Barracuda Networks SSL VPN 380 + 1Y EU+IR Specifikace

Procházejte online nebo si stáhněte Specifikace pro Zabezpečovací zařízení VPN Barracuda Networks SSL VPN 380 + 1Y EU+IR. Barracuda Networks SSL VPN 180 + 1Y EU+IR Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 96
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
1. Barracuda SSL VPN - Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1 Barracuda SSL VPN Release Notes 2.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.1 Hardware Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2.2 Virtual Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2.2.1 Sizing CPU, RAM, and Disk for Your Barracuda SSL VPN Vx . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.2.2.2 How to Deploy Barracuda SSL VPN Vx Virtual Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.2.2.3 How to Enable Promiscuous Mode on VMware for the Barracuda Network Connector . . . . . . . . . . . . . . . . . . . . . . . . 11
1.2.2.4 Barracuda SSL VPN Vx Quick Start Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.2.3 High Availability Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.2.3.1 How to Configure a High Availability Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.2.4 Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.3 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.4 Administrative Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.5 Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.5.1 How to Create and Modify User Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.5.1.1 Example - Create a User Database with Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
1.5.2 Authentication Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.5.2.1 Hardware Token Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.5.2.2 How to Configure One-Time Password (OTP) Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
1.5.2.3 How to Configure Public Key Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.5.2.4 How to Configure SSL Client Certificate Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.5.2.5 Example - How to Install and Configure YubiRADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
1.5.2.6 Example - Authentication with SMS Passcode RADIUS server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
1.5.3 How to Configure Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
1.5.4 Access Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
1.6 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
1.6.1 Web Forwards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
1.6.1.1 Custom Web Forwards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
1.6.1.1.1 How to Create Custom Web Forwards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
1.6.1.2 How to Configure a Microsoft SharePoint Web Forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
1.6.1.3 How to Configure a Microsoft Exchange OWA Web Forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
1.6.2 Network Places . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
1.6.2.1 How to Create a Network Place Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
1.6.2.2 How to Configure AV Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
1.6.3 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
1.6.3.1 How to Create an Application Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
1.6.3.2 How to Configure Outlook Anywhere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
1.6.3.3 How to Configure ActiveSync for Microsoft Exchange Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
1.6.3.4 How to Configure Microsoft RDP RemoteApp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
1.6.4 SSL Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
1.6.4.1 How to Create an SSL Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
1.6.5 Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
1.6.5.1 Requesting Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
1.6.5.2 Providing Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
1.6.6 Network Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
1.6.6.1 How to Configure the Network Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
1.6.6.2 How to Create a Static Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
1.6.6.3 Advanced Network Connector Client Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
1.6.6.4 Using the Network Connector with Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
1.6.6.5 Using the Network Connector with Mac OS X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
1.6.6.6 Using the Network Connector with Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
1.6.7 How to Configure IPsec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
1.6.7.1 How to Configure Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
1.6.7.2 How to Configure Remote Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
1.6.8 How to Configure PPTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
1.6.9 How to Configure Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
1.6.10 Provisioning Client Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
1.7 Advanced Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
1.7.1 Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
1.7.2 Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Zobrazit stránku 0
1 2 3 4 5 6 ... 95 96

Shrnutí obsahu

Strany 1

1. Barracuda SSL VPN - Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 2

2. 3. 4. 5. 1. 2. 3. 4. 5. 6. 1. 2. 3. 4. 5. 1. 2. 3. 4. 5. Take a snapshot of your virtual machine.Edit the settings in your virt

Strany 3 - Barracuda SSL VPN - Overview

5. 1. 2. 3. 4. 5. 6. 1. 2. 3. 4. 5. 1. 2. 3. 4. 5. 1. 2. 3. 4. 5. 1. 2. 3. 4. 5. 6. Follow the instructions to provision

Strany 4

1. 2. 3. 4. 5. a. b. c. d. 6. Barracuda Networks recommends that you configure a port group to allow promiscuous mode.Enable Promiscuous Mod

Strany 5 - Deployment

6. a. b. c. d. 7. a. b. c. Set the port group to promiscuous mode.Select your new port group, and click .EditClick the tab.Security From th

