
1.
2.
a.
b.
c.
d.
e.
3.
1.
2.
3.
4.
1.
2.
3.
Step 2. Create an Authentication Scheme
Create an authentication scheme that includes the SMS Passcode RADIUS server.
Go to the
page.
Manage System > ACCESS CONTROL > Authentication Schemes
In the
section:
Create Authentication Scheme
Enter a
for the scheme (e.g.,
).
Name
SMS Passcode RADIUS
From the
list, select
and click
. RADIUS then appears in the
list.
Available modules
RADIUS
Add
Selected modules
(Optional) If additional authentication modules are required by your security policy, add them to the
list.
Selected modules
From the
list, select the policies that you want to apply this authentication scheme to and click
. The
Available Policies
Add
policies then appear in the
list.
Selected Policies
Click
.
Add
(Optional) If you want to make the SMS Passcode authentication scheme the default, click the
link next to it in the
More
Authentication
section and then click
.
Schemes
Increase Priority
Step 3. Test the SMS Passcode Authentication
To test the SMS Passcode authentication:
If the SMS Passcode authentication scheme is not the default scheme, select it.
Enter your username.
When prompted, enter your SMS Passcode password, and then click
.
Login
After you receive the OTP via SMS, enter the OTP in the
field, and then click
.
Enter PASSCODE
Login
You are now logged into your Barracuda SSL VPN.
How to Configure Policies
Policies are lists of users and groups with optional time and date restrictions. Users can
only access a resource if their policy is attached to the resource. Every resource must
have at least one policy attached.
When users log into the Barracuda SSL VPN, they can only view resources for which
they meet the following policy criteria:
They are listed in one or more of the policies that are attached to the resource.
They are a member of a group listed in one or more of the policies that are
attached to the resource.
They are accessing the resource within the limits of the time and date
restrictions that are set in the resource policies.
Access method.
Related Articles
Create a Policy
Configure a set of access policies to meet your remote access needs.
Log into the
.
In the upper right, verify that you have selected the correct user database.