Configure the Barracuda NextGen Firewall X-Series to allow authentication and authorization of domain users on a Microsoft Active Directory (MSAD) server. To reduce load querying for large environments, you can also filter unwanted group membership information by creating group filter patterns.
Configure MSAD Authentication
Connect the X-Series Firewall with your Microsoft Active Directory (MSAD) server and configure MSAD as external authentication scheme.
- Go to the USERS > External Authentication page.
- Click the Active Directory tab.
- In the Basic section, click Add.
- Enter the Domain Controller IP address.
In the Searching User field, enter the MSAD Searching User in the
- Enter the Searching User Password.
Specify the Base DN where the lookup should be started. E.g.,
- Set Cache MSAD Groups to Yes to reduce network traffic and server load on the domain controller.
- Select Use SSL if your Active Directory server is configured to use SSL.
(Optional) Select Follow Referrals to use Active Directory's global catalog and follow the referrals. When a requested object exists in the directory but is not present on the contacted domain controller, the referral gives the client a location that holds the object or is more likely to hold the object. It is also possible for the referred-to domain controller to refer to a next hop location. The number of next hops is defined in Maximum Hops for Referrals.
- Click Save.
- (Optional) Add Group Filter Patterns to filter unwanted group information. Wlldcards are allowed.
Example: When using pattern: *SSL*, and the following group membership strings are used:
User01 group membership string:
User02 group membership string:
Only User02 will match.
- Click Save.
The configuration is now added to the EXISTING AUTHENTICATION SERVICES table and you can use the MSAD authentication service on the X-Series Firewall.
To test, if the connection is working, try to login as the user from another network host. When a user, for whom the authentication scheme applies, logs into the network, a log entry is created showing the login details such as source address, success or failure, time, etc. To access authentication logs, go to the LOGS > Authentication Logs page.
If the connection cannot be established:
- Make sure that you have entered the MSAD searching user in the Searching User field in the correct format:
user@domain. Do not use the
- Verify that the entry for the Base DN where the lookup should be started does not contain spaces.
- Check the Logs > Authentication Log page for error messages when connecting to your Active Directory server.