SonicWALL SSL VPN 5.0 manual Vasco User Authentication Process, Waiting for the Next Token Mode

Page 20

Using Two-Factor Authentication

Step 4 The RSA Authentication Manager verifies that the new PIN is an acceptable PIN. If the PIN is accepted, the user is prompted to log in with the new passcode.

Waiting for the Next Token Mode

If user authentication fails three consecutive times, the RSA server requires the user to generate and enter a new token. To complete authentication, the user is prompted to wait for the token to change and enter the next token.

VASCO User Authentication Process

The following sections describe user tasks when using RSA two-factor authentication:

“Logging into the SSL VPN Virtual Office Using VASCO Two-Factor Authentication” on page 20

“Creating a New PIN” on page 19

Logging into the SSL VPN Virtual Office Using VASCO Two-Factor Authentication

To log in to the SonicWALL SSL VPN Virtual Office using VASCO two-factor authentication, perform the following steps:

Step 1 Enter the IP address of the SSL-VPN appliance in your computers browser. The authentication window is displayed.

Step 2 Enter your username in the Username field.

20 SonicWALL SSL VPN 5.0 User Guide

Image 20
Contents SonicWALL SSL VPN User’s Guide Page Table of Contents Iv SonicWALL SSL VPN 5.0 User Guide Guide Conventions About this GuideOrganization of this Guide International Telephone Support Icons Used in this ManualNorth America Telephone Support Current Documentation Important Information You NeedSonicWALL SSL VPN 5.0 User Guide Accessing Virtual Office Resources Virtual Office OverviewBrowser Requirements Following table provides specific browser requirements Web Management Interface Overview SonicWALL SSL VPN 5.0 User Guide Node Description Certificates SonicWALL SSL VPN 5.0 User Guide Using Virtual Office Features Importing CertificatesUsing Two-Factor Authentication User Configuration TasksRSA User Authentication Process User PrerequisitesCreating a New PIN Vasco User Authentication Process Waiting for the Next Token ModeUsing One-Time Passwords Configuring One-Time Passwords for SMS-Capable Phones Using NetExtender Verifying User One-Time Password ConfigurationTroubleshooting Common Errors Prerequisites for Windows ClientsPrerequisites for Windows Mobile Clients Prerequisites for MacOS ClientsPrerequisites for Linux Clients Prerequisites for Android Smartphone ClientsWindows Platform Installation Windows Platform UsageMacOS Platform Linux PlatformAndroid Smartphone Platform Installing NetExtender Using the Mozilla Firefox BrowserWindows Mobile Platform SonicWALL SSL VPN 5.0 User Guide SonicWALL SSL VPN 5.0 User Guide Field Description Installing NetExtender Using the Internet Explorer Browser Installing NetExtender from Internet ExplorerInternet Explorer Prerequisites Click Ok in the Trusted Sites and Internet Options windowsSonicWALL SSL VPN 5.0 User Guide SonicWALL SSL VPN 5.0 User Guide Click OK in the Trusted Sites and Internet Options windows Launching NetExtender Directly from Your Computer Configuring NetExtender Properties Configuring NetExtender Connection Scripts Configuring Batch File Commands Click on Connection ScriptsConfiguring Proxy Settings Select the Enable proxy settings checkbox Configuring NetExtender Log Properties Configuring NetExtender Advanced Properties Viewing the NetExtender Log SonicWALL SSL VPN 5.0 User Guide Disconnecting NetExtender Changing PasswordsAuthentication Methods Upgrading NetExtenderSonicWALL SSL VPN 5.0 User Guide Uninstalling NetExtender Using the NetExtender Command Line InterfaceVerifying NetExtender Operation from the System Tray Displaying Route InformationServer Installing NetExtender on MacOS SonicWALL SSL VPN 5.0 User Guide Using NetExtender on MacOS SonicWALL SSL VPN 5.0 User Guide Installing and Using NetExtender on Linux Type the cd netExtenderClient command SonicWALL SSL VPN 5.0 User Guide Installing and Using NetExtender for Windows Mobile SonicWALL SSL VPN 5.0 User Guide SonicWALL SSL VPN 5.0 User Guide SonicWALL SSL VPN 5.0 User Guide Installing NetExtender on Android Smartphones Passwords in NetExtender MobileClick on the NetExtender Android link SonicWALL SSL VPN 5.0 User Guide Using NetExtender on Android Smartphones Connecting to NetExtender SonicWALL SSL VPN 5.0 User Guide SonicWALL SSL VPN 5.0 User Guide SonicWALL SSL VPN 5.0 User Guide SonicWALL SSL VPN 5.0 User Guide Exiting or Disconnecting from NetExtender ExitSonicWALL SSL VPN 5.0 User Guide Checking Status, Routes, and DNS Settings Configuring Profiles, Preferences, and Proxy Servers Profiles Export LOG Preferences / Proxy Settings Changing Your Password Related Documents Using Virtual Assist Understanding Virtual AssistInstalling and Launching Virtual Assist Configuring Virtual Assist Settings SonicWALL SSL VPN 5.0 User Guide SonicWALL SSL VPN 5.0 User Guide Selecting a Virtual Assist Mode Launching a Virtual Assist Technician Session Performing Virtual Assist Technician Tasks Inviting Customers by Email Assisting CustomersSonicWALL SSL VPN 5.0 User Guide Using the Virtual Assist Taskbar and Tab Controls Using Additional Virtual Assist Technician Commands Using the Virtual Assist File Transfer Viewing Virtual Assist Session LogUsing Virtual Assist from the Customer View SonicWALL SSL VPN 5.0 User Guide SonicWALL SSL VPN 5.0 User Guide SonicWALL SSL VPN 5.0 User Guide Ending a Virtual Assist Session Using Virtual Assist in Unattended ModeChanging the Virtual Assist Level of Control Enabling a System for Virtual Access Ending Virtual Access Mode Using the File Shares Applet Using File SharesUsing the Request Assistance Feature User Prerequisites Configuration OverviewSetting up Bookmarks Click Add Using the Java File Shares Applet 101 File Shares Applet Browser Overview 103 Configuration ExamplesConfiguring Bookmarks from Within the File Shares Applet SonicWALL SSL VPN 5.0 User Guide 105 Using Bookmarks from Within the File Shares AppletMoving Files and Folders SonicWALL SSL VPN 5.0 User Guide 107 SonicWALL SSL VPN 5.0 User Guide Launching a File Directly from the File Shares Applet 109SonicWALL SSL VPN 5.0 User Guide Using HTML-Based File Shares 111SonicWALL SSL VPN 5.0 User Guide Button Description 113Managing Bookmarks Adding Bookmarks 115SonicWALL SSL VPN 5.0 User Guide Input type=text name=’userid’ 117Configuring RDP ActiveX and Java Bookmarks Option Usage119 Determining the Remote Computer’s Full Name or IP Address Configuring Remote Desktop Access on the Remote ComputerEditing Bookmarks Using Bookmarks Using Remote Desktop BookmarksRemoving Bookmarks 121SonicWALL SSL VPN 5.0 User Guide Using VNC Bookmarks 123SonicWALL SSL VPN 5.0 User Guide Option Default Description of Options 125Using FTP Bookmarks Downloading Files 127Uploading Files Using Telnet Bookmarks 129Using SSHv1 Bookmarks Using SSHv2 Bookmarks 131Using Http and Https Bookmarks Using File Share Bookmarks Using Citrix BookmarksActiveX Citrix Bookmark 133SonicWALL SSL VPN 5.0 User Guide 135 Java Citrix Bookmark 137 Global Bookmark Single Sign-On Options Per-Bookmark Single Sign-On Options 139PASSWORD% Text Usage Variable Example UsageLimited Warranty Logging Out of the Virtual OfficeTrademarks 141SonicWALL SSL VPN 5.0 User Guide SonicWALL, Inc