Strany 6 - In this Section

1. 2. 3. 4. Barracuda Vx license token, which you received via email or from the website whenyou downloaded the Barracuda SSL VPN Vx package. The

Strany 7 - Hardware Specifications

1. 2. 3. 1. 2. 3. 1. If PPTP or L2TP/IPsec access is required, also open the following ports:Port Protocol Direction Usage47 GRE In/Out PPTP172

Strany 8

1. 2. 1. 2. 1. 2. 3. 4. 5. Test the connection by using a web browser from the Internet (not inside the LAN) to establish an SSL connection t

Strany 9 - Provisioning Hard Drives

5. 6. 7. 1. 2. 3. a. b. c. d. 4. Create a backup of the existing Barracuda SSL VPN configuration using the page.ADVANCED > BackupUse t

Strany 10 - VMware ESX and ESXi 4 x

Administrator password.Cluster Shared Secret, though this must be the same for the cluster to work properly (on the page)ADVANCED > Linked Manage

Strany 11

1. 2. 3. 4. 5. 6. 1. 2. 3. 4. a. b. c. 5. 6. 1. In this article:Before You BeginStep 1. Install the SSL CertificateStep 1.1. (Optional

Strany 12

1.7.3 Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 13

1. 2. 3. 4. 1. 2. 3. 4. 5. Log into the (e.g., appliance web interface .https://sslvpn.example.com:8443)Go to the page. BASIC > Admin

Strany 14 - Related Articles

The default login credentials for the SSL VPN web interface are:User: ssladminPassword: ssladminAccess ControlTo access and use the resources provided

Strany 15 - Step 4. Update the Firmware

Policies are lists of users and groups that are attached to resources. Users can only access a resource if they are included in the policy attachedto

Strany 16

1. 2. 3. 4. 5. 1. 2. 3. 4. 5. Create the User DatabaseTo create the user database:Log into the . SSL VPN web interfaceGo to the page.Manage

Strany 17 - Non-Clustered Data

After you add the user database, it appears in the section on the bottom of the page.User Databases Authentication SchemesTo authenticate users with

Strany 18

Public KeyPublic key authentication is one of the most secure methods of authentication, because the authentication information can be stored on aremo

Strany 19

Related ArticlesAuthentication SchemesExample - How to Install andConfigure YubiRADIUSSSL Client CertificateAuthenticationHardware Token Authenticatio

Strany 20 - Administrative Interfaces

1. 2. 3. 4. 1. 2. 3. 1. 2. 3. Related ArticlesAuthentication SchemesRegular Expressions (Reference)Example - Authentication with SMSPasscode

Strany 21 - Access Control

1. 2. 3. 4. 5. 1. 2. 1. 2. 3. 4. 5. 6. 7. 8. 1. 2. 3. and managed by the Barracuda SSL VPN. The module can be used as primary or sec

Strany 22 - Network Access Control (NAC)

1. 2. 3. 4. 5. 1. 2. 3. 4. 1. 2. 3. 4. 5. browser or operating system. After the initial setup is complete, the authentication process r

Strany 23

Barracuda SSL VPN - OverviewThe Barracuda SSL VPN is an ideal appliance for giving remote users secure access to network resources. The Barracuda SSL

Strany 24 - Authentication Schemes

1. 2. 3. 4. 1. 2. 3. 4. In this article:Pre-RequisitesReferenceInstalling the YubiRADIUS Virtual ApplianceConfiguring the YubiRADIUS Virtual A

Strany 25 - Hardware Token Authentication

4. 5. 6. 7. Apply the settings and enter the user password to confirm.Disconnect from the network and reconnect using the network icon in the top

Strany 26

7. 8. 9. Enter a valid domain name and click .Add DomainClick on the tab, then click . You may opt to set to , although it may be simpler to

Strany 27

9. 10. 11. Go back to and click . This configuration will use the YubiCloud validation servers. For this toGlobal Configuration Validation Serve

Strany 28 - Creation by Users on Login

11. 12. 13. 14. 15. Insert the resulting client ID and secret key in the and fields and click .Client ID API key SaveNavigate to the tab,

