PANEL_ldapProps

PANEL_ldapProps

Configuring LDAP Integration in SonicOS Enhanced

Integrating your SonicWALL appliance with an LDAP directory service requires configuring your LDAP server for certificate management, installing the correct certificate on your SonicWALL appliance, and configuring the SonicWALL appliance to use the information from the LDAP Server. For an introduction to LDAP, see Using LDAP / Active Directory / eDirectory Authentication.

See the following sections:

Preparing Your LDAP Server for Integration

Before beginning your LDAP configuration, you should prepare your LDAP server and your SonicWALL for LDAP over TLS support. This requires:

The following procedures describe how to perform these tasks in an Active Directory environment.

Configuring the CA on the Active Directory Server

To configure the CA on the Active Directory server (skip the first five steps if Certificate Services are already installed):

  1. Navigate to Start > Settings > Control Panel > Add/Remove Programs
  2. Select Add/Remove Windows Components
  3. Select Certificate Services
  4. Select Enterprise Root CA when prompted.
  5. Enter the requested information. For information about certificates on Windows systems, see
  6. : : http://support.microsoft.com/kb/931125.

  7. Launch the Domain Security Policy application: Navigate to Start > Run and run the command: dompol.msc.
  8. Open Security Settings > Public Key Policies.
  9. Right click Automatic Certificate Request Settings.
  10. Select New > Automatic Certificate Request.
  11. Step through the wizard, and select Domain Controller from the list.

Exporting the CA Certificate from the Active Directory Server

To export the CA certificate from the AD server:

  1. Launch the Certification Authority application: Start > Run > certsrv.msc.
  2. Right click on the CA you created, and select properties.
  3. On the General tab, click the View Certificate button.
  4. On the Details tab, select Copy to File.
  5. Step through the wizard, and select the Base-64 Encoded X.509 (.cer) format.
  6. Specify a path and filename to which to save the certificate.

Importing the CA Certificate onto the SonicWALL

To import the CA certificate onto the SonicWALL:

  1. Browse to System > CA Certificates.
  2. Select Add new CA certificate. Browse to and select the certificate file you just exported.
  3. Click the Import certificate button.

Configuring the SonicWALL Appliance for LDAP

The Users > Settings page in the administrative interface provides the settings for managing your LDAP integration:

  1. In the SonicOS administrative interface, open the Users > Settings page.
  2. In the Authentication method for login drop-down list, select either LDAP or LDAP + Local Users.
  3. Click Configure.
  4. If you are connected to your SonicWALL appliance via HTTP rather than HTTPS, you will see a dialog box warning you of the sensitive nature of the information stored in directory services and offering to change your connection to HTTPS. If you have HTTPS management enabled for the interface to which you are connected (recommended), click Yes.
  5. On the Settings tab of the LDAP Configuration window, configure the following fields:
  6. If the “User tree for login to server” field is given as a dn, you can also select this option if the bind dn conforms to the first bullet above, but not to the second and/or the third bullet.

    If your network uses multiple LDAP/AD servers with referrals, then select one as the primary server (probably the one that holds the bulk of the users) and use the above settings for that server. It will then refer the SonicWALL on to the other servers for users in domains other than its own. For the SonicWALL to be able to log in to those other servers, each server must have a user configured with the same credentials (user name, password and location in the directory) as the login to the primary server. This may entail creating a special user in the directory for the SonicWALL login. Note that only read access to the directory is required.

  7. On the Schema tab, configure the following fields:
  8. Selecting any of the predefined schemas will automatically populate the fields used by that schema with their correct values. Selecting User defined will allow you to specify your own values – use this only if you have a specific or proprietary LDAP schema configuration.

  9. On the Directory tab, configure the following fields:
  10. All the above trees are normally given in URL format but can alternatively be specified as distinguished names (e.g. “myDom.com/Sales/Users” could alternatively be given as the DN “ou=Users,ou=Sales,dc=myDom,dc=com”). The latter form will be necessary if the DN does not conform to the normal formatting rules as per that example. In Active Directory the URL corresponding to the distinguished name for a tree is displayed on the Object tab in the properties of the container at the top of the tree.

    Note: AD has some built-in containers that do not conform (e.g. the DN for the top level Users container is formatted as “cn=Users,dc=…”, using ‘cn’ rather than ‘ou’) but the SonicWALL knows about and deals with these, so they can be entered in the simpler URL format.

