Home
        Barracuda Networks SSL VPN 180 + 1Y EU+IR
         Contents
1.        A View Module s Logs  A System Information  3 Refresh Modules     0 Logout       8  Enter a valid domain name and click Add Domain     Global Configuration Troubleshoot    Select all   Invert selection          Domain Name Status  3sp co uk Y  Select all   Invert selection    ee ord ap  Disable Selected    9  Click on the Global Configuration tab  then click General  You may opt to set Auto provisioning to Yes  although it may be simpler to  keep it set to No initially  Ensure that Append OTP to is set to Password            Delete Selected    General Configuration              Enable Auto provisioning    Yes  O No   Enable Auto provisioning for O Yes O No   multiple YubiKeys   On service fail  fallback to single    yes   No   factor    Append OTP to    Username    Password   Temporary token length 8     Enable YubiApp registration O Yes O No   On service fail  send email O Yes O No   alert  Selecting  Yes  will send an email alert if OTP    validation server is unavailable     Email Address es        10  Go back to Global Configuration and click Validation Server  This configuration will use the YubiCloud validation servers  For this to  work  your network s firewall needs to allow outbound access on TCP ports 80 and 443 to api  yubico com  api2 yubico com   api3 yubico com  api4 yubico com and api5 yubico com     Validation Server Configuration    Validation  9  YubiCloud   Online Validation Service  Server    Local validation Server on YubiRADIUS Virtual Appliance  
2.       5  Create a backup of the existing Barracuda SSL VPN configuration using the ADVANCED  gt  Backup page      Use the ADVANCED  gt  Task Manager page to verify that no processes are running    7  On this page  enter the Cluster Shared Secret and click Save Changes  This is the password shared by all Barracuda SSL VPN  appliances in this cluster  It is limited to only ASCII characters     O     Adding an Appliance to the Cluster    Any Barracuda SSL VPN appliance that is added to the cluster will have most of its local data  except user data and that specified in Non Clustere  d Data overwritten with settings extracted from the cluster  The first system  the one identified first in the Add System field  is the source for the  initial settings     1  In the Add System field  enter the IP address of a system in the cluster  or  the first system if the cluster has not yet been created   A  fully qualified domain name can be entered  but could cause name resolution issues so is not recommended    2  Click Join Cluster  The time to complete the join depends on the number of users  domains  and the load on each Barracuda SSL VPN  appliance  During this time the configuration from the other system will be copied onto this system  The system will restart  and you will  need to login and navigate to this page    3  On each system in the cluster  perform the following    a  Refresh the ADVANCED  gt  Linked Management page to view the updated status    b  Verify that the Clustered Sy
3.       In the Create Web Forward section  select the database the users reside in from the User Database drop down list     Enter a unique name for the Web Forward in the Name field  for example SharePoint      Next to Web Forward Category  tick the checkbox Portals and select SharePoint 2013 from the list      In the Hostname field  enter the hostname or IP address that you wish to connect to     In the Domain field  enter the domain that the SharePoint server belongs to       In the Available Policies list  choose the policies that you want to apply to the Web Forward and add them to the Selected Policies list     Select Yes for Add to My Favorites if the Web Forward should be added to the default Resource Category or No if this should be    configured later   Click Add     The Sharepoint 2013 Web Forward is now visible in the Web Forwards section     How to Configure a Microsoft Exchange OWA Web Forward    The following steps explain the procedure of configuring the Barracuda SSL VPN for  use with Microsoft Exchange Outlook Web Access  To configure OWA  you will have to  create a Web Forward of type Path Based Reverse Proxy as explained in the following  sections     In this article     Step 1  Create a Web Forward  Step 2  Edit the Web Forward    Related Articles    e Web Forwards  e Custom Web Forwards       Step 1  Create a Web Forward    To create and configure the Web Forward     O O ON OO FP WP         k       h  mb     Step 2     AA U N        Log into the SSL VPN we
4.      provisioning  The virtual machine reboots after you finish the configuration     Step 2  Open Firewall Ports      In the text based menu  set the IP address and  under Licensing  enter your Barracuda license token and default domain to complete    If your Barracuda SSL VPN Vx is located behind a corporate firewall  open the following ports on your firewall to ensure proper operation     Port Protocol Direction  22 TCP Out   25 TCP Out   53 TCP UDP Out   80 TCP Out   123 UDP Out   443 TCP In Out  8000 TCP In Out  8443 TCP In Out    Usage    Remote diagnostics and service   recommended     Email alerts and one time  passwords    DNS  Energize Updates  Network Time Protocol  NTP     HTTPS SSL port for SSL VPN  access    External appliance administrator  port  HTTP     External appliance administrator  port  HTTPS     If PPTP or L2TP IPsec access is required  also open the following ports     Port Protocol Direction Usage   47 GRE In Out PPTP   1723 TCP In PPTP   500 UDP In L2TP IPsec  4500 UDP In L2TP IPsec    Note  Only open the appliance administrator interface ports on 8000 8443 if you intend to manage the appliance from outside the corporate  network     Configure your network firewall to allow ICMP traffic to outside servers  and open port 443 to updates  barracudacentral com  You must  also verify that your DNS servers can resolve updates  barracudacentral com from the Internet     Step 3  Log Into the Appliance Web Interface and Verify Configuration  Log into the Bar
5.     Click Add     0O    O NN        The user database is now listed in the User Database section     For more detailed information on how to create a user database with an external authentication service  see Example   Create a User Database  with Active Directory     Delete the User Database    To delete a user database  go the Manage System  gt  ACCESS CONTROL  gt  User Databases page and click Delete next to the user database  that you want to remove     Modify the User Database    To modify a user database  go the Manage System  gt  ACCESS CONTROL  gt  User Databases page and click Edit next to the user database that  you want to modify  You can now edit all settings for the user database  You can change authentication services for a user database  for example   you can switch to using Active Directory after using the built in user database     Example   Create a User Database with Active Directory    On the Barracuda SSL VPN  you can use an external Active Directory server for a user  database  If you are using multiple user databases  on the Barracuda SSL VPN 380 or  above  each user database manages its own authentication server configuration  so  you can configure multiple Active Directory servers on the same unit     Related Articles    e Access Control    e How to Create and Modify User  Databases       Before You Begin    Before you begin  verify that your Barracuda SSL VPN can reach your Microsoft Active Directory server  If you deployed your Barracuda SSL  VPN in
6.     Step 3  Launch the Network Place    To test the Network Place  go to the Network Places section  click the name of the Network Place or the Launch link associated with it  Make  sure that you also test a user account that has the appropriate access rights with a connection outside your intranet     Step 4  Add the Network Place  When you are ready to make the Network Place available to your users  apply a resource to it     1  In the Network Places section  click the Edit link associated with the new Network Place   2  Inthe Categories Resource section  select the resource categories that you want to apply to the Network Place  then click Add gt  gt     3  Click Save     How to Configure AV Scanning    The Barracuda SSL VPN delivers the latest in virus and application definitions through Energize Updates  see Licensing   When virus scanning is  enabled  the Barracuda SSL VPN scans files that are uploaded through the Barracuda SSL VPN for viruses and other malware  You can    determine the types of files to scan by specifying a pattern or a specific filename  Any file matching one of the current patternS will have the    associated action performed on it  To remove a pattern  select it from the corresponding section and click Remove     Configure Virus Scanning      Log into the Barracuda SSL VPN Web interface as the ssladmin administrative user      Goto the BASIC  gt  Virus Checking page      Verify that you have selected the correct user database on the top right of the
7.    Other     for example      http   192 168 1 1 wsapi 2 0 verify        Client ID 4233  Show API Key  API Key FEE    Confirm API REN  Key i       11  To get a client ID and API key  go to https   upgrade yubico com getapikey   Enter the email address you used to register with Yubico   Select the password field  insert your YubiKey and press the button to add the password                      E o        Webmin 1 570 on yrva35 ex        Yubico Get API Key x WN       C fi 48 https  upgrade yubico com getapikey     yubico  Yubico Get API Key    Here you can generate a shared symmetric key for use with  the Yubico Web Services  You need to authenticate yourself    using a Yubikey One Time Password and provide your e mail  address as a reference     Your e mail address  cdakin barracuda com    YubiKey one time    password  E  Get API Key          12  Insert the resulting client ID and secret key in the Client ID and API key fields and click Save               Client ID 8100   Show APT Key  API Key Ce ee ee ee ee  Confirm API ooveesssesscossssesenceussed  Key    13  Navigate to the Domain tab  then select your domain that was added earlier   Selected Domain 3sp co uk                               Users  Groups   Users Import ATTE    Create A New user    Ho user found    Back    Search    Choose a Search Text  Search Type    Username       14  Click the Users Import tab  Enter the hostname for your user database and set the Directory Type to either Active Directory or LDAP    15    
8.    Set the Base DN to the LDAP style root DN       Enter the username that should be used to connect and cache the users in DN format     Enter the service password       Set the schedule for how often YubiRADIUS should re cache the list of users  hourly is recommended      If you wish to only import users of a certain group  use a filter like this example in Active Directory   memberOf  lt full DN of group gt   e g  CN Group OU myOU DC domain  DC com objectClass person    which could be used to import all users  Enter the identifier of the    username  For Active Directory  this will be sAMAccountName  for OpenLDAP it is normally uid   Click Save  then click Import users     Users Groups Users Import Configuration       User Import Configuration Management    This section is used for importing users for the selected domain from an organization s LDAP AD server  periodically or manually     Use Secure Connection  O Yes O No   LDAP AD Server Address or Host Name jc  3sp co uk   Backup LDAP AD Server Address or Host       Name  optional  for user authentication only    Port  use O or blank to use the default 0   port      Directory Type Active Directory x    LDAP Version 13 x    Base DN DC 3sp DC co DC uk    User DN CN Senice Account DC 3sp 0C co DC uk    Password eccccccese   Schedule Hourly x    Timeout  Seconds  0   Filter    memberOf OU MyUsers DC 3sp DC co DC     Login Name Identifier  sAMAccountName    Save M Import Users          The users should now be imported successf
9.    e How to Configure PPTP    Administrative Interfaces    The Barracuda SSL VPN uses two administrative interfaces  the appliance web interface and the SSL VPN web interface     Appliance Web Interface  You can access the appliance web interface at either of the following IP addresses     https    lt configured IP address for the Barracuda SSL VPN gt  8443 0rhttp    lt configured IP address for the  Barracuda SSL VPN gt  8000    This interface listens on port 8000  HTTP  or 8443  HTTPS   Log into this interface to configure all non user facing options including network  configuration  clustering  firmware upgrades  and Energize Updates  The default login credentials for the appliance web interface are     e User  admin  e Password  admin    SSL VPN Web Interface  You can access the SSL VPN web interface at   https    lt configured IP address for the Barracuda SSL VPN gt     This interface listens on port 443  HTTPS   Log into this interface to configure all settings for the SSL VPN service  lt also includes all user facing  settings and functionalities  The SSL VPN web interface can be used in two modes  You can switch between both modes by clicking the link in the  upper right of the web interface     e Manage System     Manage VPN access to the system   e Manage Account     Manage the account settings     The default login credentials for the SSL VPN web interface are     e User  ssladmin  e Password  ssladmin    Access Control    To access and use the resources provided b
10.    where applicable displays further details like launch time and traffic information  The Log Off option disconnects  the user          The User Database column is only visible when the Global View database is selected        Viewing Event Logs    The User Activity Logs page displays all user level events  whilst the Audit Logs p age lists all system level events  To access the event logs  screens     1  Log into the SSL VPN web interface    2  Gotothe BASIC  gt  User Activity Logs page  For audit logs  select BASIC  gt  Audit Logs      Audit Logs Help  Filter    None v  Pattern  Apply Filter          Date Event Description User Database Username coo State  Address    Remote Assistance Title  testuser requires assistance  requested for  Test Successfu  l    E  12    ji i  2013 12 03 03 26 Request Deleted User    between     and   gt   Global View ssladmin 10 0 10 2    2013 12 03 01 43 Attached Policy To Attached Policy  Everyone  To Resource  Request          a    Resource Remote Assistance  Global View ssladmin 10 0 10 2    Click on the header of a column to sort by that column  You can also filter the list by selecting a category from the Filter drop down list      i  The User Database column is only visible when the Global View database is selected     System Tasks Overview    The Task Manager page provides a list of tasks that are in the process of being performed  and displays any errors encountered when  performing these tasks  for example  imports of historical emails
11.   1   2   3     From the File menu in the VMware Infrastructure client  select Virtual Appliance  gt  Import    Select Import from file  and navigate to the BarracudaSSLVPN vm lt version  gt  fw__ FIRMWARE _   lt version  gt  ovf file    Click Next to review the appliance information  review the End User License Agreement  and give the virtual appliance a name that is  useful to your environment       Click Finish     After your appliance finishes importing  right click it  select Open Console  and then click the green arrow to power on the virtual    appliance       Follow the Quick Start Guide instructions to provision your Barracuda SSL VPN Vx appliance     VMware ESX and ESXi 4 x    Use the OVF file ending in  4x ovf for this hypervisor     la  2   3     From the File menu in the vSphere client  select Deploy OVF Template    Select Import from file  and navigate to the BarracudaSSLVPN vm3 1 0 fw__FIRMWARE__ 20120327 4x ovf file    Click Next to review the appliance information  review the End User License Agreement  and give the virtual appliance a name that is  useful to your environment  Set the network to point to the target network for this virtual appliance       After your appliance finishes importing  right click it  select Open Console  and then click the green arrow to power on the virtual    appliance       Follow the Quick Start Guide instructions to provision your Barracuda SSL VPN Vx appliance     Sun Oracle VirtualBox and VirtualBox OSE 3 2    Use the OVF fi
12.   If the Program does not specify a version number of this License  you may choose any version ever published by the Free Software  Foundation     10  If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different  write to the author to ask  for permission  For software which is copyrighted by the Free Software Foundation  write to the Free Software Foundation  we sometimes make  exceptions for this  Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of  promoting the sharing and reuse of software generally     NO WARRANTY    11  BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE  THERE IS NO WARRANTY FOR THE PROGRAM  TO THE EXTENT  PERMITTED BY APPLICABLE LAW  EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER  PARTIES PROVIDE THE PROGRAM  AS IS  WITHOUT WARRANTY OF ANY KIND  EITHER EXPRESSED OR IMPLIED  INCLUDING  BUT  NOT LIMITED TO  THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE  THE ENTIRE RISK  AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU  SHOULD THE PROGRAM PROVE DEFECTIVE  YOU  ASSUME THE COST OF ALL NECESSARY SERVICING  REPAIR OR CORRECTION     12  INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER  OR ANY  OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE  BE LIABLE TO YOU FOR  DAMAGES  INCLUDING ANY GENERAL
13.   SPECIAL  INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR  INABILITY TO USE THE PROGRAM  INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR  LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS    EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES     END OF TERMS AND CONDITIONS  How to Apply These Terms to Your New Programs    If you develop a new program  and you want it to be of the greatest possible use to the public  the best way to achieve this is to make it free  software which everyone can redistribute and change under these terms     To do so  attach the following notices to the program  It is safest to attach them to the start of each source file to most effectively convey the  exclusion of warranty  and each file should have at least the  copyright  line and a pointer to where the full notice is found     one line to give the program s name and an idea of what it does   Copyright  C  yyyy name of author    This program is free software  you can redistribute it and or modify it under the terms of the GNU General Public License as published by the Free  Software Foundation  either version 2 of the License  or  at your option  any later version     This program is distributed in the hope that it will be useful  but WITHOUT ANY WARRANTY  without even the implied warranty of  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE  See the GNU Ge
14.   You can choose to activate a combination of the following authentication procedures     e One time passwords  sent via SMS or email    e Authentication key   e Client certificates   e IP authentication   e PIN   e Security questions   e RADIUS   e Hardware token authentication  in combination with RADIUS or Client Certificates     For more information on the available authentication schemes  see Authentication Schemes     Policies       Management Accounting Engineenng   Policies are lists of users and groups that are attached to resources  Users can only access a resource if they are included in the policy attached  to the resource  A resource can include multiple policies that contain separate lists of users and groups  You can grant different users with varying  levels of access to a resource by assigning Access Rights to the user or group  To help you easily assign resources to everybody  a built in Every  one policy is included by default  You can delete the Everyone policy  locking out out all users who do not have a specific Profile  Authentication  Scheme  or Access Right assigned to them  It is recommended that you create policies for every distinct user group  For example  in a company  with three departments  you can create separate policies for each department  management user  and administrator     For more information on Policies  see How to Configure Policies     Network Access Control  NAC     Network access control limits access to network resources  accord
15.   control  means  i  the power  direct or indirect  to cause the direction or management of such entity   whether by contract or otherwise  or  ii  ownership of fifty percent  50   or more of the outstanding shares  or  iii  beneficial ownership of such  entity      You   or  Your   shall mean an individual or Legal Entity exercising permissions granted by this License      Source  form shall mean the preferred form for making modifications  including but not limited to software source code  documentation source   and configuration files      Object  form shall mean any form resulting from mechanical transformation or translation of a Source form  including but not limited to compiled  object code  generated documentation  and conversions to other media types      Work  shall mean the work of authorship  whether in Source or Object form  made available under the License  as indicated by a copyright notice  that is included in or attached to the work  an example is provided in the Appendix below       Derivative Works  shall mean any work  whether in Source or Object form  that is based on  or derived from  the Work and for which the editorial  revisions  annotations  elaborations  or other modifications represent  as a whole  an original work of authorship  For the purposes of this License   Derivative Works shall not include works that remain separable from  or merely link  or bind by name  to the interfaces of  the Work and Derivative  Works thereof      Contribution  shall
16.   e RSA SecurlD  e VASCO Digipass Token  e Secure Computing Safeword    SafeNet   Key    This product uses a small USB device typically carried on your key chain  lt uses SSL client certificates to present a certificate to the Barracuda  SSL VPN  The user also has to enter a secret pass phrase  further improving security  The client computer must have a special utility  CIP   installed  which uploads the certificate on the USB token to the windows certificate store  The browser then uses this certificate when  authenticating to the Barracuda SSL VPN     Aladdin eToken PRO    Similar to the SafeNet   Key the Aladdin eToken uses an SSL client certificate to authenticate  It also uses a special software  which has to be  manually installed on every client computer     RSA SecurlD    RSA SecurlD uses its built in RADIUS server to enable communication between the appliance and the RSA server  In combination with an Active  Directory user database this method is especially powerful as account management may be centrally managed with both the appliance and RSA  Authentication Manager reading accounts from your Active Directory domain     VASCO Digipass    A VASCO server can authenticate with the Barracuda SSL VPN via an external RADIUS server  The VASCO server currently does not include a  RADIUS server     Secure Computing Safeword    Safeword servers include a RADIUS feature that can be used to authenticate to the Barracuda SSL VPN  Note that Safeword requires an Active  Directory
17.   e xports of archived messages and c onfiguration restoration  If a task takes a  long time to complete  you can click Cancel next to the task name and then run the task at a later time when the system is less busy  The Task  Errors section will list an error until you manually remove it from the list  To access the Task Manager page     1  Log into the Barracuda SSL VPN Web interface as the admin administrative user   2  Go to the ADVANCED  gt  Task Manager page     Web Interface Syslog    Supporting both IPv4 and IPv6 addressing with port numbers  the Syslog feature makes it possible to send all log information to a syslog server  T  o configure syslog settings     1  Log into the Administrative web interface    2  Go to the ADVANCED  gt  Syslog page     To monitor the Web syslog output  containing information regarding various events such as user login activities and configuration changes made  from the administrative interface of the Barracuda SSL VPN     1  Log into the SSL VPN web interface    2  Go to the ADVANCED  gt  Syslog page   3  Click Monitor Web Syslog     SNMP Support    The Barracuda SSL VPN offers the ability to configure the monitoring of various settings through SNMP  including traffic and policy statistics  For  instructions on how to configure SNMP settings on the Barracuda SSL VPN  see SNMP     Notifications    Notifications are configurable messages that are sent to users to inform them of  important events happening on the Barracuda SSL VPN  Notifica
18.   recommend that a file or class name and description of purpose be included on the same  printed page  as the copyright notice for easier  identification within third party archives     Copyright  yyyy   name of copyright owner     Licensed under the Apache License  Version 2 0  the  License    you may not use this file except in compliance with the License  You may obtain  a copy of the License at    http   www apache org licenses LICENSE 2 0    Unless required by applicable law or agreed to in writing  software distributed under the License is distributed on an  AS IS  BASIS  WITHOUT  WARRANTIES OR CONDITIONS OF ANY KIND  either express or implied  See the License for the specific language governing permissions and  limitations under the License     Source Code Availability   Per the GPL and other    open source    license agreements the complete machine readable source code for programs covered by the GPL or other     open source    license agreements is available from Barracuda Networks at no charge  If you would like a copy of the source code or the changes  to a particular program we will gladly provide them  on a CD  for a fee of  100 00  This fee is to pay for the time for a Barracuda Networks  engineer to assemble the changes and source code  create the media  package the media  and mail the media  Please send a check payable in  USA funds and include the program name  We mail the packaged source code for any program covered under the GPL or other  open source   lic
19.   which can not be reached directly by the Barracuda SSL VPN  The Server Agents  initiates a HTTPS connection from inside of the network  using port 443  It then waits for requests from the SSL VPN and forwards traffic for the  local resources  For example if you want to make the internal company wiki available via SSL VPN  the Server Agent is installed on a computer or  server in the same network  It will then act as a transparent proxy  relaying the information to the SSL VPN which delivers the content to the client   The SSL VPN can use multiple Server Agent in different networks  using routes containing host patterns  e g     example com  to decide which  Server Agent to contact for a particular resource  The whole process is completely transparent to the user     For more information  see How to Configure a Server Agent   How to Configure a Server Agent    The Barracuda Server Agent is used to proxy traffic for resources located in a network which can not be reached directly by the Barracuda SSL  VPN  For this example the client will request a web resource hosted on the a example com server in the intranet  The Barracuda SSL VPN will  use the server agent installed on one of the local servers in the network to connect to the a example com server and forward the traffic to the  client     Location 1 Location 2  server Agent       myco com      a     AAA         _E   Server Agent          example com     A A 3 yy    Internal  myco com   a example com       all         Loca
20.  AND OR CONDITIONS OF MERCHANTIBILITY  OF  SATISFACTORY QUALITY  OF FITNESS FOR ANY APPLICATION  OF ACCURACY  AND OF NON INFRINGEMENT OF THIRD PARTY  RIGHTS  BARRACUDA DOES NOT WARRANT THE CONTINUED OPERATION OF THE SOFTWARE  THAT THE PERFORMANCE WILL  MEET YOUR EXPECTATIONS  THAT THE FUNCTIONS WILL MEET YOUR REQUIREMENTS  THAT THE OPERATION WILL BE ERROR  FREE OR CONTINUOUS  OR THAT DEFECTS WILL BE CORRECTED  NO ORAL OR WRITTEN INFORMATION GIVEN BY BARRACUDA OR  AUTHORIZED BARRACUDA REPRESENTATIVE SHALL CREATE A WARRANTY  SHOULD THE BARRACUDA SOFTWARE PROVE  DEFECTIVE  YOU ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING  REPAIR  OR CORRECTION     6  License  YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT YOU WILL PROVIDE AN UNLIMITED ZERO COST LICENSE TO  BARRACUDA FOR ANY PATENTS OR OTHER INTELLECTUAL PROPERTY RIGHTS UTILIZED IN THE BARRACUDA SOFTWARE WHICH  YOU EITHER OWN OR CONTROL     7  Limitation of Liability  TO THE EXTENT NOT PROHIBITED BY LAW  IN NO EVENT SHALL BARRACUDA BE LIABLE FOR PERSONAL  INJURY OR ANY INCIDENTAL SPECIAL  INDIRECT  OR CONSEQUENTIAL DAMAGES WHATSOEVER  INCLUDING  WITHOUT  LIMITATION  DAMAGES FOR LOSS OF PROFITS  LOSS OF DATA  BUSINESS INTERRUPTION  OR ANY OTHER COMMERCIAL DAMAGES  OR LOSSES  ARISING OUT OF OR RELATED TO YOUR ABILITY TO USE OR INABILITY TO USE THE BARRACUDA SOFTWARE  HOWEVER CAUSED  REGARDLESS OF THE THEORY OF LIABILITY AND EVEN IF BARRACUDA HAS BEEN ADVISED OF THE  POSSIBILITY OF DAMAGES  In no event shall Barracuda s total liabili
21.  Addresses  192 168 0 100 24 192 168 0 1 Delete      DNS servers   192 168 0 2  Search domains   barracuda com  DHCP client ID       Require IPv4 addressing for this connection to complete    Routes        7 Available to all users Cancel   Apply       fF  Network Connections Editing Auto Ethernet MT    Send Ctrl Alt Del  Ctri Alt Insert   Y  Scale     Redock  Alt Shift U  Fullscreen  Ctrl Alt           5  Disconnect from the network and reconnect using the network icon in the top right area of the screen   2  Tue May 22  3 56 PM   jas    Wired Network  Auto Ethernet  Disconnect           VPN Connections    6  With a web browser  navigate to the IP address of the appliance  which should present a Webmin logon screen        Login to Webmin    You must enter a username and password to login to  the Webmin server on 10 14 4 48     Password        Remember login permanently        7  Log in with user yubikey and password yubico           7 Ey Webmin 1 570 on yrva35 ex x       gt  C f  amp  pieps  10 14 4 48 10000                            Zo    in  yubik z   5   gt  Pese a YubiRADIUS Virtual wubICO  O system Applia nce the key to the cloud     Servers    Version 3 5 1       Apache Webserver  BIND DNS Server   Domain   Global Cc  LDAP Server No Domain records     PostgreSQL Database Server    Procmail Mail Filter  Read User Mail  SSH Server  Samba Windows File Sharing  YubiRADIUS Virtual Appliance     others     Networking   U Hardware     Cluster     Un used Modules   Search     
22.  Chassis  Dimensions 16 8x1 7x9 16 8x1 7x9 16 8 x 1 7 x 14 16 8 x 1 7 x 14 16 8 x 1 7 x 22 6 17 4 x 3 5 x 25 5   inches   Weight  Ibs  8 8 12 12 26 46  Ethernet 1x 10 100 1x Gigabit 1x Gigabit 1x Gigabit 2x Gigabit 2x Gigabit  AC Input Current   1 0 1 0 1 2 1 4 1 8 4 1   Amps   Redundant Disk No No No Yes Yes Yes  Array  RAID   ECC Memory No No No No Yes Yes  Redundant No No No No No Hot Swap    Power Supply    Features  SSL Tunneling    Barracuda  Network  Connector    Intranet Web  Forwarding    Windows  Explorer Mapped  Drives    Citrix  XenApp VNC NX   Telnet   SSH RDP  Applications    Remote Desktop  Single Sign On    Antivirus    L2TP IPsec   PPTP Mobile  Device Support    Client Access  Controls    Active  Directory LDAP  Integration    Layered  Authentication  Schemes    Remote  Assistance    Multiple User  Realms    Barracuda SSL  VPN Server  Agent    Hardware Token  Support    RADIUS  Authentication    Syslog Logging  SNMP API    Clustering High  Availability    Virtual Systems    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    No    No    No    No    No    No    No    No    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    No    No    No    No    No    No    No    No    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    No    No    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Y
23.  Close      Distribute the key stored in the zip file to the individual user  Barracuda Networks recommends using a USB key for greater security     CON OOF OQ N      Creation by Users on Login    The administrator can also reset the Authentication key  forcing the user to generate a new key at the next login  The user must enter his system  password when generating the new key     1  Open the Manage System  gt  ACCESS CONTROL  gt  Accounts page   2  In the Accounts section  locate the individual user who should create the authentication key and click More   3  Select Reset Authentication Key     On the next log in the user will be asked to enter his password and a new passphrase  The Barracuda SSL VPN will then generate a zip file  containing the authentication key  which the user can download     How to Configure SSL Client Certificate Authentication    SSL client certificates are a very secure secondary authentication method  When this feature is enabled  users can provide an SSL client  certificate  but it is not required by the server  During users  initial login  they must install the SSL client certificate into the certificate store of the    browser or operating system  After the initial setup is complete  the authentication process requires minimal user interaction  Users must only  select the installed certificate when prompted  and the rest of the setup is completed automatically by the browser and the Barracuda SSL VPN     The Barracuda SSL VPN validates the offer
24.  IIS is running on  navigate to Start  gt  SharePoint 2013 Central Administration and    complete the following steps     Step 1a  Add Alternate Access Mappings      On the Central Administration page  click Configure alternate access mappings in the System Settings section     Click Edit Public URLs     Select SharePoint   80 from the Alternate Access Mapping Collection drop down list     Add the following entries   e Default   http    lt your SharePoint server gt   e Intranet   http    lt your fully qualified SharePoint server gt   e Internet   http    lt your fully qualified Barracuda SSL VPN gt   e Extranet   https    lt your fully qualified Barracuda SSL VPN gt     ROD       Step 1b  Restart the IIS Server    1  Go to Start  gt  Internet Information Services  IIS  Manager   2  In the left hand pane  click SHAREPOINT   3  In the right hand pane under Manage Server  click Restart      i  e When using SharePoint 2010  the end user will need to disable the Trusted Documents setting in order to allow editing of    documents on a SharePoint 2010 server using Office 2010   e When using SharePoint 2007  be aware that the SharePoint 2007 template only allows site navigation  limited editing of the    SharePoint site  and upload and download of documents     Step 2  Create a Web Forward    To create and configure the Web Forward     OMNOAaAR WD      10       Log into the SSL VPN web interface      Verify that you have selected the correct user database on the top right of the page
25.  If you have absolute URL addressing  use the Replacement Proxy when the other Custom Web Forward types do not work  The Replacement  Proxy works most of the time  provided that the web page is not using a lot of JavaScript  However  using a Replacement Proxy is more resource  intensive than the other proxies  Due to the number of ways it is possible to create links  in many different languages   this proxy type is not  always successful  However  it is possible to create custom replacement values to get a website working through a replacement proxy Web  Forward     Direct URL    The Direct URL type is a direct link to an external website  Traffic does not pass through the Barracuda SSL VPN  This should be used for linking  to external resources  like for example search engines  Wikipedia  etc       How to Create Custom Web Forwards    The easiest way to create a Web Forward is by using one of the predefined templates   which include the most commonly used web applications  If your web application is not  listed  create a custom Web Forward  You can configure the following types of custom  Web Forwards     e Path Based Reverse Proxy  e Host Based Reverse Proxy  e Tunneled Proxy   e Replacement Proxy   e Direct URL    If you do not know what type of Web Forward to use  Barracuda Networks  recommends that you first try using the path based reverse proxy  Note also that only  one Web Forward can be launched with the same path  For more information on the  available custom Web Fo
