Use this article as a sample roadmap for setting up and testing the Barracuda SSL VPN in your organization's environment.
Before you begin
Some essential information which you should know before you begin to deploy your Barracuda SSL VPN appliance:
Decide how you want to deploy the Barracuda SSL VPN. It is recommended to use the direct access deployment option for the evaluation. For more information on deployment options, see the Deployment page.
- The Barracuda SSL VPN provides two administrative web interfaces: the appliance web interface to administer the appliance and the SSL VPN web interface to administer and provide SSL VPN functionality:
- Appliance Web Interface
- URL: https://<IP address for the Barracuda SSL VPN>:8443
- Default user: admin
- Default password: admin
- SSL VPN Web Interface
- URL: https://<IP address for the Barracuda SSL VPN>
- Default user: ssladmin
- Default password: ssladmin
- Appliance Web Interface
- End users log into the SSL VPN web interface at: https://<IP address for the Barracuda SSL VPN>
- Users on mobile devices are automatically detected and redirected to the mobile portal when using the web interface at: https://<IP address for the Barracuda SSL VPN>
Step 1. Deploy and set up the Barracuda SSL VPN
Depending on whether you are evaluating a hardware or a virtual appliance, complete one of the following sets of instructions:
Hardware appliances
- Follow the instructions in the Quick Start Guide for Barracuda SSL VPN included with your appliance.
- (Optional) Complete the Getting Started guide.
Virtual appliances
- Download the Barracuda SSL VPN Vx image for your hypervisor from the Barracuda Networks Virtual Appliance Download page.
- Deploy and install the Barracuda SSL VPN Vx. For instructions, see Virtual Deployment.
- Complete the Barracuda SSL VPN Vx Quick Start Guide.
- (Optional) Complete the Getting Started guide.
Step 2. Configure authentication and access control
The Barracuda SSL VPN is very flexible when handling access control and authentication. You can combine different authentication modules with various external user directory services to configure a custom login process. In the web interface, login processes are referred to as authentication schemes. Lists of users and groups are stored in policies. The remote user directory (e.g., AD, LDAP, and RADIUS) or local user directory is stored in a user database. The Barracuda SSL VPN 380 and above support multiple user databases.
Configure your Active Directory server on the ACCESS CONTROL > User Databases page. Click the Active Directory tab to enter the settings. Test the connection setting by clicking Test before adding the server. If you are evaluating the Barracuda SSL VPN 180 or 280, edit the default user database to configure an external Active Directory server.
If you do not have an external user directory service or do not want to use it in combination with your Barracuda SSL VPN, you can also use the internal user database.
You can control access to the SSL VPN's resources by defining criteria (e.g., time, operating system, updates installed, browser version) that must be met by users. To configure NAC settings, go the Manage System > ACCESS CONTROL > NAC page.
Related articles and help
For more information on authentication and access control, see these articles and online help:
- User Databases – How to Configure User Databases and Example - Create a User Database with Active Directory.
- Policies – How to Configure Policies.
- NAC – Go to the Manage System > ACCESS CONTROL > NAC page.
Step 3. Configure multi-factor authentication schemes
Authentication schemes contain a configurable list of authentication modules and policies. Create an authentication scheme on the ACCESS CONTROL > Authentication Schemes page. If multiple user databases are defined, users can select a user database by clicking More before logging in. Hardware token authentication is available for the Barracuda SSL VPN 380 and above.
Available authentication modules
The following table lists all of the authentication modules that you can configure on the Barracuda SSL VPN. Secondary authentication modules must be combined with a primary authentication module, like password, for example, and can not be placed first in the authentication scheme configuration. Barracuda Networks recommends using at least two authentication modules for an authentication scheme.
Authentication Module
Type
Client Certificate
Primary/Secondary
IP Address
Primary/Secondary
Password
Primary/Secondary
PIN
Primary/Secondary
Public Key
Primary/Secondary
RADIUS
Primary/Secondary
Google Authenticator
Primary/Secondary
OTP (One-Time Passwords)
Secondary
Personal Questions
Secondary
RADIUS authentication and hardware token support is included with the Barracuda SSL VPN 380 and above.
Step 4. Provide access to applications and folders
The Barracuda SSL VPN gives users secure access to applications and network file shares in the corporate network. You can specify who can use a resource by assigning one or more policies to every resource. Choose the type of resource depending on what type of network service you want to share.
Microsoft Exchange
If you are using Microsoft Exchange, go to the RESOURCES > Web Forwards page and create a Web Forward using the Microsoft Exchange template.
Microsoft SharePoint
If you are using Microsoft SharePoint, go to the RESOURCES > Web Forwards page and create a Web Forward using the Microsoft SharePoint template.
Network places
Network places grant access to network file shares. With the web interface, you can download and upload files up to 2 GB in size. To create a resource for accessing a network file share, go to the RESOURCES > Network Places page. All files uploaded to the share are scanned for malware by the Barracuda SSL VPN.
Available resource types
The following table lists all of the resource types that you can configure on the Barracuda SSL VPN.
Resource Type
Description
Link
Web Forwards
Access to intranet websites and internal web-based applications.
Web Forwards
Applications
Predefined and custom client/server applications within the secured network.
Applications
Network Connector
Full TCP/IP access into the secured network.
Network Connector
Network Places
Network shares on the internal network.
Network Places
SSL Tunnels
Create SSL tunnels to secure unencrypted intranet services.
SSL Tunnels
Step 5. Create and provision an IPsec VPN connection
Some users, applications, or devices require full routed access to the network. The Barracuda SSL VPN supports VPN access via IPsec server for Windows, macOS, and Linux computers, as well as mobile devices. The end user does not have to configure the VPN client because an applet in the end user portal completes this task automatically. iOS users can also use the custom device setup in the mobile portal to automatically configure the VPN connections.
To create an IPsec VPN, go to the RESOURCES > IPsec Server page.
Related articles
For more information on configuring IPsec VPN connections, see these articles:
Step 6. Evaluate the Barracuda SSL VPN as an end user
Log in using a desktop computer
With an end user account, log into the SSL VPN end-user portal to view and evaluate the previously configured resources.
https://<IP address for the Barracuda SSL VPN>
If more than one user database is configured (available on the Barracuda SSL VPN 380 and above), click More to select the correct user database before logging in.
From the RESOURCES tab, you can launch the previously configured resources.
From the ACCOUNT tab, you can change personal or user-specific information.
Log in using a mobile device
Use a mobile device (cell phone, tablet) to login to the Barracuda SSL VPN:
https://<IP address for the Barracuda SSL VPN>
You are automatically redirected to the mobile portal. There, you can use the Apps (Resources), Favorites, and Folders (Network Places) you configured previously.
If you are using an Apple iOS device the mobile portal offers a Custom Device Setup for VPN, Active Sync and the ability to create a shortcut on your home screen.
Related articles
For more information on the mobile portal see these articles:
Additional features to explore
The Barracuda SSL VPN contains many features that make it easy to use and deploy.
- The User Activity Log (BASIC > User Activity Logs) helps you identify who is using the SSL VPN and when they are interacting with the network.
- The Audit Log (BASIC > Audit Logs) records any changes to resources, access controls, and access rights.
- Reports (BASIC > Reports) are generated based upon the VPN Connection and Logon Attempts log files.
- Integrated Virus Scanning on the portal ensures that web traffic and uploaded files do not contain malware.
- Remote Assistance lets you remotely control the computers of end users.
- Server Agents let you include resources from remote networks that cannot be reached directly by the Barracuda SSL VPN.