ACS Server (Cisco)

The ACS server, version 2.6, from Cisco does not support the configuration of vendor-specific privileges. Therefore, if a ACS Server is deployed, user privileges cannot be configured on the server.

The ACS server can still be used for authentication if the RADIUS users are configured globally on the SonicWALL to have the same privileges. Also, the ACS server supports CHAP, so it can be used if HTTPS is not available when logging into the SonicWALL management interface.

Internet Authentication Service (Windows NT/2000 Server)

The RADIUS server used on Microsoft Windows NT and Windows 2000 servers is known as the Internet Authentication Service (IAS). The RADIUS attributes are configured using policies, and does not support pre-configuration of vendor-specific attributes. The RADIUS attributes are entered manually into the service by using the following instructions:

1.Open IAS, and select Remote Access Policies.

2.Select the policy to be configured for user privileges, and right click. Select Properties from the list.

3.Click Edit Profile, and then click Advanced. Click Add.

4.Select Vendor-Specific from the list, and click Add. The Multivalued Attribute Information box appears.

5.Click Add. The Vendor-Specific Attribute Information box appears.

6.Click Enter Vendor Code, and enter 8741 as the vendor code.

7.Click Yes, It conforms, and then click Configure Attribute. The Configure VSA (RFC compliant) window appears.

8.Enter 1 as the Vendor-assigned attribute number.

9.Select Decimal as the Attribute format.

10.Enter one of the following values as the Attribute value. Each value defines a privilege for users within the policy.

1 - Remote Access

2 - Bypass Filters

3 - Access from VPN Client

4 - Access to VPNs

11.Click OK, and then OK again to return to the Multivalued Attribute Information window.

Repeat Steps 5 through 11 for each privilege configured for a policy.

For further information, refer to “To configure vendor-specific attributes for a remote access policy” in the IAS help file.

With IAS, the user database is located on the domain controller. Therefore, IAS only supports CHAP with RADIUS if the domain controller is configured to store passwords using reversible encryption for all users. If the domain controller is not configured in this manner, it is necessary to use HTTPS to log into the SonicWALL management interface.

Page 282 SonicWALL Internet Security Appliance Administrator’s Guide

Page 281
Image 281
SonicWALL Internet Security Appliances manual ACS Server Cisco, Internet Authentication Service Windows NT/2000 Server

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.