• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Company · Blog · Newsletter · Events · Partner Program

Downloads      Support      Security     Admin Login
Rublon

Rublon

Secure Remote Access

  • Product
    • Regulatory Compliance
    • Use Cases
    • Rublon Reviews
    • Authentication Basics
    • What is MFA?
    • Importance of MFA
    • User Experience
    • Authentication Methods
    • Rublon Authenticator
    • Remembered Devices
    • Logs
    • Single Sign-On
    • Access Policies
    • Directory Sync
  • Solutions
    • MFA for Remote Desktop
    • MFA for Remote Access Software
    • MFA for Windows Logon
    • MFA for Linux
    • MFA for Active Directory
    • MFA for LDAP
    • MFA for RADIUS
    • MFA for SAML
    • MFA for RemoteApp
    • MFA for Workgroup Accounts
    • MFA for Entra ID
  • Customers
  • Industries
    • Financial Services
    • Investment Funds
    • Retail
    • Technology
    • Healthcare
    • Legal
    • Education
    • Government
  • Pricing
  • Docs
Contact Sales Free Trial

Multi-Factor Authentication (2FA/MFA) for Barracuda Client-To-Site VPN

Multi-Factor (MFA) and Two-Factor Authentication (2FA) for Barracuda Client-To-Site VPN

March 3, 2021 By Rublon Authors

Last updated on February 6, 2025

Overview of MFA for Barracuda Client-To-Site VPN

Multi-Factor Authentication (MFA) for Barracuda Client-To-Site VPN adds an additional layer of security which requires users to provide two proofs of identity before they can gain access. First, they must enter a valid Active Directory/RADIUS username and password. Next, they must complete a secondary authentication process using an authentication method, such as Mobile Push or Email Link. Once both factors have been successfully completed, the user is granted access to the resource. Implementing Two-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) for the Barracuda Client-To-Site VPN makes it much harder for hackers to gain access to resources even if they have login credentials.

Supported Authentication Methods

Authentication Method Supported Comments
Mobile Push ✔ N/A
WebAuthn/U2F Security Key – N/A
Passcode ✔ N/A
SMS Passcode – N/A
SMS Link ✔ N/A
Phone Call ✔ N/A
QR Code – N/A
Email Link ✔ N/A
YubiKey OTP Security Key ✔ N/A

Before you start

You need to install and configure Rublon Authentication Proxy itself before configuring Barracuda to work with it. Read Rublon Authentication Proxy and follow the steps in Installation and Configuration sections. Afterward, follow the appropriate Configuration section in this document.

Ensure that you have properly set up your authentication source, that is an external Identity Provider (IdP) like FreeRADIUS.

Configuration of MFA for Barracuda Client-To-Site VPN

Note

You need to configure Active Directory in Barracuda in order for the client-to-site connection with Rublon Authentication Proxy to work.

1. Log in to Barracuda VPN interface.

2. Go to Users → External Authentication.

3. Select RADIUS. Fill in the form. Refer to the following image and table to learn more about the settings. Click Save to save the changes.

Server AddressEnter the IP of your Rublon Authentication Proxy server.
Server PortEnter the port of your Rublon Authentication Proxy server.
Server KeyEnter the Rublon Authentication Proxy server Secret.
Group AttributeKeep the default value.
Group Attribute DelimiterKeep the default value.
NAS IDIf your RADIUS server requires NAS credentials to be set, enter the NAS identifier.
NAS IP AddressIf your RADIUS server requires NAS credentials to be set, enter the NAS IP Address.
NAS IP PortIf your RADIUS server requires NAS credentials to be set, enter the NAS IP Port.
Group Information FromSet to MSAD.

4. Go to VPN → Client-To-Site VPN.

5. Navigate to the Settings section. Select RADIUS in User Authentication. Click Save to save the change.

6. Your configuration is now complete. Users have Rublon 2FA enabled when logging in to your VPN.

Log in to Barracuda using MFA for Barracuda Client-To-Site VPN

1. Run Barracuda Network Access Client.

2. Create a new profile depending on your needs, or use an already existing one.

3. Right-click your profile and select Connect.

4. Provide your username and password, and click Connect.

5. Check your mailbox for an email from Rublon. Open the email, and click Sign In.

6. You will be successfully logged in to the VPN.

Troubleshooting

Blast-RADIUS Vulnerability Protection

RADIUS integrations may enforce the validation of the Message-Authenticator RADIUS attribute as part of their mitigations for the Blast-RADIUS vulnerability.

The Rublon Authentication Proxy supports the Message-Authenticator attribute starting from version 3.5.3. The Rublon Auth Proxy uses the force_message_authenticator option in the configuration file (set to true by default) to safeguard against Blast-RADIUS attacks.

If you are experiencing issues with your RADIUS integration, ensure that the force_message_authenticator is set to true.

If you are using Rublon Authentication Proxy 3.5.2 or older, update to the newest available version.

Helper User Scheme is known to block connections to the Rublon API, so turn it off if you are experiencing connection issues.

If you encounter any issues with your Rublon integration, please contact Rublon Support.

Related Posts

Rublon Authentication Proxy

Rublon Authentication Proxy – Integrations

Filed Under: Documentation

Primary Sidebar

Contents

  • Overview of MFA for Barracuda Client-To-Site VPN
  • Supported Authentication Methods
  • Before you start
  • Configuration of MFA for Barracuda Client-To-Site VPN
  • Log in to Barracuda using MFA for Barracuda Client-To-Site VPN
  • Troubleshooting
  • Related Posts
Try Rublon for Free
Start your 30-day Rublon Trial to secure your employees using multi-factor authentication.
No Credit Card Required


Footer

Product

  • Regulatory Compliance
  • Use Cases
  • Rublon Reviews
  • Authentication Basics
  • What is MFA?
  • Importance of MFA
  • User Experience
  • Authentication Methods
  • Rublon Authenticator
  • Remembered Devices
  • Logs
  • Single Sign-On
  • Access Policies
  • Directory Sync

Solutions

  • MFA for Remote Desktop
  • MFA for Windows Logon
  • MFA for Remote Access Software
  • MFA for Linux
  • MFA for Active Directory
  • MFA for LDAP
  • MFA for RADIUS
  • MFA for SAML
  • MFA for RemoteApp
  • MFA for Workgroup Accounts
  • MFA for Entra ID

Industries

  • Financial Services
  • Investment Funds
  • Retail
  • Technology
  • Healthcare
  • Legal
  • Education
  • Government

Documentation

  • 2FA for Windows & RDP
  • 2FA for RDS
  • 2FA for RD Gateway
  • 2FA for RD Web Access
  • 2FA for SSH
  • 2FA for OpenVPN
  • 2FA for SonicWall VPN
  • 2FA for Cisco VPN
  • 2FA for Office 365

Support

  • Knowledge Base
  • FAQ
  • System Status

About

  • About Us
  • Blog
  • Events
  • Co-funded by the European Union
  • Contact Us

  • Facebook
  • GitHub
  • LinkedIn
  • Twitter
  • YouTube

© 2025 Rublon · Imprint · Legal & Privacy · Security

  • English