It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

This Firmware Version Is End-Of-Support

Documentation for this product is no longer updated. Please see End-of-Support for CloudGen Firewall Firmware for further information on our EoS policy.

How to Configure RADIUS Authentication

  • Last updated on

Remote Access Dial-In User Service (RADIUS) is a networking protocol providing authentication, authorization, and accounting. The Barracuda CloudGen Firewall can use RADIUS authentication for IPsec, Client-to-Site, and SSL VPN. RADIUS on the CloudGen Firewall supports the Extensible Authentication Protocol (EAP-RADIUS) and the Protected Extensible Authentication Protocol (PEAP) during the authentication process.

Before You Begin

When using RADIUS for OTP authentication (eg., LinOTP, privacyIDEA) you must enable the option Always use Session Password in the Firewall Admin Client Settings, otherwise authentication will fail. For more information, see Barracuda Firewall Admin Settings.

Configure RADIUS Authentication

To configure RADIUS for external authentication with the Barracuda CloudGen Firewall,

  1. Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
  2. In the left navigation pane, select RADIUS Authentication.
  3. Click Lock.
  4. From the Configuration Mode menu on the left, select Advanced View.
  5. Enable RADIUS as external directory service.
  6. In the Radius Server Address / Port fields, enter the IP address and port of the RADIUS server (default: port 1812).
  7. In the Radius Server Key section, define the pre-shared secret to authorize requests.

    The pre-shared secret can consist of small and capital characters, numbers, and non alpha-numeric symbols, except backslashes and the hash sign (#).

  8. From the Group Attribute Delimiter list, you can select how groups are delimited in a list. To explicitly specify a delimiter character, select the Other checkbox and enter the character in the Group Attribute Delimiter field.
  9. From the Group Attribute Usage list, you can select the group information that is used (e.g.: CN=…, OU=…, DC=…). You can select:
    • All (default) – Complete string
    • First – Only the first group
    • Last – Only the last group
  10. If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list.
  11. Enter the NAS identifier, IP address, and port if your RADIUS servers requires you to set NAS credentials.
  12. When using RADIUS for Multi-Factor Authentication (MFA), increase the Timeout for the RADIUS server to respond to 60.
  13. Enable OTP preserves State if a One-Time Password server (e.g., Symantec VIP Enterprise Gateway 9.0) requires the RADIUS response to contain the 'State' attribute.
  14. Click Send Changes and Activate.

RADIUS Authentication Through the Remote Management Tunnel

To allow remote CloudGen Firewalls to connect to the authentication server through the remote management tunnel, you must activate the outbound BOX-AUTH-MGMT-NAT Host Firewall rule. By default, this rule is disabled.

Using RADIUS with Multi-Factor Authentication (MFA)

When using RADIUS for MFA, you must increase the Request Timeout in Timeouts and Logging from 10 to 60 for the firewall to wait for the RADIUS server MFA response. 

For VPN client-to-site setup with RADIUS MFA, you must also increase the Handshake Timeout in the VPN Settings from 10 to 60. 

For more information, see Configure RADIUS Authentication on the CloudGen Firewall in How to Configure the Azure Multi-Factor Authentication Server for VPN Client Authentication.

Depending on the VPN client and RADIUS server, the multi-factor challenge may have to be a combination of appending a password with the passcode, such as, for example, password:passcode or password,passcode. Please confirm the format the RADIUS server requires if password and passcode must be appended when a user sends the return challenge.