26.  If your server does not use a specific authentication method  this value is ignored  The only methods  that are currently supported in this configuration are PAP  CHAP  MSCHAP and MSCHAPv2        The timeout for a RADIUS message        The number of retries for a RADIUS message     Attribute Attributes      Pras NAS IP Address     radius r   The RADIUS attributes    User Name     session use     required to execute the  User Password     session    request               8  As Entered     Force Upper Case      Force Lower Case    Setting that defines what case the username is sent to the RADIUS server  Options are to leave as  entered  force to upper case or force to lower case     RADIUS Password Customize the RADIUS password prompt text     O Yes  Ono   Reject a challenge response request from the RADIUS server  Default  true     A URL for generated challenge images  Leave blank to disable        OYes  No Allow Challenge Images to be server from untrusted servers     Step 2  Create an Authentication Scheme    Create an authentication scheme that includes the SMS Passcode RADIUS server     1  Goto the Manage System  gt  ACCESS CONTROL  gt  Authentication Schemes page   In the Create Authentication Scheme section     2     2 2 POR    e     Enter a Name for the scheme  e g   SMS Passcode RADIUS     From the Available modules list  select RADIUS and click Add  RADIUS then appears in the Selected modules list    Optional  If additional authentication modules are required by your
27.  Request Forgery  CSRF   BNSEC 1247   BNVS 4079    Med severity vulnerability  URL Redirection  BNSEC 727   BNVS 3665    Low severity vulnerability  Requires a man in the middle  url redirection  BNSEC 1399   BNVS 4147   Low severity vulnerability  Requires authentication  non persistent XSS  BNSEC 1239   BNVS 4078   Low severity vulnerability  Cross Site Request Forgery  CSRF   HTTP header injection  non persistent X SS  BNSEC 1144    VS 4026     What s new with the Barracuda SSL VPN Version 2 4 0 9    New Features    The Device Configuration feature allows resources and other settings configured on the Barracuda SSL VPN to be provisioned directly to  a user s device    Improved Sharepoint functionality  including supporting Sharepoint 2013    Policy time restrictions are more comprehensive    Improved browser NAC checking    Download functionality for all aspects of the system works faster and more reliably    Increased backup and restore capabilities  from the appliance interface      Version 2 4 0 9 Fixes     e Backups    e Show All Backups option on the ADVANCED  gt  Backups page displays all backup files on the share  BNVS 4348   e Only the requested number of SMB backups is stored  BNVS 4378    e Status of SMB backup is reported accurately  BNVS 4376    e Clustering information is excluded from backups  BNVS 4382     e All Network Connector client configurations can be launched from the user interface  BNVS 4381    e Fixed Java applet signing to conform to new security
28.  Reverse Proxy creates a unique hostname and appends it to the subdomain of the Barracuda SSL VPN     For example  If the Barracuda SSL VPN hostname is ss vpn myco cc  the URL for the host based reverse proxy Web Forward would be htips   lt r  andom string gt  sslvpn myco cc  Because a unique subdomain is created for each Web Forward configured as a Host Based Reverse Proxy  you  must configure a DNS entry on your DNS server for each subdomain that is used to resolve to the Barracuda SSL VPN  You can identify every    generated hostname and create an explicit entry for it on your DNS server  or create a wildcard entry so that all lookups resolve to the same IP  address as the Barracuda SSL VPN  As with the Path Based Reverse Proxy  accessing links to a location that was not specified in the  configuration fails unless you configure the destination hostname as an allowed host  with the Allowed Host option       i  You must create configure your DNS server to resolve all generated subdomains to the IP address of the Barracuda SSL VPN     Tunneled Proxy    SSL Tunnel       http   localhost 45678    4   Barracuda SSL VPN    Connect d    http   intemalexample com       A tunneled proxy uses the Barracuda SSL VPN Agent on the client to open up a SSL tunnel to the Barracuda SSL VPN  The clients browser  connects to a localhost address  e g   http    localhost   45678   A direct connection to the resource located behind the SSL VPN is then  established through the SSL tunnel  This ty
29.  SSL VPN  for example  httos   ssivon example com   2  On your RESOURCES  gt  My Resources page  you will see an IPsec or PPTP resource if the Barracuda SSL VPN is configured to  accept L2TP IPsec or PPTP connections       Click on the IPsec or PPTP icon  either one will work   This will launch a mobile configuration profile which will prompt you to install it     Select Install  and then select Install Now       Enter your account name and password and click Next     Click Done  The newly created connection will appear in the VPN menu as well as in the main Settings    menu   7  Go to Settings  gt  General  gt  Network  gt  VPN  gt   lt VPN name gt  to start the connection     O a Bb W    Configure an Android Device    To configure your Android device to connect to the Barracuda SSL VPN  complete the following steps     1  On the Android device  tap Settings  gt  Wireless  amp  Networks  gt  VPN Settings  gt  Add VPN   2  To configure an L2TP IPsec connection  select Add L2TP IPsec PSK VPN  for Preshared key  and configure only the following settings   for all other settings  accept the default values    e VPN name   A name for this connection  for example  Ss vpn ipsec    e Set VPN server   The hostname or IP address of the Barracuda SSL VPN  for example  ss vpn example com    e Set IPsec pre shared key   Select to enter the pre shared key   e Enable L2TP secret   Clear this setting   e DNS search domains   Enter the default domain for the protected network  for example  ex
30.  Signed by a trusted CA       In the Trusted  Signed by a trusted CA  section  click Edit Data      Inthe CSR Generation window  enter the full DNS name  e g   sslvpn example com   enter the requested information about your  organization  and then click Save Changes    6  Click Download CSR     0O A ON      You can now submit the CSR to your Certificate Authority     Step 1 2  Upload Signed Certificates    When the certificates are uploaded to the Barracuda SSL VPN  the Certificate Candidates table displays the current status of the certificates   The Status column displays OK when all required certificates have been uploaded       Log into the appliance web interface  e g   https    sslvpn example com  8443       Goto the BASIC  gt  SSL Certificate page     From the Certificate Type list  select Trusted  Signed by a trusted CA       In the Trusted  Signed by a trusted CA  section  upload the certificates that you received from the CA in the following order   a  Root CA certificate  PEM or PKCS12   b   Depending on your CA  Intermediate CA certificate  PEM or PKCS12   c  SSL server certificate  PEM or PKCS12    5  Click Use    6  In the Synchronize SSL section  click Synchronize     AAU N      Your SSL certificate is now installed on both the appliance and the SSL VPN web interface  To avoid Java runtime certificate errors  use the full  DNS name to connect to your Barracuda SSL VPN     Step 2  Configure System Contact and Alert Email Addresses    Specify the email addresses 
31.  Software in the same form and manner that such copyright and other proprietary notices are included on the Energize Update  Software  Except as expressly authorized in this Agreement  Customer shall not make any copies or duplicates of any Energize Update Software  without the prior written permission of Barracuda Networks  Customer may make such backup copies of the Energize Update Software as may be  necessary for Customer s lawful use  provided Customer affixes to such copies all copyright  confidentiality  and proprietary notices that appear on  the original     Protection of Information  Customer agrees that aspects of the Energize Update Software and associated documentation  including the specific  design and structure of individual programs  constitute trade secrets and or copyrighted material of Barracuda Networks  Customer shall not  disclose  provide  or otherwise make available such trade secrets or copyrighted material in any form to any third party without the prior written  consent of Barracuda Networks  Customer shall implement reasonable security measures to protect and maintain the confidentiality of such trade  secrets and copyrighted material  Title to Energize Update Software and documentation shall remain solely with Barracuda Networks     Indemnity  Customer agrees to indemnify  hold harmless and defend Barracuda Networks and its affiliates  subsidiaries  officers  directors   employees and agents at Customers expense  against any and all third party c
32.  a DMZ  open the necessary ports for read or read write access to your Active Directory server     You also need the following information     e Domain controller hostname  e Domain   e Service account name   e Service account password    Configure the User Database to Use an Active Directory Server  In the user database  provide the information required to connect with the Active Directory server     1  Go to the ACCESS CONTROL  gt  User Databases page   2  In the Create User Database section  click the Active Directory tab   3  In the Connection section  enter the following information   e Domain Controller Hostname     The name of the domain controller   e Domain     The domain   e Service Account Name     The user with permissions for read or read write access to the Active Directory server  Write  permissions must be configured in the Advanced Settings   e Service Account Password     The password for the user   4   Optional  Click Show Advanced Settings to configure Backup Domain Controller  SSL  read write access  and OU Filters   5  Click Add     After you add the user database  it appears in the User Databases section on the bottom of the page     Authentication Schemes    To authenticate users with more than just their usernames and passwords  configure authentication schemes  Every authentication scheme  comprises at least one authentication module  such as PINs  passwords  certificates  or one time passwords  You can add as many  authentication modules as your sec
33.  access   L2TP IPsec   PPTP     Configure secure remote access through smartphones and other mobile devices     Barracuda SSL VPN Release Notes 2 4       Please Read Before Updating    Before installing any firmware version  be sure to make a backup of your configuration and read all release notes that apply to versions  more recent than the one currently running on your system     Do not manually reboot your system at any time during an upgrade  unless otherwise instructed by Barracuda Networks Technical  Support  The update process typically takes only a few minutes after the update is applied  The appliance web interface for the  administrator will usually be available a minute or two before the SSL VPN user interface  If the process takes longer  please contact  Technical Support for further assistance     Upgrading to Version 2 x    e When upgrading from version 2 3  or earlier  firmware    e Backups taken from earlier firmware versions will NOT restore properly with the new backup restore functionality found starting in   version 2 4  Make new backups after the firmware update   e Mapped Drives    e WebDAV is now the default method for providing Mapped Drives and configuration settings have been changed accordingly   Windows 7 and Vista 64 bit clients will be prompted to uninstall the current Dokan driver and also given the option to increase  the maximum file download size to 2GB when launching Mapped Drives    e Client Certificates will need to be disabled when launch
34.  and compares the user input to the stored answer  If the  user input matches the answer  the user is logged in     Hardware Token Authentication    Two factor or multi factor authentication is considered to be strong authentication  using  a combination of the  something you know  and  something you have  principles  For  the Barracuda SSL VPN these hardware solutions are based on two different  authentication mechanisms  the RADIUS and the SSL Client Certificate authentication  modules     In this article     e Hardware Token Authentication using SSL Client Certificates  e Hardware Token Authentication using RADIUS Integration   e SafeNet   Key   e Aladdin eToken PRO   e RSA SecurlD   e VASCO Digipass   e Secure Computing Safeword    Related Articles    Authentication Schemes  Example   How to Install and    Configure YubiRADIUS  SSL Client Certificate  Authentication       Hardware Token Authentication using SSL Client Certificates    The token or smart card contains an SSL client certificate which is used to authenticate to the system  Some vendors require software installed on  the client  or card readers depending on the solution     e SafeNet   Key 2032  e Aladdin eToken PRO    Hardware Token Authentication using RADIUS Integration    Other hardware token authentication servers use a built in or external RADIUS server  The Barracuda SSL VPN queries the RADIUS server as a  part of its multi factor authentication process  This way OTP and CryptoCard tokens can be used   
35.  below  blog is added to this Web Forward   e htips  sslivon example com blog page2 htm   page 2 htm  a child of  blog  is added to this Web Forward     When you try to access this Web Forward and the web content attempts to bring up an HTTP request that is not at one of those locations  such  as  htip   ssivon example local news index html  the Barracuda SSL VPN automatically adds the path specified by that request  in this case   new  s  Adding paths automatically does not work when they conflict with a path that the Barracuda SSL VPN uses to display HTTP content  such as  d  efault  theme  js  fs  lf parts of the web page are missing  the Barracuda SSL VPN might not have detected some of the paths   To resolve this  issue  edit the Web Forward  and manually add these extra paths      i  To use the Path Based Reverse Proxy  make sure that you set the Always Launch Agent option to Yes     Host Based Reverse Proxy    HOST BASED REVERSE PROXY          SSL Tunnel    http   a132 ssivpn myco cc http   a132 ssivpn myco cc http   linternal example com http  internal  example com    A host based reverse proxy works in a similar way to a path based reverse proxy  but is not restricted to subdirectories  However  the host must  resolve properly via DNS  The proxy allows the web content to be located anywhere on the destination web server  including its root  This is  useful for websites and applications that specify a host header or use relative paths in the content     The Host Based
36.  by port group  Under the Ports tab  virtual port groups are  listed  Under the Network Adapters tab  physical network interface cards in the server are listed  To see a summary of a port group s  settings  click its name  In the figure below  you can see that Promiscuous Mode is set to Reject  off         wWawitchd Properties             5  Add a port group   a  Under the Ports tab  click Add   b  Select Virtual Machine  and click Next   c  Enter a Network Label  and set the VLAN ID to 4095 to enable trunking on the port group  This creates a VMware VLAN that  lets the port group see the traffic on any VLAN without altering the VLAN tags   d  Click Finish     6  Set the port group to promiscuous mode   a  Select your new port group  and click Edit     iwi beh Properties       b  Click the Security tab   c  From the Promiscuous Mode list  select Accept   d  Click OK  and then click Close   7  Set your VM client to the new port group   a  Right click the Barracuda SSL VPN virtual machine  and select Edit Settings   b  In the left pane  click Network Adapter 1   c  In the Network Connection section  select the port group that you just created and click OK         E 10 21 70 77   Sphere Client  File Edit Wiee Inventory Aahriimestration Plug ins Help    re E 8 Home  gt  Inverticey   By Enveribory    a n p BE   T   saven virtual Machine Properties  g 10 2 70 77 z   0 Cierta     ng LABCC 3 7      B   Routers Switches  Ac a on  Eh Internet Flouter vyatta                  Adapter Typ
37.  database and Internet Authentication Server  IAS  installed on the Domain Controller     How to Configure One Time Password  OTP  Authentication    One time passwords  OTPs  are passwords that can only be used once in a predefined  time frame  usually just minutes  You can configure the Barracuda SSL VPN to send  the OTP to users by either email or SMS  OTPs do not require any special hardware or  infrastructure  Any device that receives email or SMS can be used to receive the OTP     e To configure the Barracuda SSL VPN to send OTPs by email  configure the  SMTP server and the OTP settings    e To configure the Barracuda SSL VPN to send the OTPs by SMS  configure the  SMTP server  the OTP settings  and an SMTP to SMS service     Related Articles    e Authentication Schemes    e Regular Expressions  Reference   e Example   Authentication with SMS  Passcode RADIUS server       In this article     e Prerequisites for Sending OTPs by SMS   e Step 1  Configure the SMTP Server   e Step 2  Configure the OTP Settings   e Step 3   If Sending OTPs via SMS  Configure the SMTP to SMS Service    Prerequisites for Sending OTPs by SMS  If you want to send OTPs by SMS     e You must have an account for an SMTP to SMS service that can send SMS to cell phones in your country  e Determine the address format for sending SMS over email  Each service provider uses a different format   e Every user must have the mobile number attribute set     Step 1  Configure the SMTP Server  Configure the SMTP
38.  disclaimer in the documentation  and or other materials provided with the distribution     The names of the authors may not be used to endorse or promote products derived from this software without specific prior written permission     THIS SOFTWARE IS PROVIDED    AS IS  AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES  INCLUDING  WITHOUT LIMITATION   THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE      Barracuda Products may include the libspf library which is Copyright  c  2004 James Couzens  amp  Sean Comeau All rights reserved  It is covered  by the following agreement  Redistribution and use in source and binary forms  with or without modification  are permitted provided that the  following conditions are met  1  Redistributions of source code must retain the above copyright notice  this list of conditions and the following  disclaimer  2  Redistributions in binary form must reproduce the above copyright notice  this list of conditions and the following disclaimer in the  documentation and or other materials provided with the distribution  THIS SOFTWARE IS PROVIDED  AS IS  AND ANY EXPRESSED OR  IMPLIED WARRANTIES  INCLUDING  BUT NOT LIMITED TO  THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A  PARTICULAR PURPOSE ARE DISCLAIMED  INNO EVENT SHALL THE AUTHORS MAKING USE OF THIS LICENSE OR ITS  CONTRIBUTORS BE LIABLE FOR ANY DIRECT  INDIRECT  INCIDENTAL  SPECIAL  EXEMPLARY  OR CONSEQUENTIAL DAMAGES   INCLUDING  BUT NOT LIMITED TO  PROC
39.  existing installations     Virtual Machine Sizing Requirements    Barracuda SSL VPN Vx Model Licensed Cores Recommended RAM Recommended Hard Disk  Space   V180 1 1GB 50 GB   V380 2 1 GB 50 GB   V480 3 2 GB 50 200 GB   V680 4 4 GB 200 500 GB   V680   additional cores license Limited only by license 1 GB per core 500  GB    Provisioning CPUs Cores    You must provision the number of cores in your hypervisor before the Barracuda SSL VPN Vx can use them  Each model can only use a set  number of cores  For example  if you assign 6 cores to the Barracuda SSL VPN Vx 380  which can only use 2 cores   the virtual machine turns off  the extra cores that cannot be used     To add cores     1  Shut down your hypervisor    2  Go into the virtual machine settings    3  Add CPUs  The number of available CPUs that are shown will vary with your hypervisor licensing and version  In some cases  the  number of CPUs that you can add must be a multiple of 2     Provisioning Hard Drives    Provision your hard disk space according to the Virtual Machine Sizing Requirements table  Barracuda Networks requires a minimum of 50 GB of  hard disk space to run your Barracuda SSL VPN Vx     From your hypervisor  you can either edit the provisioned size of the hard drives or add a hard drive    i  Recommended VMware Provisioning Format  If you are using VMware  note that VMware tools support thin provisioning  which is not currently available in the virtual product lines     Barracuda Networks recommends usi
40.  in Java 1 7u45  BNVS 4516   Note  This error may still appear if the SSLVPN doesn t have a valid SSL certificate installed  A valid SSL certificate will be  required for all SSL VPN devices as of the release of Java 1 7u51    Version 2 4 0 7     Fix  Mapped drives time out according to the inactivity timeout setting under Profiles  BNVS 4337    Fix  Attempts to access hosts not in the Web Forward Allowed Hosts list displays error message  BNVS 4319   Fix  Can log off users with Network Connector sessions using the Sessions page  BNVS 4322    Fix  Set limitations on IP subnet range for PPTP and IPSec  BNVS 4325    Fix  Updated Code Signing Certificate   Fix  Vulnerability   Information Disclosure  BNSEC 1839   BNVS 4261    Fix  Vulnerability   Unauthenticated  XSS Not Persistent  BNSEC 1542   BNVS 4211    Fix  Vulnerability   Unauthenticated  XSS Not Persistent  BNSEC 1546   BNVS 4210    Fix  Vulnerability   Requires Man in the Middle  URL Redirection  BNSEC 1399   BNVS 41 47    Fix  Vulnerability   CSRF  BNSEC 1247   BNVS 4079     Fix  Vulnerability   Authenticated  XSS Not Persistent  BNSEC 1239   BNVS 4078    Fix  Vulnerability   CSRF  HTTP Header Injection  XSS Not Persistent  BNSEC 1144   BNVS 4026   Fix  Vulnerability   Click Jacking  BNSEC 509   BNVS 4024    Fix  Vulnerability   URL Redirection  BNSEC 727   BNVS 3665     Version 2 4 0 3     Feature  Bookmark aliases are created automatically for new and existing resources   Fix  Server Agent service starts on Linux  BN
41.  individual IP addresses of the  systems in the cluster for management  When the originally active SSL VPN appliance becomes available again  it will act as a passive backup     Creating a High Availability Cluster  Use the following steps to create a high availability cluster     e Complete the steps in the Adding an Appliance to the Cluster task above   e Inthe Simple High Availability section  enter the Virtual IP address   e On the initially active system  select the High Availability Master option     Setting Non Proxied Hosts    If the Barracuda SSL VPN systems are using a proxy  BASIC  gt  IP Configuration   then you must also configure non proxy hosts in the  Barracuda SSL VPN appliance interface on port 443  To do this  log onto each Barracuda SSL VPN appliance interface  From the ADVANCED  gt   Configuration  gt  Proxies page  make sure there is a non proxied host entry for your IP range that the clustered systems are on  for example  192 168 0     Without this setting  data synchronization may not occur and your systems will not be truly clustered     Non Clustered Data     i  Energize updates do not synchronize across systems in a cluster   The following data is not propagated to each system in the cluster     e IP Address  Subnet Mask  and Default Gateway  on the BASIC  gt  IP Configuration page     e Primary DNS Server and Secondary DNS Server  on the BASIC  gt  IP Configuration page     e Serial number  this will never change     e Hostname  on the BASIC  gt  I
42.  interactive but does not normally print such an announcement   your work based on the Program is not required to print an announcement      These requirements apply to the modified work as a whole  If identifiable sections of that work are not derived from the Program  and can be  reasonably considered independent and separate works in themselves  then this License  and its terms  do not apply to those sections when you  distribute them as separate works  But when you distribute the same sections as part of a whole which is a work based on the Program  the  distribution of the whole must be on the terms of this License  whose permissions for other licensees extend to the entire whole  and thus to each  and every part regardless of who wrote it     Thus  it is not the intent of this section to claim rights or contest your rights to work written entirely by you  rather  the intent is to exercise the right  to control the distribution of derivative or collective works based on the Program     In addition  mere aggregation of another work not based on the Program with the Program  or with a work based on the Program  on a volume of  a storage or distribution medium does not bring the other work under the scope of this License     3  You may copy and distribute the Program  or a work based on it  under Section 2  in object code or executable form under the terms of  Sections 1 and 2 above provided that you also do one of the following     a  Accompany it with the complete corresp
43.  is not managed by the appliance  You must verify that the user information  hosted on the RADIUS server corresponds to the information stored in the user database on the Barracuda SSL VPN     For more information  see Example   How to Install and Configure YubiRADIUS and Example   Authentication with SMS Passcode RADIUS  server     OTP  One Time Password     You can use one time password  OTP  authentication as only a secondary authentication module  The OTP is generated by the appliance at login  and is only valid for a short period of time  The OTP can be delivered by email or SMS  if an external SMTP to SMS service is available   If you do  not want users to wait for OTPs during login  you can configure the appliance to deliver OTPs before login and set a longer expiration time  hours  or days   If a user s OTP expires before it can be used  a new OTP is sent during the user s next login  External OTP systems  e g   SMS  Passcode  interface with the Barracuda SSL VPN via the RADIUS server and not with the OTP authentication module     For more information  see How to Configure One Time Password  OTP  Authentication     Personal Questions    You can use the Personal Questions module as only a secondary authentication module  It does not require any external servers or configuration   When users initially log in  they are asked five questions and their answers are stored by the module     To authenticate a user  the module randomly selects one of the preconfigured questions
44.  may not impose any further restrictions on the  recipients  exercise of the rights granted herein  You are not responsible for enforcing compliance by third parties to this License     7  If  as a consequence of a court judgment or allegation of patent infringement or for any other reason  not limited to patent issues   conditions  are imposed on you  whether by court order  agreement or otherwise  that contradict the conditions of this License  they do not excuse you from  the conditions of this License  If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent  obligations  then as a consequence you may not distribute the Program at all  For example  if a patent license would not permit royalty free  redistribution of the Program by all those who receive copies directly or indirectly through you  then the only way you could satisfy both it and this  License would be to refrain entirely from distribution of the Program     If any portion of this section is held invalid or unenforceable under any particular circumstance  the balance of the section is intended to apply and  the section as a whole is intended to apply in other circumstances     It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims  this  section has the sole purpose of protecting the integrity of the free software distribution system  which is implemented by 
45.  mean any work of authorship  including the original version of the Work and any modifications or additions to that Work or  Derivative Works thereof  that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal  Entity authorized to submit on behalf of the copyright owner  For the purposes of this definition   submitted  means any form of electronic  verbal   or written communication sent to the Licensor or its representatives  including but not limited to communication on electronic mailing lists  source  code control systems  and issue tracking systems that are managed by  or on behalf of  the Licensor for the purpose of discussing and improving  the Work  but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as  Not a  Contribution       Contributor  shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and  subsequently incorporated within the Work     2  Grant of Copyright License  Subject to the terms and conditions of this License  each Contributor hereby grants to You a perpetual  worldwide   non exclusive  no charge  royalty free  irrevocable copyright license to reproduce  prepare Derivative Works of  publicly display  publicly perform   sublicense  and distribute the Work and such Derivative Works in Source or Object form     3  Grant of Patent License  Subject to the terms and con
46.  network connector on your Mac   In this article     e Step 1  Install the Mac Client  e Step 2  Install the Client Configuration File  e Step 3  Launch the Network Connector Client    Step 1  Install the Mac Client    1  Open the RESOURCES  gt  My Network Connector page    2  Click the Download Mac Client button  You will be prompted to either Run or  Save the installer   dmg file     3  Launch the installer once the installation package downloads  and select all  default settings as you continue through the installation     Once installed  the Network Connector is ready for use by any user on the remote  system who is logged in through the web interface of the Barracuda SSL VPN     Related Articles    Network Connector  Using the Network Connector with    Linux  Using the Network Connector with  Microsoft Windows       Step 2  Install the Client Configuration File   i  A client configuration file for the Network Connector is required only when using the Network Connector in stand alone mode     To be able to run this client in stand alone mode  or without requiring an explicit login through the web interface  you must install a configuration  file for the client on the remote system       Log back into the SSL VPN web interface     Go to the RESOURCES  gt  My Network Connector page     Hover over the icon for the client configuration file in the My Network Connector section  A list of actions will appear       Select Install Client Configuration file  When installing the co
47.  of the Work  excluding those notices that do not pertain to any part of the Derivative Works  and     d  If the Work includes a  NOTICE  text file as part of its distribution  then any Derivative Works that You distribute must include a readable copy  of the attribution notices contained within such NOTICE file  excluding those notices that do not pertain to any part of the Derivative Works  in at  least one of the following places  within a NOTICE text file distributed as part of the Derivative Works  within the Source form or documentation  if  provided along with the Derivative Works  or  within a display generated by the Derivative Works  if and wherever such third party notices  normally appear  The contents of the NOTICE file are for informational purposes only and do not modify the License     You may add Your own attribution notices within Derivative Works that You distribute  alongside or as an addendum to the NOTICE text from the    Work  provided that such additional attribution notices cannot be construed as modifying the License     You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use   reproduction  or distribution of Your modifications  or for any such Derivative Works as a whole  provided Your use  reproduction  and distribution  of the Work otherwise complies with the conditions stated in this License     5  Submission of Contributions  Unless You explicitly state otherwis
48.  only on the single Barracuda labeled hardware device  on which the software was delivered  You may not make copies of the Software and you may not make the Software available over a network  where it could be utilized by multiple devices or copied  You may not make a backup copy of the Software  You may not modify or create  derivative works of the Software except as provided by the Open Source Licenses included below  The BARRACUDA SOFTWARE IS NOT  INTENDED FOR USE IN THE OPERATION OF NUCLEAR FACILITIES  AIRCRAFT NAVIGATION OR COMMUNICATION SYSTEMS  LIFE  SUPPORT MACHINES  OR OTHER EQUIPEMENT IN WHICH FAILURE COULD LEAD TO DEATH  PERSONAL INJURY  OR  ENVIRONMENTAL DAMAGE     3  You may not transfer  rent  lease  lend  or sublicense the Barracuda Software     4  This License is effective until terminated  This License is automatically terminated without notice if you fail to comply with any term of the  License  Upon termination you must destroy or return all copies of the Barracuda Software     5  YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT THE USE OF THE BARRACUDA SOFTWARE IS AT YOUR OWN RISK AND THAT  THE ENTIRE RISK AS TO SATISFACTION  QUALITY  PERFORMANCE  AND ACCURACY IS WITH YOU  THE BARRACUDA SOFTWARE IS  PROVIDED    AS IS    WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND  AND BARRACUDA HEREBY DISCLAIMS ALL  WARRANTIES AND CONDITIONS WITH RESPECT TO THE BARRACUDA SOFTWARE  EITHER EXPRESSED OR IMPLIED OR  STATUTORY  INCLUDING  BUT NOT LIMITED TO  THE IMPLIED WARRANTIES
49.  page      In the Virus Scanning Options section  select Yes to Enable Virus Scanning      Next to Files to Scan  enter the patterns or filenames to be scanned for viruses and click Add  gt  gt      or O N     Specify files by their exact name or combined with the asterisk       as a wildcard that matches any number of any character   For example     e The file  badfile html   badfile html   e All files ending in   exe      exe   e All files starting with  Readme   Readme   e Every file       6  If you want files to be excluded  add them to the Patterns to Exclude list   7  In the Files to Block section  add the patterns or filenames that should be blocked without any scanning     Applications    Some tasks require the use of client server applications  The Barracuda SSL VPN Agent on the client established a secure tunnel to the  Barracuda SSL VPN and then launches the application specified by the application resource  Application definitions are regularly updated with En  ergize Updates  There are two types of application resources     Full Application Download    No preinstalled application is necessary  The download automatically starts when the application resource is started  These applications may be  limited to just one platform  Some examples for full applications are     e PuTTY  e UltraVNC  e Firefox Portable    Configuration File Download    For this type of application resource  the application must be preinstalled on the client system  The Barracuda SSL VPN start
50.  proxy type only works with Windows applications and does not support single sign on    e Proxy   For complex environments  you can use the Proxy type to create a SSL Tunnel to a proxy server  located in the destination network  This proxy type injects a proxy auto configuration  PAC  file into the  browser with instructions about how to connect to different sites  These instructions redirect the target    web requests through the tunnel  Use the Proxy proxy type when   e Laptop users do not need to disable their proxy settings when they are outside their corporate network   e Internal applications are hosted across WAN links  For example  if your users are in Austria but the Citrix server is hosted in the  United States  You can use a PAC file to direct specific URLs to proxy servers that handles Citrix traffic exclusively  The rest of  the traffic goes through your default Internet proxy in Austria      i  With Tunneled proxy  all the links must be relative on the host that you have defined  For example   folder file  html instead of http   serv  er folder file html    Replacement Proxy    A replacement proxy is generally used if all the other Custom Web Forward types cannot be used  This proxy type attempts to find all links in the  website code and replace them with links pointing back to the Barracuda SSL VPN  The content of the web page is modified as it    passes through the SSL VPN  making it possible to create custom replacement values for different remote  users    
