Barracuda Web Filter 310 – The hidden options

Many months ago when configuring a Barracuda Web Filter 310 I came across a “hidden” expert menu which provides extended options (some of which are not advertised by Barracuda Networks) which may be useful within your environment.

To access this hidden menu you simply load up the admin interface on your Web Filter then click on the “Advanced” tab. Once the Advanced page displays, click in your location bar of your web browser and at the end of the URL listed add &expert=1 .. So for example your URL would look something like:

http://ipaddress:8000/cgi-mod/index.cgi?&user=admin&password=hash&et=1265483069&auth_type=Local&locale=en_US&primary_tab=ADVANCED&expert=1

Many months ago when configuring a Barracuda Web Filter 310 I came across a “hidden” expert menu which provides extended options (some of which are not advertised by Barracuda Networks) which may be useful within your environment.

To access this hidden menu you simply load up the admin interface on your Web Filter then click on the “Advanced” tab. Once the Advanced page displays, click in your location bar of your web browser and at the end of the URL listed add &expert=1 .. So for example your URL would look something like:

http://ipaddress:8000/cgi-mod/index.cgi?&user=admin&password=hash&et=1265483069&auth_type=Local&locale=en_US&primary_tab=ADVANCED&expert=1

Then simply click enter and Viola! You will now see a new tab available in red labeled “Expert Variables”.

Here is a list of some of the options available to you within this new tab:

  • Define NTP Server
  • Enable SNMP (On Barracuda’s website they list this option as *NOT* available on the 310’s — it is SNMPv1 only though)
  • Enable DOS Attack Protection
  • Define the IP address and port of any pre-existing proxy in front of the Barracuda
  • Traffic Log Maximum Size
  • Define the allowed HTTP methods other than standard GET,POST,HEAD. Example for Subversion: REPORT MERGE MKACTIVITY CHECKOUT … etc.
  • Define HTTPS Ports
  • Ports exempt from being examined by the Spyware Protocol scanning module
  • Define the local Redirect IP Address
  • Define the email address that the Reports From Address displays
  • The 5 minute system load average value that will trigger Safe Operating mode
  • Define whether to use the DNS cache service to handle heavy DNS traffic loads
  • Define whether to use your local DNS server to cache DNS entries
  • Proxy Authentication Exempt
  • Define URLs, Source/Dest IP Addresses, HTTP Request Headers, etc

Enjoy!