SonicWALL SonicWALL UTM Appliance manual Authentication

Page 13
13

configurable.

Step 12: Select the Test tab to test the configured LDAP settings:

The Test LDAP Settings page allows for the configured LDAP settings to be tested by attempting authentication with specified user and password credentials. Any user group memberships and/or framed IP address configured on the LDAP/AD server for the user will be displayed.

Authentication

There are two mechanisms available for having a user authenticate to the SonicWALL firewall. The first mechanism is the Single Sign-On agent (SSO). With SSO, the authentication process is transparent and seamless to the end user. All the user needs to do is login to the domain, and the SSO takes care of the rest.

The next mechanism is the Local Non-transparent Authentication. The first time the user attempts to pass HTTP traffic through the appliance, he or she will be redirected to login in to the appliance. The user’s login credentials will be tied to whichever back end mechanism was established, i.e. LDAP, AD, the local user database, etc.

Single Sign-On Agent (SSO)

For more details on how to implement and install the SSO, please refer to following white papers. Please be sure to search the Knowledge Base at Mysonicwall.com for the most up to date content.

HTTP://www.sonicwall.com/downloads/AD_auth_with_30e_and_sc10.pdf

HTTP://www.sonicwall.com/downloads/SonicOS_4.0_Single_Sign_On.pdf

HTTP://www.sonicwall.com/downloads/SonicOS_5.0_Single_Sign_On.pdf

Image 13
Contents Contents Page Integrating LDAP/Active Directory with Sonicwall UTM Configuring the CA on the Active Directory ServerImporting the CA Certificate onto the SonicWALL Configuring the SonicWALL Appliance for LdapPage Page Page Page Page Page Page Enable Radius to Ldap Relay Enables this feature Authentication Page Page Page Creating Firewall Rules with Ldap Groups/Users SonicOS Options That Leverage Groups/UsersPage Page Firewall Rules with Bandwidth Management & Logging Page Blocking Domains with Firewall Rules Blocking Websites Domain Names for Groups/UsersPage Page Navigate to Firewall Access Rules Create a rule to allow Http traffic for your allowed lists Do the same for Https Create the deny rules for Http and Https Firewall rules should now look like the below picture Blocking Https SSL Domains with SSL Control Configuring a SSL Blacklist and Whitelist Page Applying Different CFS Policies to Groups Page Creating Custom CFS Policies Navigate to the Policy tab and add a new CFS policy Page Page Page Http//$$fwinterface$$/$#SWLSTYLESCSS#$ Variables for Custom Block Page in SonicOSAdvanced Sample Code for SonicOS Basic Sample Code for SonicOSPage Page Sample Code for SonicOS 5.1 or Earlier Sample JavaScript Code for SonicOSApplying Application Firewall Polices to Groups/Users Page Page Page Page Tightening Control over the Browsing Behavior of Users Blocking IM Traffic Categorically Applying Granular IM Policies Global VPN Client GVC Applying VPN Access Policies to Groups/UsersPage SSL-VPN NetExtender Guest Services Wireless Guest Services