Strany 29

15. 16. The users should now be imported successfully: Now go back to the tab and click on your domain, you should now see which accounts may aut

Strany 30 - Reference

16. 17. 18. 19. 20. Click the link at the bottom of the page. Enter the username you wish to assign a key to, select the OTP box andAssign a ne

Strany 31

20. 1. 2. - Click the tab.Configuration- In the section, enter the IP address of the Barracuda SSL VPN, and set and confirm a shared secret (th

Strany 32

2. 3. a. b. c. d. e. Navigate to > and scroll to the section.ACCESS CONTROL Configuration RADIUSEnter the hostname or IP address for th

Strany 33

3. e. 4. 5. Now you can connect to the Barracuda SSL VPN via this user account. Enter the username and click . Login Insert the user's datab

Strany 34

When configuring Barracuda Network Connector on Macintosh systems, note that DNS insertion and Up/Down commands aremutually exclusive.What's new

Strany 35

5. The user should now be logged on successfully: Example - Authentication with SMS Passcode RADIUS serverYou can use SMS Passcode servers to authe

Strany 36

1. 2. 3. In this article:Step 1. Configure the RADIUS ServerStep 2. Create an Authentication SchemeStep 3. Test the SMS Passcode AuthenticationStep

Strany 37 - Configuring Barracuda SSL VPN

1. 2. a. b. c. d. e. 3. 1. 2. 3. 4. 1. 2. 3. Step 2. Create an Authentication SchemeCreate an authentication scheme that includes the S

Strany 38

3. 4. a. b. c. 1. 2. 3. 4. 5. 6. 7. 8. 1. 2. 3. 4. Go to the page.Manage System > ACCESS CONTROL > PoliciesIn the section,

Strany 39

4. 5. In the section of the window, double-click the user databases that you want to copy theCopy to User Database Edit Access Right access right

Strany 40

Path-Based Reverse ProxyHost-Based Reverse ProxyTunneled ProxyReplacement ProxyDirect URLPath-Based Reverse ProxyThe Path-Based Reverse Proxy (most co

Strany 41

generated hostname and create an explicit entry for it on your DNS server, or create a wildcard entry so that all lookups resolve to the same IPaddres

Strany 42 - How to Configure Policies

1. 2. 3. 4. a. b. c. d. 5. passes through the SSL VPN, making it possible to create custom replacement values for different remoteusers. If y

Strany 43 - Access Rights

1. 2. 3. 1. 2. 3. 4. 1. 2. 3. 4. 1. 2. 3. To configure additional options (e.g., and ) for the custom Web Forward, edit its settings.A

Strany 44 - Resources

1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 1. 2. 3. 4. Step 2. Create a Web ForwardTo create and confi

Strany 45 - Host-Based Reverse Proxy

Fix: Vulnerability - Authenticated, XSS-Not Persistent [BNSEC-1239 / BNVS-4078]Fix: Vulnerability - CSRF, HTTP Header Injection, XSS-Not Persistent [B

Strany 46

1. 2. 3. 4. 5. 6. 7. a. Network Places provide remote users with a secure web interface to access the corporate network file shares. With appr

Strany 47

7. a. b. 8. 9. 1. 2. 3. 4. 1. 2. 3. 1. 2. 3. 4. 5. 6. 7. In the field, select .Password session:passwordIn the Available Policie

Strany 48

1. 2. 3. 4. 5. 6. 7. 8. 1. 2. 3. Some tasks require the use of client-server applications. The Barracuda SSL VPN Agent on the client establ

Strany 49 - Network Places

3. 4. 1. 2. 3. 4. a. b. c. d. 5. 1. 2. 3. Select the resource categories that you want to apply to the application in the section, and

Strany 50 - Web Folders

3. 4. 5. 6. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. a. b. c. d. e. 14. a. b. 15. 1. 2. 3. 4. Double click the Exchang

Strany 51 - Applications

all the client systems that are using Outlook 2013.If required, verify that you have opened port 443 on your internal firewall for the Barracuda SSL V

