It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

This Firmware Version Is End-Of-Support

Documentation for this product is no longer updated. Please see End-of-Support for CloudGen Firewall Firmware for further information on our EoS policy.

How to Create and Apply User Objects for VPN Users

  • Last updated on

In user objects, you can enter either X.509 certificate patterns or VPN user patterns to reference VPN users and groups. With use of the Barracuda Network Access Client, you can also reference users by policy role patterns.

Combining fields is also possible. For example, you can enforce a VPN connection, by entering required VPN user patterns and require a matching X.509 certificate to be installed in the browser application by entering required X.509 certificate patterns.

Create a User Object for VPN Users

  1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Forwarding Rules.
  2. Click Lock.
  3. In the left menu, select Users and Groups.
  4. Right-click the table and select New.
  5. In the Edit/Create User Object window, enter a Name for the user object. E.g., VPN Users
  6. Click New to add a user condition. The User Condition window opens.
  7. If you are using the Barracuda Network Access Client , enter the policy roles patterns in the Policy Roles Patterns section.
    1. Select the required condition from the list.
    2. Click Add and select one or more patterns. If a condition must not apply, select the Negative Match check box.
  8. To use a certificate, click Edit in the X509 Certificate Pattern section and specify the certificate conditions:
    • Subject/Issuer  The subject/issuer of the affected X.509 certificate.

      If multiple subject parts (key value pairs) are required, separate them with / (for example, OU=test1 and OU=test2 are required, select OU and enter test1/test2). Using wildcards (?, *) is allowed. Take into consideration that order is mandatory.

    • Policy/AltName – The ISO number and the SubjectAltName according to the certificate. 

  9. If applicable, enter the required VPN login and group policy the object has to apply to in the VPN User Pattern section:
    • VPN Name – The required VPN login name. Using wildcards (?, *) is allowed.
    • VPN Group  – The required VPN group policy that the object has to apply to.
    • Authentication Method – In this section, you can specify the following settings:
      • Origin  Defines the type of originator (see User Objects).
      • Server/Service/Box – Allows enforcing authentication on a certain server/service/box.

    VPN_user_object.png
  10. Click OK.
  11. After you specify the conditions for all of the users that you want to include in this object, click OK to create the user object.
  12. Click Send Changes and Activate.

If you are using Offline Authentication, ensure that user-specific rules are sequenced after the fwauth rule. For more information, see How to Configure Offline Firewall Authentication.

Apply a User Object to an Access Rule

  1. Go to CONFIGURATION > Configuration Tree > Box > Virtual Servers > your virtual server > Assigned Services > Firewall > Forwarding Rules.
  2. Click Lock.
  3. Edit the access rule that you want to apply the user object to.
  4. From the Authenticated User list, select the user object.
    user_obj_rule.png
  5. Click OK.
  6. Click Send Changes and Activate.