It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

This Firmware Version Is End-Of-Support

Documentation for this product is no longer updated. Please see End-of-Support for CloudGen Firewall Firmware for further information on our EoS policy.

How to Configure MSAD DC Client Authentication

  • Last updated on

The Barracuda DC Client receives user authentication information from Barracuda DC Agents installed on Microsoft domain controllers.

Before you Begin

Before you configure MSAD DC Client authentication, you must install the Barracuda DC Agent on the Microsoft Active Directory server. For more information, see Barracuda DC Agent for User Authentication.

Configure the MSAD DC Client

Configure MSAD DC Client settings on the Barracuda NextGen Firewall F-Series: 

  1. Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
  2. In the left menu, click MSAD DC Client.
  3. Click Lock.
  4. Set Activate Scheme to Yes.
  5. In the Server Setting table, add all Microsoft Active Directory servers running the Barracuda DC Agent. 
  6. For each entry, specify the IP Address of the Active Directory server running the DC Agent.
  7. Enter the TCP Port of the Active Directory server running the DC Agent (default: port 5049).
  8. If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list.
  9. Click OK.
  10. In the Group Filter Patterns table, you can add patterns to filter group information from the directory service.

    • Group Filter Pattern: *SSL*
    • User01: CN=foo, OU=bar, DC=foo-bar, DC=foo
    • User02: CN=SSL VPN, DC=foo-bar, DC=foo

    In this example, User01 does not have the *SSL* pattern in its group membership string and will not match in group-based limitations.

  11. Click Send Changes and Activate.

Last updated on