Barracuda Networks CloudGen Firewall - RSA MFA API (REST) Configuration - RSA Ready Implementation Guide
Configure RSA Authentication Manager
Perform these steps to configure RSA Authentication Manager using RSA MFA API (REST).Procedure
- Sign in to Security Console and navigate to Access > Authentication Agents.
- Add an agent host by selecting Agent Type as Standard Agent or Web Agent.
- Go to Setup > System Settings > RSA SecurID Authentication API and activate Enable Authentication API to allow the use of the REST API.
Configure Barracuda Networks CloudGen Firewall
To configure the Barracuda CloudGen Firewall with RSA Authentication, download and install Barracuda Firewall Admin.Configure the Authentication
Procedure- Start Barracuda Firewall Admin and sign in to Barracuda CloudGen Firewall.
- Click the Configuration tab and click Box > Infrastructure Services > Authentication Service.
- On the left panel, go to RSA-ACE Authentication, and click Lock to change the settings.
- In the Activate Scheme drop-down list, select Yes.
- Add RSA Authentication Manager and specify its fully qualified domain name.
- In the RSA Client ID field, enter the agent hostname of your firewall as configured in the RSA Authentication Manager under Access > Authentication Agents in the Security Console.
- In the RSA Client Key field, enter the Setup > System Settings > RSA SecurID Authentication API > Access Key value from the Security Console.
- Click Send Changes and click Activate to activate the new configuration.
- Confirm the activation.
Configure a Service
Barracuda CloudGen Firewall can host several services, such as the HTTP Proxy, SSL VPN, VPN, URL Filter, and Virus Scanner services.Procedure
- In the configuration tree, select Network.
- Add a shared IP for the firewall and its services.
Configure a VPN Service
Procedure- In the configuration tree, go to Box > Assigned Services.
- Right-click Assigned Services and click Create Service.
- Enter a Service Name.
- In the Software Module drop-down list, select VPN Service.
Configure RSA SecurID on an SSL VPN Service
Procedure- In the configuration tree, double-click Box > Assigned Services > VPN (VPN-Service) > SSL-VPN.
- In the service settings under Service Setup, click Lock, and set Enable SSL VPN to yes.
- In the Listen IPs table, add the listen IP address for the SSL VPN.
- In the Service Identification section, select the certificate type to use.
- Click Send Changes and click Activate to activate the new configuration.
- Confirm the activation.
- In the Login section, click Lock.
- In the Identity Scheme list, select RSA SecurID.
- Click Send Changes and click Activate to activate the new configuration.
- Confirm the activation.
Configure the VPN Settings
Refer to https://campus.barracuda.com/product/cloudgenfirewall/doc/98210126/client-to-site-vpn/ for the general setup guide for Client-to-Site VPN.Procedure
- In the configuration tree, double-click Box > Assigned Services > VPN (VPN-Service) > VPN Settings.
- Click Lock.
- Scroll down to the General section.
- In the Access Control Service section, enter the IP Address for the VPN service.
- In the Server Configuration section, set the required options.
- In the Default Server Certificate section, click Ex/Import > New/Edit Certificate to create a new certificate.
- Click OK.
- In Server Settings, under the Default Key section, click Ex/Import > New 2048Bit RSA Key to create a new RSA key.
- Click OK to confirm the Server Settings.
- On the VPN Settings Configuration page, click Client Networks.
- Click Lock.
- Right-click the table and select New Client Network.
- Enter the required settings and click OK.
- Click Send Changes and click Activate to activate the new configuration.
- Confirm the activation.
Configure RSA SecurID on a VPN IPsec Service
Procedure- In the configuration tree, click Box > Assigned Services > VPN (VPN-Service) > Client to Site.
- Click Lock.
- In the External CA tab, click the Click here for options link.
- In Group VPN Settings, under the X509 Client Security section, select the External Authentication check box.
- In the Server section, click Default Authentication Scheme as Authentication Scheme.
- Select rsaace as Default Authentication Scheme.
- Click OK.
- Click Send Changes and click Activate to activate the new configuration.
- Confirm the activation.
Create a VPN Group Policy
Procedure- In the External CA tab, click the Group Policy sub-tab.
- Right-click the table and select New Group Policy.
- Enter a name for the Group Policy.
- In the Network list, select the VPN client network that you created before.
- In the Network Route section, enter the network that must be reachable through the VPN connection.
- Right-click the Group Policy Condition table and select New Rule.
- In the Group Pattern field, define the group or leave it blank if no groups are used.
- Click OK to confirm the Group Policy Condition changes.
- Click OK to confirm the Group Policy changes.
- Click Send Changes and click Activate to activate the new configuration.
- Confirm the activation.
Return to Barracuda Networks CloudGen Firewall - RSA Ready Implementation Guide.
Related Articles
SilverFort - RSA MFA API (REST) Configuration - RSA Ready Implementation Guide 20Number of Views ManageEngine ADSelfService Plus - RSA MFA API (REST) - RSA Ready Implementation Guide 52Number of Views Dell PowerStore - RSA MFA API (REST) Configuration - RSA Ready Implementation Guide 22Number of Views CrowdStrike Falcon Identity Protection - Authentication Manager - RSA MFA API (REST) Configuration - RSA Ready Implementat… 22Number of Views CrowdStrike Falcon Identity Protection - Cloud Authentication Service - RSA MFA API (REST) Configuration - RSA Ready Imple… 12Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026) Deploying RSA Authenticator 6.2.2 for Windows Using DISM RSA MFA Agent 2.4 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?