SSL VPN 5.0 specifications

SonicWALL SSL VPN 5.0 is a powerful solution designed to provide secure remote access to organizations while ensuring robust security for their networks. This version builds upon previous iterations, incorporating advanced technologies and features that cater to both enterprise and small business needs.

One of the main features of SonicWALL SSL VPN 5.0 is its user-friendly web portal. The portal is accessible from any device with a web browser, allowing users to connect seamlessly to corporate resources without the need for client software installation. This flexibility is particularly beneficial for remote workers who may be using public or personal devices.

The SSL VPN 5.0 also supports multiple authentication methods, enhancing security while maintaining ease of access. It includes support for two-factor authentication (2FA), which adds an extra layer of protection during the login process. Administrators can configure various authentication schemes, including RSA SecurID, LDAP, RADIUS, and more, to meet organizational security policies.

Another notable characteristic of SonicWALL SSL VPN 5.0 is its scalable architecture. Organizations can easily expand their VPN capabilities as their workforce grows. The solution supports a large number of concurrent connections, ensuring that businesses can accommodate an increasing number of remote users without compromising performance.

SonicWALL SSL VPN 5.0 also emphasizes security features that protect both user data and the corporate network. It leverages strong encryption protocols, ensuring that all data transmitted between users and the network is secure from eavesdropping or interception. The solution employs SSL (Secure Sockets Layer) technology, which is widely recognized for its robust security measures.

In addition to security, SonicWALL SSL VPN 5.0 provides comprehensive access control options. Administrators can create policies that restrict user access based on roles or groups, making it easier to manage permissions and safeguard sensitive information. This granular control helps organizations enforce compliance with regulatory standards.

Moreover, the solution includes advanced logging and reporting capabilities that allow administrators to monitor user activity and access patterns. This insight not only aids in troubleshooting but also helps to identify potential security threats.

SonicWALL SSL VPN 5.0 stands out with its integration capabilities. It can work harmoniously with existing network infrastructures, including firewalls, to create a cohesive security strategy. By utilizing the SonicWALL global management system, IT teams can manage and monitor their VPN and other security solutions from a central location.

Combining ease of use, robust security, and comprehensive management capabilities, SonicWALL SSL VPN 5.0 is a compelling choice for organizations seeking to enable secure remote access while protecting their critical assets against emerging threats.