This solution applies to Barracuda SSL VPNs, all firmware versions.
Log on as the super user account, ssladmin.
Navigate to Access Control > User Databases. Either edit the existing Default Database and select the Active Directory tab (if this is going to be the only user database) or click the Active Directory tab (if you wish to create a second user database).
On the edit page, enter your Active Directory details, enter
the following information:
Domain Controller Hostname:
This should be the fully qualified name (FQDN) of your domain controller, e.g. pdc.example.co.uk.
This should be the FQDN of your Active Directory domain, e.g. example.co.uk.
Service Account Username:
SSL VPN requires a Windows service account in order to authenticate Active Directory users. This can be any user on AD, but a normal method is to create an account specifically for the use of SSL VPN. Enter the username here, e.g. sslvpn. This account is used to cache the users and groups into SSL VPN from AD, so that the system has a list of objects to attach to policies.
Service Account password:
Enter the service account password.
You may wish to only cache a certain set of users from Active Directory. If you wish to do this, click Show Advanced Settings to get to the extra options below.
Organizational Unit Filter:
Use this setting to restrict which Organizational Units SSL VPN will search or exclude for users and groups. If no OUs are set then SSL VPN will search the entire Active Directory schema for accounts. If you have placed your users and groups into separate OUs you will need to enter them here. For example if your domain name is example.co.uk and you had specific OUs named Sales and Development, then these OUs should be entered in the filter as follows, clicking the Add button after each:
Finally, any additional preferences in the Advanced section and Save or Add to create the User Database.
Link to This Page: