It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda NextGen Firewall X

This Product is Going End-of-Life and End-Of-Support

End-Of-Sales: As of December 1st, 2018, all new sales for Barracuda NextGen Firewall X Series products have ceased. Only renewals of software and hardware subscriptions for a maximum of one year are available for a limited time up to an expiration date of 30th November 2020.

End-Of-Life and End-Of-Support on December 1st 2020: All Barracuda Firewall X-Series sales will cease; neither new sales nor any renewals will be available. If you currently hold a maintenance and support contract, you will continue to receive our award-winning support and services until your contract expires, or until Dec 1st, 2020, whichever occurs first. Please see the End-Of-Life definition as described in the End of Support and End of Life Information.

How to Configure an Outlook Web Access Web Forward

  • Last updated on

To give your end users direct access to their corporate email resources, configure an Outlook Web Access / Outlook Web App (OWA) resource. The SSL VPN offers preconfigured web forward templates for Outlook Web Access 2003, 2007, 2010, and 2013. By default, the session username and password is used to authenticate on the Outlook Web Access portal. If the user must use a different password or user to sign in, create user attributes to replace the session attributes.

Before you begin

Enable and configure SSL VPN on the firewall. For more information, see How to Enable SSL VPN and CudaLaunch.

Configure an Outlook Web Access web forward (OWA)

  1. Go to the VPN > SSL VPN page and click the Resources tab.

  2. In the Web Forwards section, click Add Web Forward.

  3. In the Add Web Forward window, set Enable to Yes.
  4. (optional) Click Browse to upload a PNG file for the web portal, less than 30 kB and not larger than 80x80 pixels.
  5. Select the OWA template matching your Exchange server from the Web Forward Template drop-down list. A pop-up window appears, asking for the server name. 
  6. Enter the FQDN, hostname, or IP address for your Microsoft Exchange server, and click OK.
  7. (OWA 2003 only) Enter the Single Sign-On (SSO) domain for your Exchange server, and click OK. 
  8. In the Name field, enter the visible name for the web forward. This is the name displayed for the user in the web portals and CudaLaunch.
  9. (optional) In the Allowed Hosts list, add all servers that must be proxied by the SSL VPN when accessing this web forward. Enter Name, Root URL, and Launch Path in the Allowed Hosts section, and click +.
  10. (optional) To restrict access to the web forward by user group, remove the * entry in the Allowed User Groups list. Enter the user groups that can access the web forward, and click + after each entry. If no groups are added, the web forward cannot be accessed. Use question marks (?) and asterisks (*) as wildcard characters.
  11. (optional) In the Single Sign On section, change the session attribute for user attributes to enable SSO if your OWA username and password differ from the session username and password. For more information on how to create user attributes, see How to Use and Create Attributes.
  12. Click Save.
Last updated on