We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

How to Configure a Client-to-Site VPN Group Policy

  • Last updated on

To let mobile workers securely connect to corporate information resources, create a client-to-site VPN group policy. This allows you to use one client-to-site configuration that enables CudaLaunch, Barracuda VPN clients, and native IKEv1 and IKEv2 IPsec clients to connect. Use CudaLaunch on iOS and Android to fully manage the VPN configuration remotely through the SSL VPN templates. To manually configure the native IPsec clients on iOS and Android, verify that you are using encryption settings compatible with the version of your mobile operating system. VPN clients can be authenticated either through external authentication schemes, client certificates, or a combination thereof.

Client2SiteIPsecAdvancedVPN.png

Supported VPN Clients

Although any standard-compliant IPsec client should be able to connect via IPsec, Barracuda Networks recommends using the following clients:

Before You Begin

Step 1. Configure the VPN Service Listeners

Configure the IPv4 and IPv6 listener addresses for the VPN service.

Step 2. Configure the VPN Client Network

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > VPN Settings .
  2. Click Lock.
  3. Click the Client Networks tab.
  4. Right-click the table, and select New Client Network.
  5. In the Client Network window, configure the following settings:
    • Name – Enter a descriptive name for the network, e.g.: Client to Site VPN Network
    • Network Address – Enter the default network address, e.g.: 192.168.6.0. All VPN clients will receive an IP address in this network.
    • Network Mask – Specify the appropriate subnet mask, e.g.: 24
    • Gateway – Enter the gateway network address, e.g.: 192.168.6.254
    • Type Select the type of network that is used for VPN clients:
      • routed (Static Route) –  A separate subnet. A static route on the firewall routes traffic between the VPN client subnet and the local network.
      • local (proxy ARP) – A subnet of a local network. For example, Local network: 10.0.0.0/24 , Local segment 10.0.0.128/28 . You must also specify the IP range for the network:
        • IP Range Base – Enter the first IP address in the IP range for the VPN client subnet, e.g.: 10.0.0.128.
        • IP Range Mask – Specify the subnet mask of the VPN client subnet, e.g.: 28
  6. Click OK.
  7. Click Send Changes and Activate.

Step 3. Configure Group Policy Settings

Configure the default Group Policy settings.

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > Client-to-Site.  
  2. Click Lock.       
  3. Click the External CA tab and then the Group Policy tab.
  4. Click the Click here for options link. The Group VPN Settings window opens. 
  5. Select the Authentication Scheme:
    • Primary Authentication Scheme – The default authentication scheme used for all VPN group policies.
    • Extract from username – The authentication scheme is appended to the username, e.g., @msad. The authentication scheme (e.g., @msad) with the prepended username (e.g., user1@domain.com) is used with the default authentication scheme acting as a fallback if the authentication scheme name is not present on the firewall. E.g., user1@msad1 or user2@domain.com@msad.
  6. Select the Default Authentication Scheme from the drop-down list. This authentication scheme must be configured on box level of the firewall.
    extract_from_msad.png
  7. When using multi-factor authentication, select the Secondary Authentication Scheme.
  8. Configure which certificates are used. By selecting a specific certificate, all VPN group policies must use this certificate:   
    • (optional) Server – Select a server certificate, or use the default server certificate configured in the VPN settings.
    • Server Protocol Key – Select the service certificate. 
    • (optional) Used Root Certificates –  Select a root certificate, or use the default server certificate configured in the VPN settings.
    • (optional) X509 Login Extraction Field – Select the X.509 field containing the user name.
  9. (optional) If needed, select the Preauthentication Scheme.
  10. Click OK.

    Only X.509 certificate conditions can be assigned because IPsec XAUTH authentication will not work if group patterns are defined in the External Group Condition section.

Step 4. Create a VPN Group Policy

Create a group policy and configure the network settings for the client-to-site connections. If you want the client to send all traffic through the VPN tunnel, enter 0.0.0.0/0 as the network.

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > Client-to-Site.
  2. Click the External CA tab and then click the Group Policy  tab.
  3. Right-click the table and select New Group Policy.
  4. In the Edit Group Policy window, edit the following settings: 
    • Name – Enter a name for this policy.
    • Common Settings – Select the check box.
    • Statistics Name – To better allocate statistics entries, enter a name.
    • Network – Select the required client network.
    • DNS – Enter a DNS server for the clients.
    • Network Routes – Add all networks that should be reachable by the VPN clients.  Enter 0.0.0.0/0 for all traffic to be sent through the client-to-site VPN. 
  5. Right click the Group Policy Condition field and select New Rule.

  6. In the X509 Certificate Conditions section of the Group Policy Condition window, set filters for the certificate. Click Edit/Show and specify the conditions:
    • To let everyone with a valid certificate log on,
      • Add the following condition to the Subject field: CN=*
    • To limit the condition to a specific group,
      • Add the following condition to the Subject field: *CN=groupname*. You can also hit Lookup to search for a group. Inside the AD lookup, put in your object filter or hit Search. From the list, select the desired group. You must be logged on to Firewall Admin from the domain controller to use this search query feature.
    • For local authentication,
      • Add the following condition to the Subject field to allow all users or groups: *
      • To limit, add the group name of your local users.

