We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda SSL VPN

Why is a RDP Application failing to forward the provided login credentials for every login attempt with a Barracuda SSL VPN?

  • Type: Knowledgebase
  • Date changed: 9 years ago

Solution #00004632

 

Scope:

Applies to all Barracuda SSL VPNs.

 

Answer:

It is possible for a system configured with the Terminal Server package to block any incoming login credentials and force credentials to be provided on the logon screen of the unit or replace the credentials with a predefined set of credentials. The only way to stop this credential overriding to occur is to go into the system and disable the settings causing the credentials to be blocked/changed.

 

Open the Terminal Services Configuration and open the Connections folder, there should be a connection called RDP-tcp. Open the properties for this connection. Go to the Logon Settings tab. The settings here can be used to override the login credentials for incoming connections. To block the incoming details, the option “Always use the following logon information” will be selected. If all the fields are left empty then the login fields will be empty. If the fields have any information entered then these details will be used. There is also an additional option “Always prompt for password." If this is enabled then the password will always be blocked and must be provided on the login screen.

 

In order for the login details to be sent through, the option “Use client-provided logon information” will need to be enabled and the "Always prompt for password" option must be disabled.

 

Link to this page:

https://campus.barracuda.com/solution/50160000000IC8kAAG