSTOM-1425890996342 \[[email protected]\] https://self-repair.mozilla.org - - 0
Barracuda | LogZilla Documentation