    Ordering is not critical, but since they are searched in the given order it is most efficient to place the most commonly used trees first in each list. If referrals between multiple LDAP servers are to be used, then the trees are best ordered with those on the primary server first, and the rest in the same order that they will be referred.

    Note: When working with AD, to determine the location of a user in the directory for the ‘User tree for login to server’ field, the directory can be searched manually from the Active Directory Users and Settings control panel applet on the server, or a directory search utility such as queryad.vbs in the Windows NT/2000/XP Resource Kit can be run from any PC in the domain.

    In the Auto Configure dialog box, enter the desired domain in the Domain to search field.

    Select one of the following:

    The auto-configuration process may also locate trees that are not needed for user login. You can manually remove these entries.

    If using multiple LDAP/AD servers with referrals, this process can be repeated for each, replacing the Domain to search value accordingly and selecting Append to existing trees on each subsequent run.

  11. On the Referrals tab, configure the following fields:
  12. On the LDAP Users tab, configure the following fields:
  13. In the LDAP Import Users window, select the checkbox for each user that you want to import into the SonicWALL, and then click Save selected.

    The list of users read from the LDAP server can be quite long, and you might not want to import all of them. A Remove from list button is provided, along with several methods of selecting unwanted users.You can use these options to reduce the list to a manageable size and then select the users to import.

    Having users on the SonicWALL with the same name as existing LDAP users allows SonicWALL user privileges to be granted upon successful LDAP authentication.

    In the LDAP Import User Groups window, select the checkbox for each group that you want to import into the SonicWALL, and then click Save selected.

    Having user groups on the SonicWALL with the same name as existing LDAP/AD user groups allows SonicWALL group memberships and privileges to be granted upon successful LDAP authentication.

    Alternatively, you can manually create user groups on the LDAP/AD server with the same names as SonicWALL built-in groups (such as ‘Guest Services’, ‘Content Filtering Bypass’, ‘Limited Administrators’) and assign users to these groups in the directory. This also allows SonicWALL group memberships to be granted upon successful LDAP authentication.

    The SonicWALL appliance can retrieve group memberships efficiently in the case of Active Directory by taking advantage of its unique trait of returning a ‘memberOf’ attribute for a user.

  14. On the LDAP Relay tab, configure the following fields:
  15. The RADIUS to LDAP Relay feature is designed for use in a topology where there is a central site with an LDAP/AD server and a central SonicWALL with remote satellite sites connected into it via low-end SonicWALL security appliances that may not support LDAP. In that case the central SonicWALL can operate as a RADIUS server for the remote SonicWALLs, acting as a gateway between RADIUS and LDAP, and relaying authentication requests from them to the LDAP server.

    Additionally, for remote SonicWALLs running non-enhanced firmware, with this feature the central SonicWALL can return legacy user privilege information to them based on user group memberships learned via LDAP. This avoids what can be very complex configuration of an external RADIUS server such as IAS for those SonicWALLs.

    Note: The ‘Bypass filters’ and ‘Limited management capabilities’ privileges are returned based on membership to user groups named ‘Content Filtering Bypass’ and ‘Limited Administrators’ – these are not configurable.

  16. Select the Test tab to test the configured LDAP settings:

The Test LDAP Settings page allows for the configured LDAP settings to be tested by attempting authentication with specified user and password credentials. Any user group memberships and/or framed IP address configured on the LDAP/AD server for the user will be displayed.

Configuring L2TP to use LDAP for MacOS and iOS Connections

Some care must be taken when configuring devices running MacOS or Apple iOS (iPad/iPhone/iPod touch) for L2TP connections using either LDAP or RADIUS. This is because iOS devices accept the first supported authentication protocol that is proposed by the server. In SonicOS, the default authentication protocol order was changed in SonicOS beginning in releases 5.8.0.8 and 5.8.1.1. Here are the default authentication protocol orders:

Note: Upgrades from previous firmware versions will retain the original ordering. The new ordering is set on new installations only.

This change in default authentication protocol order, combined with the iOS behavior of accepting the first supported authentication protocol will default to SonicOS and iOS devices using RADIUS authentication (because Active Directory does not support CHAP, MS-CHAP, or MS-CHAPv2).

To force L2TP connections from iOS devices to use LDAP instead of RADIUS, follow the steps outlined below.

  1. Navigate to the VPN > L2TP Server page.
  2. Click Configure.
  3. Click on the PPP tab.
  4. Ensure that PAP is moved to the top of the list.
  5. Click OK.

Note: The order of authentication protocols can also be changed to force L2TP connections from iOS devices to use RADIUS by moving PAP to the bottom of the list.