    Certificate condition entries are case insensitive and can contain the quantification patterns ? (zero or one) and * (zero or more).


  7. Click OK.
  8. Click OK.
  9. Click Send Changes and Activate.

Step 5. (optional) Adjust Barracuda (TINA) Settings

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > Client-to-Site.
  2. Click Lock.
  3. Click the External CA tab and then click the Group Policy  tab.
  4. Double-click the VPN group policy created in Step 2.
  5. In the Barracuda tab configure:
    • Windows Security Settings
    • VPN Client Network
    • Firewall Rules 
    • Login Message 
    • Ciphers 
  6. Click OK.

Step 6. (optional) Adjust the IKEv1 IPsec Phase I and II Settings

To connect to the firewall using iOS and Android clients, you must use the following IKEv1 IPsec Phase I and II settings.

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > Client-to-Site.
  2. Click Lock.
  3. Click the External CA tab and then click the Group Policy  tab.
  4. Double-click the VPN group policy created in Step 3.
  5. Click the IPSec IKEv1 tab and configure the following settings:
    • IPSec IKEv1 Phase II - Settings – Clear the check box and then select Group Policy Name (Create New).
    • Encryption – Select AES.
    • Hash Meth – Select SHA for iOS and Android VPN 5.2 or lower. For Android 6.X use SHA256, for Android 7.0 or higher SHA512
    • DH-Group – Select Group2
    • Time – Enter 3600
    • Minimum – Enter 1200
    • Maximum – Enter 4800
  6. Configure the same settings for IPsec Phase I that you selected for IPsec Phase II.
    1. Click Edit Phase I.
    2. In the Change IPSec Phase I window, specify the same settings that you selected for the IPSec Phase II - Settings:
      • Encryption – Select AES.
      • Hash Meth – Select SHA.
      • DH-Group – Select Group2
      • Time – Enter 3600
      • Minimum – Enter 1200 
      • Maximum – Enter 4800
    3. Click OK.
  7. In the Edit Group Policy window, click OK.
  8. Click Send Changes and Activate.

Step 7. (optional) Adjust the IKEv2 IPsec Phase I and II Settings

To allow IKEv2 IPsec clients to connect to the firewall using this group policy, create and configure the IKEv2 group policy settings.

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > Client-to-Site.
  2. Click Lock.
  3. Click the External CA tab and then click the Group Policy  tab.
  4. Double-click the VPN group policy created in Step 3.
  5. Click the IPSec IKEv2 tab and configure the following settings:
    • IPSec IKEv2 Phase II - Settings – Clear the check box and then select Group Policy Name (Create New).
    • Encryption
    • Hash Meth
    • DH-Group
    • Lifetime
  6. Configure the same settings for IPsec Phase I that you selected for IPsec Phase II.
    1. Click Edit Phase I.
    2. In the Change IPSec Phase I window, specify the same settings that you selected for the IPSec Phase II - Settings :
      • Encryption
      • Hash Meth
      • DH-Group
      • Lifetime
    3. Click OK.
  7. In the  Edit Group Policy window, click OK.
  8. Click Send Changes and Activate.

Step 8. (optional) Configure a Pre-Shared Key

If you want to authenticate using pre-shared keys for a IPsec IKEv1, client you must configure the shared secret in the VPN settings.

The shared secret can consist of small and capital characters, numbers, and non-alphanumeric symbols, except the hash sign (#).

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > VPN Settings.
  2. Click Lock.
  3. In the Server Settings window, click on the Advanced tab.
  4. In the IKE Parameter section, enter the IKE PSK key. E.g., pre$haredKey
    PSK02.png

  5. Click OK.
  6. Click Send Changes and Activate.

Step 9. Add Access Rules

Add an access rule to allow the VPN clients to connect to your network. For more information, see How to Configure an Access Rule for a Client-to-Site VPN.

Monitoring VPN Connections

On the VPN > Client-to-Site page, you can monitor VPN connections. The page lists all available client-to-site VPN tunnels. In the Tunnel column, the color of the square indicates the status of the VPN:

  • Blue – The client is currently connected.
  • Green  The VPN tunnel is available, but currently not in use. 
  • Grey – The VPN tunnel is currently disabled. To enable the tunnel, right-click it and select Enable Tunnel.

For more information about the VPN > Client-to-Site page, see VPN Tab.

Configure Custom Login Message

When using a Barracuda VPN client, you can define a custom welcome message as well as upload your company's logo as a custom Picture. Custom message and pictures can be selected in the Barracuda - Settings of the VPN group policy. 

  • Messages – Create a custom message in the Message tab of the Client-to-Site page, and then select the customized welcome messages in the Barracuda Settings tab of the VPN group policies.
  • Bitmap/Pictures – Upload a 150x80 pixel, 256 color BMP bitmap in the Pictures tab of the Client-to-Site page, and then select the custom bitmap in the Barracuda Settings tab of the VPN group policies.

custom_login_message.png

Troubleshooting

To troubleshoot VPN connections, see the /VPN/VPN and /VPN/ike log files. For more information, see LOGS Tab.

Next Steps

Configure the remote access clients to connect to the client-to-site VPN. 

For more information, see Remote Access Clients.

Last updated on