The Barracuda DC Agent is the connector between various Barracuda Networks products and Microsoft domain controllers to transparently monitor user authentication. You can install the Barracuda DC Agent either on the domain controller or on a dedicated Windows PC on the office network. The Barracuda DC Agent periodically checks the domain controller for login events and to obtain a record of authenticated users. The IP addresses of authenticated users are mapped to their username and group context. The list of authenticated users is provided to the firewall, allowing true single sign-on capabilities.
Before you begin
Before you configure MSAD DC Client authentication, you must install the Barracuda DC Agent on the Microsoft Active Directory server.
For more information, see Barracuda DC Agent for User Authentication.
Configure the MSAD DC Client
Configure MSAD DC Client settings on the Barracuda NextGen Firewall F-Series:
- Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
- In the left menu, click MSAD DC Client.
- Click Lock.
- Set Activate Scheme to Yes.
- Set Auto Logout After to the number of hours after which a user is automatically logged out. If the client receives the IP address via DHCP sync this value with the DHCP lease timeout.
- In the Server Setting table, add all Microsoft Active Directory servers running the Barracuda DC Agent.
- For each entry, specify the IP Address of the Active Directory server running the DC Agent.
- Enter the TCP Port of the Active Directory server running the DC Agent (default: port 5049).
- If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list.
- Click OK.
In the Group Filter Patterns table, you can add patterns to filter group information from the directory service.
- Group Filter Pattern:
CN=foo, OU=bar, DC=foo-bar, DC=foo
CN=SSL VPN, DC=foo-bar, DC=foo
In this example, User01 does not have the
*SSL*pattern in its group membership string and will not match in group-based limitations.
- Group Filter Pattern:
Click Send Changes and Activate.
Remove the user from the user database
On the FIREWALL > Users page, right-click on the user and click Logout Selected. The user now has to re-authenticate on the domain controller, for example by accessing a network share or by logging in to his/her workstation.