We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

Access Control Service

  • Last updated on

The Barracuda CloudGen Firewall Access Control service defines security policies for network users (e.g., VPN clients) and enables the CloudGen Firewall to perform identity and health checks on clients. The Access Control service of the CloudGen Firewall interacts with the Barracuda Network Access Client and needs to be set up simultaneously. For proper operation, all components of the Barracuda Network Access Client framework, the Access Control service on the CloudGen Firewall, and the client software require up-to-date virus and spam protection.

Access Control Service Trustzones

Access Control services within the same trust zone share the same set of security policies that are defined in access control objects. If you are using the Access Control service on a managed CloudGen Firewall, the Barracuda Firewall Control Center provides Access Control Service Trustzones as global objects. Access Control Service Trustzones can be configured on a range, cluster, or virtual server basis. 

For more information, see Configuring Access Control Service Trustzones.

Access Control Objects

Access control objects are assigned to clients according to access control policies and enable administrators to perform certain actions such as registry checks and repairs on a client. Create access control objects with policy rulesets specifying required system and service settings to let the CloudGen Firewall perform identity and health checks on connecting clients and groups. Access control objects permit access only to administrators with appropriate administrative scope and appropriate permission.

For more information, see Configuring Access Control Objects.

Last updated on