Strany 52 - Next Steps

1. 2. 3. 4. 5. 6. 7. 8. 9. 1. 2. 3. 4. 1. 2. 3. 4. On your Android device, start and scroll to the section.Settings AccountsTap

Strany 53 - In this article:

1. 2. 3. 4. 5. 6. 1. 2. 3. Open the page.RESOURCES > Applications Enter a . E.g.,Name RDP RemoteAppSelect from the list.RDP - Micros

Strany 54

1. 2. 3. 4. 5. 6. 7. 8. 9. but to a Port on the 127.0.0.1 interface. The SSL VPN Agent accepts the local connection and forwards the traffic

Strany 55

1. 2. 3. 1. 2. 3. 4. 5. 6. Step 2. (Optional) Configure Advanced Tunnel SettingsYou can configure additional settings such as , or by edit

Strany 56 - Before you Begin

Direct Access DMZ DeploymentThe Barracuda SSL VPN is deployed behind the firewall. Only one port (443) has to be opened up by the firewall and forward

Strany 57

1. 2. 1. 2. 3. 4. 5. 1. 2. 3. The request is added to the section.My Remote Assistance RequestsStep 2. Launch the Remote Assistance Reques

Strany 58 - How to Create an SSL Tunnel

1. 2. 3. 4. 5. Create a Request for other UsersAs a helpdesk administrator, you can also create remote assistance requests for other users if req

Strany 59 - Remote Assistance

1. 2. 3. 4. a. b. 5. 6. Related Articles How to Create a Static Route Advanced Network ConnectorClient Configuration Using the Network Connect

Strany 60 - Providing Remote Assistance

1. 2. 3. 1. 2. 3. 4. 5. Publish a route that will apply to all clients using this Network Connector server interface.Use an in the client

Strany 61 - Network Connector

Auto-LaunchThis setting determines whether a user logging in to the BarracudaSSL VPN will automatically launch the Network Connector. This doesnot aff

Strany 62 - How to Create a Static Route

1. 2. 3. 4. Down In the Down Commands area, enter the commands that you wantthe remote system to execute when leaving the secured network.Typicall

Strany 63

1. 2. 3. 4. 1. 2. 3. 4. 1. 2. 3. Barracuda SSL VPN.Step 2. (optional) Install the Client Configuration FileTo run the Network Connector in

Strany 64 - #!/bin/bash -x

1. 2. 3. 4. 1. 2. 3. Step 2. Install the Client Configuration FileTo be able to run this client in stand-alone mode, or without requiring an ex

Strany 65

1. 2. 3. 4. 5. 1. 2. 3. 4. 5. 1. 2. 3. 1. 2. 3. 4. 5. 6. Step 2. Download Client Configuration FileDownload and save the client con

Strany 66

6. 7. 8. 1. 2. 3. a. b. c. 4. 1. 2. 3. From the Policies list, select the available policies that you want to apply to the IPsec server,

Strany 67

Hardware SpecificationsVirtual SystemsHigh Availability DeploymentLicensingHardware SpecificationsHardware Specifications of the Various Barracuda SSL

Strany 68 - How to Configure IPsec

1. 2. 3. 4. 5. 6. 7. 1. 2. 3. 4. 1. 2. 3. 4. 5. 6. 7. 8. Configure a Windows 8 RT Surface TabletConfigure a Windows Mobile DeviceRe

Strany 69

8. 9. a. b. 1. 2. 3. 4. 5. 6. 7. 8. 9. a. b. c. d. 1. 2. 1. 2. 3. 4. 5. Click and exit regedit.OKRestart Windows 8 RT:Swipe

Strany 70 - Related Article

1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 1. 2. 3. 1. 2. 3. 4. 5. 6. 7. 8. Related Article How to Configure IPsecConfigure a Windo

Strany 71 - Launch SSL VPN

8. a. b. c. d. i. ii. iii. iv. v. 9. 10. 11. 1. 2. 3. 4. 5. 6. 7. 8. 9. have to edit the Windows 8 registry to allow access to a