51.  security policy  add them to the Selected modules list   From the Available Policies list  select the policies that you want to apply this authentication scheme to and click Add  The  policies then appear in the Selected Policies list    Click Add     3   Optional  If you want to make the SMS Passcode authentication scheme the default  click the More link next to it in the Authentication  Schemes section and then click Increase Priority       Name       Add    Create Authentication Scheme Help    Available modules Selected modules  Client Certificate A RADIUS  IP Authentication IS  One Time Password  Secondary   Password  PIN  Canurnh  Nunntinna lO anandanrt    Available Policies Selected Policies  Administrators A Everyone  Auditors o Add All  gt  gt   Help Desk Administrators  Help Desk Users  lt  lt  Remove  Power Users  lt  lt  Remove All    Emninunas       Step 3  Test the SMS Passcode Authentication    To test the SMS Passcode authentication     BR WD        If the SMS Passcode authentication scheme is not the default scheme  select it      Enter your username      When prompted  enter your SMS Passcode password  and then click Login      After you receive the OTP via SMS  enter the OTP in the Enter PASSCODE field  and then click Login     You are now logged into your Barracuda SSL VPN   How to Configure Policies    Policies are lists of users and groups with optional time and date restrictions  Users can  only access a resource if their policy is attached to the resou
52.  server that will be used to send the OTPs     1  Select the user database that you want to configure the SMTP server for  To configure an SMTP server for all user databases  select Glo  bal View    2  Go to the Manage System  gt  BASIC  gt  Configuration page    3  Inthe SMTP section  enter the settings for your SMTP server    4  Click Save Changes     Step 2  Configure the OTP Settings  Specify when OTPs are sent  how they are sent  and what kind of OTPs are generated by the Barracuda SSL VPN     1  Go to the Manage System  gt  ACCESS CONTROL  gt  Security Settings page   2  In the One Time Password section  configure the following settings   e Send Mode     Select At Login to send the OTP during user logins   e Method of password delivery     You can select either Email to send the OTP via email or SMS over Email to send the OTP to  users  cell phones   e Generation Type     Select the type of OTP that you want the appliance to generate  If you experience problems with character  encoding in your emails or SMS  select ASCII   3  Click Save Changes     If you configured the Barracuda SSL VPN to send OTPs by email  no additional configurations are required  When the appliance sends an OTP  it  obtains the email address of the user from the user database     Step 3   If Sending OTPs via SMS  Configure the SMTP to SMS Service    If you configured the Barracuda SSL VPN to send the OTPs by SMS  provide the information required to connect with the SMTP to SMS service  that you ar
53.  the Barracuda SSL VPN and launching the    Network Connector   e By running the Network Connector in stand alone mode     For both launch options  you must have the Windows client installed on your remote  system     In this article     e Step 1  Install the Windows Client  e Step 2   optional  Install the Client Configuration File  e Step 3  Launch the Network Connector Client    Related Articles    Network Connector  Using the Network Connector with    Linux  Using the Network Connector with  Mac OS X       Step 1  Install the Windows Client    If you are the administrator you can download the Windows client software from the SSL VPN web interface       Log into the SSL VPN web interface     Open the RESOURCES  gt  My Network Connector page     fF WN        Click Download Windows Client  You will be prompted to either Run or Save the installer   Launch the installer once the installation package downloads  and select all default settings as you continue through the installation  If    you see warnings about any compatibility issues during the install  click Continue Anyway     Once installed  the Network Connector is ready for use on the remote system as long as you are logged in through the web interface of the    Barracuda SSL VPN     Step 2   optional  Install the Client Configuration File    To run the Network Connector in stand alone mode  without having to log in through the web interface  you must download and install a client  configuration file onto the remote sys
54.  to publish for such a route would be   e For Windows clients   route add 192 168 50 0 mask 255 255 255 0 192 168 1 1  e For Linux Mac clients   route add  net 192 168 50 0 netmask 255 255 255 0 gw 192 168 1 1  5  Save the configuration     AA UN      When launched  this configuration should automatically publish this new route 10 15 seconds after the Network Connector client is launched   Advanced Network Connector Client Configuration    A default client configuration is automatically generated when the network connector is  created  however  you may need to edit this configuration to make it suitable for the  majority of your users  Additional client configurations may also be required in some  instances  such as for remote users on different platforms that may require different  initialization commands  You can create additional additional client configurations for  the same Server Interface by copying  click the Copy link associated with the client   the initial client configuration  and then customizing it     In this article     e Client Settings  e Up  and Down Commands    Related Articles    e Network Connector    e How to Configure the Network  Connector  e How to Create a Static Route       Client Settings    The following additional client settings can be configured by editing the network connector client configuration     Setting Description    Auto Launch This setting determines whether a user logging in to the Barracuda  SSL VPN will automatically launch the Ne
55.  using HTTP option and click Exchange Proxy Settings     13  In the Connection settings section  complete the following steps   In the Use this URL to connect to my proxy server for Exchange field  enter the Barracuda SSL VPN hostname   Check the option for On fast networks  connect using HTTP first  then connect using TCP IP   Check the option for On slow networks  connect using HTTP first  then connect using TCP IP   In the Proxy authentication settings area  select Basic Authentication from the Use this authentication when connecting to  my proxy server for Exchange drop down menu   e  Click OK and then click Next   14  The Exchange Server prompts you to connect and requests your credentials   a  In the User Name field  enter your username using the following format  domain username  b  In the Password field  enter your password and click OK   15  Click Finish and then click OK     0 05 0    Step 4  Test the Configuration from an External Network    Use the following procedure to determine if your Outlook 2013 clients are successfully connecting to your Exchange Server 2013 using Outlook  Anywhere     1  From the command line  start outlook exe  rpcdiag  The Outlook email client and an extra diagnostic window opens  Keep this window  open to test your configuration    2  If prompted  select the new Outlook profile and click OK    3  The Exchange Server prompts you to connect and requests your credentials  Using the format domain username  type your username  and password  
56. 1 Barractida Sol VPN  Ov  rvieW isa o er so ea ee ete dais 3    1 1  B  rac  da  ool  VPN Release  Noles 24 tatoo ra be id UE ewes hehe ee eee eee te 3  TZ DEP VNS e o Sea Tass Mig Bc ates Meee dee seco eink MGA a O AS 5  ias HardWare SDECHICALONS  raras dai ted bye bee poet oe cod bohe i Seve ee eh bt id 7  22 MUU ey SINS lepra ia nd ae id iia eben cd tenes 8  1 2 2 1 Sizing CPU  RAM  and Disk for Your Barracuda SSL VPN VX        o o ocooooococcooo tenes 9   1 2 2 2 How to Deploy Barracuda SSL VPN Vx Virtual Images            2 0 00 ccc ttt teens 10   1 2 2 3 How to Enable Promiscuous Mode on VMware for the Barracuda Network Connector          ocoooooococoooo   11   1 2 2 4 Barracuda  Sok  VPN  Vx Quick Start Guide viociscisaoi Yee hoes 13   123 19H Availability  DeployMent  cio ac daravione dew a oS sees a cern Sith ark  ah ark Aah mee elle merase Aho Beh ae ree RAEE AG wh nth ach 16   1 2 3 1 How to Configure a High Availability Cluster        0  0 0 0 0    0 ccc tte ttt eenes 16   124 LICCNSING  sia bce susan te pak et cote be hale sane 18   ESSE IN Stearns o pa ela ve Oi rere ar ee pao NT cron oO Om he We oe Cee ee WD 18   A  ACMINIStFatIve Menaces   lt   c 2  lt 2b5 ms dcce aia las uh eo    ee DU aE AA Se Bai tue Won eae ri   20  TS ACCESS CONTON sii eek ed carts ee es A A e eee ee 21   1 5 1 How to Create and Modify User Databases 2 2  osc 3 he A A a ie ee 22   1 5 1 1 Example   Create a User Database with Active Directory          0 0    eee eens 23   12 te AUIMeMUCAN
57. Exchange Server  For each Exchange server  complete the following steps     1  Open the Exchange 2013 web interface   2  From the left hand panel of the Exchange admin center page  go to servers and select servers from the main menu     3  Double click the Exchange Server that you want to configure    4  From the left hand panel of the server configuration window  select Outlook Anywhere    5  Enter the external host name for your Exchange Server  for example  mall mycompany com    6  Set the authentication type to Basic  By default  authentication is set to NTLM  which does not work for clients that are connecting from a  different domain than the Exchange Server     Step 3  Configure the Outlook 2013 Client  On the client s Windows system  configure the Outlook 2013 client     1  Open the Control Panel   2  Double click the Mail    3  Click Show Profiles   4  Click Add to add a new mail profile    5  Enter a unique name for the mail profile and click OK    6  Select the Manually configure server settings or additional server types option and click Next    7  Select the Microsoft Exchange or compatible service option and click Next    8  In the Server field  enter the Barracuda SSL VPN hostname  for example  sslvpn example com   9  In the User Name field  enter your username in the following format  usernamef domain  Do NOT click Check Name   10  Click More Settings  11  Select the Connection tab   12  In the Outlook Anywhere section  select the Connect to Microsoft Exchange
58. L VPN  and set and confirm a shared secret  this will be needed for  the Barracuda SSL VPN configuration        Click Add     Add Client    The client administrator of RADIUS Service can configure its RADIUS Client IP address and shared secret for security of RADIUS  messages  Please note  RADIUS Service uses UDP port 1812 for communication     Client IP  e g  192 168 0 0 24     Client Secret  shared encryption key     Confirm Client Secret       The RADIUS client should now appear in the list     Client IP Created Status    F  10 14 0 19 2012 05 22 18 29 27 y  Select all   Invert selection       Configuring Barracuda SSL VPN    1  Log on to the Barracuda SSL VPN web interface as ssladmin and navigate to ACCESS CONTROL  gt  Authentication Schemes  Create  a new authentication scheme which contains the RADIUS module  Select RADIUS  click Add   Select a policy which will be able to use  this authentication  such as Everyone for example  and click Add  The new module will appear  this may be set as the default module by  clicking More   next to the item and choosing Increase Priority until it appears at the top of the list             anm  Ex Webmin 1 570 on yrva35 c       lt 8 Barracuda SSL VPN  Authen  gt  a  IE C fi  amp  ptps   10 14 0 19 showAuthenticationSchemes do wy A       3SP     ssladmin  gt   NETWORKS    Manage Account    ARRACUDA    SSL VPH 680Vx RESOURCES   ACCESS CONTROL   ADVANCED Logot  English  x     User Databases Access Rights NAC    NAC Exceptions Authentica
59. Navigate to ADVANCED  gt  Linked Management   b  In the Clustered Systems section enter the IP address of the primary unit and click Add System   c  Click Join Cluster      i  The configuration of this unit will now be overwritten with the configuration from the primary unit     Limited Warranty and License    Limited Warranty    Barracuda Networks  Inc   or the Barracuda Networks  Inc  subsidiary or authorized Distributor selling the Barracuda Networks product  if sale is  not directly by Barracuda Networks  Inc       Barracuda Networks     warrants that commencing from the date of delivery to Customer  but in case of  resale by a Barracuda Networks reseller  commencing not more than sixty  60  days after original shipment by Barracuda Networks  Inc    and  continuing for a period of one  1  year   a  its products  excluding any software  will be free from material defects in materials and workmanship  under normal use  and  b  the software provided in connection with its products  including any software contained or embedded in such products  will substantially conform to Barracuda Networks published specifications in effect as of the date of manufacture  Except for the foregoing  the  software is provided as is  In no event does Barracuda Networks warrant that the software is error free or that Customer will be able to operate  the software without problems or interruptions  In addition  due to the continual development of new techniques for intruding upon and attacking  n
60. OMOCMNEIMEGS  anrr clo  fsa hg E A  Sl Reese eee ei Glee ee eae Ge aie el A eke Piet ee gs 24   125 2 1 Hardware Token Authentication  1202 0  A Sides tie asd hades och eww de o 25   1 5 2 2 How to Configure One Time Password  OTP  Authentication         0 0    000 cc eee eens 26   1 5 2 3 How to Configure Public Key Authentication         20    0  ccc tte etn t eens 27   1 5 2 4 How to Configure SSL Client Certificate Authentication          0    eee eee ees 28   1 5 2 5 Example   How to Install and Configure YubiRADIUS      2    2  ttt nes 29   1 5 2 6 Example   Authentication with SMS Passcode RADIUS server             00  eee eens 40   EDO HOMO COMMGULETPONICIES  angi Ancora eed a eee are et as ee eo eee E A 42   ESA ACCESS ONIS srta id ee Wen wee a Pee eh ae ek ee ia tae 43   TWO RESOUS asui ths wees aw ad oes oie O aa has wide oe nate eset 44   ROTE DEON IS e fea es2 7 6 ae ok ee ees et eas he ik oa ok eh ee are ee Se Riek ee eed OE en eee a ee ee 44   Sal GU StOM Wep EOW dS 0 5 oe es A 44   1 6 1 1 1 How to Create Custom Web Forwards            een eee eee 47   1 6 1 2 How to Configure a Microsoft SharePoint Web Forward               0000 ccc cect ttt ttt teens 48   1 6 1 3 How to Configure a Microsoft Exchange OWA Web Forward             0  cece eee es 49   te Network Races ains iO A A ale Gi Seen is 49   1 6 2 1 How to Create  a Network Place Resource 20 A ja a 50   16 22 HOw to Conligure AV Scanning ara A A A A Ade aks 51   03 ADDIIGANONS   c  rs A he Mes ee heed ee
61. P Configuration page     e All SSL information  including saved certificates  on the BASIC  gt  SSL Certificate page     e Any advanced IP configuration  models 600 and above  on the ADVANCED  gt  Advanced IP Configuration page      e Administrator password   e Cluster Shared Secret  though this must be the same for the cluster to work properly  on the ADVANCED  gt  Linked Management page     e Time Zone  on the BASIC  gt  Administration page     e The appliance GUI and SSL VPN HTTP and HTTPS ports    e Whether the latest release notes have been read    e All customized branding  models 600 and above  on the ADVANCED  gt  Appearance page      Licensing    i  For more questions about your Barracuda SSL VPN license  contact your Barracuda Networks sales representative   The Barracuda SSL VPN virtual and physical appliances both have different base licences  For both appliance types  add on subscription licenses  are also available     In this article     e Hardware Licenses   e Vx Licenses   e Subscription Based Licenses  e Energize Updates  e Instant Replacement  e Premium Support    Hardware Licenses    Hardware appliances are limited only by the performance of the appliance s hardware  There is no limit to how many users can concurrently  connect to the appliance  To help you size the appliance  Barracuda Network provides a recommended number of concurrent users  If you are  using the appliance with more than the recommended number of users  its performance declines  but use
62. Properties and go to the Security tab      Click Advanced settings  and from the L2TP tab      Select Use preshared key for authentication      In the Key field  enter the PSK for the Barracuda SSL VPN      Click OK to return to the Security tab      Click OK to save your settings and return to the connect dialog      To log in  enter the following information     e User name   The account name for the connecting user  for example  psmith  e Password   The password for the username specified above   Click Connect     Configure a Windows 8 Client Device    For Windows 8 systems  the required configuration changes are automatically made  To verify that your system makes the changes automatically     A    Known Issue  It is necessary for users to manually enter the PSK in the IPsec configuration       Launch the browser on your remote system and log into the Barracuda SSL VPN     On your RESOURCES  gt  My Resources page  you will see a Barracuda IPsec resource  an administrator can change the name of this    resource        Click on the Barracuda IPsec icon  This launches the Barracuda SSL VPN Agent and configures the VPN connection on your Windows    8 system     If these instructions do not work  your Barracuda SSL VPN is probably running an older version  Continue with the rest of this article     Windows 8 for IPsec    1     NO oR Ww    Launch the browser on your remote system and log into the Barracuda SSL VPN  On your RESOURCES  gt  My Resources page  you will  see a Barra
63. RECT  CONSEQUENTIAL  INCIDENTAL  OR PUNITIVE  DAMAGES HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF LIABILITY ARISING OUT OF THE USE OF OR INABILITY TO  USE THE ENERGIZE UPDATE SOFTWARE EVEN IF BARRACUDA NETWORKS OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE  POSSIBILITY OF SUCH DAMAGES  In no event shall Barracuda Networks  liability to Customer  whether in contract  tort  including negligence    or otherwise  exceed the price paid by Customer  BECAUSE SOME STATES OR JURISDICTIONS DO NOT ALLOW LIMITATION OR  EXCLUSION OF CONSEQUENTIAL OR INCIDENTAL DAMAGES  THE ABOVE LIMITATION MAY NOT APPLY TO YOU     This Energize Update Software License shall be governed by and construed in accordance with the laws of the State of California  without  reference to principles of conflict of laws  provided that for Customers located in a member state of the European Union  Norway or Switzerland   English law shall apply  The United Nations Convention on the International Sale of Goods shall not apply  If any portion hereof is found to be void  or unenforceable  the remaining provisions of the Energize Update Software License shall remain in full force and effect  Except as expressly  provided herein  the Energize Update Software License constitutes the entire agreement between the parties with respect to the license of the  Energize Update Software and supersedes any conflicting or additional terms contained in the purchase order     Open Source Licensing    Barracuda products may include prog
64. RESOURCES tab only lists the items to which they have been granted access by the system  administrator     For more information on the types of resources that you can configure on your Barracuda SSL VPN  see the articles that are linked in the  following table     Resource Type Description Link    Web Forwards Access to intranet websites and internal Web Forwards  web based applications     Applications Predefined and custom client server Applications  applications within the secured network     Network Connector Full TCP IP access into the secured network  Network Connector  Network Places Network shares on the internal network  Network Places  SSL Tunnels Create SSL tunnels to secure unencrypted SSL Tunnels    intranet services     Web Forwards    To make web based applications and internal websites accessible to remote users with the proper credentials  configure Web Forwards  With  Web Forwards  sensitive information does not need to be placed outside of your corporate firewall  Because all communication is secured with  SSL  additional encryption or authentication routines are not required for the site     The type of Web Forward that you use depends on the directory structure of your internal websites  For the most popular web based applications   you can use predefined templates to configure the Web Forward  For all other websites  you can configure custom Web Forwards     Web Forward Templates  The Barracuda SSL VPN offers predefined Web Forward templates for the foll
65. S  export control laws  including the U S  Export Administration Act and its  associated regulations  and may be subject to export or import regulations in other countries  Customer agrees to comply strictly with all such  regulations and acknowledges that it has the responsibility to obtain licenses to export  re export  or import Energize Update Software     Restricted Rights  Barracuda Networks  commercial software and commercial computer software documentation is provided to United States  Government agencies in accordance with the terms of this Agreement  and per subparagraph     c     of the    Commercial Computer Software    Restricted Rights    clause at FAR 52 227 19  June 1987   For DOD agencies  the restrictions set forth in the    Technical Data Commercial Items     clause at DFARS 252 227 7015  Nov 1995  shall also apply     No Warranty  The Energize Update Software is provided AS IS  Customer s sole and exclusive remedy and the entire liability of Barracuda  Networks under this Energize Update Software License Agreement will be  at Barracuda Networks option  repair  replacement  or refund of the  Energize Update Software     Renewal  At the end of the Energize Update Service Period  Customer may have the option to renew the Energize Update Service at the current  list price  provided such Energize Update Service is available  All initial subscriptions commence at the time of sale of the unit and all renewals  commence at the expiration of the previous valid subs
66. SSL VPN     1  Left click on the Network Manager entry on your Linux system panel and select VPN Connections  gt  Name for your VPN Connection   2  An animated icon will appear while the connection is being made   3  When connected  the icon will change to show a padlock     How to Configure IPsec    You can configure the Barracuda SSL VPN to allow L2TP IPsec connections from remote devices using an L2TP IPsec client that supports using  a pre shared key  PSK  as an authentication protocol  L2TP IPsec clients are also standard on most smartphones  including  Apple iPhones and   Pads  smartphones running Android 1 6 or higher and tablets running Android 3 0 or  higher     In this article   e Before you Begin  e Step 1  Configure the IPsec Server  e Step 2  Create an L2TP IPsec Connection  e Step 3  Apply the Installation to the Client Device    Before you Begin    On your organization s firewall  allow authentication traffic to and from the Barracuda SSL VPN  UDP over ports 500 and 4500 must be enabled to  reach the Barracuda SSL VPN for L2TP IPsec connections to function     Step 1  Configure the IPsec Server  On the Barracuda SSL VPN  configure the IPsec server to allow your remote users to authenticate and connect to the protected network       Log into the SSL VPN Web interface      Navigate to the RESOURCES  gt  IPsec Server page      Verify that you have selected the correct user database on the top right of the page      In the Create IPsec Server section  enter a descr
67. Save        The certificate then appears in the SSL Certificates section on the Manage System  gt  ADVANCED  gt  SSL Certificates page              SSL Certificates Help  Name  fi User Database Keystore Type Actions  R Root Certificate Default Client Certificate Authentication Delete   Export Certificate       ssivpn barracuda com SSL VPN Server Certificate   Export Certificate   Export Private Key       Step 2  Configure Client Certificate Authentication Settings  Configure the settings for the client certificates       Log into the SSL VPN web interface      Go to the Manage System  gt  ACCESS CONTROL  gt  Security Settings page     In the Client Certificates section  configure the client certificates settings      Click Save Changes     AA U N      Step 3  Add the Client Certificate Authentication Module to an Authentication Scheme      Log into the SSL VPN web interface      Go to the Manage System  gt  ACCESS CONTROL  gt  Authentication Schemes page     Edit an authentication scheme      Double click Client Certificate to add the authentication module    5  Click Save     Example   How to Install and Configure YubiRADIUS    A U N      This article provides step by step instructions on how to deploy the YubiRADIUS virtual appliance in context with Barracuda SSL  VPN  Once YubiRADIUS is installed  Barracuda SSL VPN can be configured to act as a RADIUS client     In this article     e Pre Requisites   e Reference   e Installing the YubiRADIUS Virtual Appliance   e Configuri
68. THAT ANY ERRORS IN ITS PRODUCTS OR THE SOFTWARE WILL BE CORRECTED  FURTHERMORE  BARRACUDA  NETWORKS DOES NOT WARRANT THAT BARRACUDA NETWORKS PRODUCTS  THE SOFTWARE OR ANY EQUIPMENT  SYSTEM OR  NETWORK ON WHICH BARRACUDA NETWORKS PRODUCTS WILL BE USED WILL BE FREE OF VULNERABILITY TO INTRUSION OR  ATTACK     Software License    PLEASE READ THIS SOFTWARE LICENSE AGREEMENT     AGREEMENT     CAREFULLY BEFORE USING THE BARRACUDA SOFTWARE   BY USING THE BARRACUDA SOFTWARE YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS LICENSE  IF YOU DO NOT  AGREE TO THE TERMS OF THIS LICENSE DO NOT USE THE SOFTWARE  IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE    YOU MAY RETURN THE SOFTWARE OR HARDWARE CONTAINING THE SOFTWARE FOR A FULL REFUND TO YOUR PLACE OF  PURCHASE     1  The software  documentation  whether on disk  in read only memory  or on any other media or in any other form  collectively    Barracuda  Software     is licensed  not sold  to you by Barracuda Networks  Inc      Barracuda     for use only under the terms of this License and Barracuda  reserves all rights not expressly granted to you  The rights granted are limited to Barracuda s intellectual property rights in the Barracuda Software  and do not include any other patent or intellectual property rights  You own the media on which the Barracuda Software is recorded but Barracuda  retains ownership of the Barracuda Software itself     2  Permitted License Uses and Restrictions  This License allows you to use the Software
69. UREMENT OF SUBSTITUTE GOODS OR SERVICES  LOSS OF USE  DATA  OR PROFITS  OR  BUSINESS INTERRUPTION  HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY  WHETHER IN CONTRACT  STRICT LIABILITY  OR  TORT  INCLUDING NEGLIGENCE OR OTHERWISE  ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE  EVEN IF ADVISED OF  THE POSSIBILITY OF SUCH DAMAGE     Barracuda Products may contain programs that are Copyright  c  1998 2003 Carnegie Mellon University  All rights reserved  Redistribution and  use in source and binary forms  with or without modification  are permitted provided that the following conditions are met  1  Redistributions of  source code must retain the above copyright notice  this list of conditions and the following disclaimer  2  Redistributions in binary form must  reproduce the above copyright notice  this list of conditions and the following disclaimer in the documentation and or other materials provided with  the distribution  The name  Carnegie Mellon University  must not be used to endorse or promote products derived from this software without prior  written permission  For permission or any other legal details  please contact Office of Technology Transfer Carnegie Mellon University 5000  Forbes Avenue Pittsburgh  PA 15213 3890  412  268 4387  fax   412  268 7395 tech transfer andrew cmu edu  Redistributions of any form  whatsoever must retain the following acknowledgment   This product includes software developed by Computing Services at Carnegie Mellon  University  http   
70. VS 4244    Fix  Improved ActiveSync session disconnection handling  BNVS 4243  BNVS 4263    Fix  Prevent files that were in tmp directory from being deleted when they should not have been  BNVS 4188    Fix  Enabled uploading of certificates with PKCS  8 private keys  BNVS 4235    Fix  Account selection works correctly for Read Only mode Active Directory groups when using Internet Explorer  BNVS 421 7   Fix  My Resources filter displays correct selection  BNVS 4258    Fix  Creating a new Certificate Authority is possible after deleting an existing one  BNVS 4233  BNVS 4255    Fix  Ssladmin session information is displayed correctly on clustered systems  BNVS 4225    Fix  Correction to AD password expiry message  BNVS 3591    Fix  Improvements to Microsoft Sharepoint 2013 checkout discard in Microsoft Office 2007 and 2010  BNVS 4184     Version 2 4 0 2 Fixes     Graphs  e Graphs display correctly in Internet Explorer version 10  BNVS 4030   Web Forwards  e Path based web forwards display large pages containing multi byte characters accurately  BNVS 4196   e Web sites that switch between character encodings display extended chars          etc   correctly  BNVS 4102   e Launching a Host File Redirect Tunneled Web Forward in Windows 7 closes the Command prompt window  BNVS 4101   e Sharepoint 2010 documents can be edited  BNVS 4132   IPsec PPTP  e Timeout option added for IPsec PPTP sessions  BNVS 4155   e When launching PPTP  if the connection already exists then a confirmation m
71. Verify that you have selected the correct user database on the top right of the page      In the Create Profile section  select the database  for which you want to apply the profile from the User Database list      Enter a unique name for the profile in the Name field      From the Policies list  select the policies to associate with this profile and click Add  gt  gt  to add them to the Selected area on the right     Click Add to create the policy     NO of WD      Step 2   Optional  Configure Additional Profile Settings  The Edit Profile window lets you configure additional details if required  such as timeouts and local proxy settings     1  To edit the profile settings  click the Edit link next to the profile in the Profiles list    2  Modify the settings as required  The session parameters affect how the active session behaves and includes for example cache behavior  and inactivity timeout    3  Click Save Changes     Users who are granted the appropriate permissions can create and manage their own profiles  For example  a user might configure a home profile  which is configured for use when working from home and another called On site which could be used for when the user is on a customer site     Provisioning Client Devices    This functionality is supported on client devices running Microsoft Windows    OS and Mac OS X 10 7 and above and requires Barracuda SSL  VPN firmware version 2 4 0 9 or newer    The Device Configuration feature allows you to provision resources 
72. a SSL VPN which Server Agent is responsible for a particular resource  You can define multiple routes for  every Server Agent     1  Log into the SSL VPN web interface   2  Open the Manage System  gt  ADVANCED  gt  Server Agents page   3  In the Create Route section  enter the following information   e Name      Enter a name   e Host Pattern     Enter a host pattern  This can be an IP address or a domain  Wildcards are allowed  E g   10 0 100   or   my  Co com  e Port Pattern     Enter a single port  or port range that applies to the resources using this server agent  E g   800   e Server Agent     Select the Server Agent from the list   4  Click Add     The routes are now visible in the Routes section  If you want to move a route to a different Server Agent  edit the Server Agent configuration in  the Agents list     How to Configure the SSL VPN Agent    The SSL VPN Agent is a small client installed on the client computer to tunnel  unencrypted connections  The traffic is intercepted and rerouted through a SSL tunnel  created by the SSL VPN Agent     The SSL tunnel creates a secure tunnel into your network  lt is important that  users log out and do not leave their session unattended  The tunnel will  disconnect  if it is inactive for a configurable amount of time     Related Articles       e How to Configure Profiles    INTERNET DMZ INTRANET    HTTP          Remote Client with  Bamac uda SSL  VPN Agent    External HTTP Webserver  Firewall    Executing Resources from the Bar
73. a secondary IP address from the IP range defined  in the network connector resource configuration  The network connector uses the assigned secondary IP and the configured published routes to  determine which traffic to forward to the internal network  The default configuration is for the network connector to act as a split level VPN  only  routing traffic destined for the internal network through the tunnel  It is possible to change this behavior to route all traffic through the network  connector     In this Section    e How to Configure the Network Connector   e How to Create a Static Route   e Advanced Network Connector Client Configuration   e Using the Network Connector with Microsoft Windows  e Using the Network Connector with Mac OS X   e Using the Network Connector with Linux    How to Configure the Network Connector    Configure the server side settings for the network connector and create the client  configurations  Supported platforms are Windows  Linux and Mac OS X      i  The displayed Network and IP Address are those already assigned to the  Barracuda SSL VPN  The IP addresses distributed by the Network  Connector to remote systems must be a subnet of the IP address range that  you assigned to the unit in the administrative interface  For example     Barracuda SSL VPN IP configuration  10 0 0 1 with netmask 255 255 255 0    Available  IPs for the Network Connector LANs  10 0 0 2   10 0 0 254    Related Articles    How to Create a Static Route  Advanced Network C
74. allow remote access  you can  setup a connection on a remote device  All you need to do is to make sure that you  have the appropriate credentials  and that the system you want to use has the  appropriate type of client  L2TP IPsec  that will already come pre installed on your  device  in most cases     In this article   e Configure a Windows 7 Client Device  e Configure a Windows 8 Client Device  e Configure a Mac OS X Client Device    Related Article       e How to Configure IPsec    Configure a Windows 7 Client Device            O O ON OO Ff    ek    12     The details of the following steps are specific to Windows 7  but can be adapted for other Windows versions such as XP and Vista by  navigating to the corresponding feature on the system       Log into the Barracuda SSL VPN  On your RESOURCES  gt  My Resources page  you will see a Barracuda    IPsec resource if the Barracuda SSL VPN has been configured to accept L2TP IPsec connections       Click on the Barracuda IPsec configuration tool  The Barracuda SSL VPN Agent will automatically create and configure an L2TP IPsec    VPN connection on your Windows system      i  Configuring the IPsec settings may require administrator privileges on your system       Once the configuration  and possible reboot  has completed  navigate to Control Panel  gt  Network and    Internet  gt  Network and Sharing Center       Select Connect to a network  click on the Barracuda IPsec entry  and click Connect     On the connect dialog  select 
