Barracuda CloudGen Firewall Integration
Last updated
Last updated
General Overview
This guide explains the configuration of multi-factor authentication (MFA) for Barracuda CloudGen Firewall utilizing Mirket as the identity provider. Prior configuration and deployment of Barracuda CloudGen Firewall are required before setting up MFA with Mirket.
Barracuda CloudGen firewall offers various MFA configuration modes. In this integration, we've configured RADIUS authentication with Mirket.
This integration was tested with version v7.1.3-061 of Barracuda CloudGen firewall Vx VF10.
Before proceeding with these procedures, ensure the following:
You've completed the installation and configuration of the Mirket (go to Mirket Installation Steps).
End-users can access the Barracuda CloudGen Firewall Vx VF10.
For RADIUS authentication in Barracuda CloudGen Firewall, you need to configure a RADIUS server (the Mirket server IP address).
Follow these steps to configure a RADIUS server:
Access the Barracuda CloudGen firewall using Barracuda NextGen Admin credentials to proceed.
Go to Configuration > Configuration Tree > Box > Infrastructure Services > Authentication Service.
Select the RADIUS Authentication option from the left-hand menu. Then click on Lock.
Select the Advanced View option from under the Configuration Mode in the left-hand menu.
Within the Radius Authentication area, choose the "Yes" option from the Activate Scheme dropdown list.
Choose the "RADIUS" option from the Method dropdown list.
Click on the "+" icon to add a RADIUS server in the Basic field.
Input the IP address of the Mirket (RADIUS server) into the Radius Server Address field.
Input the port number for communication with the Mirket (Radius Server) in the Radius Server Port field. The default Gateway ports are 1812 and 1645.
Assign a shared secret key to identify your RADIUS client in the Radius Server Key field. Make sure to use the same shared secret key while configuring your RADIUS client resource in Mirket.
Click on OK. Keep the remaining settings as default values.
Click on Send Changes and then click on Activation Pending.
Go to Configuration > Configuration Tree > Box > Virtual Servers > S1 > Assigned Services.
Right-click on Assigned Services and select Create Service.
Choose the "Yes" option from the Enable Service dropdown list.
Enter a unique service name that contains more than six characters in the Service Name field. Note: The service name can't be modified later.
Choose the "VPN Service" option from the Software Module dropdown list.
Choose the "First + Second-IP" option from the Service Availability dropdown list.
Click on Next. Keep the settings at their default values on the Statistics and Access Notification configuration pages.
Click on Finish and then click on Activate.
Go to Configuration > Configuration Tree > Box > Virtual Servers > S1 > Assigned Services > VPN-Service > VPN Settings.
Click on Lock then click on the "Click here for Server Settings" option.
Choose the "No" option in the Port 443 VPN Listener field.
Click on OK to confirm settings.
Click on Send Changes and then click on Activate.
Go to Configuration > Configuration Tree > Box > Virtual Servers > S1 > Assigned Services > VPN-Service > SSL-VPN.
Click on Lock.
Choose the "Yes" option from the Enable SSL VPN dropdown list.
Click on the "+" icon next to the Listen IPs field. This represents the external IP address that the SSL VPN listens on, typically used for internet connectivity.
Check the Restrict to Strong Ciphers Only checkbox.
Choose the "Generated-Certificate" option from the Identification Type dropdown list.
Select the Login option from the left-hand menu.
Choose the "RADIUS" option from the Identity Scheme dropdown list.
Click on Send Changes and then click on Activate.
Select the Access Control Policies option from the left-hand menu. Then modify the Default policy.
Click on the "+" icon next to the Authentication Schemes field to add the "RADIUS" option.
Then click on OK to confirm settings.
Click on Send Changes and then click on Activate.
To enable Mirket to receive authentication requests from Barracuda, follow these steps:
Define Barracuda as a RADIUS client resource within Mirket.
Create an authentication policy for the Barracuda RADIUS client resource or include it in an existing authentication policy.
Attach the Barracuda resource to the Mirket Radius.
Before starting, ensure that you have installed Mirket Radius Gateway. To add a Radius Client to the Mirket Radius Gateway, follow these steps:
First, navigate to the directory C:\MirketRadius
and open the config.json
file.
Fill in the gateway and radiusClientList fields according to the provided specifications to ensure accurate and secure network configuration.
samName: Enter the SAM name of the gateway. In Mirket, user identification is done using the SAM (Security Account Manager) name. This is preferred over the standard username. This username is used for authentication and access controls. Please provide your domain name, such as 'mirket'.
authenticationPort: Enter the authentication port value you set for the gateway. The default value is 1812.
accountingPort: Enter the accounting port value you specified for the gateway. The default value is 1813.
gatewayIp: Enter the IP address of the server where the Mirket is installed.
ipAddress: Enter the IP address of your firewall.
secretKey: Enter your secret key. This secret key is used to link your radius client and radius server, so ensure they are identical.
Once you've made the necessary changes to the config.json file, save and close it. Note: You can add multiple RADIUS clients.
After completing the configuration, restart the 'Mirket Radius Gateway Service'.
To set up multifactor authentication, make sure you have at least one user group in Mirket.
If it is preferred to use a local user, first create a local group and then create a local user and make the user a member of the group.
If it is preferred to use LDAP users, the priority LDAP group is created by pulling users from Active Directory or OpenLDAP in Mirket.
Radius Rules define user access to resources and the authentication methods available (such as SMS, Approve / Deny, OTP etc.).
First, you should follow these steps:
Select Rules > Radius Rules.
Click on Add New.
Enter a rule name in the Name field.
Enter the rule description in the Description field.
Select the group to which the rule applies from the Group dropdown list.
Select the provider to which the rule applies from the Provider dropdown list.
Select the authorization profile to which the rule applies from the Authorization dropdown list.
Click on Save to confirm settings.
To validate the integration between Mirket MFA and your Barracuda CloudGen firewall, perform authentication using a mobile token on your mobile device. For RADIUS resources, available authentication methods include Approve/Deny authentication.
In this example, we illustrate the use of the Approve/Deny authentication method.
Access the Barracuda CloudGen firewall using Barracuda NextGen Admin credentials to proceed.
Go to Configuration > Configuration Tree > Box > Virtual Servers > S1 > Assigned Services > VPN-Service > SSL-VPN > Native Apps.
Click on the "+" icon in the Native Apps section and then add an RDP App.
Input your external IP address of the Barracuda CloudGen firewall and then click on Connect.
Click on the "Yes" option in the "Server certificate error dialog box".
Enter your Mirket username in the Username field.
Input your password in the RADIUS Password field.
Click on Log in. Then, select the 'Approve' option(found in the Mirket mobile app) immediately and make sure it doesn't time out.
Click on RDP to launch this app.
Then, input your RDP host credentials to log on.
Launch the CudaLaunch client application, which can be downloaded from the .