Strany 72

1. 2. 3. 4. 5. 6. 7. 1. 2. 3. 1. 2. 3. 1. 2. 3. 4. 5. 6. 7. 1. 2. 3. On the Barracuda SSL VPN, configure PPTP to allow your rem

Strany 73 - How to Configure PPTP

1. 2. 3. 4. 5. 6. 7. 8. 9. The Device Configuration feature allows you to provision resources and other settings configured on the Barracuda

Strany 74 - Provisioning Client Devices

PPTP SettingsCreates a VPN connection on the device using the PPTPrelevantsettings configured on the RESOURCES > page.PPTP ServeriOS / Mac OS X

Strany 75 - Windows Devices

1. 1. 2. 3. 4. 5. 6. 7. 8. illegal characters and append a numeric value if the alias already exists. You can specify these aliases on the ed

Strany 76 - Bookmark Aliases

8. 9. 10. Enter your message in the field.ContentSelect one or more Accounts, Groups or Policies to which the message will be sent.Click to sav

Strany 77 - Advanced Configuration

1. 2. 3. 1. 2. 3. 4. 1. 2. 3. 4. In this article:Step 1. Install the Server Agent ClientStep 2. Authorize Server AgentsStep 3. Create Route

Strany 78 - Server Agent

FeaturesSSL Tunneling Yes Yes Yes Yes Yes YesBarracudaNetworkConnectorYes Yes Yes Yes Yes YesIntranet WebForwardingYes Yes Yes Yes Yes YesWindowsExplo

Strany 79 - Step 3. Create Routes

The routes are now visible in the section. If you want to move a route to a different Server Agent, edit the Server Agent configuration inRoutesthe

Strany 80 - Monitoring

1. 2. 1. 2. 1. 2. Web Interface Syslog SNMP SupportRelated ArticleSNMPStatus and PerformanceThe Status page displays information about the c

Strany 81

1. 2. 1. 2. 1. 2. 3. 1. 2. 3. 4. 5. 6. 7. Click on the header of a column to sort by that column. You can also filter the list by selec

Strany 82 - Notifications

7. 8. 1. 2. 3. 4. 1. 2. 3. Select which type of user you want to receive the notification. If you select all administrator who have suffici

Strany 83

3. 4. 1. 2. 3. 4. 1. 2. 3. 4. 1. 2. 3. Password – Enter a password.Authentication Method – Select the authentication method supported by

Strany 84 - Maintenance

3. 4. 5. 6. 7. Select the backup file and click .Open After the upload has completed click .Finsh On the top of the page select the you want

Strany 85 - Update Firmware

1. 2. 3. 4. 1. 2. a. b. 3. 4. 5. 1. 2. 3. 1. 2. 3. 4. 5. This is a one-way upgrade; reverting to an earlier firmware version is not

Strany 86

5. a. b. c. If the unit is the primary unit: notNavigate to ADVANCED > Linked Management. In the section enter the IP address of the primary

Strany 87 - Limited Warranty and License

YOU MAY RETURN THE SOFTWARE OR HARDWARE CONTAINING THE SOFTWARE FOR A FULL REFUND TO YOUR PLACE OFPURCHASE.1. The software, documentation, whether on

Strany 88

1. 2. 3. License. Subject to the terms and conditions of and except as otherwise provided in this Agreement, Barracuda Networks, Inc., or a Barracu

Strany 89

1. 2. 3. 4. 1. 2. 3. 1. 2. The Barracuda SSL VPN is available as a virtual appliance. Because it is mostly used after office hours, it is sui

Strany 90

any refund of license fees paid and is responsible for paying any and all outstanding invoices. Customer's rights under this License will termina

Strany 91

License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This GeneralPubl

Strany 92

In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume ofa storage

Strany 93

will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.Each version is given a distinguishing

Strany 94

Ty Coon, President of ViceThis General Public License does not permit incorporating your program into proprietary programs. If your program is a subro

Strany 95

1. Definitions."License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of t

Strany 96

Work, provided that such additional attribution notices cannot be construed as modifying the License.You may add Your own copyright statement to Your

Komentáře k této Příručce

Žádné komentáře