75. ample com    3  To configure a PPTP connection  select Add PPTP VPN and configure only the following settings  for all other settings  accept the  default values    e VPN name   A name for this connection  for example  Ss von ppip   e Set VPN server   The hostname or IP address of the Barracuda SSL VPN  for example  ss von example com    e Enable Encryption   Select to enable encryption of your PPTP session   e DNS search domains   Enter the default domain for the protected network  for example  example com    4  Select Save  The newly created connection appears in the VPN Settings menu     When you attempt a connection to the Barracuda SSL VPN  you are prompted for your username and password     Configure a Windows 8 RT Surface Tablet    Edit Windows 8 RT Registry Entry    If both your remote computer and the Barracuda SSL VPN are behind a router that uses NAT  which is the most common scenario   you will have  to edit the Windows 8 RT registry to allow access to an L2TP IPsec server behind NAT T devices     To edit the registry entry on Windows RT  proceed as follows       On the Microsoft Surface tablet  swipe in from the right edge of the screen  and tap the Search  magnifying glass  charm     Type regedit and select it from the list      Navigate to Computer HKEY_LOCAL MACHINE SYSTEM CurrentControlSet Services PolicyAgent      On the Edit menu  point to New  and then click DWORD  32 bit  Value    Type AssumeUDPEncapsulationContextOnSendRule  and then press Enter      Rig
76. an Authentication Scheme  e Step 3  Test the SMS Passcode Authentication    Step 1  Configure the RADIUS Server    On the Barracuda SSL VPN  enter the configuration for the SMS Passcode RADIUS server     1  Go to the Manage System  gt  ACCESS CONTROL  gt  Configuration page   2  In the RADIUS section  enter the following information   e RADIUS Server     Enter the hostname or IP address of the SMS Passcode server   e Authentication Port     Enter 1812   e Shared Secret     Enter the shared secret  This passphrase must be configured on the SMS Passcode server   e Authentication Method     Select PAP   e Reject Challenge     Select No     3  Click Save Changes     RADIUS    RADIUS Server     Backup RADIUS Servers     Authentication Port     Accounting Port   Shared Secret   Authentication Method     Time Out     Authentication Retries     RADIUS Attributes     Username Case     Password Prompt Text   Reject Challenge     Challenge Image URL     Allow Untrusted Challenge Image  URL        Save Changes Help    Hostname Hostnames       Host names of backup RADIUS  Servers      lt  lt  Remove          1812 This is the port number stipulated for the RADIUS authentication process  It MUST be a valid integer  port between 0 and 65535  Default  1812      1813 This is the port number stipulated for the RADIUS accounting process  It MUST be a valid integer port  between 0 and 65535  Default  1813    eeeeeeeeeeeeeee 2 The RADIUS shared secret which has been set up on the RADIUS server    
77. ancer in Bridge Path  recommended  or Route Path mode     To cluster your Barracuda SSL VPNs with a load balancer  complete the following tasks     1  Configure the Barracuda Load Balancer  For instructions  see Barracuda Load Balancer Bridge Path Deployment or How to Set Up a  Barracuda Load Balancer for Route Path Deployment   2  Configure Simple High Availability  See How to Configure a High Availability Cluster     How to Configure a High Availability Cluster    Follow these instructions to cluster your Barracuda SSL VPN systems  These  instructions apply to both simple high availability and for clustering with a load  balancer     In this article     e Before you Begin   e Adding an Appliance to the Cluster  e Simple High Availability   e Creating a High Availability Cluster  e Setting Non Proxied Hosts   e Non Clustered Data    Related Articles  e High Availability Deployment    e How to Update Firmware of  Systems in a Cluster       Before you Begin  Log in to the appliance interface using the admin account  and perform the following steps for each system that will be in the cluster       Complete the installation process      Make sure that each Barracuda SSL VPN are the same model  It is possible to mix hardware and virtual appliances      Make sure that each Barracuda SSL VPN is on exactly the same firmware version using the ADVANCED  gt  Firmware page     Make sure that each Barracuda SSL VPN has the same time zone using the BASIC  gt  Administration page     BR WD
78. and click OK  The Outlook client then retrieves the client s email from the Exchange Server through the Outlook Anywhere  connection    4  Check the Connection Status window     When the Outlook client is fully connected  you will see 4 connections  2 Mail types and 2 Directory types  to your Exchange Server  All of these  connections should show a connection  Conn  type of HTTPS  If they do  the test is successful     Troubleshooting Outlook Anywhere    If the connection type is TCP IP  then the Outlook client is connected directly to the Exchange Server and is not using RPC  If this is the case   verify the following points to troubleshoot the issue     e Verify your Outlook 2013 client configuration    e Verify your Exchange Server 2013 configuration    e Verify that you have a valid SSL certificate signed by a trusted root Certification Authority  CA  or a  self signed certificate installed on the Barracuda SSL VPN    e If you are using a self signed certificate  verify that you have imported it to the local certificate store on    all the client systems that are using Outlook 2013   e  f required  verify that you have opened port 443 on your internal firewall for the Barracuda SSL VPN to  communicate with your Exchange Server   e Make the appropriate Outlook and Exchange Server configuration changes  and test your configuration  from your external network   How to Configure ActiveSync for Microsoft Exchange Servers    If you are using Microsoft Exchange Server  your user
79. and other settings configured on the Barracuda SSL VPN directly on a user s  device  When logged in  the user will see resources and settings on their RESOURCES  gt  Device Configuration page  depending on what  resources you make available to them and the operating system of the device  There they can select the resources to be provisioned and where  they should be located on the device  for example  in a folder on the Desktop     Before you Begin  For the user to be able to see the RESOURCES  gt  Device Configuration page  the following conditions must be met     e The user must have the Personal Access Right Device Configuration View Access Right    e There must be a accessible resource on the client to be provisioned    e For the items  client certificates  mail settings  Exchange ActiveSync settings  and LDAP settings  the corresponding option on the RESO  URCES  gt  Configuration page must be set to allow the provisioning     Grant Access to Users    Follow these instructions to grant users the Personal Access Right Device Configuration View Access Right       Log into the SSL VPN web interface      Verify that you have selected the correct user database on the top right of the page      Go to the ACCESS CONTROL  gt  Access Rights page      Inthe Create Access Right section  select the relevant database from the User Database drop down list     Select Personal Right    Enter a descriptive Name for this access right      In the Available Rights list  select Device Config
80. aries depending on whether the method is configured or not  If you want to use email  you must first configure the  SMTP settings  If you want to use SMS over email  configure the SMS settings on the ACCESS CONTROL  gt  Configuration p  age     e First   Send the message via the first available delivery method  This option is useful if the messaging configuration is frequently  altered or the recipients do not mind how they are contacted   e All   Send the message via all available delivery methods  This guarantees that individuals will always receive a message in  some way  but it means that the recipients may get multiple copies of the message   e Agent   Send the message via the SSL VPN Agent to only those recipients who are currently running the SSL VPN Agent  This  is useful if  for example  you want to warn that you are shutting down the service for maintenance   e Email   Send the message via email   e SMS over Email   Send the message to mobile phones using the SMS gateway service   6  If the message should be treated as urgent  select Urgent to place it at the front of the message queue   7  If the message should be treated as secure  select Secure  to not display the message contents within the Audit Log or Reports     8  Enter your message in the Content field   9  Select one or more Accounts  Groups or Policies to which the message will be sent   10  Click Send to save this entry     An entry for this message will be displayed in the Messages section below  By def
81. attached to this application resource can now run the RemoteApp on the Windows Server via the Barracuda SSL  VPN     SSL Tunnels    SSL Tunnels are used to encrypt data for client server applications which normally do not use encryption  The tunnel is created by the SSL VPN  Agent and terminated at the Barracuda SSL VPN  local tunnel   The remote user does not connect directly to the remote resource as in a VPN     but to a Port on the 127 0 0 1 interface  The SSL VPN Agent accepts the local connection and forwards the traffic through the SSL tunnel  The  Barracuda SSL VPN forwards the traffic to the destination IP and Port defined in the SSL tunnel configuration  The traffic from the Barracuda SSL  VPN to the destination IP in the network is not encrypted anymore     SSL Tunnel  127 0 0 1 45678    f j Barracuda SSL VPN  Connect Ed    a example com 25             y    SSL tunnels can be configured to only allow local connections or to allow connections directly to the remote network  It is also possible to define  the source IP address of the SSL tunnel  so that clients in the same remote network can share a SSL tunnel  The tunnel is terminated when the  session is closed or timed out     Next Steps    To create a SSL Tunnel complete the following instructions  How to Create an SSL Tunnel   How to Create an SSL Tunnel    An outgoing SSL tunnel protects TCP connections that your local computer forwards from a local port to a preconfigured destination IP address  and port  reac
82. ault  all available messages are listed in alphabetical order  To  display only the messages that begin with certain characters  enter the desired text in the area on the left  and click Apply Filter     Agents   There are two agents for the Barracuda SSL VPN  The Barracuda SSL VPN Agent which secures unencrypted connections from the client  computer to the SSL VPN and the Server Agent which creates a SSL tunnel to relay traffic for resources which can not be directly accessed by  the SSL VPN  Both Agents create a SSL tunnels to the Barracuda SSL VPN  acting as a transparent proxy    SSL VPN Agent    INTERNET DMZ INTRANET    HTTP       Baracuda SSL VPN       Remote Client with  Baracuda SSL  VPN Agent    External HTTP Webserver  Firewall    The Barracuda SSL VPN Agent is used to tunnel unencrypted connections  The traffic is intercepted and rerouted by the SSL VPN Agent installed  on the client computer and then sent through a SSL encrypted tunnel to the Barracuda SSL VPN     The SSL tunnel creates a secure tunnel into your network  lt is important that users log out and do not leave their session unattended   The tunnel will disconnect  if it is inactive for a configurable amount of time     For more information  see How to Configure the SSL VPN Agent   Server Agent    INTERNET DM Z INTRANET         Serer Agent  Installed        Barracuda SSL VPN    External E  Firewall Internal  Firewall       Intranet Resou res    The Barracuda Server Agent is installed inside of a network
83. b interface      Go to the RESOURCES  gt  Web Forwards page      Verify that you have selected the correct user database on the top right of the page      In the Create Web Forward section  select the database the users reside in from the User Database drop down list      Enter a unique name for the Web Forward in the Name field  for example Outlook Web Access      Next to Web Forward Category  tick the checkbox Mail and select Outlook Web Access 2010 from the list      Inthe Hostname field  enter the hostname or IP address of the web server you wish to connect to      To save authentication time  select the Provide Single Sign On option      In the Available Policies list  choose the policies that you want to apply to the Web Forward and add them to the Selected Policies list     Select Yes for Add to My Favorites if the Web Forward should be added to the default Resource Category or No if this should be    configured later       Click Add to create the Web Forward     Edit the Web Forward      In the Web Forwards section  click Edit next to the Web Forward entry      To use OWA form based authentication  make sure that the option Multiple Services On Destination Host is enabled     Configure additional options  such as authentication parameters if required      Click Save     Adding a resource category to a Web Forward makes it available to the user on the My Resources page  You can also configure this Web  Forward to be launched automatically every time a user logs into th
84. can get it if you want it   that you can change the software or use pieces of it in new free programs  and that you know you can do these things     To protect your rights  we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights  These  restrictions translate to certain responsibilities for you if you distribute copies of the software  or if you modify it     For example  if you distribute copies of such a program  whethergratis or for a fee  you must give the recipients all the rights that you have  You  must make sure that they  too  receive or can get the source code  And you must show them these terms so they know their rights     We protect your rights with two steps   1  copyright the software  and  2  offer you this license which gives you legal permission to copy  distribute  and or modify the software     Also  for each author s protection and ours  we want to make certain that everyone understands that there is no warranty for this free software  If  the software is modified by someone else and passed on  we want its recipients to know that what they have is not the original  so that any  problems introduced by others will not reflect on the original authors  reputations     Finally  any free program is threatened constantly by software patents  We wish to avoid the danger that redistributors of a free program will  individually obtain patent licenses  in effect making the program proprietary  To prevent this  w
85. cription     In no event does Barracuda Networks warrant that the Energize Update Software is error free or that Customer will be able to operate the  Energize Update Software without problems or interruptions  In addition  due to the continual development of new techniques for intruding upon  and attacking networks  Barracuda Networks does not warrant that the Energize Update Software or any equipment  system or network on which  the Energize Update Software is used will be free of vulnerability to intrusion or attack     DISCLAIMER OF WARRANTY  ALL EXPRESS OR IMPLIED CONDITIONS  REPRESENTATIONS  AND WARRANTIES INCLUDING   WITHOUT LIMITATION  ANY IMPLIED WARRANTY OR CONDITION OF MERCHANTABILITY  FITNESS FOR A PARTICULAR PURPOSE   NONINFRINGEMENT  SATISFACTORY QUALITY OR ARISING FROM A COURSE OF DEALING  LAW  USAGE  OR TRADE PRACTICE  ARE  HEREBY EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW  TO THE EXTENT AN IMPLIED WARRANTY CANNOT BE  EXCLUDED  SUCH WARRANTY IS LIMITED IN DURATION TO THE WARRANTY PERIOD  BECAUSE SOME STATES OR JURISDICTIONS  DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS  THE ABOVE LIMITATION MAY NOT APPLY TO YOU   THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS  AND YOU MAY ALSO HAVE OTHER RIGHTS WHICH VARY FROM  JURISDICTION TO JURISDICTION     General Terms Applicable to the Energize Update Software License Disclaimer of Liabilities  INNO EVENT WILL BARRACUDA NETWORKS BE  LIABLE FOR ANY LOST REVENUE  PROFIT  OR DATA  OR FOR SPECIAL  INDI
86. ction  and enter the preshared key      l Drarraicida lene ett et ont on    Advanced Properties    L2TP     8  Use preshared key For authentication    key    seskekekckstefcoteosdoketefeteoech     Use certificate For authentication    wf  Verify the Mame and Usage attributes of the servers certificate    c  Click OK twice to exit the connection properties   4  Connect to the IPsec server     Step 3  Apply the Installation to the Client Device    Once you are successfully connected  provision the device configuration to the client device  Be aware  that  for this procedure  the user must  have been granted the appropriate access rights  For more information  see  Provisioning Client Devices     1  From the Resources tab of the client device  go to Device Configuration   2  Tick the checkbox unter the IPsec server entry   3  Click Provision on the bottom of the page     How to Configure Mobile Devices    To configure your mobile device to connect to the Barracuda SSL VPN  follow the  instructions given in the relevant article section     e Configure an iOS Device  e Configure an Android Device    e Configure a Windows 8 RT Surface Tablet  e Configure a Windows Mobile Device    Related Article       e How to Configure IPsec    Configure an iOS Device    The Barracuda SSL VPN will automatically make the configuration changes required on your iPhone or iPad  To configure the client device   complete the following steps     1  In a web browser  go to the login page of the Barracuda
87. cuda IPsec resource if the Barracuda SSL VPN has been configured to accept L2TP IPsec connections       Click on the Barracuda IPsec icon  This launches the Barracuda SSL VPN Agent and asks you to configure the L2TP IPsec VPN    connection on your Windows 8 system       On the Connect dialog that appears     Click Properties     In the General tab  enter the IP address or host name of the Barracuda SSL VPN       In the Security tab  select Layer 2 Tunneling Protocol with IPsec  L2TP IPsec  and click Advanced settings     On the Advanced Properties dialog  select Use preshared key for authentication and enter the preshared key given to you by your IT    administrator       Click OK two times     e If both your remote computer and the Barracuda SSL VPN are behind a router that uses NAT  most likely scenario   you will    have to edit the Windows 8 registry to allow access to an L2TP IPsec server behind NAT T devices   a  Press the Windows key on your keyboard   b  Type regedit and then run the regedit app   c  Navigate to Computer HKEY_LOCAL_ MACHINE SYSTEM CurrentControlSet Services PolicyAgent   d  On the Edit menu  point to New  and then click DWORD  32 bit  Value   i  Type AssumeUDPEncapsulationContextOnSendRule  and then press Enter   li  Right click AssumeUDPEncapsulationContextOnSendRule  and then click Modify   iii  In the Value Data box  set the value to 2  iv  Click OK and exit regedit   v  Restart Windows   9  Once the restart has completed  launch your browser and l
88. d click Add  gt  gt  to add them to the Selected Policies   6  Click Save when you are done     This will create a LAN entry in the Server Interfaces section  and a corresponding LAN client entry in the Client Configurations section  As soon  as a server interface is created  you can customize the configuration according to your requirements     e You can create  or copy  and configure your client settings as required  For more information  see Advanced Network Connector Client  Configuration   How to Create a Static Route    If the Barracuda SSL VPN is installed in a DMZ  you must create a static route on the  client systems so that they can reach the main LAN  To introduce the static route   complete the following steps     e Step 1  Configure the Client  e Step 2  Configure the Static Route  e Option 1  Publish the Static Route  e Option 2  Configure an Up Command tor the Static Route    Related Articles    e Network Connector    e How to Configure the Network  Connector       Step 1  Configure the Client    Configure the client as described in Advanced Network Connector Client Configuration  At this point the client will only be  able to route through to other systems within the DMZ  Before creating a static route on the client systems   determine the default gateway address that the Barracuda SSL VPN uses  This gateway should be able to  route to the main LAN from the DMZ  To create a route to the clients to tell them how to get to the main LAN  there are two    alternat
89. d submit their own remote assistance requests   For information on how to  configure Access Rights  see Access Rights      To create a remote assistance request  complete the following steps     e Step 1  Create a Remote Assistance Request  e Step 2  Launch the Remote Assistance Request    Related Articles    e Remote Assistance  e Providing Remote Assistance       Step 1  Create a Remote Assistance Request      Log into the SSL VPN web interface      Open the RESOURCES  gt  My Remote Assistance page      In the Name field  enter a brief summary for your request      Add a detailed description of the problem and any additional notes concerning this request     Enter your email address and phone number  optional       Click Add     Ook WN         The request is added to the My Remote Assistance Requests section     Step 2  Launch the Remote Assistance Request    As soon as the helpdesk administrator has contacted you and requests access to your system     1   2     Click on your remote assistance request to launch the session   Once the assistance session has started  you can communicate with the assistant  Click the Chat icon on the bottom of the screen to  view and send messages     When the session is closed  the request will be deleted from the list   Providing Remote Assistance    A helpdesk  or system administrator with the appropriate access rights can respond to  remote assistance requests sent by standard users and then connect to the remote  system to provide assista
90. d then complete the following steps to configure the RemoteApp on the Barracuda SSL VPN     1  In the Applications section click Edit for the RDP application resource you just created  E g   RDP RemoteApp  2  Inthe Remote Applications section enter   e Remote Applications Mode     Select Yes   e Remote Application Name     Enter the remoteapplicationname value after the last colon from the rdp file created on the  Windows Server  E g   Navision if the string in the rdp file is  remoteappliationname s Navision  e Remote Application Program     Enter the value after the last colon of remoteapplicationprogram in the rdp file created on the  Windows Server  E g   Navision PDP Systems USA if the string in the rdp file is  remoteapplicationprogram s     Nav  ision PDP Systems USA     e  optional  Command Line Arguments     Enter optional commandline arguments which will be passed to the applications when       it is started   3  Click Save Changes   Remote Applications   Save Changes   Heip    Remote Applications Mode   S Yes No Activate the Remote Applications Support  Remote Application Name  Navision     The name of the Remote Application you what to use  Remote Application Program  Navision PDP Systems US      The program name of the Remote Application  Command Line Arguments  sd     Any command line arguments to pass to the Remote Application  Gateway server settings   Do not use    Automatically detect   TS Gateway configuration settings    All users included in the policies 
91. d tia ghee be 3 68   1 6 7 1 How to Configure Mobile Devices 2 02 50  604 4445 e ARAS AA wa De SO es 69   1 6 7 2 How to Configure Remote Devices avisa A AA Oe ae eR Aa ee 71   LOG OW NO COMIGUIC RPTE  nd A Sees Nae  te te Saree eg 73   LE FIOW NO  COMMNGUIE Promesas Sem epee Sierras oa Gatien en we E E eee a a Sh ei ele ee ae ds 74   126 10 Provisioning Client Devices  224 ts ete Re phe ant ed he Orbe nd ohe he ae al eee Rea eed ote 74   17   Advanced CONtQUratON assis  tai e a A ee a AA A dee deed 77   AAU POUL Soh ra eee este ea  See ant ee oe eee Gat rae tne le nd ee oe cere a ene Oe Britain ee cee eae em pied CRE eee ete a ace ed 77    E eMe S Sa sata A o NN ee ea 77    LASADEN  S vidas    Al OW to Conigurea DET VER Agent pass A oie  1 7 3 2 How to Contigure the SSL  VPN Agent  cuisine A ee di    1 8 Monitoring                   1 8 1 Basic Monitoring         1 8 2 Notifications             1 83 SNMP   2 deseara   1 9 Maintenance                   1 9  Rowo Comigur   Automated  BACKUPS cana A A eee eae kad    1 9 2 Restore from Backups     1 9 3 Update Firmware           1 9 4 How to Update the Firmware in a High Availability Cluster               o oooooooooooonro eens    1 10 Limited Warranty and License    Barracuda SSL VPN   Overview    The Barracuda SSL VPN is an ideal appliance for giving remote users secure access to network resources  The Barracuda SSL VPN only  requires a browser to give remote users access from any computer  Built in and third party multi facto
92. ditions of this License  each Contributor hereby grants to You a perpetual  worldwide   non exclusive  no charge  royalty free  irrevocable  except as stated in this section  patent license to make  have made  use  offer to sell  sell   import  and otherwise transfer the Work  where such license applies only to those patent claims licensable by such Contributor that are  necessarily infringed by their Contribution s  alone or by combination of their Contribution s  with the Work to which such Contribution s  was  submitted  If You institute patent litigation against any entity  including a cross claim or counterclaim in a lawsuit  alleging that the Work or a  Contribution incorporated within the Work constitutes direct or contributory patent infringement  then any patent licenses granted to You under this  License for that Work shall terminate as of the date such litigation is filed     4  Redistribution  You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium  with or without modifications   and in Source or Object form  provided that You meet the following conditions      a  You must give any other recipients of the Work or Derivative Works a copy of this License  and   b  You must cause any modified files to carry prominent notices stating that You changed the files  and     c  You must retain  in the Source form of any Derivative Works that You distribute  all copyright  patent  trademark  and attribution notices from  the Source form
93. documents  the order of precedence shall be  1  the written  agreement   2  the click on agreement  and  3  this Energize Update Software License     License  Subject to the terms and conditions of and except as otherwise provided in this Agreement  Barracuda Networks  Inc   or a Barracuda  Networks  Inc  subsidiary  collectively    Barracuda Networks      grants to the end user     Customer     a nonexclusive and nontransferable license to  use the Barracuda Networks Energize Update program modules and data files for which Customer has paid the required license fees  the     Energize Update Software      In addition  the foregoing license shall also be subject to the following limitations  as applicable     Unless otherwise expressly provided in the documentation  Customer shall use the Energize Update Software solely as embedded in  for  execution on  or  where the applicable documentation permits installation on non Barracuda Networks equipment  for communication with  Barracuda Networks equipment owned or leased by Customer  Customer s use of the Energize Update Software shall be limited to use on a  single hardware chassis  on a single central processing unit  as applicable  or use on such greater number of chassis or central processing units  as Customer may have paid Barracuda Networks the required license fee  and Customer s use of the Energize Update Software shall also be  limited  as applicable and set forth in Customer s purchase order or in Barracuda Networks  pr
94. e  Current adapter            By WGS_VF250  m NGS_WESO  E  Win20087 2064   Ch  WindkB6 pro momi statio    Py Tacks rok g    Barracuda SSL VPN Vx Quick Start Guide    After your virtual appliance has been deployed  you must provision it  You need your    Barracuda Vx license token  which you received via email or from the website when  you downloaded the Barracuda SSL VPN Vx package  The license token is a 15  character string  formatted like this  01234 56789 ACEFG     Complete the following steps     e Before You Begin   e Step 1  Enter the License Code   e Step 2  Open Firewall Ports   e Step 3  Log Into the Appliance Web Interface and Verify Configuration   e Step 4  Update the Firmware   e Step 5  Change the Administrator Password for the Appliance Web Interface  e Step 6  Route Incoming SSL Connections to the Barracuda SSL VPN Vx   e Step 7  Verify Incoming SSL Connections to the Barracuda SSL VPN Vx   e Next Step    Related Articles    e Barracuda SSL VPN Administrative    Interfaces  e Backing Up Your Virtual Machine  System State       Before You Begin    Deploy the Barracuda SSL VPN Vx on your hypervisor  For more information  see How to Deploy Barracuda SSL VPN Vx Virtual Images     Step 1  Enter the License Code  Enter the license token to start automatically downloading your license       Start your virtual appliance     Open the console for the Barracuda SSL VPN virtual machine     When the login prompt appears  log in as admin with the password admin     Bb O N 
95. e  any Contribution intentionally submitted for inclusion in the Work by You to  the Licensor shall be under the terms and conditions of this License  without any additional terms or conditions  Notwithstanding the above   nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such  Contributions     6  Trademarks  This License does not grant permission to use the trade names  trademarks  service marks  or product names of the Licensor   except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file     7  Disclaimer of Warranty  Unless required by applicable law or agreed to in writing  Licensor provides the Work  and each Contributor provides its  Contributions  on an  AS IS  BASIS  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND  either express or implied  including  without  limitation  any warranties or conditions of TITLE  NON INFRINGEMENT  MERCHANTABILITY  or FITNESS FOR A PARTICULAR PURPOSE   You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your  exercise of permissions under this License     8  Limitation of Liability  In no event and under no legal theory  whether in tort  including negligence   contract  or otherwise  unless required by  applicable law  such as deliberate and grossly negligent acts  or agreed to in writing  shall any Co
96. e  reverting to an earlier firmware version is not recommended   e Once you install the EA firmware  you must update each point release up to the final GA release to take advantage of latest fixes     Update your Barracuda SSL VPN Firmware    The appliance will reboot when the firmware update is applied  Make sure you do not unplug or manually reset your Barracuda SSL  VPN during the update process unless instructed to do so by Barracuda Networks Technical support     1  Log into the Appliance web interface    2  Open the ADVANCED  gt  Firmware Update page    3  If anew firmware version is available  click Download Now next to the version  GA or EA  you want to upgrade to   4  Click Apply Update after the update has been downloaded to the appliance     The Barracuda SSL VPN will reboot and perform the update  This may take up to 20 minutes   How to Update the Firmware in a High Availability Cluster    Special care needs to be taken when updating the firmware in a high availability  cluster  To avoid synchronization errors and inconsistencies  it is necessary to remove  all units from the cluster and update each one individually  After the update  recreate  the cluster  Each Barracuda SSL VPN system in a cluster must be on exactly the same  firmware version  so plan to update the units at the same time     It is strongly recommended that you create a back up  ADVANCED  gt   Backup  before proceeding     Related Articles    e Virtual Systems    e Update Firmware  e High Availab
97. e Barracuda SSL VPN by setting Auto Launch to Yes     Network Places    Network Places provide remote users with a secure web interface to access the corporate network file shares  With appropriate permissions   users can browse network shares  rename  delete  retrieve and upload files just as if they were connected in the office  In addition  Network  Places also provide support for Web Folders and the Windows Explorer Drive Mapping feature  The Barracuda SSL VPN supports the following  network file systems     e SMB  Windows file shares   e FTP  e SFTP    Web Folders    Web Folders use a direct WebDAV connection  Remote users can access the organization   s network through the standard Windows Explorer  interface without actually needing to log into the Barracuda SSL VPN  Once configured  they can access the share by clicking an icon and  entering their Windows credentials     Configured Web Folders must go through the Barracuda SSL VPN server so that the share can be seen by the client operating system  For  security reasons  the Barracuda SSL VPN only allows Web Folders that are mapped to existing Network Places  This enforces policy restrictions   if a user does not have a policy which allows them to access a given network place then they will also be unable to map a Web Folder to it     Windows Explorer Drive Mapping    The Windows Explorer Drive Mapping feature allows you to create a Network Place and assign it a drive letter for clients running Microsoft  Windows  Whe
98. e Before you Begin   e Step 1  Configure the Barracuda SSL VPN   e Step 2  Configure the Exchange Server   e Step 3  Configure the Outlook 2013 Client   e Step 4  Test the Configuration from an External Network  e Troubleshooting Outlook Anywhere    Before you Begin    e Make sure that you have a valid SSL certificate signed by a trusted root Certification Authority  CA  or a self signed certificate  If you are  using a self signed certificate  you must import it to the local certificate store on all the client machines on which you want to use Outlook   e If required  open port 443 on your internal firewall so that the Barracuda SSL VPN can communicate with the Exchange Server     Step 1  Configure the Barracuda SSL VPN  Configure the Barracuda SSL VPN to act as an RPC Proxy     1  Log into the SSL VPN web interface   2  Open the Mange System  gt  RESOURCES  gt  Configuration page   3  Verify that you have selected the correct user database on the top right of the page   4  In the Outlook section   a  In the Exchange Server field  enter the Exchange servers hostname   b  In the Exchange Port field  enter 443  unless you have configured the Exchange server to listen on a different port    c  In the Protocol area  click the HTTPS option   d  In the Authorized Policies section  select one or more policies that contain the users that should have access to the Outlook  proxy and click Add to add them to the Selected Policies area   5  Click Save Changes     Step 2  Configure the 
99. e device must have an  appropriate VPN client that supports the desired authentication protocol  preferably MSCHAPv2     A As of 2012  PPTP is no longer considered secure  It is highly recommended that you switch away from PPTP     In this article     e Before you Begin   e Step 1  Enable PPTP Server   e Step 2  Create a PPTP Connection   e Step 3  Download the Configuration to the Client Device    Before you Begin    e On your organization s firewall  allow authentication traffic to and from the Barracuda SSL VPN  TCP over port 1723 and GRE  IP  Protocol 47  forwarded to the Barracuda SSL VPN for PPTP connections to function     Step 1  Enable PPTP Server    On the Barracuda SSL VPN  configure PPTP to allow your remote users to authenticate and connect to the protected network       Log into the SSL VPN Web interface      Navigate to the RESOURCES  gt  PPTP Server page      Verify that you have selected the correct user database on the top right of the page      In the Create PPTP Server section  enter a descriptive name for your PPTP server      In the IP Range Start End fields  enter the first and last IP address of the DHCP range that should be assigned to remote systems  connecting via PPTP     0O A O N      This IP range must reside in the network range that is configured in the Basic IP Configuration section of the applicance  interface  and MUST NOT be part of any other DHCP range on your LAN     6  From the Policies list  select the available policies that you want t
100. e have made it clear that any patent must be  licensed for everyone s free use or not licensed at all     The precise terms and conditions for copying  distribution and modification follow   GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING  DISTRIBUTION AND MODIFICATION    0  This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the  terms of this General Public License  The  Program   below  refers to any such program or work  and a  work based on the Program  means  either the Program or any derivative work under copyright law  that is to say  a work containing the Program or a portion of it  either verbatim or  with modifications and or translated into another language   Hereinafter  translation is included without limitation in the term  modification    Each  licensee is addressed as  you      Activities other than copying  distribution and modification are not covered by this License  they are outside its scope  The act of running the  Program is not restricted  and the output from the Program is covered only if its contents constitute a work based on the Program  independent of  having been made by running the Program   Whether that is true depends on what the Program does     1  You may copy and distribute verbatim copies of the Program s source code as you receive it  in any medium  provided that you conspicuously  and appropriately publish on each copy an appropriate copy
101. e using     1  Open the Manage System  gt  ACCESS CONTROL  gt  Configuration page   2  Inthe SMS section  enter the following information  depending on the requirements of your SMTP to SMS service provider   e SMS Gateway Address     The email address for the SMS gateway  A common example would be     userAttributes mobi  leNumber    example com  e SMS Provider Credentials     Usually the credentials and the text are entered here   3  Click Save Changes     How to Configure Public Key Authentication    The public key authentication module is a very secure authentication mechanism  combining a client certificate and a passphrase with the  possibility to store the authentication keys on an external storage device  No external services or appliances are needed  all keys are generated    and managed by the Barracuda SSL VPN  The module can be used as primary or secondary authentication mechanism  The administrator has to  generate a private and public key which is then uploaded to the Barracuda SSL VPN and stored on the users USB key device or home directory   When you authenticate with a public key  the following steps are followed       The Barracuda SSL VPN generates a random ticket  certificate      The user selects the private key and enters the corresponding passphrase      The ticket is signed with the users private key and sent to the Barracuda SSL VPN     The Barracuda SSL VPN uses checks if the signed ticket is valid with its public key     If the check was successful  
102. ed client certificate according to parameters that are defined by you  If you do not check for certificate  attributes that are unique to each user  any user can log in with a browser that has a valid SSL client certificate  To prevent this  you must always  combine SSL client certificate authentication with another authentication method like a password prompt     In this article     e Before You Begin   e   Step 1  Upload the Root Certificate   e Step 2  Configure Client Certificate Authentication Settings   e Step 3  Add the Client Certificate Authentication Module to an Authentication Scheme    Before You Begin  Create the following     e A root certificate   e Client certificates   e An authentication scheme using client certificates as a primary or secondary authentication method     For more information on creating your own self signed root certificates  see How to Create Certificates with XCA     Step 1  Upload the Root Certificate  For every user database  you can create or upload a unique root certificate     1  Open the Manage System  gt  ADVANCED  gt  SSL Certificates page    2  In the Import Key Type section  select A root Certificate Authority certificate you trust for client certificate authentication from the  Certificate Type list   3  In the Import Details section  select the user database that you want to upload the root certificate to    4  Click Browse  and select the root certificate file  The certificate file must have a cer or crt extension    5  Click 
103. ed to create a new PIN during the  next login  To prevent weak PINs  disable the use of sequential numbers  e g   1234      To configure the PIN module  go to the PIN section on the ACCESS CONTROL  gt  Security Settings page     Public Key    Public key authentication is one of the most secure methods of authentication  because the authentication information can be stored on a  removable medium such as a USB key device  You can generate the key files for every user  or you can reset the public keys for everyone  letting  users generate the keys during initial logins  After the key is generated  the login applet searches external media and the user s home directory for  available keys  The user selects the correct key and enters the matching passphrase to complete the login     For more information  see How to Configure Public Key Authentication     RADIUS    External RADIUS servers can be queried by the appliance to authenticate users  RADIUS servers are often used for external authentication  methods that require users to enter a secondary challenge password     RADIUS servers are also integrated with some hardware token solutions  The hardware token generates a login passphrase and the RADIUS  server interfaces with the external security appliance from the hardware token vendor  validating the string from the hardware key  generator  Challenge images can be used in combination with RADIUS authentication     Because the RADIUS server is an external authentication service  it
104. emperature and system load when  using a hardware appliance     In this article     e Status and Performance  e Session Monitoring  e Viewing Event Logs  e System Tasks Overview    e Web Interface Syslog  e SNMP Support    Related Article       e SNMP    Status and Performance  The Status page displays information about the current status of the Barracuda SSL VPN server for the last 24 hours     1  Log into the SSL VPN Web interface    2  Go to the BASIC  gt  Status page     The status information is displayed as follows       Status   Quick Launch User Activity Logs Audit Logs Virus Checking  Configuration Administration         Scanned Infected       Type       Users Online            Web Forward file upload      ol o  Network Place file upload Lol o    0 100 200 300 400 500 600          EN Current users online  1   B Most users ever online  2       The graphs displayed on the Status page provide information about session types  user activity  resources and traffic sent through the Barracuda  SSL VPN     Session Monitoring  The Sessions screen displays all active sessions of users that are currently logged in     1  Log into the SSL VPN Web interface    2  Go to the ACCESS CONTROL  gt  Sessions page           Sessions Help  Apply Filter  User   i User Database Session Type IP Address Logon Time Actions  g ssladmin Super Users Browser 10 0 10 2 2013 12 03 04 41 35 Log Off  3 ssladmin Super Users Browser 10 0 10 2 2013 12 03 04 39 38 Log Off       Expand a session by clicking
105. ense     
106. entication Scheme                    The user should now be logged on successfully   A AA hh TTT X    3 Webmin 1 570 on yrvaaS c  j  lt 8 Barracuda SSL VPN  My Res  gt                     e C Ni    btepS   10 14 0 19 showCategorizedResources do ZA  ARRACUDA test    NETWORKS Logoff English            SSI VPH 680Vx RESOURCES   ACCOUNT    My Web Forwards My Network Places My Applications My SSL Tunnels My Remote Assistance  My Network Connector My IPsec Server My Profiles My Resource Categories    My Resources Help      Filter By All Categories m  mE                 te   ie a        Barracuda IPsec Cudatel My Computer Outlook Web Selenium  Access          y     amp     support cudaops com UniTTYOctane             Example   Authentication with SMS Passcode RADIUS server    You can use SMS Passcode servers to authenticate users with one time passwords  OTP  that are sent via SMS  The user logs in with a  username and password and then receives an SMS containing the OTP  e g   nc43sa   After entering the OTP  the user is logged in  For  multi factor authentication  you can combine SMS Passcode with other authentication modules     To set up authentication with SMS Passcode  configure a RADIUS server to be used by it and then create an authentication scheme that includes  the RADIUS server        Phone       In this article             Send 5MS with OTP    SMS Passcode  RADIUS server       Authenticate username   Verity OTP    e Step 1  Configure the RADIUS Server  e Step 2  Create 
107. es    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    Yes    The Barracuda SSL VPN is available as a virtual appliance  Because it is mostly used after office hours  it is suitable on a server hosting virtual m  achines that are used intensely during office hours but sit idle for the rest of the time  You can pair a Barracuda SSL VPN Vx with a hardware  Barracuda SSL VPN appliance to create a high availability cluster  With a load balancer  you can create a configuration that uses the resources of  the hardware Barracuda SSL VPN during the day when the hypervisor is under high load and then use the virtual Barracuda SSL VPN to cover  the peak load in the evening when employees log in from home     Deploying the Barracuda SSL VPN Vx  To deploy the Barracuda SSL VPN Vx  complete the following tasks     1  Size the CPU  RAM  and Disk for your Barracuda SSL VPN Vx    2  Deploy the Barracuda SSL VPN Vx virtual images    3   For VMware hypervisors  Enable Promiscuous mode on VMware for the Barracuda Network Connector   4  Set up the Barracuda SSL VPN Vx with the Quick Start Guide     Sizing CPU  RAM  and Disk for Your Barracuda SSL VPN Vx    Barracuda Networks recommends the following sizing for the initial deployment of your virtual appliance or the upgrade of
108. essage is not displayed  BNVS 4194   e IPsec PSK can include all valid symbols  BNVS 4081  BNVS 4125   Mapped Drives  e Webdav Mapped Drives do not timeout due to inactivity  BNVS 4090   e Session timeout will disconnect Mapped Drives  BNVS 4128   e Office 2013 documents work with Mapped Drives  BNVS 3778   Sessions  e Password can be entered after session has been locked due to browser closure  BNVS 4144   Server Agent  e The ADVANCED  gt  Server Agents page refreshes correctly when an agent is enabled or disabled in Internet Explorer version 10   BNVS 4119   e Zip file containing the server agent client contains the correct version  BNVS 4120   e Server Agent service starts on Linux  BNVS 4244     e Improved notifications message handling under heavy load  BNVS 4058    e NAC antivirus checking detects status of multiple installed AV products  BNVS 4099    e Network Connector routes can be added in Mac OS X  BNVS 4100    e Authentication schemes and NAC exceptions consider policy time restrictions  BNVS 3455   e  32 CIDR notation is handled correctly by IP authentication  BNVS 381 8     Deployment    The Barracuda SSL VPN is typically deployed in the following configurations     Direct Access DMZ Deployment     Behind the firewall  with direct access to all intranet resources    Multilayer Firewall DMZ Deployment     In a DMZ between the external and internal firewall  Additional ports have to be opened on the  internal firewall to access internal resources    Isolated Deplo
109. etworks  Barracuda Networks does not warrant that the software or any equipment  system or network on which the software is used will be free  of vulnerability to intrusion or attack  The limited warranty extends only to you the original buyer of the Barracuda Networks product and is  non transferable     Exclusive Remedy    Your sole and exclusive remedy and the entire liability of Barracuda Networks under this limited warranty shall be  at Barracuda Networks or its  service centers option and expense  the repair  replacement or refund of the purchase price of any products sold which do not comply with this  warranty  Hardware replaced under the terms of this limited warranty may be refurbished or new equipment substituted at Barracuda Networks  option  Barracuda Networks obligations hereunder are conditioned upon the return of affected articles in accordance with Barracuda Networks  then current Return Material Authorization     RMA     procedures  All parts will be new or refurbished  at Barracuda Networks discretion  and shall  be furnished on an exchange basis  All parts removed for replacement will become the property of the Barracuda Networks  In connection with  warranty services hereunder  Barracuda Networks may at its discretion modify the hardware of the product at no cost to you to improve its  reliability or performance  The warranty period is not extended if Barracuda Networks repairs or replaces a warranted product or any parts   Barracuda Networks may change t
110. ewall  The Barracuda SSL VPN is deployed and isolated from the rest of the network  All resources are located in networks which are not directly    accessible by the Barracuda SSL VPN  Server Agents inside the networks initiate tunnels to the SSL VPN and act as proxies for the local    resources  This deployment minimizes security implications caused by opening various ports on the firewalls to access the resources located  behind them     In this Section    e Hardware Specifications   e Virtual Systems   e High Availability Deployment  e Licensing    Hardware Specifications    A Warranty and Safety Instructions  Unless you are instructed to do so by Barracuda Networks Technical Support  you will void your warranty and hardware support if you  open your Barracuda Networks appliance or remove its warranty label     Barracuda Networks Appliance Safety Instructions Hardware Compliance        Hardware Specifications of the Various Barracuda SSL VPN Models    The hardware configuration list in this table was valid at the time this content was created  The listed components are subject to change  at any time  as Barracuda Networks may change hardware components due to technological progress  Therefore  the list may not  reflect the current hardware configuration of the Barracuda SSL VPN     Barracuda SSL VPN Model    180 280 380 480 680 880  Recommended 15 25 50 100 500 1 000  Maximum  Concurrent  Users  Hardware  Rackmount 1U Mini 1U Mini 1U Mini 1U Mini 1U Full size 1U Full size 
111. firms that your appliance can receive connections from the Internet     Next Step    Configure your virtual machine  For instructions  see Getting Started    High Availability Deployment   High availability is available for the Barracuda SSL VPN 480 and above  Clustering two or three Barracuda SSL VPNs provides you with a  high availability  fault tolerant environment that supports data redundancy and centralized policy management  After you configure one HA unit     configuration settings are synchronized across the cluster  You can cluster the Barracuda SSL VPN in two ways  simple high availability or high  availability with a load balancer     Simple High Availability    If you configure two or more Barracuda SSL VPNs in a high availability setup without a load balancer  configurations are synced between the  units but only one unit processes traffic  The secondary unit is passive and monitors the health of the primary unit  If the active system becomes  unavailable  the secondary unit takes over automatically     For more information  see How to Configure a High Availability Cluster     High Availability with a Load Balancer    If you want all clustered Barracuda SSL VPNs to process traffic  use a load balancer  such as the Barracuda Load Balancer  to direct traffic to the  HA units while maintaining session persistence  You must have a load balancer to spread the load over all Barracuda SSL VPN cluster members   It is recommended that you configure the Barracuda Load Bal
112. hable by the Barracuda SSL VPN that the user is connected to  To use the tunnel  the application or browser connects to a random  listener port on the 127 0 0 1 or 127 0 0 2 localhost address  The encrypted tunnel ends at the SSL VPN  all connection beyond the SSL VPN are  not secure  If you want other computers on the same network to share a SSL tunnel  use a network IP address instead of the 127 0 0 1 localhost  address as the source address     In this article    e Step 1  Create a SSL Tunnel  e Step 2   Optional  Configure Advanced Tunnel Settings  e Step 3  Test the SSL Tunnel    Step 1  Create a SSL Tunnel    1  Log into the SSL VPN web interface     2  Go to the RESOURCES  gt  SSL Tunnels page   3  In the Create SSL Tunnel section  select the desired database from the User Database drop down list     If you are a Super User in the Global View and you want to apply this SSL tunnel across more than one User Database  select  Global View as the User Database to list the Policies across all the User Databases     4  Enter a unique name for the tunnel in the Name field   5  In the Destination Host field  enter the name or IP of the resource you want to access     The  f  indicates that replacement variables can be used  Clicking this icon will load the replacement variables that are  available  The session variables are values taken from the current session  The userAttributes variables are values taken from  user defined attributes for the currently logged on user     6  I
113. he Network Place  for example  lisales public   In the Username and Password fields  enter the username and password  or leave them blank if you want the user to provide  credentials when the application is launched  If you are using session variables   a  Select session username in the Username field     NOOR WON o    You might have to enter the domain as well as the Username session variable  using the following format  domain   s  ession username     b  In the Password field  select session password     8  In the Available Policies section  select the policies that you want to apply to the Network Place and click Add  gt  gt     If the policy that you want to add is not available in the Available Policies section  make sure that the appropriate user  database is selected from the pull down menu in the upper right of the page  or select the Global View user database to list all  of the available policies from all the user databases     9  Click Add to create the network place     The Network Place resource is now created and displayed in the Network Places section     Step 2  Edit the Network Place  You can configure additional settings such as host and folder options by completing the following steps     In the Network Places section  click the Edit link associated with the Network Place  The Edit Network Places page opens     Configure the settings as required      When you are finished configuring your options  click Save at the bottom of the page      Click Save     hop
114. he availability of limited warranties  at its discretion  but any changes will not be retroactive  INNO EVENT  SHALL BARRACUDA NETWORKS LIABILITY EXCEED THE PRICE PAID FOR THE PRODUCT FROM DIRECT  INDIRECT  SPECIAL   INCIDENTAL  OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OF THE PRODUCT  ITS ACCOMPANYING SOFTWARE  OR  ITS DOCUMENTATION     Exclusions and Restrictions    This limited warranty does not apply to Barracuda Networks products that are or have been  a  marked or identified as    sample    or    beta      b   loaned or provided to you at no cost   c  sold    as is      d  repaired  altered or modified except by Barracuda Networks   e  not installed  operated or  maintained in accordance with instructions supplied by Barracuda Networks  or  f  subjected to abnormal physical or electrical stress  misuse   negligence or to an accident     EXCEPT FOR THE ABOVE WARRANTY  BARRACUDA NETWORKS MAKES NO OTHER WARRANTY  EXPRESS  IMPLIED OR  STATUTORY  WITH RESPECT TO BARRACUDA NETWORKS PRODUCTS  INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTY  OF TITLE  AVAILABILITY  RELIABILITY  USEFULNESS  MERCHANTABILITY  FITNESS FOR A PARTICULAR PURPOSE   NONINFRINGEMENT  OR ARISING FROM COURSE OF PERFORMANCE  DEALING  USAGE OR TRADE  EXCEPT FOR THE ABOVE  WARRANTY  BARRACUDA NETWORKS PRODUCTS AND THE SOFTWARE IS PROVIDED    AS IS    AND BARRACUDA NETWORKS DOES  NOT WARRANT THAT ITS PRODUCTS WILL MEET YOUR REQUIREMENTS OR BE UNINTERRUPTED  TIMELY  AVAILABLE  SECURE OR  ERROR FREE  OR 
115. he user only      IPsec Settings Creates a VPN connection on the device using the relevant IPsec  settings configured on the RESOURCES  gt  IPsec Server page     PPTP Settings Creates a VPN connection on the device using the relevant PPTP  settings configured on the RESOURCES  gt  PPTP Server page     A Known Issue  The preshared key has to be entered manually by the user for PPTP and L2TP IPsec connections on Windows devices       OS   Mac OS X Devices    This table shows the types of items that can be provisioned to   OS and Mac OS X  10 7 and above  devices     Item Type Description    Mail Settings Creates an email account on the device using a variety of settings  stored in the Barracuda SSL VPN  The email address is from the user  account  The server details are found on RESOURCES  gt   Configuration  gt  Mail Checking for inbound settings and BASIC  gt   Configuration  gt  SMTP for outbound  The username and password  for authenticating with the SMTP server are also taken from the same  place  but for inbound mail they are taken from the user attributes for  mail checking  ACCOUNT  gt  Attributes  gt  Mail Checking      Exchange Settings The remote device is configured to use the Barracuda SSL VPN to  proxy the connection     LDAP Settings For users authenticated with the Barracuda SSL VPN using LDAP or  OpenLDAP  the settings from the user database and user account  will be provisioned to the device     e Applications All of these resources  if available to the user o
116. ht click AssumeUDPEncapsulationContextOnSendRule  and then click Modify      In the Value Data box  set the value to 2     NOOR WD      8  Click OK and exit regedit    9  Restart Windows 8 RT   a  Swipe in from the right edge of the screen  and tap Settings   b  Tap or click Power  and then tap or click Restart     Create the IPsec Connection  Use the following steps to create the IPsec connection       On the Microsoft Surface tablet  swipe in from the right edge of the screen  and tap the Search  magnifying glass  charm      Type VPN to search for it in settings      Select Set up a virtual private network  VPN  connection  This opens the Create a VPN Connection window in Desktop mode      Enter the Barracuda SSL VPN IP address or host name  and enter a name for the connection      Click Create  The Networks widget will appear and give you the option to connect  This is not going to work yet though as you have not   yet entered the preshared Key  Press the icon to the right of the new connection until the Context menu appears      Select View Connection Properties  The Properties will display in desktop mode      Click the Security tab  and set the VPN type to Layer 2 Tunneling Protocol with IPsec  L2TP IPsec     8  Click Advanced Settings  Select Use pre shared key for authentication  and enter the preshared key that your administrator gave to  you and click OK    9  On the Security tab    a  Select Allow these protocols   b  Select PAP   c  Clear MS CHAP v2  so only PAP i
117. icate with the Exchange Server     Step 1  Configure the Barracuda SSL VPN    Configure the Barracuda SSL VPN to allow Outlook Anywhere access  see Step 1  of How to Configure Outlook Anywhere      Step 2  Configure Exchange Server 2013    For each Exchange server  configure the settings as described in Step 2  of How to Configure Outlook Anywhere     Step 3  Configure the Client Mobile Device for ActiveSync    Follow the instructions below for the type of mobile device that you want to connect to the Barracuda SSL VPN     Connecting an Android Mobile Device    To set up your Exchange ActiveSync account on your Android device  proceed as follows     1  On your Android device  start Settings and scroll to the Accounts section    2  Tap Add Account  then Corporate  Type in your email address and password and click Next   The mobile device attempts to retrieve the account information and does not succeed   The device prompts for further information     3  Type in your Active Directory domain name in front of your username so that it is in the format  domain username   4  For Server  type in the SSL VPN hostname  e g   sslvpn example com   5  Verify Use secure connection  SSL  is selected  If you are using a self signed certificate  select Accept all SSL certificates    6  Tap Next   The device will now prompt  The server  lt sslvpn hostname gt  requires that you allow it to remotely control some security features of your  Android device  Do you want to finish setting up this acc
118. ike adl sslvpn exa  mple   com as a user database hostname  You will also need to create a publicly available DNS entry that maps adl sslvpn example com to  the IP address of the Barracuda SSL VPN     You can tell if a user database is set as default by looking at ACCESS CONTROL  gt  User Databases  The user databases that are not built in  have a More   menu to the right hand side  If you click on that  and it displays an option to set this user database as default  then this is not the  default database     1  Navigate to ACCESS CONTROL  gt  User Databases  The User Databases section shows the built in databases and the user databases  that you have already configured  If there is an Edit option on the same row as the relevant user database  click it    2  In the User Database Details section  enter a hostname in the User Database Host field  This is normally a subdomain of your  Barracuda SSL VPN hostname    3  Add an entry for this hostname in your external DNS servers so that it resolves to the public IP address of the Barracuda SSL VPN    4  When connecting mobile devices to the Barracuda SSL VPN  use this new user database hostname as the server address     How to Configure Microsoft RDP RemoteApp    Microsoft Windows Server 2008 R2 added a feature that allows organizations to deploy server hosted desktop applications without requiring the  user to load an entire remote desktop  Only the application window is remotely displayed  integrating seamlessly into the user s c
119. ility Deployment       Step 1  Remove all Units from the Cluster  On each system in the cluster  proceed as follows     1  Gotothe ADVANCED  gt  Linked Management page and delete the Cluster Shared Secret  You will have to log in again   2  If you are using a Simple High Availability Cluster   a  Navigate to ADVANCED  gt  Linked Management   b  In the Simple High Availability section  clear the value of the IP address if it exists  you may only need to do this on the first  system    3  Log back in   4  Navigate to ADVANCED  gt  Linked Management   5  Delete all entries from the list of clustered systems  except the unit you are logged in to     Step 2  Update the Firmware    Update one unit first to verify that the upgrade applies successfully and the Barracuda SSL VPN is operating as expected  Then update the rest of  the systems     1  Goto the ADVANCED  gt  Firmware Update page and download the new firmware   2  Click Apply to update the system   3  After the system reboots  verify that the firmware has been applied successfully and is operating as expected     Step 3  Recreate the Cluster    Choose one unit as the primary unit  All other systems in the cluster will pull the configuration from this unit  Complete the following steps for all  units to recreate the cluster     1  Log into the SSL VPN web interface    2  Open the ADVANCED  gt  Linked Management page   3  Enter the Cluster Shared Secret    4  Click Save Changes     5  If the unit is not the primary unit   a  
120. ing WebDAV Mapped Drives    e Version 2 3 1 013 is not compatible with systems that are clustered    e When upgrading from version 2 1 firmware    e Replacement Proxy Web Forwards for OWA that were created prior to version 2 2 are no longer supported  If you have one  you  will need to replace it using the new OWA Template  Go to the RESOURCES  gt  Web Forwards page and delete the old Web  Forward  Then create a new one using the Mail Web Forward category     e When configuring Barracuda Network Connector on Macintosh systems  note that DNS insertion and Up Down commands are  mutually exclusive     What s new with the Barracuda SSL VPN Version 2 4 0 12    ix  Clustering on new systems  BNVS 4678    ix  High severity vulnerability  non persistent XSS  BNSEC 2802   BNVS 4542   ix  High severity vulnerability  persistent XSS  BNSEC 2697   BNVS 4543    ix  Unknown severity vulnerability   BNSEC 380    ix  Unknown severity vulnerability   BNSEC 335     What s new with the Barracuda SSL VPN Version 2 4 0 10    Fix   Fix   Fix   Fix   Fix   Fix   Fix   Fix   Fix   Fix     BN    External access blocked for non SSH ports  BNVS 4152    The most recent Scheduled Backup files are retained  BNVS 4614    High severity vulnerability  Unauthenticated  non persistent XSS  BNSEC 1546   BNVS 4210    High severity vulnerability  Unauthenticated  non persistent XSS  BNSEC 1542   BNVS 4211    High severity vulnerability  Clickjacking  BNSEC 509   BNVS 4024    Med severity vulnerability  Cross Site
121. ing to a variety of factors that are not connected to the user  Users who fail the  NAC check are not allowed to log in until they have a conforming system  You can define exceptions for single users  so that they can continue  using the service until they have time to update their system  User systems are evaluated by the following parameters     e Time of day   e Operating system  type and if it is up to date   e IP and MAC address   e Browser type and version   e Antivirus state  installed up to date    e Firewall   e Version of plugins installed   e Type of connection  Wi Fi    e Domain membership    To configure NAC  go to Manage System  gt  ACCESS CONTROL  gt  NAC  To define exceptions  go to Manage System  gt  ACCESS CONTROL  gt   NAC Exceptions     How to Create and Modify User Databases    A user database specifies where user authentication information is stored  The Barracuda SSL VPN 380 and above support multiple user  databases  letting you define different access policies for resources that are shared by users  The Barracuda SSL VPN supports authentication  with the following services     e Active Directory   e LDAP   e NIS   e OpenLDAP   e Built in internal user database    Create the User Database  To create the user database       Log into the SSL VPN web interface      Go to the Manage System  gt  ACCESS CONTROL  gt  User Databases page      Enter a Name for the database      Inthe Create User Database section  select and configure the authentication service 
122. iption     Getting Started    Follow the instructions in this guide after you complete the steps explained in the Barra  cuda SSL VPN Quick Start Guide  PDF  that shipped with your appliance     In this article     e Before You Begin  e Step 1  Install the SSL Certificate  e Step 1 1   Optional  Generate a CSR Request  e Step 1 2  Upload Signed Certificates  e Step 2  Configure System Contact and Alert Email Addresses  e Step 3  Change the Administrator s Password for the SSL VPN Web Interface  e Next Steps    Related Articles    e Administrative Interfaces  e Barracuda SSL VPN Quick Start  Guide  PDF        Before You Begin    e Install Java Runtime version 1 6 or above on your client computers   e Register a full DNS name for the Barracuda SSL VPN  e g   ss1vpn example  com    e  Recommended  Purchase an SSL certificate signed by a trusted CA     Step 1  Install the SSL Certificate    To prevent certificate errors whenever your users connect to the Barracuda SSL VPN  it is recommended that you install an SSL certificate signed  by a trusted CA  You can generate the signing request directly on the Barracuda SSL VPN  Your SSL certificate must use the full DNS name   e g   sslvpn example com  for the Common Name attribute     Step 1 1   Optional  Generate a CSR Request  To generate a CSR request       Log into the appliance web interface  e g   https    sslvpn example com  8443       Go to the BASIC  gt  SSL Certificate page      From the Certificate Type list  select Trusted 
123. iptive name for your IPsec server      Enter the preshared key  The string must be alphanumeric      Inthe IP Range Start End fields  enter the first and last IP address of the DHCP range that should be assigned to remote systems  connecting via IPsec     O ORAON          i  This IP range must reside in the network range that is configured in the TCP IP Configuration of the applicance interface  and  MUST NOT be part of any other DHCP range on your LAN     7  From the Policies list  select the available policies that you want to apply to the IPsec server  and add them to the Selected Policies list     8  Click Add     The IPsec Server is now created and appears in the IPsec Server section  You can test the configuration by  clicking the Launch link associated with the entry     Step 2  Create an L2TP IPsec Connection    On your remote device  create an L2TP IPsec connection to the Barracuda SSL VPN     If the remote device has had a VPN client uninstalled at some point  then make sure that the IPsec service has been re enabled in  order to allow connections via L2TP IPsec     1  Log into the Barracuda SSL VPN on the client device   2  Go to the Resources tab   3  From My Resources  select the IPsec server and click to launch it   During the connection  you will be prompted with a certificate warning message   a  Go to your network connections  right click the SSL VPN connection and go to the properties   b  Under the Security tab  click Advanced settings in the Type of VPN se
124. ives     e Publish a route that will apply to all clients using this Network Connector server interface   e Use an Up Command in the client configuration that configures the route on the client when the network connector is launched     Step 2  Configure the Static Route    Option 1  Publish the Static Route  To publish a static route for all users of a server interface     1  Go to the RESOURCES  gt  Network Connector page    2  Click Edit next to the relevant server interface    3  On the Edit Server Interface page  in the Routing Section  specify the network to be published  This network will always use the default  gateway  All clients will use this route  so if you have multiple client configurations with different networks  you may need to use the Up C  ommand instead     Option 2  Configure an Up Command for the Static Route  To configure an Up Command to create a static route on the client system when the configuration file is launched  proceed as follows       From the Barracuda SSL VPN web interface  log in as ssladmin and verify that you are in the Manage System mode     Go to the RESOURCES  gt  Network Connector page     Verify that you have selected the correct user database on the top right of the page     In the Edit Client Configuration section  add the Up Command   Example   e DMZ network address of 192 168 1 0 24  e Barracuda SSL VPN on IP address 192 168 1 100 and default gateway of 192 168 1 1  e Main LAN network address of 192  168 50 0 24  The Up Command
125. laims  actions  proceedings  and suits and all related liabilities   damages  settlements  penalties  fines  costs and expenses  including  without limitation  reasonable attorneys fees and other dispute resolution  expenses  incurred by Barracuda Networks arising out of or relating to Customers  a  violation or breach of any term of this Agreement or any  policy or guidelines referenced herein  or  b  use or misuse of the Barracuda Networks Energize Update Software     Term and Termination  This License is effective upon date of delivery to Customer of the initial Energize Update Software  but in case of resale by  a Barracuda Networks distributor or reseller  commencing not more than sixty  60  days after original Energize Update Software purchase from  Barracuda Networks  and continues for the period for which Customer has paid the required license fees  Customer may terminate this License at  any time by notifying Barracuda Networks and ceasing all use of the Energize Update Software  By terminating this License  Customer forfeits    any refund of license fees paid and is responsible for paying any and all outstanding invoices  Customer s rights under this License will terminate  immediately without notice from Barracuda Networks if Customer fails to comply with any provision of this License  Upon termination  Customer  must cease use of all copies of Energize Update Software in its possession or control     Export  Software  including technical data  may be subject to U 
126. le ending in  4x ovf for this hypervisor     1   2   3     From the File menu in the VirtualBox client  select Import Appliance   Navigate to the BarracudaSSLVPN vm3 1 0 fw__FIRMWARE__ 20120327 4x ovf file   Use the default settings for the import  and click Finish     4  Start the appliance     5  Follow the Quick Start Guide instructions to provision your Barracuda SSL VPN Vx appliance   Deploying VMX Images  VMware Server 2 x    1  Put the files ending in  vmx and  vmdk into a folder in your datastore  which you can locate from the Datastores list on your server s  summary page       From the VMware Infrastructure Web Access client s Virtual Machine menu  select Add Virtual Machine to Inventory      Navigate to the folder used in step 1  and click the BarracudaSSLVPN vmx file from the list under Contents    Click OK      Start the appliance      Follow the Quick Start Guide instructions to provision your Barracuda SSL VPN Vx appliance     oa wo PD    VMware Player 3 x   i  VMware Player cannot edit the network   vswitch settings  This can cause problems when testing the Network Connector       From the File menu  select Open a Virtual Machine      Navigate to the BarracudaSSLVPN vmx file      Use the default settings  and click Finish      Start the appliance      Follow the Quick Start Guide instructions to provision your Barracuda SSL VPN Vx appliance     ork O N     VMware Workstation 6 x      From the File menu  select Open a Virtual Machine      Navigate to the Barrac
127. led on your system  install OpenVPN NetworkManager  Depending on your Linux distribution  you  may need to do this via one of the following methods     e Deb based Linux distributions  Ubuntu  Debian          In a terminal enter  sudo apt get install network manager openvpn  e RPM based Linux distributions  Redhat  SUSE          In a terminal enter  as root   yum install NetworkManager openvpn    Step 2  Download Client Configuration File    Download and save the client configuration file for the network connector       Log into the SSL VPN web interface      Go to the RESOURCES  gt  My Network Connector page      In the My Network Connector section  click on the More    link next to the client configuration file     Select Download Client Configuration file from the list      Save and extract the downloaded file to the users home directory  E g     HOME SSL VPN     0O A O N      Step 3  Configure Network Manager    Configure the Network Manager applet on your Linux system  Exact steps may vary based on your particular  Linux distribution  but the resulting settings should be equivalent     1  Left click on the Network Manager entry on your Linux system panel and select VPN Connections  gt  Configure VPN   2  Click Import    3  Select the Linux ovpn configuration file  E g    HOME SSLVPN linux  lt Network Connector name gt  ovpn   4   5    Enter the Username and Password       Click Save     Step 4  Initiate the Connection  Initiate a secured connection through the Barracuda 
128. llows    editing of the details  such as the assigned assistant  status and scheduled time  The Available From column displays the requested  times of assistance  An asterisk     means that no specific time is requested       To view and modify the details click the Edit link next to the request     Connect to the Remote System    To work on an assistance request  you will generally require a direct connection to the remote system     1     Ze    3     Step 3     To initiate the connection  click the Launch link associated with the request  This will set the status to Waiting for Connection  When the  user responds  the status will be set to In Progress  and an RDP session to the remote system still be launched  You may refresh the  page to see the status change    Once the assistance session has started  select Show Chat Window from the taskbar from the View context menu under Remote Assist  ance  You can now communicate with the user    To send files via the chat client in the Remote Assistance window  select Send File from the Connection context menu     Close the Remote Assistance Request    When the assistance session has finished  terminate the connection by closing the Remote Assistance window   This will also set the status to    nactive if the One Time Request field is set to No   Once the request is closed  it will be deleted from the list     Create a Request for other Users  As a helpdesk administrator  you can also create remote assistance requests for other user
129. lt in Enabled  Y 3SP Active Directory Enabled      Super Users Built in Enabled   3    3  Navigate to ACCESS CONTROL  gt  Configuration and scroll to the RADIUSsection   a  Enter the hostname or IP address for the YubiRADIUS appliance in the RADIUS Server field     b  Keep the ports the same   c  Enter the same shared secret as used in the YubiRADIUS RADIUS client configuration earlier   d      Set the Authentication Method to PAP   Everything else may use the default settings     e  Click Save Changes     5     RADIUS    Backup RADIUS Servers     Authentication Port     Accounting Port   Shared Secret   Authentication Method     Time Out     Authentication Retries     Username Case     Password Prompt Text   Reject Challenge     Challenge Image URL     Allow Untrusted Challenge Image  URL     1812    1813    PaP  e     5       As Entered     Force Upper Case     Force Lower Case      RADIUS Password       Yes O No    Yes   No    Save Changes Help       Host names of backup RADIUS            This is the port number stipulated for the RADIUS authentication process  It MUST be a valid integer  port between 0 and 65535  Default  1812        This is the port number stipulated for the RADIUS accounting process  TEREST HES VA pa      between 0 and 65535  Default  1813        The RADIUS shared secret which has been set up on the RADIUS server        Tf your server does not use a specific authentication method  this value is ignored  The only methods    that are currently supported i
130. n heh ea eed Som ey 51   1 6 3 1 How to Create an Application Resource    cada ieee helene od ha oe ee eed ade ict Ba eee 52   1 6 3 2 How to Configure Outlook Anywhere    1    nnn nnn e ttt e nett enes 53   1 6 3 3 How to Configure ActiveSync for Microsoft Exchange Servers                00 cece cect ttt 55   1 6 3 4 How to Configure Microsoft RDP RemoteApp            0 00  ccc tte tent e eens 56   16  SPUN CIS  suits a oat ak Shed ab A A copa bed ah AA Bet Rid eae tear he 57   1264 1 HOW To Create an ool TUNNEN cat oe oot tee te Weed ee Oto ew eo Cho eee ence Eon tad meas 58   16 5  ReEMOle ASSISIAGNCE  as hur wit id dt A Se wee hee dee dae dita 59   156 51  REGUESIING AEMOle2ASSISIANCe   ei cane eos ome tee Oe Se ete boas es baad sn web oe 59   1 06 32 Providing Remote ASSISIANCE   ur Sick ahs orp a tigate ara whe arp a eee Be Aigner a bid 60   126 6 Network COMMECION     2  ore 2  lt   e a bts 2 Shae a wy ogc id RROD OTS  Bcd Deh nese ee aie ele Ata 61  1 6 6 1 How to Configure the Network Connector    61   1 6 6 2 Howto Greate a SlaliC Route iia Aa ee eee Be Beh ee A ES LA ee ee GRR we 62   1 6 6 3 Advanced Network Connector Client Configuration       0    0  eee eee eens 63   1 6 6 4 Using the Network Connector with Microsoft Windows            0 00 cee eee eee eens 65   1 6 6 5 Using the Network Connector with Mac OS X 0 0    66   1 6 6 6 Using the Network Connector With LINUX osos tada to AAA ea ORE eS 67   12657 TOW LO GOMNGUILC IPSEC e dd NO at ici Leg de lar Met ta
131. n the Barracuda SSL VPN Agent is running on the client system  the drive becomes available in the Windows Explorer just like any  local drive  This feature uses a WebDAV connection to a locally created SSL tunnel that gets routed through to the server     Windows specifies the maximum file download size of 2 GB  If you need a larger file download size  download and install the Network  Connector     In this Section     e Howto Create a Network Place Resource  e How to Configure AV Scanning    How to Create a Network Place Resource    The following steps describe the process of creating and configuring Network Places on the Barracuda SSL VPN in order to allow users access to  the companies network shares     On Windows systems  the Network Places resource provides support for Web Folders and the Windows Explorer Drive Mapping  feature  To use these features  the Windows user must have administrative rights     In this article     e Step 1  Create the Network Place  e Step 2  Edit the Network Place  e Step 3  Launch the Network Place  e Step 4  Add the Network Place    Step 1  Create the Network Place      Log into the SSL VPN web interface     Go to the RESOURCES  gt  Network Places page     Verify that you have selected the correct user database on the top right of the page   In the Create Network Place section  select the desired database from the User Database drop down list     Enter the name of the Network Place in the Name field   In the Path field  specify the path to t
132. n the Destination Port field  enter the port number on the destination host  If you have a client application running on the destination  host that for example listens at port 5900 for VNC  enter 5900    7  Select Yes for Add to My Favorites if the tunnel should be added to the default Resource Category    8  Double click on your desired policies from the Available Policies list to send them to Selected Policies list    9  Click Add to create the SSL Tunnel     The SSL tunnel is now visible in the SSL Tunnel section     Step 2   Optional  Configure Advanced Tunnel Settings  You can configure additional settings such as auto launch  multiple port ranges or tunnel type by editing the SSL tunnel configuration     1  In the SSL Tunnels section  click the Edit link associated with the tunnel  The Edit Tunnel page opens   2  Configure the settings as required   3  Click Save     Step 3  Test the SSL Tunnel    To test the SSL tunnel  click the name of the SSL Tunnel your just created or the Launch link associated with it  Make sure that you also test a  user account that has the appropriate access rights with a connection outside your intranet     Remote Assistance    Remote Assistance only works on Windows and Linux based computers with Oracle Java installed  Mac OS X users cannot  successfully initiate a remote assistance session     Remote Assistance  RA  is a standard help desk feature on the Barracuda SSL VPN  It enables remotely connected users to easily communicate  with thei
133. n their current device   e Web Forwards can be provisioned as Web Clip shortcuts     e Audit Reports  e Network Places Whether these resources appear depends on the user s access    e SSL Tunnels rights and whether they are applicable for the client device  SSL  tunnels and tunneled Web Forwards will not be available on   OS  devices because they require the agent      These items can be provisioned in the form of a profile installed on  the device  The remote user can specify the name of the profile on  the RESOURCES  gt  Device Configuration page     Client Certificates Installs the selected client certificate onto the device  Certificates are  taken from the ADVANCED  gt  SSL Certificates page  client  certificates for the user only      IPsec Settings Creates a VPN entry on the device using the relevant IPsec settings  configured on the RESOURCES  gt  IPsec Server page  The user will  be prompted for their password when installing a profile containing  IPsec settings     PPTP Settings Creates a VPN entry on the device using the relevant PPTP settings  configured on the RESOURCES  gt  PPTP Server page  The user will  be prompted for their password when installing a profile containing  PPTP settings     By default  all shortcuts created are added to the user s Desktop  Start Menu and web browser  in a sub folder whose name matches that of the  Barracuda SSL VPN  If the web browser option is selected  the user will be prompted from the Barracuda SSL VPN agent asking which br
134. n this configuration are PAP  CHAP  MSCHAP and MSCHAPv2        The timeout for a RADIUS message       The number of retries for a RADIUS message     Attributes    f a gt    NAS IP Address 10 14 0 19       User Name    USERNAME      The RADIUS attributes required    User Password    PASSW  to execute the request        lt  lt  Remove       See aret ded ice iat cate DA CETERA nee to fhe ARS ever  Options are to leave as  entered  to upper case or force to lower      Customize the RADIUS password prompt text         Reject a challenge response request from the RADIUS server  Default  true          A URL for generated challenge images  Leave blank to disable             Allow Challenge Images to be server from untrusted servers                    C ft  amp  btepS   10 14 0 19 default showLogon do    jancu    Login    Welcome to the Barracuda SSL VPN  a secure gateway to your network     Insert the user s database password  don t confirm with enter at this stage  and immediately press the YubiKey button  so that the    Language    English    usemame     z           password is a combination of the user s password   the YubiKey password         a PO  o x        Webmin 1 570 on yrva35 e    8 Barracuda SSL VPN  Login  gt  Y      C ft    amp  bitps   10 14 0 19 default showLogon do ZA    NETWORKS             Welcome to Barracuda SSL VPN  a secure gateway to your network     RADIUS Password       There are other methods of authentication available  Click here to choose a different Auth
135. nce  All modifications to a request will trigger an email  notification to both the owner of the request as well as to the assigned assistant  In  order to provide remote assistance  the assistant must have the following Resource  Rights  see Access Rights      Related Articles    e Remote Assistance       e Requesting Remote Assistance    Remote Assistance Create   Allows creating of assistance requests for other users    Remote Assistance Edit   Allows editing of the details of an assistance request that has been submitted  such as the assigned assistant   the scheduled time and the status of the request    Remote Assistance View   Allows viewing of all existing assistance requests  as well as connecting to a remote system that is requesting  assistance    Remote Assistance Delete   Allows closing of any assistance requests that are still open     To provide remote assistance  complete the instructions given in the following steps     Step 1     AA WD      Step 2     Step 1  Access the Remote Assistance Request  Step 2  Connect to the Remote System   Step 3  Close the Remote Assistance Request  Create a Request for other Users    Access the Remote Assistance Request      Log into the SSL VPN web interface      Go to the RESOURCES  gt  Remote Assistance page      Verify that you have selected the correct user database on the top right of the page      Check the Remote Assistance Requests section  The list displays all requests that have been submitted by standard users and a
136. neral Public License for more details     You should have received a copy of the GNU General Public License along with this program  if not  write to the Free Software Foundation  Inc    59 Temple Place   Suite 330  Boston  MA 02111 1307  USA     Also add information on how to contact you by electronic and paper mail   If the program is interactive  make it output a short notice like this when it starts in an interactive mode     Gnomovision version 69  Copyright  C  19yy name of author Gnomovision comes with ABSOLUTELY NO WARRANTY  for details type    show w    This is free software  and you are welcome to redistribute it under certain conditions  type show c  for details     The hypothetical commands    show w  and    show c  should show the appropriate parts of the General Public License  Of course  the commands  you use may be called something other than  show w  and    show c   they could even be mouse clicks or menu items  whatever suits your  program     You should also get your employer  if you work as a programmer  or your school  if any  to sign a  copyright disclaimer  for the program  if  necessary  Here is a sample  alter the names     Yoyodyne  Inc   hereby disclaims all copyright interest in the program Gnomovision   which makes passes at compilers  written by James Hacker     signature of Ty Coon  1 April 1989    Ty Coon  President of Vice    This General Public License does not permit incorporating your program into proprietary programs  If your program is a 
137. nfiguration file  you may be presented with various  warnings depending on the security level that is configured on your system  Accept the warnings as  they appear in order to continue with the installation     bb O N      Step 3  Launch the Network Connector Client    1  Select Finder  gt  Applications  gt  Network Connector  A gray network icon will appear in the top right of your screen    2  Click the network icon and choose Connect LAN1 Client  where LAN1 may be a different network name  depending on how it was  configured by ssladmin     3  Enter your username and password when prompted  and click OK     Using the Network Connector with Linux    The Network Connector is available for use with Linux 2 4 or higher  integrated with the TUN TAP driver     No separate client software is needed to connect from Linux systems to the Network  Connector service  since most modern Linux distros already contain the required  support in the OpenVPN NetworkManager openvpn packages  However  a  configuration file must be installed in order for the system to connect to the Barracuda  SSL VPN     In this article     e Step 1  Install OpenVPN NetworkManager  e Step 2  Download Client Configuration File  e Step 3  Configure Network Manager   e Step 4  Initiate the Connection    Related Articles    Network Connector  Using the Network Connector with    Mac OS X  Using the Network Connector with  Microsoft Windows       Step 1  Install Open VPN NetworkManager    If it is not already instal
138. ng  environment variables  to adding network printers and mapping of  network drives     Example 1  Up command to publish a route     e Windows clients  route add 192 168 50 0 mask  255 255 255 0 192 168 1 1   e Linux Mac clients  route add  net 192 168 50 0  netmask 255 255 255 0 gw 192 168 1 1    Example 2  Up command for Mac clients  xx xx xx xx and  example com are the DNS server IP and DNS suffix         bin bash  x   mkdir  p  etc resolver   echo  nameserver XX XX XX xXx   gt    etc resolver example com killall  lookupd exit 0    Down    In the Down Commands area  enter the commands that you want  the remote system to execute when leaving the secured network   Typically  you will have a corresponding Down command for every Up  command that was configured  to reverse any action that was taken     Example 1  Down command to delete a route     e Windows clients  route delete 192 168 50 0 mask  255320042004 0   e Linux Mac clients  route del  net 192 168 50 0  netmask 255 255 255 0 gw 192 168 1 1    Example 2  Down command for Mac clients  example com is the DNS  suffix         bin bash  x   rm  Rf  etc resolver example com  killall lookupd   exit 0    Using the Network Connector with Microsoft Windows    A Installing and running the Network Connector service on a Windows system  requires the use of an account with administrative permissions     You can launch the client portion of the Network Connector remotely in one of two  ways     e By signing into the Web interface of
139. ng the THICK provisioning format when allocating disk storage for your Barracuda Networks  virtual machine     To add a hard drive     1  Shut down your Barracuda SSL VPN Vx     oF  amp W PP      Take a snapshot of your virtual machine      Edit the settings in your virtual machine  and either increase the size of the hard drive or add a new hard drive      Restart the virtual machine      During the system bootup  answer Yes after the pop out console displays a message asking if you want to use the new additional space     If you do not respond in 30 seconds  the pop out console times out and defaults to No  Resizing can take several minutes  depending on  the amount of provisioned hard drive space     How to Deploy Barracuda SSL VPN Vx Virtual Images    Barracuda offers three types of packages for virtual deployment  Follow the instructions for your hypervisor to deploy the Barracuda SSL VPN Vx    appliance   Package Type Hypervisors  OVF images e VMware ESX and ESXi 3 5  e VMware ESX and ESXi 4 x  e Sun Oracle VirtualBox and VirtualBox OSE 3 2  VMX images e VMware Server 2 0   e VMware Player 3 0   e VMware Workstation 6 0    e VMware Fusion 3 0   XVA images e Citrix Xen Server 5 5     If you are deploying the Barracuda SSL VPN Vx on a VMware hypervisor  complete How to Enable Promiscuous Mode on VMware for  the Barracuda Network Connector after deploying the VM     Deploying OVF Images    VMware ESX and ESXi 3 5    Use the OVF file ending in  35 ovf for this hypervisor   
140. ng the YubiRADIUS Virtual Appliance  e Configuring Barracuda SSL VPN    Pre Requisites    e AYubiKey  e AVM host server to load the Virtual Appliance  e An external user database  such as Active Directory or LDAP  that both Barracuda SSL VPN and YubiRADIUS servers can query    Reference    The YubiRADIUS configuration guide can be found here  http   static yubico com var uploads pats YubiIRADIUS Virtual_Appliance_3_5 1 paf     Installing the YubiRADIUS Virtual Appliance    1  Go to http   www  yubico com yubiradius    2  You will need to register on the yubico website to download the virtual appliance image  enter your registration details and click Submit   Yubico will send an email containing a link to the image    3  Click the link to download the image  Extract the files and import the virtual machine into your VM host server  The images show    XenServer    ES Import OVF OVA Package Lo    e  we Locate the file you want to import o  Import Source Enter the pathname of an exported VM or template  an OVF OVA package or a virtual hard disk image file or  EULAs click Browse to find the file you want   Location  Filename  C  Users chris Downloads Yubico_YubiRADIUS_Virtual_Appliance_V3 5 1_0VP  rowse     Storage eee   B        4  The default settings should be correct in most cases  apart from the network settings  where it might be required to set a static address   unless IP reservations will be used on the DHCP server      If entering a static IP address does not work at thi
141. nthe Available Policies section  select the policies that you want to apply to the application and click Add    8  Click Add to create the application     oR OO N    The new application resource is created and displayed in the Applications section     Step 2   optional  Edit Advanced Settings for the Application Resource    In the Applications section click the Edit link next to the application to configure additional options     Step 3  Launch the Application    1  In the Applications section  click the Launch next to the application to test it   2  When you are ready to make the application available to your users  click the Edit link associated with the resource in the Applications s  ection     3  Select the resource categories that you want to apply to the application in the Resource Categories section  and then click Add   4  Click Save     How to Configure Outlook Anywhere    To protect the Microsoft Exchange server from the direct external access  you can  deploy a Barracuda Spam and Virus Firewall for all SMTP traffic and a Barracuda SSL  VPN to handle all HTTPS traffic coming from the Internet  The client connects to the  Barracuda SSL VPN using Outlook Anywhere  formerly known as RPC over HTTPS    Authentication and proxying of all traffic is also handled by the SSL VPN     Related Articles    e Resources    e How to Create an Application  Resource       Barracuda SSL VPN    y    Barracuda Spam and Virus Firewall Microsoft Exchange Server       In this article     
142. ntributor be liable to You for damages  including  any direct  indirect  special  incidental  or consequential damages of any character arising as a result of this License or out of the use or inability to  use the Work  including but not limited to damages for loss of goodwill  work stoppage  computer failure or malfunction  or any and all other  commercial damages or losses   even if such Contributor has been advised of the possibility of such damages     9  Accepting Warranty or Additional Liability  While redistributing the Work or Derivative Works thereof  You may choose to offer  and charge a fee  for  acceptance of support  warranty  indemnity  or other liability obligations and or rights consistent with this License  However  in accepting such   obligations  You may act only on Your own behalf and on Your sole responsibility  not on behalf of any other Contributor  and only if You agree to   indemnify  defend  and hold each Contributor harmless for any liability incurred by  or claims asserted against  such Contributor by reason of your  accepting any such warranty or additional liability     END OF TERMS AND CONDITIONS  APPENDIX  How to apply the Apache License to your work     To apply the Apache License to your work  attach the following boilerplate notice  with the fields enclosed by brackets      replaced with your own  identifying information   Don t include the brackets   The text should be enclosed in the appropriate comment syntax for the file format  We also
143. o apply to the PPTP server  and add them to the Selected Policies list   7  Click Add     The PPTP Server is now created and appears in the PPTP Server section  You can test the configuration by clicking the Launch link associated  with the entry     Step 2  Create a PPTP Connection  On your remote device  create a PPTP connection to the Barracuda SSL VPN     1  Log in to the Barracuda SSL VPN on the client device   2  Go to the Resources tab   3  From My Resources  select the PPTP server and click to connect     Step 3  Download the Configuration to the Client Device  For more information  see  Provisioning Client Devices     1  From the Resources tab of the client device  go to Device Configuration   2  Tick the checkbox for the PPTP server entry   3  Click Provision on the bottom of the page     How to Configure Profiles    Creating profiles allows the administrator to define specific settings for the general working environment of the system  Settings in a Profile can  affect the timeouts of a user session  change the default view for resources  icons or lists  or also affect agent timeouts and proxy settings  If  multiple profiles are configures users can select different profiles when logging in  or the administrators can manage default environment settings  for users preselecting a matching profile  A default profile always exists and cannot be deleted     Step 1  Create a Profile      Log into the SSL VPN web interface      Go to the RESOURCES  gt  Profiles page      
144. o the Manage System  gt  ACCESS CONTROL  gt  Access Rights page  For more information   see Access Rights     Access Rights    Access rights grant various permissions to configure resources and system settings  As administrator  you can assign access rights to individual  users or groups  e g   all team leaders   You can also use access rights to create administrators for all or just one user database  Access rights  are classified as     e Resource Rights     Lets users create  edit  and delete resources such as access rights  profiles  and network places    e System Rights     Lets users create  edit  and delete system resources such as policies  SSL certificates  authentication schemes   account  and reporting    e Personal Rights     Lets users manage personal resources in the Manage Account mode of the SSL VPN web interface     You can create an access right for a single user database  or you can create an access right that is available to all user databases  You can also  copy access rights between user databases     In this article     e Create Access Rights  e Edit Access Rights  e Copy Access Rights to a Different User Database    Create Access Rights  To create an access right     1  Log into the SSL VPN web interface    2  Go to the Manage System  gt  ACCESS CONTROL  gt  Access Rights page    3  In the Create Access Rights section  select the user database that you want to create the access right for  For example  if you want to  create the access right for all use
145. oduct catalog  user documentation  or web site  to a  maximum number of  a  seats  i e  users with access to the installed Energize Update Software    b  concurrent users  sessions  ports  and or  issued and outstanding IP addresses  and or  c  central processing unit cycles or instructions per second  Customer s use of the Energize Update  Software shall also be limited by any other restrictions set forth in Customer s purchase order or in Barracuda Networks  product catalog  user  documentation or web site for the Energize Update Software     General Limitations  Except as otherwise expressly provided under this Agreement  Customer shall have no right  and Customer specifically  agrees not to     1  transfer  assign or sublicense its license rights to any other person  or use the Energize Update Software on unauthorized or secondhand  Barracuda Networks equipment  and any such attempted transfer  assignment or sublicense shall be void    2  make error corrections to or otherwise modify or adapt the Energize Update Software or create derivative works based upon the Energize  Update Software  or to permit third parties to do the same  or   3  decompile  decrypt  reverse engineer  disassemble or otherwise reduce the Energize Update Software to human readable form to gain  access to trade secrets or confidential information in the Energize Update Software     Upgrades and Additional Copies  For purposes of this Agreement     Energize Update Software    shall include  and the te
146. of those who should receive notifications from the Barracuda SSL VPN and emails from Barracuda Central     1  Log into the appliance web interface  e g   https    sslvpn example com  8443     2  Go to the BASIC  gt  Administration page    3  In the Email Notification section  enter the email addresses of those who should receive system alerts and security news and updates   4  Click Save Changes     Step 3  Change the Administrator s Password for the SSL VPN Web Interface    Change the password used by ssladmin to log into the SSL VPN web interface     1  Log into the SSL VPN web interface  e g   https    ssl1vpn example  com  with the default username and password of ssladmin       Click Manage System  and then go to the ACCESS CONTROL  gt  Accounts page      In the Accounts section  locate the ssladmin user and click More      Select Set Password      Enter the new password and click Save  The password must conform to the password rules defined for the appliance     of W PP    Next Steps    After you set up and explore the Barracuda SSL VPN  you can complete the following tasks     Task Articles    Configure a User Database  e How to Create and Modify User Databases  e Example   Create a User Database with Active Directory    Configure Authentication Schemes  Authentication Schemes  Configure Policies  How to Configure Policies  Configure Access Rights  Access Rights   Configure Resources  Resources    Optional  Configure L2TP IPsec or PPTP access  e How to Configure IPsec 
147. og into the Barracuda SSL VPN again   10  On your RESOURCES  gt  My Resources page  click the Barracuda IPsec icon   11  On the connect dialog  enter the following information and click Connect   e User name     The account name for the connecting user  e g   psmith  e Password     The password for the username    You should be able to connect to the Barracuda SSL VPN and access your resources     Configure a Mac OS X Client Device    1  On the remote device  navigate to System Preferences  gt  Network   2  Click   to add a new service   3  On the dialog that appears  enter the following   e Interface   Select VPN from the list   e VPN type   Select L2TP over IPSec   e Service name   Name of your selection   4  Select the service you created   The status will show as Not Configured    5  Enter the following   e Server Address   The external IP address or the URL of your Barracuda SSL VPN   e Account Name   Your account name for authentication  for example  LDAP or Active Directory user name    6  Click Authentication Settings     7  Enter the following   e Password   Your account password   e Shared secret   Provided to you by your IT administrator   8  Click OK   9  To connect to the Barracuda SSL VPN  highlight the service and click on Connect       How to Configure PPTP    PPTP  or Point to Point Tunneling Protocol  enables authorized mobile devices  including smartphones  to    access your organization s network  To connect to your Barracuda SSL VPN using PPTP  your remot
148. onding machine readable source code  which must be distributed under the terms of Sections 1  and 2 above on a medium customarily used for software interchange  or     b  Accompany it with a written offer  valid for at least three years  to give any third party  for a charge no more than your cost of physically  performing source distribution  a complete machine readable copy of the corresponding source code  to be distributed under the terms of  Sections 1 and 2 above on a medium customarily used for software interchange  or     c  Accompany it with the information you received as to the offer to distribute corresponding source code   This alternative is allowed only  for noncommercial distribution and only if you received the program in object code or executable form with such an offer  in accord with  Subsection b above      The source code for a work means the preferred form of the work for making modifications to it  For an executable work  complete source code  means all the source code for all modules it contains  plus any associated interface definition files  plus the scripts used to control compilation and  installation of the executable  However  as a special exception  the source code distributed need not include anything that is normally distributed   in either source or binary form  with the major components  compiler  kernel  and so on  of the operating system on which the executable runs   unless that component itself accompanies the executable     If distribu
149. onnector  Client Configuration   Using the Network Connector with    Microsoft Windows   Using the Network Connector with  Linux   Using the Network Connector with  Mac OS X       Configuring a New Network    1  Log into the SSL VPN web interface   2  Navigate to the RESOURCES  gt  Network Connector page   3  Click Configure Network to bring up the Create Network Configuration page   4  In the Server Information section  configure the network information that will apply to your remote users   a  In the IP Address Range Start and End fields  enter the first and last IP addresses of a DHCP range that can be assigned to  remote systems  All Network Connector IP addresses will be assigned from a DHCP range that is derived from this information   To prevent IP conflicts  the specified range must NOT be a part of any other existing DHCP range   b  If you want your remote users to default to using a different domain name and DNS server  enter your desired values for Domain    Name and Primary DNS Server     The default values are derived from the values already assigned to the Barracuda SSL VPN  The domain name  configured here will be used whenever a requested system is identified only by its system name without the domain  portion  i e   not as an FQDN   and the primary DNS server will be used to resolve all supplied hostnames     5  From the Available Policies area  select the policies that contain the users who should be allowed access to this Network Connector  configuration an
150. ost  For this proxy type to work  all  possible destinations on the specified website or application for a particular Web Forward Resource must be within a directory on the web server    example  for Microsoft Outlook Web Access  OWA    exchange and  exchweb     This type of forward does not modify the data stream  The proxy works by matching unique paths in the request URI with the configured Web  Forwards  For example  if you have a website that is accessible from the URL http   intranet blog in your network you can configure the reverse  proxy Web Forward with a path of  blog so that all requests to the SSL VPN server URL https   ssIvon myco cc blog are proxied to the destination  site     With a Path Based Reverse Proxy  the Barracuda SSL VPN attempts to automatically detect all the paths that the target website uses  and add  them to the Web Forward configuration when the Resource is launched  For example  when you create a Web Forward for http   ssivon myco cc b  log and this blog page also contains images from a path called  images from the root of the server  the Barracuda SSL VPN adds  blog and  imag  es to the Web Forward configuration  This allows anything in the  blog or  images directory or subdirectories to work with this Web Forward  The  following example shows the paths that the Barracuda SSL VPN added to the Web Forward http   ssivon myco cc blog which the user can  access     e htips  sslivon example com blog images picture jpg   The subdirectory of  images
151. otification  click Delete     SNMP    All Barracuda SSL VPNs model 480 and larger offers the ability supply various  information to Network Management Systems via SNMP  Both SNMP version 2c and 3  are supported  Barracuda Networks recommends using SNMP v3 as it is more secure     In this article     e SNMP v2  e SNMP v3  e Configure SNMP v2  e Configure SNMP v3  e Enable SNMP Traps    SNMP v2    Related Article       e Basic Monitoring    e  P address  range  from which the Network Management System will contact the Barracuda SSL VPN SNMP service   e SNMP community string     SNMP v3    e User and password to authenticate the NMS   e Authentication Method  supported encryption methods    e Allowed IP address or range for the Network Management System     Configure SNMP v2    1  Log into the Administration interface   2  Open the ADVANCED  gt  Administration page   3  In the SNMP Manager section  configure the following settings     Enable SNMP Agent     Select Yes    SNMP Version     Select v2c    SNMP Community String     Enter a password to authenticate the SNMP server    Allowed SNMP IP Range     Enter the IP addresses or range from which the Barracuda SSL VPN should accept SNMP queries     4  Click Save Changes     Configure SNMP v3    1  Log into the Administration interface   2  Open the ADVANCED  gt  Administration page   3  In the SNMP Manager section configure the following settings     Enable SNMP Agent     Select Yes   SNMP Version     Select v3   User     Enter a 
152. ount     7  Tap OK    8  Configure the Account Options and tap Next    9  Tap Next     You can now access your email using the Android Mail Application     Connecting an Apple   OS Device  Follow these steps to set up your Exchange ActiveSync account on your Apple iPhone    OS device or iPod Touch     1  On your   OS device  tap Settings  gt  Mail  Contacts  Calendars  gt  Add Account     gt  Microsoft Exchange   2  In the window that appears  enter your Email  Username and Password  where Email and Username are your full email address  for  example  somebody example com   Tap Next   The   OS device tries to verify the account  fails and prompts you to enter some extra details   3  Complete the following fields and then tap Next   e Server   Type in your company s Barracuda SSL VPN hostname  for example  mysslvpn example com    e Domain   Type in the Active Directory domain name  for example  example   com    4  This time the settings are verified  Select which items to synchronize between your account and your device and tap Save     You can now access your email by opening the Mail Application     Special Case  Multiple User Databases    Many customers only use one user database  However  If you are using multiple user databases  then you need a different hostname for each  user database that you want to use with ActiveSync  except for the default user database     As an example  if your Barracuda SSL VPN uses the hostname sslvpn example com  then you may choose something l
153. owing types of applications and websites     e Development Tools   E g   JIRA 4    e Mail   E g   Outlook Web Access  see How to Configure a Microsoft Exchange OWA Web Forward    e Portals   E g   SharePoint  see How to Configure a Microsoft SharePoint Web Forward     e Terminal Services   E g   XenDesktop 5  RDP Clients     Creating a Custom Web Forward  If none of the available Web Forward templates matches your requirements  you can create custom Web Forwards     For more information  see Custom Web Forwards and How to Create Custom Web Forwards     In this Section    e Custom Web Forwards  e How to Configure a Microsoft SharePoint Web Forward  e How to Configure a Microsoft Exchange OWA Web Forward    Custom Web Forwards    To create a Web Forward for a intranet site or web based application  for which there is no predefined template  you have to create a Custom  Web Forward  The Barracuda SSL VPN can differentiate between these types of Web Forwards     e Path Based Reverse Proxy  e Host Based Reverse Proxy  e Tunneled Proxy   e Replacement Proxy   e Direct URL    Path Based Reverse Proxy    PATH BASED REVERSE PROXY         http   ssivpn myco cc blog http   ssivpn myco cc blog http   fintranet blog http    intranet blog    The Path Based Reverse Proxy  most commonly used  acts as the front end to your web servers on the Internet or intranet  The Barracuda SSL  VPN receives all the incoming web traffic from an external location and forwards it to the appropriate website h
154. owsers  to provision shortcuts to  When the installation is completed  the agent will add the bookmarks to all profiles defined within those browsers     Bookmark Aliases    When shortcuts are created  they point at URLs on the Barracuda SSL VPN  For example  the shortcut looks like https   ss von example com web  forward jira  By default  the Barracuda SSL VPN will attempt to generate an alias from the resource name when it is created  This will strip out any    illegal characters and append a numeric value if the alias already exists  You can specify these aliases on the edit pages of the respective  resources  To disable aliasing  go to RESOURCES  gt  Configuration  gt  Bookmarking  In this case  the provisioned shortcuts will instead refer to  the verbose URL     Advanced Configuration    In addition to the general setup and configuration utilities  the Barracuda SSL VPN provides an advanced configuration area that lets you specify  extended settings such as advanced system wide User and Policy attributes  Messaging and the Barracuda SSL VPN Agent that secures  unencrypted connections from the client device to the SSL VPN     In this Section     e Attributes  e Messaging  e Agents    Attributes    Attributes are system wide dynamic variables to store either user or policy information  After defining attributes the variables can be used in every  configuration where dynamic expressions can be used     User Attributes    The system comes with a set of default user attribute
155. pe of Custom Web Forward does not modify the data stream  but will only work as long as all links stay  on the same destination host  If the destination site uses multiple domains  or sub domains  a host file or a proxy auto configuration file  PAC   with routing information can tell the client which additional target sites have to be routed through the SSL tunnel  If needed  the PAC file is  downloaded to the remote system when the session is initiated     The tunnel proxy the following basic configurations  based on your web resource     e None    Recommended at first use  Creates a simple SSL tunnel  The browser connects to a local address  e g   http   127 0 0 1   45678   The SSL VPN Agent forwards all traffic from the localhost address through the SSL tunnel  where the connection with the  configured destination host is made  Use the None proxy type for simple  static websites  that are not virtually hosted and do not check  the headers for the hostname     e Host File Redirect   Adds temporary entries to the remote system s host file to enable direct routing to  the destination site  Upon launch of a Web Forward of this type  the Barracuda SSL VPN automatically  uploads the additional configuration information to the remote system  Because of this  the user must  have write permissions to the system s hosts file  This proxy type is typically used with Microsoft  Silverlight applications  because they do not operate in a reverse proxy environment  The Host File  Redirect
156. public license practices   Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application  of that system  it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot  impose that choice     This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License     8  If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces  the original copyright  holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries  so that  distribution is permitted only in or among countries not thus excluded  In such case  this License incorporates the limitation as if written in the  body of this License     9  The Free Software Foundation may publish revised and or new versions of the General Public License from time to time  Such new versions    will be similar in spirit to the present version  but may differ in detail to address new problems or concerns     Each version is given a distinguishing version number  If the Program specifies a version number of this License which applies to it and  any later  version   you have the option of following the terms and conditions either of that version or of any later version published by the Free Software  Foundation
157. r IT department  System administrators and help desk personnel can see at a glance which users are in need of help  communicate with  a remote user via instant messages and  if needed  view and control the remote system directly to resolve various issues     Requirements for Remote Assistance    e The Barracuda SSL VPN Agent requires the Oracle Java Virtual Machine  JVM  to be installed on both the remote and the help desk  systems in order for the two way communication tunnel to be initiated  Specialized VNC client server software is used to access and  control the remote system  The VNC clients and server is downloaded as needed from the Barracuda SSL VPN requiring no separate  installation    e Because the VNC application is downloaded on demand  the user of the remote system must have administrator root rights    e The user must have the appropriate Access Rights to provide or request Remote Assistance  Additionally  it is recommended that you co  nfigure policies for users and Helpdesk administrators and assign them either the Access Right Remote Assistance Administration or Req  uest Remote Assistance when editing a policy  For more information  see How to Configure Policies     In this Section     e Requesting Remote Assistance  e Providing Remote Assistance    Requesting Remote Assistance    Any user account that is granted the Access Right Remote Assistance Create  will have  the ability to access their own My Remote Assistance page where they can create  m  odify an
158. r authentication and network access control   NAC  only connects clients that meet chosen security standards  For secure remote access through smartphones and other mobile devices  the  Barracuda SSL VPN supports both L2TP IPsec and PPTP  The Barracuda SSL VPN is available as a hardware and a virtual appliance     Where to Start  If you have the Barracuda SSL VPN Vx virtual appliance  start here     e Barracuda SSL VPN Vx Quick Start Guide  e Getting Started    If you have the Barracuda SSL VPN appliance  start here     e Quick Start Guide for version 2 4  PDF  or Quick Start Guide for version 2 3  PDF   e Getting Started    Key Features    e Access Control     A multi factor authentication process  with support for external authentication and third party hardware tokens   combined with NAC and multiple user databases    e Web Forwards     Make intranet resources available for your remote users and secure unencrypted connections before they leave the  network    e Network Places     Provide remote users with a secure web interface to access corporate network file shares    e Applications     Provide applications to remote client systems through the Barracuda SSL VPN Agent for remote access    e SSL Tunnels     Create SSL Tunnels to allow secure connections from remote devices to the Barracuda SSL VPN by encrypting data for  client server applications    e Network Connector     An application that provides full  transparent network access for users requiring widespread network
159. r databases  select Global View      Select the Type of access right that you are creating    Enter a descriptive Name for the access right      From the Available Rights list  select the rights that you want to add      From the Available Policies list  select the policies that you want to assign the access rights for      Click Add     The new access right appears in the Access Rights section     Edit Access Rights    To edit an access right  go to the Manage System  gt  ACCESS CONTROL  gt  Access Rights page and click Edit next to the name of the access  right     To remove an access right  click Delete next to the name of the access right     Copy Access Rights to a Different User Database  To copy an access right to a different user database     1  Log into the SSL VPN web interface   2  Open the Manage System  gt  ACCESS CONTROL  gt  Access Rights page   3  In the Access Rights section  click More next to the name of the access right and select Copy to User Database     4  Inthe Copy to User Database section of the Edit Access Right window  double click the user databases that you want to copy the  access right to   5  Click Save     Resources    Within the Barracuda SSL VPN  you can configure different types of internal network corporate resources that your users can access externally  such as applications  email  network shares  or intranet websites  Within a resource  you can apply the policies that you have created  When  users log into the Barracuda SSL VPN  their 
160. racuda SSL VPN Agent    The SSL VPN Agent is launched by a small applet placed on all pages that require access to the SSL VPN client  When the Agent has been  started the Barracuda SSL VPN Agent taskbar icon is visible  While the SSL Agent is running  you can start all your resources from the icon in the  taskbar  The SSL VPN Agent terminates when the browser session is closed or the user logs out     Enable the SSL VPN Agent on Login    You can configure the Profile used for a user group to start the SSL VPN Agent automatically when the user logs in  All Resources can now be  started from the taskbar  The SSL VPN Agent is terminated when the users session ends  by logging out or closing the browser     For more information  see How to Configure Profiles   Monitoring    The Barracuda SSL VPN incorporates hardware and software fail safe mechanisms that are indicated via notifications and logs  You can inspect  the logs to see what is happening with traffic  SNMP monitoring and traps for the Barracuda SSL VPN model 380 and larger are supported     The following articles explain the tools and monitoring tasks that you can use to track user numbers and system performance     In this Section    e Basic Monitoring  e Notifications  e SNMP    Basic Monitoring    The Barracuda SSL VPN lets you monitor the performance of your Barracuda SSL VPN  system including traffic and policy details  the subscription status of Energize Updates   as well as performance statistics  including CPU t
161. racuda SSL VPN Vx web interface  and finalize the configuration of the appliance     1  In your browser  go to https    lt configured IP address for the Barracuda SSL VPN gt  8443   2  Log into the Barracuda SSL VPN Vx web interface as the administrator   Username  admin Password  admin  3  Go to the BASIC  gt  IP Configuration page and verify that the following settings are correct   e IP Address  Subnet Mask  and Default Gateway   e Primary DNS Server and Secondary DNS Server   e  lf you are using a proxy server on your network  ProxyServer Configuration     Step 4  Update the Firmware    Go to the ADVANCED  gt  Firmware Update page  If there is a new Latest General Release available  perform the following steps to update the  system firmware     1  Click Download Now next to the firmware version that you want to install    2  When the download finishes  click Apply Now to install the firmware  The firmware installation takes a few minutes to complete   After the firmware has been applied  the Barracuda SSL VPN Vx automatically reboots  The login page displays when the system has  come back up    3  Log back into the web interface  and read the Release Notes to learn about enhancements and new features     For more information  see Update Firmware     Step 5  Change the Administrator Password for the Appliance Web Interface    To prevent unauthorized use  change the default administrator password to a more secure password  Go to the BASIC  gt  Administration page   enter yo
162. rams that are covered by the GNU General Public License  GPL  or other    open source    license  agreements  The GNU license is re printed below for you reference  These programs are copyrighted by their authors or other parties  and the  authors and copyright holders disclaim any warranty for such programs  Other programs are copyright by Barracuda Networks     GNU GENERAL PUBLIC LICENSE   GPL  Version 2  June 1991   Copyright  C  1989  1991 Free Software Foundation  Inc  51 Franklin St  Fifth Floor  Boston  MA 02110 1301 USA  Everyone is permitted to copy and distribute verbatim copies of this license document  but changing it is not allowed   Preamble    The licenses for most software are designed to take away your freedom to share and change it  By contrast  the GNU General Public    License is intended to guarantee your freedom to share and change free software  to make sure the software is free for all its users  This General  Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it   Some  other Free Software Foundation software is covered by the GNU Library General Public License instead   You can apply it to your programs  too     When we speak of free software  we are referring to freedom  not price  Our General Public Licenses are designed to make sure that you have  the freedom to distribute copies of free software  and charge for this service if you wish   that you receive source code or 
163. rce  Every resource must  have at least one policy attached     When users log into the Barracuda SSL VPN  they can only view resources for which  they meet the following policy criteria     They are listed in one or more of the policies that are attached to the resource   They are a member of a group listed in one or more of the policies that are  attached to the resource    They are accessing the resource within the limits of the time and date  restrictions that are set in the resource policies    Access method     Related Articles       e Resources  e Access Control    Create a Policy    Configure a set of access policies to meet your remote access needs     1  Log into the SSL VPN web interface   In the upper right  verify that you have selected the correct user database     2     3  Go to the Manage System  gt  ACCESS CONTROL  gt  Policies page   4  In the Create Policy section  configure your policies  For each policy   a  Enter a name for the policy   b  Add the Accounts and Groups that must be members of the policy  The Accounts that you add appear in the Selected  Accounts section  and the Groups that you add appear in the Selected Groups section   c  Click Add to create the policy  The policy appears in the Policies section     Edit a Policy    To change the membership and network access settings for a policy  go to the Manage System  gt  ACCESS CONTROL  gt  Policies page and click  Edit next to the policy name     To change the rights associated with a policy  go t
164. rdware tokens or SSL client certificates containing user information that is  checked when processing the login     For more information  see How to Configure SSL Client Certificate Authentication     IP Address    The IP Address module is useful when users always log in from the same computer with the same IP address  You must manually specify the  allowed IP address for every user  If a user tries to authenticate from a computer with a different IP address  the login attempt is denied     To configure the IP Address module  go to the ACCESS CONTROL  gt  Accounts page and specify the allowed IP address for each user  To let a  user log in from any IP address  enter an asterisk         Password    Password authentication is the classic authentication module and is used for almost every account  Passwords can be used either from external  authentication sources  such as an Active Directory server  or from the built in user database  You can define a password policy to ensure that  only safe passwords are used  Passwords for external authentication methods can only be changed if the appliance has read write access     For more information on external authentication  see How to Create and Modify User Databases     PIN    A PIN is a numeric password  lts length is configurable and usually varies between four and six digits  You can let users create their PINs during  initial logins  or you can manually assign PINs  After a PIN s configured lifetime  it expires and the user is ask
165. re from Backups    Configure Automatic Backups    1  Log into the Administrative web interface   2  Open the BASIC  gt  Backups page   3  In the Automated Backups section  complete the following tasks   e Configure the remote server where the backups are stored  You can choose between SMB and FTP servers  You can verify the  connection to the remote storage by clicking Test Backup Server   e Select the type of backups you want to create and set the time   4  Click Save Changes     Restore from Backups    You can restore the Barracuda SSL VPN from a backup file you previously created  If  you did a complete backup or just a backup up of the Appliance or SSL VPN  configuration you can do a full or partial restore     Complete Restore for the Barracuda SSL VPN    Related Article       e How to Configure Automated  Backups    1  Open the BASIC  gt  Backups page    2  In the Restore Backups section  select the Restore From  backup file source  Select smb to restore from a network share  or local if  you have the backup files on you local computer    3  Click Browse     Restore Backups Help    Note  Uploaded backups must be confirmed to take effect and will overwrite the current configuration     Restore From  SMB v Select the destination where the desired backup file is stored   Show All Backups     Yes  O No Include all backups on the server  not limiting to backups saved by  this appliance     4  Select the backup file and click Open   5  After the upload has completed click Fin
166. right notice and disclaimer of warranty  keep intact all the notices that refer to this  License and to the absence of any warranty  and give any other recipients of the Program a copy of this License along with the Program     You may charge a fee for the physical act of transferring a copy  and you may at your option offer warranty protection in exchange for a fee     2  You may modify your copy or copies of the Program or any portion of it  thus forming a work based on the Program  and copy and distribute  such modifications or work under the terms of Section 1 above  provided that you also meet all of these conditions     a  You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change     b  You must cause any work that you distribute or publish  that in whole or in part contains or is derived from the Program or any part  thereof  to be licensed as a whole at no charge to all third parties under the terms of this License     c  If the modified program normally reads commands interactively when run  you must cause it  when started running for such interactive  use in the most ordinary way  to print or display an announcement including an appropriate copyright notice and a notice that there is no   warranty  or else  saying that you provide a warranty  and that users may redistribute the program under these conditions  and telling the  user how to view a copy of this License   Exception  if the Program itself is
167. rms and conditions of this  Agreement shall apply to  any Energize Update upgrades  updates  bug fixes or modified versions  collectively     Upgrades     or backup copies of  the Energize Update Software licensed or provided to Customer by Barracuda Networks or an authorized distributor reseller for which Customer  has paid the applicable license fees  NOTWITHSTANDING ANY OTHER PROVISION OF THIS AGREEMENT   1  CUSTOMER HAS NO  LICENSE OR RIGHT TO USE ANY SUCH ADDITIONAL COPIES OR UPGRADES UNLESS CUSTOMER  AT THE TIME OF ACQUIRING  SUCH COPY OR UPGRADE  ALREADY HOLDS A VALID LICENSE TO THE ORIGINAL ENERGIZE UPDATE SOFTWARE AND HAS PAID  THE APPLICABLE FEE FOR THE UPGRADE   2  USE OF UPGRADES IS LIMITED TO BARRACUDA NETWORKS EQUIPMENT FOR WHICH  CUSTOMER IS THE ORIGINAL END USER PURCHASER OR LESSEE OR WHO OTHERWISE HOLDS A VALID LICENSE TO USE THE  ENERGIZE UPDATE SOFTWARE WHICH IS BEING UPGRADED  AND  3  USE OF ADDITIONAL COPIES IS LIMITED TO BACKUP  PURPOSES ONLY     Energize Update Changes  Barracuda Networks reserves the right at any time not to release or to discontinue release of any Energize Update  Software and to alter prices  features  specifications  capabilities  functions  licensing terms  release dates  general availability or other  characteristics of any future releases of the Energize Update Software     Proprietary Notices  Customer agrees to maintain and reproduce all copyright and other proprietary notices on all copies  in any form  of the  Energize Update
168. rs can continue using it     Vx Licenses    Virtual licenses are limited by the number of CPU cores that are licensed for the appliance model  There is no per user license  If you use your  Barracuda SSL VPN Vx with more users than recommended  the performance of the appliance declines but no users are blocked  When your  user base grows  you can upgrade the license and add additional cores to the virtual machine for increased performance     Subscription Based Licenses    The following subscription based licenses are available     Energize Updates    Energize Updates offer the latest firmware  application definition  and security updates for your system  lt also includes standard technical support   24x5      Instant Replacement    With Instant Replacement  a replacement for your Barracuda SSL VPN hardware ships within 1 day if your appliance fails  Every 4 years  your  Barracuda SSL VPN is replaced by a new appliance with the latest hardware for your SSL VPN model  Standard technical support  24x7  is also  included     An active Energize Updates subscription is required for the Instant Replacement subscription     Premium Support    Premium Support subscriptions offer the highest level of 24 7 technical support for mission critical environments  Barracuda Networks is  committed to meeting the demands of these environments by providing a dedicated and highly trained technical support team     An active Energize Updates subscription is required for the Premium Support Subscr
169. rward types  see Custom Web Forwards     You can also edit the settings for the custom Web Forward to configure additional  options such as its authentication type or allowed hosts     After you finish configure the Web Forward  launch it to make it accessible to users   In this article     e Step 1  Create the Web Forward  e Step 2  Edit the Web Forward  e Step 3  Launch the Web Forward    Related Articles    e Web Forwards  e Custom Web Forwards       Step 1  Create the Web Forward  To create the custom Web Forward       Log into the SSL VPN web interface     Go to the Manage System  gt  RESOURCES  gt  Web Forwards page     In the upper right  verify that you have selected the correct user database     In the Create Web Forward section   a  Enter a name for the custom Web Forward  This name is displayed to end users   b  From the Web Forward Category list  select the Custom check box  Then select the type of custom Web Forward that you are  creating   c  Configure the settings that appear for the custom Web Forward type that you selected   d  Add the policies that you want to apply to the Web Forward   5  Click Add to create the Web Forward  The new Web Forward appears in the Web Forwards section     KR WD      Step 2  Edit the Web Forward    To configure additional options  e g   Authentication Type and Allowed Hosts  for the custom Web Forward  edit its settings     1  In the Web Forwards section  click Edit next to the Web Forward entry   2  In the Edit Web Forward windo
170. s  which can be extended by the administrator  User Attributes can be used for user specific  answers to security questions or customization for Resources  Custom user attributes can be used in every context where dynamic expressions  are allowed     Policy Attributes    Policy attributes are variables which are set for policies  Once set these attributes are valid for all users attached to that policy  You can run the  same resource with different policies  each policy setting the policy attributes to a different value  For Example  if the engineering group is using a  different Exchange server from Sales or Marketing you can define a policy variable with the Exchange server name  When an engineer uses the  Exchange resource  the Barracuda SSL VPN uses the server name stored in the policy attribute to connect to the correct server     Messaging    Messaging allows the user to send messages either to an individual or groups     Create a Message  To create and send a message within the Barracuda SSL VPN       Log into the SSL VPN web interface      Go to the Advanced  gt  Messaging page      Verify that you have selected the correct user database on the top right of the page      From the User Database drop down list  select the database where the users are located  or select Global View to list all users     In the Subject field  enter the subject for the message      From the Delivery Method drop down list  select the delivery method to use     O A O N          i  The list v
171. s can securely access their  email  calendar  contacts and tasks from their mobile devices using Microsoft  Exchange ActiveSync via the Barracuda SSL VPN  ActiveSync allows mobile users to  securely connect to an Exchange server  As an added layer of security  you can use  the Barracuda SSL VPN to authenticate ActiveSync requests and proxy all the traffic   The advantage of this deployment is that only the Barracuda SSL VPN will accept  HTTPS traffic from the Internet     Related Articles    e Resources    e How to Create an Application  Resource       When used in combination with a Barracuda Spam and Virus Firewall protecting the Exchange servers from direct external access     Barracuda SSL VPN       y    Microsoft Exchange Server       Barracuda Spam and Virus Firewall    In this article     e Before you Begin   e Step 1  Configure the Barracuda SSL VPN   e Step 2  Configure Exchange Server 2013   e Step 3  Configure the Client Mobile Device for ActiveSync  e Connecting an Android Mobile Device  e Connecting an Apple   OS Device   e Special Case  Multiple User Databases    Before you Begin    e Make sure that you have a valid SSL certificate signed by a trusted root Certification Authority  CA  or a self signed certificate  If you are  using a self signed certificate  you must import it to the local certificate store on all the client machines on which you want to use Outlook   e If required  open port 443 on your internal firewall so that the Barracuda SSL VPN can commun
172. s if required       Enter a brief summary of the nature of the request in the Name field      Enter the name of the account for which this request is being created in the Username field      In the Email field  enter the user s email address  Any notifications regarding this request will be sent to the address entered here      If this request can be handled at any time  set Start Immediately to Yes  otherwise  set to No to activate the Preferred Time field and  specify the appropriate values   Set to blank to request assistance to begin as soon as possible     5  Click Add     Network Connector    The Network Connector provides full  transparent access for users requiring general or more widespread network access  No configuration is  required on the client computer  the configuration is stored on the Barracuda SSL VPN  Authorized users can be provided with complete  TCP UDP access to the entire network in a manner similar to what is provided by IPsec  including mounting drives  accessing network shares and  moving files  just as if they were physically inside the companies network     A U N      Deployment  The Network Connector consists of two components     e A server side component which needs to be enabled on the Barracuda SSL VPN to allow access by your designated users   e A client side component that  when installed onto the remote system  connects to the server interfaces     When a client connects to the Barracuda SSL VPN with the Network Connector  it is assigned 
173. s selected    d  Click OK     0O A O N      N O    Launch SSL VPN  Use the following steps to launch SSL VPN     1  On the Microsoft Surface tablet  swipe in from the right edge of the screen  tap the Settings  gear  charm  and then tap the currently  connected network icon  The Networks list will display  and you will see the IPsec connection near the top   2  Select that connection  Tap Connect  Enter your login credentials to access the Barracuda SSL VPN     Configure a Windows Mobile Device    If you own a device running Windows Mobile complete the following steps     1  On the Windows Mobile device  navigate to  Settings  gt  Connections  gt  Add a new VPN server connection   2  Select Make New Connection  and then configure just the following  for all other settings  accept the default values    e Name   A name for this connection  for example  Ss von pptp  e Hostname IP   The FQDN or IP address of the Barracuda SSL VPN  for example  ss von example com  e VPN type   Select the desired VPN type  IPSec L2TP or PPTP    3  Select Next   4  If IPsec L2TP was chosen  then a screen will appear from which you must select A pre shared key and enter the PSK for the Barracuda  SSL VPN     5  Then  select Next  The newly created connection will appear in the Connections page  in the VPN tab     Your username and password will be requested when a connection to the Barracuda SSL VPN is attempted     How to Configure Remote Devices    As soon as the Barracuda SSL VPN is configured to 
174. s the local  application on the client and provides a configuration for the resource you want to access  Examples include     e Microsoft RDP client  e RDP   RDesktop  e Remote Desktop Client v2 for Mac OS X    Next Steps    e How to Create an Application Resource   e How to Configure Outlook Anywhere   e How to Configure ActiveSync for Microsoft Exchange Servers  e How to Configure Microsoft RDP RemoteApp    How to Create an Application Resource    Application resources are shortcuts to predefined application definitions and the necessary complementary configuration settings  When the user  clicks the application resource the application is started with the settings provided by the administrator  Follow these steps to create an application  resource     In this article     e Step 1  Create an Application Resource  e Step 2   optional  Edit Advanced Settings for the Application Resource  e Step 3  Launch the Application    Step 1  Create an Application Resource    1  Log in to the SSL VPN Web interface     Go to the RESOURCES  gt  Applications page       Verify that you have selected the correct user database on the top right of the page      In the Create Application section  enter a Name  E g   Of ficeCitrix     Select the application definition from the Application list  You may need to click the application category to see the entry in the list  E g    Citrix Published Applications   6  Enter the required configuration settings  E g   hostname for the Citrix server   7  I
175. s time  log in to the appliance after the import process has finished  and set  the IP address then                E Configure networking options for the Transfer VM 9  Import Source Select the network interface on which the temporary VM  Transfer VM  used to perform the import  EULAs operation will run   Location    Network interface    Network 1    Storage  Networking Network Settings  Security Automatically obtain network settings using DHCP  OS Fixup Settings    Use these network settings   T fer VM Setti  P address   192165000  Finish    Subnet mask  255 255 255 0    Gateway  192 168 0 1        Configuring the YubiRADIUS Virtual Appliance    1  After the virtual appliance has been imported  start it and connect to the console  Log in as user  yubikey with the password  yubico    2  Check the networking by clicking the System menu  gt  Preferences  gt  Network Connections    3  Select Auto Ethernet and click Edit  Select the IPv4 tab and change the settings as required by adding a static address  it is important  also to set the DNS here  otherwise connections to the user database may fail      4  Apply the settings and enter the user password to confirm     E  YubiRadius Virtual Appliance 3 5 1 i 1 l acn     O Applications Places System fp  UA  Tue May 22  3 51 PM  ws Sy    Editing Auto Ethernet    aia Connection name   Auto Ethernet    Computer  Connect automatically    Wired   802 1x Security IPva Settings   ipv6 Settings      yubikey s Home Method  Manual     i      N
176. sh     Loading m progress        Your backup file has been loaded successfully     Emish    6  On the top of the page select the Components you want to restore  For a complete restore select Configuration and SSL VPN    Configuration Logs   7  Click Restore Now     RESETTING     Please Wait    i       Wait while the Barracuda SSL VPN restored the configuration from the selected backup files  You will be redirected to the login screen once the  restore process has been completed     Update Firmware    A Read the entire article before upgrading your Barracuda SSL VPN     The Barracuda SSL VPN firmware is available as     e General Release  GA      The latest generally available firmware from  Barracuda Central    e Early Release  EA      The newest version of firmware available for early  access from Barracuda Central     Related Article    e How to Update the Firmware in a  High Availability Cluster    General Release       GA firmware is the final and fully tested firmware version  Barracuda Networks highly recommends that you download the GA release as soon as  itis available to take advantage of important new features and fixes     Early Release    EA firmware is available for early adopters who wish to test the latest firmware from Barracuda Networks  or who have a specific need for early  access  such as a new feature or bug fix that would be beneficial to your environment    Before downloading the EA firmware release  consider the following     e This is a one way upgrad
177. ssign a new YubiKey link at the bottom of the page  Enter the username you wish to assign a key to  select the OTP box and  press the YubiKey button to send the password     liser Details       19  At this point a local test can be performed  Go back to the main YubiRADIUS Virtual Appliance module under Servers in the left menu  and click the Troubleshoot tab       Keep the Client Secret as  test     Enter the username that has the YubiKey assigned     Enter the user s database password      Click the OTP field and press the YubiKey button     This should authenticate successfully     Global Configuratior Troubleshoot Reports  RadTest    This page allows you to test the YubiRADIUS Virtual Appliance setup by querying it directly with requests           Client Secret  shared encryption key              test  default test   Username test  Password       YubiKey OTP or Temporary Token  0       RadTest Response  Successful     Sending Access Request of id 8 to 127 0 0 1 port 1812  User Name      test     User Password      password123 ccccccbgigtdhtgcheftrhjcderfucnerhdnbjgucennu     NAS IP Address   127 0 1 1  NAS Port   0  rad_recv  Access Accept packet from host 127 0 0 1 port 1812  id 8  length 20       20  The final appliance configuration step is to inform the system that the Barracuda SSL VPN will be a RADIUS client       Access the Domain tab  then select your domain       Click the Configuration tab       In the Add Client section  enter the IP address of the Barracuda SS
178. stems list contains the IP address of each clustered system    c  Verify that the Connection Status indicates that each clustered system is up and communicating with this system  The column  displays green for each system that is available and red for each system that cannot be reached  Initially  it may take up to a  minute for the status light to turn green  The Synchronization Latency field tells how long it takes to send updates to each of  the other systems in the cluster  The value of this field should be 2 seconds or less  If it is greater  configuration changes may not  be propagated correctly    d  The Mode column in the Clustered Systems table should usually show all systems in the cluster as being active  If a system is in  standby mode  changes to its configuration are not propagated to other systems in the cluster    4   Optional  Distribute the incoming SSL traffic to each Barracuda SSL VPN using a load balancer     Simple High Availability    Simple High Availability  HA  can be used in cases where more than one Barracuda SSL VPN is available to create a failover cluster but a load  balancer is not in use  Only one SSL VPN system will actively process traffic  The other system s  will act as passive backup s     In an HA cluster  a virtual IP address is used to access the SSL VPN service  If the active system becomes unavailable  one of the passive  systems in the cluster will become active and serve requests directed to the virtual IP address  You will use the
179. subroutine library  you  may consider it more useful to permit linking proprietary applications with the library  If this is what you want to do  use the GNU Library General  Public License instead of this License     Barracuda Products may contain programs that are copyright  c 1995 2005 International Business Machines Corporation and others  All rights  reserved  These programs are covered by the following License      Permission is hereby granted  free of charge  to any person obtaining a copy of this software and associated documentation files  the   Software    to deal in the Software without restriction  including without limitation the rights to use  copy  modify  merge  publish  distribute  and or  sell copies of the Software  and to permit persons to whom the Software is furnished to do so  provided that the above copyright notice s  and this  permission notice appear in all copies of the Software and that both the above copyright notice s  and this permission notice appear in supporting  documentation      Barracuda Products may include programs that are covered by the BSD License   Redistribution and use in source and binary forms  with or  without modification  are permitted provided that the following conditions are met     Redistributions of source code must retain the above copyright notice  this list of conditions and the following disclaimer     Redistributions in binary form must reproduce the above copyright notice  this list of conditions and the following
180. t up a Barracuda SSL VPN Vx system but did not enable promiscuous mode  you may see issues where the network  connectivity seems intermittent  Experience suggests that the virtual interface does not receive all of the packets that it should  As a result     Barracuda Networks recommends that you configure a port group to allow promiscuous mode     Enable Promiscuous Mode on a vSwitch  Add a new port group  and set itto promiscuous mode  Then set your VM client to the port group       Log into the vSphere client  and select the ESX host      Click the Configuration tab      From the Hardware menu in the left pane  select Networking      On the summary page for the virtual switch  click the Properties link     AA U N        10 3 4 111  v5phere Client E BR   Fis Edt View Inventory Administration Fiupiis Hap    ka Ey Home P at  irvertory  gt  Ep Irmentory          S g    g 10 3 4 111 A VMware ESY  4 00  171294   Evaluation  59 days remaining   E RHELSSOB r    Hardware    Health bate Networking Refresh Add Mestwardira    Properties     Processors  Fierio Lj Wr tul Sube  vue W Raana Pr operas  Ot Se Virtual Muabine Port Group Pigia Adapters  Networking CA WM Network p     a E  m 1000 Ful OD  Shor ae Adapters E i areal macnas   Network Adapters RHEL SSO8  advwenced Seething    ia rel ort   O Management Network    Software ne  iai    Sib    BTA ind ad  Licor Febres  1     P kag      gt     Recent Taska w    In the properties window that opens  you can modify the vSwitch configuration
181. tem      i  This file is only required for stand alone mode     To install the client configuration file on your system     1  Log in to SSL VPN web interface   2  Go to the RESOURCES  gt  My Network Connector page   3  Locate the client configuration in the My Network Connector section and click More     When installing the configuration file  you may be presented with various warnings depending on the security level that is  configured on your system  Accept the warnings as they appear in order to continue with the installation     4  Select Install Client Configuration file     Step 3  Launch the Network Connector Client  Once the Client Configuration file is installed  launch the Network Connector client in stand alone mode       Start the Network Connector GUI program  A red network icon will appear in your System Tray      Right click on that icon and select Connect      Enter your authentication information  and click OK      The icon will flash while attempting to establish a connection  and will turn green when a secure connection to the protected network is in  place and ready for use     ROD         i  Due to restrictions imposed by Windows networking  the VPN routes are not instantly published when the Network Connector is  launched  Expect to wait around 10 15 seconds after launching the client before the routes are published and the Network Connector  client is fully usable     Using the Network Connector with Mac OS X    Follow these instructions to install the
182. the user is logged in     O A ON    In this article     e Step 1  Create or Modify the Authentication Scheme  e Step 2  Configure Key Authentication Settings  e Step 3  Generate Keys  e Creation and Distribution by Administrator  e Creation by Users on Login    Step 1  Create or Modify the Authentication Scheme    To use the public key authentication create or modify the authentication scheme and add the Public Key Authentication module to the  configuration  If you want users to generate their own initial public keys  the public key authentication module will query the users password to  authenticate them before generating the new keys     Step 2  Configure Key Authentication Settings  Configure the key authentication module     1  Open the Manage System  gt  RESOURCES  gt  Security Settings page   2  In the Key Authentication section  configure the following settings    e Allow user to create initial authentication key   e Enforce Password Security Policy    Step 3  Generate Keys    There are two ways the keys can be generated     Creation and Distribution by Administrator  The administrator can initialize the key for a user       Open the Manage System  gt  ACCESS CONTROL  gt  Accounts page      Click on the More link for the user you want to generate the key for      Select Generate Authentication Key      Enter the Passphrase  The Administrator can require the passphrase to conform to the password security policy      Click Generate      Download the zip file       Click
183. tion 3          uf i i    E a  example com      Client ee o    Internal myco  com Barracuda SSL VPN    Firewall    In this article     e Step 1  Install the Server Agent Client  e Step 2  Authorize Server Agents  e Step 3  Create Routes    Step 1  Install the Server Agent Client    For every network you want to connect to the Barracuda SSL VPN with a Server Agent  install the client on a system in the network that can reach  all the resources you want to access via the SSL VPN     1  Log into the SSL VPN web interface   2  Open the Manage System  gt  ADVANCED  gt  Server Agents page   3  In the Download Clients section  click on the download link for your operating system     After installing the software package  enter the IP address and authentication information for your Barracuda SSL VPN  The Server Agent will  automatically register with the Barracuda SSL VPN  The Server Agent is now listed in the Agents section on the Manage System  gt  ADVANCED     gt  Server Agents page     Step 2  Authorize Server Agents  You need to authorize the Server Agents after the initial connection     1  Log into the SSL VPN web interface   2  Open the Manage System  gt  ADVANCED  gt  Server Agents page   3  In the Agents section  locate the Server Agent with the red indicator icon and click More     4  Select Authorize     The indicator icon is now green  lf the indicator icon is yellow  the Server Agent is offline or blocked     Step 3  Create Routes    Routes are used to tell the Barracud
184. tion Schemes Security Settings Configuration         Create Authentication Scheme    e Name     Available modules  Authentication Key  Client Certificate  IP Authentication  One Time Password  Secondary   Password    m    Availabl lici  Admin Rights Add  gt  gt   Administrators  Barracuda  Customers  lt  lt  Remove    Add All  gt  gt     Employees     lt  lt  Remove All    Add    Authentication Schemes          Name     RADIUS    Password    WebDAV    Actions   Edit   Copy   Delete   More      Edit   Copy   Delete   More                    2  Navigate to ACCESS CONTROL  gt  User Databases and ensure you are connected to the same user database that YubiRADIUS is  connected to  If not  edit the user database and change the settings accordingly     s eo O A ae m  Do  x  E Webmin 1 570 on yrva35 e      lt 8 Barracuda SSL VPN  User De      wt                                                                        C A  amp  biips   10 14 0 19 showRealms do  ARRACUDA   ENANA  ee rT Manage Account  SSL VPH 680Vx RESOURCES   ACCESS CONTROL   ADVANCED ne English  ay  Create User Database  Active Directory   Built in OpenLDAP    The server will use its own internal database of users and groups       Name    UN       Advanced User Databases settings are hidden by default  In most cases  selecting one of the pre configured configurations will work by default     Click the Show Advanced Settings button to view or edit these settings   User Databases  Reset  Name Type Status  Global View Bui
185. tion of executable or object code is made by offering access to copy from a designated place  then offering equivalent access to copy the  source code from the same place counts as distribution of the source code  even though third parties are not compelled to copy the source along  with the object code     4  You may not copy  modify  sublicense  or distribute the Program except as expressly provided under this License  Any attempt otherwise to  copy  modify  sublicense or distribute the Program is void  and will automatically terminate your rights under this License  However  parties who  have received copies  or rights  from you under this License will not have their licenses terminated so long as such parties remain in full  compliance     5  You are not required to accept this License  since you have not signed it  However  nothing else grants you permission to modify or distribute  the Program or its derivative works  These actions are prohibited by law if you do not accept this License  Therefore  by modifying or distributing  the Program  or any work based on the Program   you indicate your acceptance of this License to do so  and all its terms and conditions for  copying  distributing or modifying the Program or works based on it     6  Each time you redistribute the Program  or any work based on the Program   the recipient automatically receives a license from the original  licensor to copy  distribute or modify the Program subject to these terms and conditions  You
186. tions are sent by  email  agent or SMS over email  You can configure who should be notified for every  event     Create a Notification    Related Article       e SNMP    If you want to be informed when a certain event occurs on the Barracuda SSL VPN  you need to create a notification       Log into the SSL VPN web interface      Open the ADVANCED  gt  Notifications page      In the Create Notification section  select the User Database    Enter a Name      Select the Event State      Double click all events you want to associate with this notification in the Available Events list     oaR WON      7  Select which type of user you want to receive the notification  If you select Administrative User all administrator who have sufficient  rights to act on the event will receive the notification   8  Click Add     The notification is now listed in the Notifications section below     Notifications    Help  Apply Filter   Reset  Name  fi User Database Delivery Method Actions     Failed Logon Global View Email Edit   Copy   Delete   More    Failed NAC Authentication Global View Email Edit   Copy   Delete   More       Remote Assistance Notifications Global View Email Edit   Copy   Delete   More     Server Shutdown Scheduled Global View Agent Edit   Copy   Delete   More       If you want to modify a notification after it has been created  or define the recipients in a more granular way  click Edit next to the  notification  make the necessary changes and save your settings  To remove a n
187. twork Connector  This does  not affect the ability of the stand alone version of the Network  Connector from also running with this particular client configuration     Server Interface The server interface identifies the network information that this client  configuration is associated with  This should match the server  interface that caused the creation of this client configuration     Static IP Address This field should only be used when you expect only one remote user  to connect using this configuration  If there is a value specified here   then the remote system that is connecting via the Network Connector  will always be assigned this IP address  regardless of any DHCP  range that is set in the associated server interface     Authentication Type If you wish to change the authentication type for the user of this client  configuration  then select the desired method here     Up  and Down Commands    Up commands are executed from a temporary script file created by the Barracuda SSL VPN when a remote client connects with the Network  Connector  This script can be used to create the needed static routes when the Barracuda SSL VPN is installed in a DMZ  For more information   see How to Create a Static Route     Down commands are executed when the remote client disconnects  usually to remove settings added by the up commands     Command Description    Up In the Up Commands area  you can enter any command that is  executable from a script file  These can range from initializi
188. ty to you for all damages exceed the amount of one hundred dollars     8  Export Control  You may not use or otherwise export or re export Barracuda Software except as authorized by the United States law and the  laws of the jurisdiction where the Barracuda Software was obtained     Energize Update Software License    PLEASE READ THIS ENERGIZE UPDATE SOFTWARE LICENSE CAREFULLY BEFORE DOWNLOADING  INSTALLING OR USING  BARRACUDA NETWORKS OR BARRACUDA NETWORKS SUPPLIED ENERGIZE UPDATE SOFTWARE     BY DOWNLOADING OR INSTALLING THE ENERGIZE UPDATE SOFTWARE  OR USING THE EQUIPMENT THAT CONTAINS THIS  SOFTWARE  YOU ARE CONSENTING TO BE BOUND BY THIS LICENSE  IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS  LICENSE  THEN  A  DO NOT DOWNLOAD  INSTALL OR USE THE SOFTWARE  AND  B  YOU MAY RETURN THE SOFTWARE FOR A FULL  REFUND  OR  IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT  YOU MAY RETURN THE ENTIRE PRODUCT FOR A  FULL REFUND  YOUR RIGHT TO RETURN AND REFUND EXPIRES 30 DAYS AFTER PURCHASE FROM BARRACUDA NETWORKS OR AN  AUTHORIZED BARRACUDA NETWORKS RESELLER  AND APPLIES ONLY IF YOU ARE THE ORIGINAL PURCHASER     The following terms govern your use of the Energize Update Software except to the extent a particular program  a  is the subject of a separate  written agreement with Barracuda Networks or  b  includes a separate    click on    license agreement as part of the installation and or download  process  To the extent of a conflict between the provisions of the foregoing 
189. udaSSLVPN vmx file      Use the default settings  and click Finish      Start the appliance      Follow the Quick Start Guide instructions to provision your Barracuda SSL VPN Vx appliance     oar O N     VMware Fusion 3 x      From the File menu  select Open a Virtual Machine      Navigate to the BarracudaSSLVPN vmx file      Use the default settings  and click Finish      Start the appliance      Follow the Quick Start Guide instructions to provision your Barracuda SSL VPN Vx appliance     0O A O N     Deploying XVA Images    Citrix XEN Server 5 5   1  From the File menu in the XenCenter client  select Import   2  Browse to the BarracudaSSLVPN  lt version  gt  fw__ FIRMWARE _   lt version  gt  xva file  and click Next   3  Follow the instructions to configure the Storage and Networking pages   4  When prompted  review the template information and click Finish to import the template   5  Right click the resulting template  and select New VM     6  Follow the Quick Start Guide instructions to provision your virtual appliance   How to Enable Promiscuous Mode on VMware for the Barracuda Network Connector    If your virtual appliance is running on a VMware hypervisor  you must enable promiscuous mode on the appliance so that Barracuda Network  Connector can work correctly     About Promiscuous Mode    Place the virtual network adapter for the Barracuda SSL VPN Vx in promiscuous mode so that it can detect all frames that are passed on the  virtual switch     If you have already se
190. ully     User Import Configuration Management    User Import operation started      Connecting to LDAP AD server    Successfully connected to LDAP AD server   Binding to server with given user credentials   Successfully bound to server    Searching user records    User records found    Added new users    Disabled deleted users     Successfully updated users records   Connecting to LDAP AD server     Importing users from LDAP AD       This may take a while depending on your  directory size     User Import operation completed          16  Now go back to the Domain tab and click on your domain  you should now see which accounts may authenticate  If you click on a group     the users should become visible  note that there are currently no YubiKeys assigned         Select all   Invert Pe   Create   a new user   Assign a new YubiKey   Temporary token settings        Temp   Username Sao YuolKXey User DN Token Directory YubiKey  Name ID Status Status Status    Further Test No YubiKey OU Further Test Accounts OU Test  Accounts Assigned Accounts DC 3sp DC co DC uk       F No Yubikey CN test amp  OU Test   C test amp       Assigned Accounts DC 3sp DC c0 DC uk a dd e       No YubiKey CN Test Group OU Test    Test Group Assigned Accounts DC 3sp DC co DC uk       No Yubikey CN user dot OU Test x y x  Assigned Accounts DC 3sp DC co DC uk  Select all   Invert selection   Create a new user   Assign a new v YubiKey   Temporary token settings    ees es    user dot user dot       17  Click the A
191. ur old and new passwords  and then click Save Password  This only changes the password for the appliance web interface  The  password for the ssladmin user on the SSL VPN web interface must be changed separately     Step 6  Route Incoming SSL Connections to the Barracuda SSL VPN Vx    Route HTTPS incoming connections on port 443 to the virtual appliance  This is typically achieved by configuring your corporate firewall to port  forward SSL connections directly to the Barracuda SSL VPN Vx      i  Ports for Remote Appliance Management  If you are managing the virtual appliance from outside the corporate network  the appliance administrator web interface ports on  8000 8443 need similar port forward configurations  Barracuda Networks recommends that you use the appliance web interface on port  8443  HTTPS      Step 7  Verify Incoming SSL Connections to the Barracuda SSL VPN Vx    After you configure your corporate firewall to route SSL connections to the Barracuda SSL VPN Vx  verify that you can accept incoming SSL  connections     1  Test the connection by using a web browser from the Internet  not inside the LAN  to establish an SSL connection to the external IP  address of your corporate firewall  For example  if your firewall s external IP address is 23 45 67 89  goto https   23 45 67 89in  your browser    2  When you are prompted to accept an untrusted SSL certificate  accept the warning and proceed to load the page    If you see the Barracuda SSL VPN login screen  this con
192. uration View and click Add  gt  gt       In the Available Policies list  select the policies for which provisioning should be enabled and click Add      Click Add     OMNOoOAR WD      On the RESOURCES  gt  Configuration page  in the Device Configuration section  you can configure whether the non resource items  certificate   mail settings  exchange  LDAP  can be provisioned     Windows Devices    This table shows the types of items that can be provisioned to Windows devices     Item Type Description  e Applications All of these resources  if available to the user on their device  can be  e Web Forwards provisioned as shortcuts that will immediately launch the appropriate  e Audit Reports resource when selected  Whether they appear or not depends on the  e Network Places user s access rights and whether they are applicable for the device  e SSL Tunnels  SSL tunnels and tunneled web forwards will not be available on iOS    devices because they require the agent   The settings for the  resource are provisioned only as shortcuts  an URL to the Barracuda  SSL VPN and the appropriate icon      Mapped Drives If the user has access to at least one Network Place resource that  has an associated drive mapping  a shortcut will be provisioned to the  device that will initiate the drive mapping process     Client Certificates Installs the selected client certificate into the Windows keystore  Certif  icates are taken from the ADVANCED  gt  SSL Certificates page   client certificates for t
193. urity policy requires  You can also configure a secure  default authentication method and offer users an  alternative method to log in  For example  you can require users to use their hardware token with client certification for normal logins  but allow  them to log in with a password and PIN code if they are using a computer that cannot use hardware tokens     Some authentication modules must be used with other authentication modules  These modules are referred to as  secondary  authentication  modules because they require user information  Some modules can be used as primary or secondary authentication modules  The following table  lists the type of each available authentication module      Authentication Module Type   Client Certificate Primary Secondary  IP Address Primary Secondary  Password Primary Secondary  PIN Primary Secondary  Public Key Primary Secondary  RADIUS Primary Secondary  OTP  One Time Passwords  Secondary  Personal Questions Secondary    Client Certificate    The Client Certificate module validates an SSL client certificate installed in the browser s certificate store against the root certificate that is  uploaded to the Barracuda SSL VPN  The SSL client certificate can be installed manually  per Active Directory policy  or with a hardware token  using the vendor s utility  lt is recommended that you use the Client Certificate module as a secondary module  because it authenticates the  browser and not the user directly  This is not the case when using ha
194. urrent desktop   This feature is only available when using the Microsoft RDP client     Before you Begin  Create a rdp file on the Microsoft Windows Server for the application you want to use via RDP RemoteApp     Create a new Application Resource    Create a standard RDP application resource using the Microsoft RDP Client Application template       Open the RESOURCES  gt  Applications page      Enter a Name  E g   RDP RemoteApp     Select RDP   Microsoft RDP Client from the Application list     Enter the Hostname       Select the policies this resource should be available for and click Add  The policies are now visible in the Selected Policies list     Click Add     O O AOU N                      Create Application Help    User Database  Global View v    Name  RDP RemoteApp  E   Ericom Powerl erm Webconnect En  Published Clients B  Firefox Portable  P Remote Access m  NX Client    Application   Remote Control   RDP   CoRD for Mac OS X  System Tools    RDP   Elusiva Java RDP  2 RDP   Microsoft RDP Client    Hostname  10 0 10 110  51  The Hostname IP to connect to    Port  3389  1  The Port number to connect to    Provide Single Sign On   Yes No    Add to My Favorites     Yes O No  Available Policies Selected Policies  Administrators nnn Everyone  Auditors  gt  Add All  gt  gt   Help Desk Administrators  Help Desk Users  lt  lt  Remove  Power Users  lt  lt  Remove All  Add    Add the RemoteApp Configuration to the Application Resource  Use a text editor to open the rdp file an
195. username     e Password     Enter a password    e Authentication Method     Select the authentication method supported by your network management software  E g   SHA   e Encryption Method     Select the encryption method supported by your network management software  E g   AES   e Allowed SNMP IP Range     Enter the IP addresses or range from which the Barracuda SSL VPN should accept SNMP queries   4  Click Save Changes     Enable SNMP Traps  If you want your Barracuda SSL VPN to send SNMP traps to the network management system add the IP address     1  Log into the Administration interface    2  Open the ADVANCED  gt  Administration page    3  In the SNMP Traps section  add the IP address of the network management system   4  Click Save Changes     Maintenance    The following article section describes in detailed steps how to configure and restore backups of the Barracuda SSL VPN configuration and  explains the procedure of firmware updates     In this Section    e How to Configure Automated Backups   e Restore from Backups   e Update Firmware   e Howto Update the Firmware in a High Availability Cluster    How to Configure Automated Backups    It is recommended to always have working backups of your appliance  In case of a  hardware failure or system misconfiguration the backup files can be used to quickly  restore the appliance to working order  The administrator can configure how many   backups are saved to a SMB share  FTP or FTPS server     Related Article       e Resto
196. w  configure the additional settings   3  Click Save     Step 3  Launch the Web Forward  Add a resource category to the Web Forward to make it available to users on their My Resources page     1  In the Web Forwards section  click Edit next to the Web Forward entry    2  In the Edit Web Forward window  scroll to the Resource Categories section  and add the available categories that you want to apply to  the Web Forward    3  If you want the Web Forward to automatically launch whenever users log into the Barracuda SSL VPN  scroll to the Details section and  enable Auto Launch    4  Click Save     How to Configure a Microsoft SharePoint Web Forward    When you create a Web Forward for SharePoint 2013 on the Barracuda SSL VPN  use  the SharePoint 2013 template as described in the following configuration steps  To get  SharePoint working through a proxy  you must also add Alternate Access Mappings t  o tell SharePoint to expect requests that were made to other hosts  namely    the Barracuda SSL VPN      In this article     e Step 1  Configure SharePoint Server  e Step 1a  Add Alternate Access Mappings  e Step 1b  Restart the IIS Server   e Step 2  Create a Web Forward    Related Articles    e Web Forwards  e Custom Web Forwards       Step 1  Configure SharePoint Server    To configure the settings for SharePoint  go to the SharePoint 2013 Central Administration console  this might be set up on  lt your SharePoint  server gt  1317   If it is not available  then  on the system that
197. www cmu edu computing     CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS  SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS  IN NO EVENT SHALL CARNEGIE MELLON  UNIVERSITY BE LIABLE FOR ANY SPECIAL  INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING  FROM LOSS OF USE  DATA OR PROFITS  WHETHER IN AN ACTION OF CONTRACT  NEGLIGENCE OR OTHER TORTIOUS ACTION   ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE     Barracuda products may include programs that are covered by the Apache License or other Open Source license agreements  The Apache  license is re printed below for you reference  These programs are copyrighted by their authors or other parties  and the authors and copyright  holders disclaim any warranty for such programs  Other programs are copyright by Barracuda Networks     Apache License  Version 2 0  January 2004  http   www apache org licenses     TERMS AND CONDITIONS FOR USE  REPRODUCTION  AND DISTRIBUTION    1  Definitions    License  shall mean the terms and conditions for use  reproduction  and distribution as defined by Sections 1 through 9 of this document    Licensor  shall mean the copyright owner or entity authorized by the copyright owner that is granting the License      Legal Entity  shall mean the union of the acting entity and all other entities that control  are controlled by  or are under common control with that  entity  For the purposes of this definition 
198. y the Barracuda SSL VPN  a user must be able to authenticate  Additionally  the user s device must  adhere to any configured network access control  NAC  policies  You can configure user authentication as either a single  or multi factor process   using a combination of information stored in the authentication services and additional authentication procedures defined in the Barracuda SSL  VPN  After users log in  the levels of access and privileges assigned to them on a per resource basis are defined by the policies that you  configured     In this article     e User Databases   e Authentication   e Policies   e Network Access Control  NAC     User Databases    Users and groups can be stored locally on the Barracuda SSL VPN s built in user database or retrieved from external authentication servers   User databases define where user information is stored  The Barracuda SSL VPN 380 and above can use multiple user databases  You can  configure every user database with global access rights and delegate some Super User responsibilities to management users in the user  database     For more information  see How to Create and Modify User Databases     Authentication    User Authentication    User Databases Authentication    Built in Authentication   Single Factor Authentication     External Authentication   Multi Factor Authentication       User authentication is not limited to password authentication  For greater security  the Barracuda SSL VPN provides multi factor authentication 
199. yment     The Barracuda SSL VPN is reachable from the Internet  All resources connect via Server Agents which initiate  the connection from inside the networks  No ports have to be opened     Direct Access DMZ Deployment          Remote  Client    Firewall    Barracuda SSL VPN    The Barracuda SSL VPN is deployed behind the firewall  Only one port  443  has to be opened up by the firewall and forwarded to the SSL VPN   You have direct access to all services  authentication  file  web  etc   in the intranet without further configuration     Multilayer Firewall DMZ Deployment       Rem ote  Client        External Barracuda SSL VPN internal  Firewall Firewall    The Barracuda SSL VPN is deployed in a DMZ behind the corporate firewall but before the internal network firewall  All access to services on the  internal network requires ports to be opened on the internal firewall  By deploying the Barracuda SSL VPN between the two firewalls  another  security layer is added  It is also possible to install the Server Agent on a computer in the internal network  which initiates an SSL tunnel on port  443 from the inside of the network so you can limit the ports that you must open on the internal firewall     Isolated Deployment        server Agent    7     myco com  E           server Agent  m example  com     a example  com                  Ey Ej q Firewall    Internal myco com    Firewall           a a example com a  Client a  Internal myco  com    ss as      AN Barracuda SSL VPN  Fir
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
  2013 – 2014 Mention : Information et communication  Bose SoundTrue in-ear  Lirio by Philips Floor lamp 36723/17/LI  User Guide - Your Vodafone Account  Christie Interactivity Kit  FloridaEducator User Manual  Epson 1640XL- Product Support Bulletin  BST / Instruções de Operação / 2008-04 - SEW  Manual de Usuario - Emmegi Ricambi SpA    Copyright © All rights reserved. 
   Failed to retrieve file