1
2
3 Click Add.
NOTE: If a User Name or IP Address already exists, you can edit them in-line by clicking the desired column in the Authentication Agent Settings table.
4 In the Settings tab, enter the host name or IP Address of the workstation on which the SonicWALL SSO Agent is installed, in the Host Name or IP Address field.
5 In Port Number, enter the port number of the workstation on which SonicWALL SSO Agent is installed. The default port is 2258.
6 In the Shared Key field, enter the shared key that you created or generated in the SonicWALL SSO Agent. The shared key must match exactly. Re-enter the shared key in the Confirm Shared Key field.
7 In the Timeout (seconds) field, enter a number of seconds before the authentication attempt times out.
8 In the Retries field, enter the number of authentication attempts.
9 The Maximum requests to send at a time setting is available on the Advanced tab of the SSO agent configuration.
1 Click the Users tab. The User Settings page displays.
2 Click Allow only users listed locally to allow only users listed locally to be authenticated.
3 Click Simple user names in local database to use simple user names. This setting ignores the domain component of a user name. If this box is not checked, user names in the local database must match exactly the full names returned from the agent, including the domain component.
4 Check the box next to Allow limited access for non-domain users to allow limited access to users who are logged in to a computer but not into a domain. These users are not given access to the Trusted Users user group. They are identified in logs as computer-name/user-name. When completing local authentication and the Simple user names in local database option is disabled, user names must be configured in the local database using the full computer-name/user-name identification.
5 (Available for SonicOS 5.6 and higher.) Select Probe users for and select either NetAPI or WMI (depending on which is configured for the SSO Agent) to attempt browser NTLM authentication before the SonicWALL SSO agent attempts to acquire the user information.
6 To use LDAP to retrieve user information, select Use LDAP to retrieve user group information.
7 To use local configuration, select Local configuration.
8 In the Polling rate (minutes) field, enter a polling interval, in minutes, that the security appliance polls the workstation running SSO Agent to verify that users are still logged on.
9 In the Hold time after (minutes) field, enter a time, in minutes, that the security appliance waits before trying again to identify traffic after an initial failure to do so. This feature rate-limits requests to the agent.
10 (Available for SonicOS 5.6 and higher.) To populate the User names used by Windows services list, type the service login name in the dialog box (the simple name only, without the domain or PC name) add click Add. Repeat as necessary for additional user names, and then click Update.
The Enforcement tab settings are for triggering or bypassing SSO when it is used to identify users for the security services, log-in, and so on. They do not affect its use with firewall access rules that require user authentication.
2 (Available in SonicOS releases 5.6 and higher.) To bypass SSO for traffic from certain devices or locations and apply the default content filtering policy to the traffic, select the appropriate address object or address group from the first pull-down menu under SSO Bypass. To bypass SSO for certain services or types of traffic, select the service from the second pull-down menu.
1 (Available in SonicOS releases 5.6 and higher.) Click the Terminal Services tab.
2 Click Enable Terminal Services agent authentication.
3 Click Add. The page is updated to display a new row in the table at the top, and new input fields in the lower half of the page.
4 In the Host Name or IP Address(es) field, enter the name or IP address of the terminal server on which SonicWALL TSA is installed. If the terminal server is multi-homed (has multiple IP addresses) and you are identifying the host by IP address rather than DNS name, enter all the IP addresses as a comma-separated list.
5 In the Port field, enter the port number of the workstation on which SonicWALL TSA is installed. The default port is 2259. Note that agents at different IP addresses can have the same port number.
6 In the Shared Key field, enter the shared key that you created or generated in the SonicWALL TSA. The shared key must match exactly. Re-enter the shared key in the Confirm Shared Key field.
7
8
9 Allow traffic from services on the terminal server to bypass user authentication in access rules is selected by default. This allows traffic such as Windows updates or anti-virus updates that is not associated with any user login session, to pass without authentication. If you clear this check box, traffic from services can be blocked if firewall access rules require user authentication. In this case, you can add rules to allow access for “All” to the services traffic destinations, or configure the destinations as HTTP URLs that can bypass user authentication in access rules.
1
2 In the Authentication domain text-field, enter the full DNS name of the domain, or if using LDAP you can select Use the domain from the LDAP configuration to use the same domain that is entered in the LDAP configuration.
• The interface IP address
To begin the NTLM authentication process, an HTTP connection from a user’s browser is intercepted and the browser is redirected to the appliance’s own web server. Here you can configure the domain name or IP address that it is redirected to.
6 Click Forward legacy LanMan in NTLM to enable this feature.
1 Click Enable SSO by RADIUS accounting to enable this feature.
3 Click Add... under RADIUS accounts.
4
5 (optional) Enter the Shared Key, and then enter it again to confirm. If you leave these text-fields blank, the current Shared Keys of the appliances remains unchanged.
6 Click the RADIUS tab.
7 Click the User-Name attribute format drop-down menu, then select a format for the user name login. Depending on the selected attribute format, different options display in the RADIUS tab:If you select Domain\User-name, Domain/User-name, or User-name@Domain. The following options display:
• If domain component is missing—select which action is taken by clicking Assume a non-domain user or Look up the user name via LDAP.If you select other..., the following options display:
• Format—enter a scanf-style format specifier with either a “%s” or “%[...]” directive for each component.
• Add Component—add a name, domain, or Fully Qualified Distinguished Name (DN) component into the format.
• Remove Last Component—remove the last component from the format.
• Components—click the drop-down list(s) and select a component (Not used, User-name, Domain, DN).
• If domain component is missing—select which action is taken by clicking Assume a non-domain user or Look up the user name via LDAP.
8 (optional) Select Log user out if no accounting interim updates are received, then enter a value in the time text-field. You can enter a time limit between 0 and 99999.
9 Click the Forwarding tab. This gives you the option to enter up to four RADIUS accounting servers. If one or more RADIUS account servers are configured, then RADIUS accounting messages from this client will be forwarded on to them.
10 Enter the Name or IP Address, Port number, and Shared Secret for each the RADIUS accounting server you want to add. The minimum port number value is 1 and the maximum is 65535. If you leave the Shared Secret text-fields blank, the current Shared Keys of the appliances remains unchanged.
11 For each server, a Select from drop-down list is available. If requests from more that one client are to be forwarded to the same accounting server, then after is has been configured for any one client it can be selected from this drop-down list for the others. All the information for the selected accounting server, including its shared secret, is copied and instated for this client.
12 In the Timeout field and Retries field, enter the timeout period (0-999 seconds) and the number of retries (0-99).
13
14 Click OK.
1 Click the Content Filter tab if you are using the SonicWALL Content Filtering Service (CFS) and there is a proxy server in your network.
1 You can test the Transparent Authentication Configuration settings on the Policies > Diagnostics > Network page. For more information, click the Test tab.
2