We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

Attention

Barracuda CloudGen Firewall version 8.0 is a cloud-only version. It is currently not available for on-premises deployments and can only be deployed in Microsoft Azure, Amazon Web Services, or Google Cloud Platform public clouds.

How to Configure an Access Rule for a Client-to-Site VPN

  • Last updated on

To connect your routed client-to-site VPN to your network, you must add a forwarding access rule to direct traffic between the tunnel, the remote, and the home network.

Before You Begin

Before creating your forwarding access rules, gather the following information:

  • The published VPN network(s).
  • The VPN client network(s)

Step 1. Create a Network Object for the Published VPN Networks

Create a static network object for the published VPN networks. If more networks are added to published VPN networks, update the network object to reflect these changes.

  • Type – Select List of Network Addresses.
  • Include Entries – For each published VPN network, click + to add it to the list.

c2s_access_rule_01.png

For more information, see Network Objects

Step 2. Create a Pass Access Rule

  • Action – Select Pass.
  • Source – Select VPN-Clients
  • Service – Select the allowed services, or Any to allow all services.
  • Destination – Select the network object containing the published VPN networks created in step 1.
  • Connection Method – Select Dynamic NAT.

c2s_access_rule_02.png

For more information, see How to Create a Pass Access Rule

Last updated on