Introduction to User Management

SonicWall security appliances provide a mechanism for user-level authentication, as well as a means to enforce or bypass content filtering policies for LAN users attempting to access the Internet. Only authenticated users are permitted to access VPN tunnels and send data across the encrypted connection. The SonicWall authenticates all users as soon as they attempt to access network resources in a different zone (such as WAN, VPN, WLAN, etc.), which causes the network traffic to pass through the SonicWall. Users who log into a computer on the LAN, but perform only local tasks are not authenticated by the SonicWall. User level authentication can be performed using a local user database, LDAP, RADIUS, or a combination of a local database with either LDAP or RADIUS. SonicOS also provides Single Sign-On (SSO) capability, which can be used in conjunction with LDAP. The local database on the SonicWall can support up to 1000 users. If you have more than 1000 users, you must use LDAP or RADIUS for authentication.

Protect Your Data with BDRSuite

Cost-Effective Backup Solution for VMs, Servers, Endpoints, Cloud VMs & SaaS applications. Supports On-Premise, Remote, Hybrid and Cloud Backup, including Disaster Recovery, Ransomware Defense & more!

Now we are going to see how to configure Sonicwall device with an LDAP server.

  1. Open web console for your SonicWall Appliance NSA 2650 in configuration mode
  2. web-console-for-your-SonicWall-Appliance-NSA-2650

  3. Move to manage tab and click users and select settings in the left side pane
  4. Under Authentication select LDAP + Local Users in User authentication method
  5. Now click configure LDAP button
  6. configure-LDAP

    Download Banner
  7. On the settings page provide FQDN or IP Address of the LDAP server
  8. Specify the port for the LDAP server. Default LDAP over TLS port is 636, and default LDAP port (unencrypted) is 389
  9. Leave the server timeout as default. The amount of time, in seconds, that the SonicWall will wait for a response from the LDAP server before timing out. Allowable ranges are 1 to 99999, with a default of 10 seconds. The default overall operation timeout is 5 minutes
  10. LDAP-server-before-timing-out

  11. Go to the next tab, provide login credentials and location in the tree
  12. Specify a username that has rights to log in to the LDAP directory. The login name will automatically be presented to the LDAP server in full ‘dn’ notation. This can be any account with LDAP read privileges (essentially any user account) – Domain Administrative privileges are required. Note that this is the user’s display name, not their login ID
  13. Now move to directory tab and provide a primary domain name. The user domain used by your LDAP implementation
  14. Provide User tree for login to the server, that is the location of the tree that the user specified in the settings tab
  15. Click on Auto-configure
  16. Auto-configure

  17. Select Append to Existing trees and Click Start
  18. Append-to-Existing-trees

  19. This will populate the Trees containing users and Trees containing user groups fields by scanning through the directories in search of all trees that contain user objects
  20. In Schema tab select Microsoft Active directory in LDAP Schema. Click ok and finish it
  21. Now, go to users tab in the left pane, select Local Users, and Groups
  22. Here in Local users click Import from LDAP button to retrieve the users from the LDAP server
  23. Local-users-click-Import-from-LDAP-button

  24. Now you can select the users as you wish

To test the connectivity, go to Users > Settings > Configure LDAP > Test and provide a Username and Password in the Active directory to make sure that the communication is successful.

test-the-connectivity

Result:

The LDAP configuration with SonicWall Appliance is a very simple process. We can manage the users efficiently with user groups and assign privileges to a group of people. We can also enable Mirror LDAP users locally to retrieve the user information automatically in a specified interval.

Got questions? Email us at: vembu-support@vembu.com for answers.

Follow our Twitter and Facebook feeds for new releases, updates, insightful posts and more.

Rate this post