Applies to all Barracuda SSL VPNs.
Using NAC, the Barracuda SSL VPN can be configured to block any users that are attempting to log in from an unauthorized IP address. For example, a Barracuda SSL VPN is only to allow access to users logging in from two specific subnets, 188.8.131.52 and 184.108.40.206, and from 2 specific IP addresses, 220.127.116.11 and 18.104.22.168. The best method to configure this will be to block access to all IP addresses and create NAC Exceptions for the subnets and individual IPs. To do this, follow these instructions:
- Login to the SSL VPN with ssladmin and select the database this configuration will be setup on. NAC is realm aware so you must be editing the user database this will be for.
- Go to ACCESS CONTROL > NAC and make sure Enable NAC Rules is set to Yes. Then set the Login from any IP Address option to Block and save the changes.
- Access to the SSL VPN on this user database is being blocked for all IP Addresses and will need exceptions to allow any kind of access. Go to ACCESS CONTROLS > NAC Exceptions and create a new exception:
- Set a name for the exception
- Select the Lookup button. This loads the Applies To page which allows specification of the Users/Groups/Policies the exception will apply to. Select Add when finished adding principles.
- In the Type list select IP Address.
- In the Sub Type/Expression field the allowed IPs must be entered. This field accepts individual IP addresses, addresses using wildcards, and CIDR Addresses. Only one entry can be made per exception so begin by adding the first subnet, 1.2.3.* (or 22.214.171.124/24).
- Set the Access option to Allow & Continue or Allow.
- Select the Add button to save the exception.
As each IP address exception can only hold one value, a total of four exceptions will need to be made. One for each subnet and individual IP address previously listed.
Link to this page: