We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

How to Configure RADIUS Authentication

  • Last updated on

Remote Access Dial-In User Service (RADIUS) is a networking protocol providing authentication, authorization, and accounting. The Barracuda CloudGen Firewall can use RADIUS authentication for IPsec, Client-to-Site, and SSL VPN. RADIUS on the CloudGen Firewall supports the Extensible Authentication Protocol (EAP-RADIUS) both with and without TLS and the Protected Extensible Authentication Protocol (PEAP) during the authentication process.

Before You Begin

When using RADIUS for OTP authentication (e.g., LinOTP, privacyIDEA), you must enable the option Always use Session Password in the Firewall Admin Client Settings, otherwise authentication will fail. For more information, see Barracuda Firewall Admin Settings.

Configure RADIUS Authentication

To configure RADIUS for external authentication with the Barracuda CloudGen Firewall,

  1. Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Authentication Service.
  2. In the left navigation pane, select RADIUS Authentication.
  3. Click Lock.
  4. From the Configuration Mode menu on the left, select Advanced View.
  5. Enable RADIUS as external directory service.
  6. In the Radius Server Address / Port fields, enter the IP address and port of the RADIUS server (default: port 1812).
  7. In the Radius Server Key section, define the pre-shared secret to authorize requests.

    The pre-shared secret can consist of small and capital characters, numbers, and non alpha-numeric symbols, except backslashes and the hash sign (#).

  8. From the Group Attribute Delimiter list, you can select how groups are delimited in a list. To explicitly specify a delimiter character, select the Other checkbox and enter the character in the Group Attribute Delimiter field.
  9. From the Group Attribute Usage list, you can select the group information that is used (e.g.: CN=…, OU=…, DC=…). You can select:
    • All (default) – Complete string
    • First – Only the first group
    • Last – Only the last group
  10. If group information is queried from a different authentication scheme, select the scheme from the User Info Helper Scheme list.
  11. Enter the NAS identifier, IP address, and port if your RADIUS servers requires you to set NAS credentials.
  12. Enable OTP preserves State if a One-Time Password server (e.g., Symantec VIP Enterprise Gateway 9.0) requires the RADIUS response to contain the 'State' attribute.
  13. Click Send Changes and Activate.

RADIUS Authentication Through the Remote Management Tunnel

To allow remote CloudGen Firewalls to connect to the authentication server through the remote management tunnel, you must activate the outbound BOX-AUTH-MGMT-NAT Host Firewall rule. By default, this rule is disabled.

Last updated on