It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda NextGen Firewall X

This Product is Going End-of-Life and End-Of-Support

End-Of-Sales: As of December 1st, 2018, all new sales for Barracuda NextGen Firewall X Series products have ceased. Only renewals of software and hardware subscriptions for a maximum of one year are available for a limited time up to an expiration date of 30th November 2020.

End-Of-Life and End-Of-Support on December 1st 2020: All Barracuda Firewall X-Series sales will cease; neither new sales nor any renewals will be available. If you currently hold a maintenance and support contract, you will continue to receive our award-winning support and services until your contract expires, or until Dec 1st, 2020, whichever occurs first. Please see the End-Of-Life definition as described in the End of Support and End of Life Information.

How to Configure a Tunneled Web Forward

  • Last updated on

Create tunneled web forwards to allow SSL VPN users to access web-based internal applications through an SSL tunnel created by CudaLaunch. The client then connects to a dynamically generated port on the loopback interface (e.g., CudaLaunch forwards the web traffic through the SSL tunnel to the SSL VPN service and the web server behind it. To use tunneled web forwards you must have a Remote Access Premium subscription.

Before you begin

Enable the SSL VPN service and CudaLaunch. For more information, see How to Enable SSL VPN and CudaLaunch.

Configure a tunneled web forward

  1. Go to the VPN > SSL VPN page and click the Resources tab.
  2. In the Web Forwards section, click Add Tunneled Web Forward.
  3. In the Add Web Forward window, set Enable to Yes.

  4. (optional) Click Browse to upload a PNG file for the web portal, less than 30 kB and not larger than 80x80 pixels.
  5. In the Name field, enter the visible name for the web forward. This is the name used in the SSL VPN portal for this web forward.
  6. Enter the IP address or hostname of the Web Server Host.
  7. Enter port the Web Server Host listens on.
  8. In the Client Loopback TCP Port field, enter the client loopback TCP port number for the tunnel to enable tunneling of application data to the user's localhost IP address To use a random port, enter 0 (default).
  9. Select the type of the tunnel from the Protocol drop-down list.
  10. (optional) To restrict access to the web forward by user group, remove the * entry in the Allowed User Groups list. Enter the user groups that can access the web forward, and click + after each entry. If no groups are added, the web forward cannot be accessed. Use question marks (?) and asterisks (*) as wildcard characters.
  11. Click Save.
Last updated on