Enabling SonicWall SSO affects policies on the Firewall > Access Rules page of the SonicOS management interface. Rules set under Firewall > Access Rules are checked against the user group memberships returned from a SSO LDAP query, and are applied automatically.
When a SonicWall SSO agent or TSA is configured in the SonicOS management interface, a Firewall access rule and corresponding NAT policy are created to allow the replies from the agent into the LAN. These rules use either a SonicWallSonicWall SSO Agents or SonicWall Terminal Services Agents address group object, which has a member address object for each configured agent. The member address objects are automatically added to and deleted from the group object as agents are added or deleted. The member address objects are also updated automatically as an agent’s IP address changes, including when an IP address is resolved via DNS (where an agent is given by DNS name).
If SonicWall SSO agents or TSAs are configured in different zones, the Firewall access rule and NAT policy are added to each applicable zone. The same SonicWall SSO Agents or SonicWall Terminal Services Agents address group is used in each zone.
Samba is a software package used by Linux/Unix or Mac machines to give their users access to resources in a Windows domain (via Samba’s smbclient utility) and/or to give Windows domain users access to resources on the Linux or Mac machine (via a Samba server).
•
|
To use SonicWall SSO with Linux/Mac users, the SonicWall SSO Agent must be configured to use NetAPI rather than WMI to get the user login information from the user's machine.
|
SonicWall SSO is supported by Samba 3.5 or newer.
To avoid these problems, the Don't invoke Single Sign On to Authenticate Users check box is available when configuring Firewall access rules by clicking Add on the Firewall > Access Rules page (with View Style set to All Rules). This check box is visible only when SonicWall SSO is enabled and when the Users Allowed field on the Add Rule page is not set to All. If this check box is selected, SSO will not be attempted for traffic that matches the rule, and unauthenticated HTTP connections that match it will be directed straight to the login page. Typically, the Source field would be set to an address object containing the IP addresses of Mac and Linux systems.
NOTE: Do not select the Don't invoke Single Sign On to Authenticate Users option for use with devices that are allowed to bypass the user authentication process entirely. Any devices that may be affected by an access rule when this option is enabled must be capable of logging in manually. A separate access rule should be added for such devices, with Users Allowed set to All.
|
1
|
On the Network > Address Objects page, create an Address Group containing the IP addresses to be white-listed.
|
2
|
•
|
Set the Source to the Address Group you just created.
|
•
|
3
|
4
|
5
|
Click Configure.
|
6
|
On the Enforcement tab, select the Address Group you created in the Bypass the Single Sign On process for traffic from field.
|
7
|
Click OK.
|
1
|
Change Users Allowed in the default LAN -> WAN rule to Everyone or Trusted Users. These are authenticated users.
|
2
|
3
|
Leave the default LAN -> WAN rule allowing All users, and add a rule to allow HTTP and HTTPS from addresses Any to Any with Users Allowed set to Everyone or Trusted Users.
|
Firewall access rules provide the administrator with the ability to control user access. Rules set under Firewall > Access Rules are checked against the user group memberships returned from a SSO LDAP query, and are applied automatically. Access rules are network management tools that allow you to define inbound and outbound access policy, configure user authentication, and enable remote management of the SonicWall security appliance. The SonicOS Firewall > Access Rules page provides a sortable access rule management interface.