We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda SSL VPN


This Product Is Going End-Of-Life and End-Of-Support

End-OF-Sales: As of 1st March 2019, all new sales for the Barracuda SSL VPN product have ceaved. Only renewals of software and hardware subscriptions are available for a limited time up to an expiration date of 30th November 2020.

End-OF-Life and End-Of-Support on 1st December 2020: All Barracuda SSL VPN sales will cease; neither new sales nor any renewals will be available. If you currently hold a maintenance and support contract, you will continue to receive our award-winning support and services until your contract expires, or until Dec 1st, 2020, whichever occurs first.

How to Configure VMware ESXi for the Barracuda SSL VPN

  • Last updated on

If your virtual appliance is running on a VMware hypervisor, you must place the virtual network adapter for the Barracuda SSL VPN Vx in promiscuous mode so that Barracuda Network Connector can detect all frames that are passed on the virtual switch. If you have more than one physical NIC connected to the vSwitch attached to the Barracuda SSL VPN Vx, you must also reconfigure the vSwitch to use only 1 NIC.

Promiscuous mode on a vSwitch

Place the virtual network adapter for the Barracuda SSL VPN Vx in promiscuous mode so that it can detect all frames that are passed on the virtual switch. 

If you have already set up a Barracuda SSL VPN Vx system but did not enable promiscuous mode, you may encounter issues in which the network connectivity seems intermittent. Experience suggests that the virtual interface does not receive all of the packets that it should. As a result, Barracuda Networks recommends that you configure a port group to allow promiscuous mode.

  1. Log into the vSphere client, and select the ESX host.
  2. Click the Configuration tab.
  3. From the Hardware menu in the left pane, select Networking
  4. On the summary page for the virtual switch, click the Properties link.
    In the properties window that opens, you can modify the vSwitch configuration by port group. Virtual port groups are listed under the Ports tab. Physical network interface cards in the server are listed under the Network Adapters tab. To see a summary of a port group's settings, click its name. In the figure below, you can see that Promiscuous Mode is set to Reject (off).
  5. Add a port group.
    1. Under the Ports tab, click Add.
    2. Select Virtual Machineand click Next
    3. Enter a Network Label.
    4. Click Finish.
  6. Set the port group to promiscuous mode.
    1. Select your new port group, and click Edit.
    2. Click the Security tab.
    3. From the Promiscuous Mode list, select Accept.
    4. Click OK, and then click Close.
  7. Set your VM client to the new port group.
    1. Right-click the Barracuda SSL VPN virtual machine, and select Edit Settings
    2. In the left pane, click Network Adapter 1
    3. In the Network Connection section, select the port group that you just created and click OK.

VMware ESXi NIC teaming

To avoid network connectivity issues when using Network Connector, you must have only a single physical NIC configured in the VMware vSwitch for the SSL VPN. If you have more than one physical NIC attached to the vSwitch, you must remove them, even if they are in standby mode or load balanced. Once you have reconfigured the vSwitch to use only 1 NIC, you will be able to reconnect using Network Connector and ping your internal devices.

Last updated on