Specifications
16
Configuring your Firewall to Route Incoming SSL Connections to the
Barracuda SSL VPN
There are many implementations of firewalls using software or/and hardware to enforce an access
policy. The way in which these rules are created can vary greatly. This being the case it may be
necessary to consult the documentation accompanying the firewall being used.
The appliance requires the firewall to forward all SSL encrypted traffic to it in order to function
correctly. This is achieved by adding a port forwarding rule (also known as a DNAT rule). Even
though there is great variety with firewalls there will be a number of standard values required for the
appliance to operate as expected. The following list shows some typical values required for a port
forwarding rule:
• Listening Port: This is the port that the firewall will listen for SSL traffic. By default this is
443 but can be another value.
• Target Port: This is the port that all SSL traffic will be passed onto.
• Target IP: The IP address of the appliance is required here.
Below is an example of a simple firewall interface, the required values have already been filled.
Testing Connections to the Barracuda SSL VPN
It is recommended that a test be conducted to ensure that the Barracuda SSL VPN functions as
expected. This is done by entering the URL or IP address of the appliance into a Web browser. For
example:
• https://[IP Address]:[Port]
• https://www.mycomp.com:[Port]
If the connection attempt is successful then the following dialog will be presented.