The SonicWALL SSL VPN appliance provides secure access—including clientless access to Web
applications, access to client/server applications, and file sharing—to employees, business
partners, and customers. All traffic is encrypted using Secure Sockets Layer (SSL) to protect it from
unauthorized users.
The appliance makes applications available from a range of acce ss meth ods—in cludi ng a standard
Web browser, a Windows client, or a mobile device—on a wide range of platforms including
Windows, Macintosh, and Linux.
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 1
Aventail WorkPlace
Internal
Kiosk
users
Windows Mobile-powered devices
Business
partners
Teleworkers
Web-based
PDA
smartphone
users
File shares
applications
You might use the appliance to:
z
Create a remote access VPN that enables remote employees to securely access private company
applications such as email over the Internet.
z
Create a business partner VPN that provides designated suppliers with access to an internal
supply chain application over the Internet.
users
Wireless
LANs
IT-managed
devices
Thin client/server
applications
Windows
servers
Windows
desktops
Branch office
applications
Traditional client/
server applications
Page 12
2 | Chapter 1 - Introduction
The appliance’s granular access control lets you define policy and control access down to the user
and resource level. Managing policy and configuring the appliance is quick and easy with the Webbased management console.
For an overview of planning your SonicWALL SSL VPN appliance configuration and deployment, see
the Getting Started Guide.
Features of Your SonicWALL Aventail Appliance
This section highlights the key components provided with your appliance.
SonicWALL Aventail E-Class SRA Appliance Models
SonicWALL offers the following SSL VPN appliance models, all of which are documented in this
manual. Most of them can be clustered: a cluster of two appliances with internal load balancing is
intended for high availability (it provides system redundancy in case one of the nodes fails), and
clusters of up to eight can be used to increase capacity:
z
SonicWALL Aventail SRA E-Class EX7000 and EX-2500: Supports up to 2,000 concurrent
users, and provides for clustering two identical appliances behind one virtual IP address with
internal load balancing, or up to eight appliances using an external load balancer.
z
SonicWALL Aventail SRA E-Class EX6000 and EX-1600: Supports up to 250 concurrent
users and provides for clustering two identical appliances behind one virtual IP address with
internal load balancing, or up to eight appliances using an external load balancer.
z
SonicWALL Aventail SRA E-Class EX-750: Supports up to 50 concurrent users.
Administrator Components
These are the key components for managing the SonicWALL appliance and services:
z
Aventail Management Console (AMC) is a Web-based administrative tool used to manage
the appliance. It provides centralized access for managing security policies, configuring the
system (including networking and certificate configuration), and monitoring. AMC is accessible
from a Web browser.
z
The Web proxy service provides users with secure access to Web-based applications, Web
servers, and network file servers from a W eb brow ser. The Web proxy service is a secure HT TP
reverse proxy that brokers and encrypts access to Web-based resources. It also manages
TCP/IP connections for the Connect Mobile client.
z
The network tunnel service is a network routing technology that provides secure network
tunnel access to a wide range of applications, including those that use non-TCP protocols such
as Voice Over IP (VoIP) and ICMP, reverse-connection protocols, and bi-directional protocols
Page 13
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 3
such as FTP. It works in conjunction with the Connect Tunnel client and t he OnD em and Tunnel
agent to provide authenticated and encrypted access. The network tunnel service can traverse
firewalls, NAT devices, and other proxy servers that can interfere with traditional VPN devices.
User Access Components
The appliance includes several components that provide users with access to resources on your
network.
Aventail WorkPlace
The WorkPlace portal provides users with quick access to resources on your network. It is accessible
from any Web browser that supports SSL and has Jav aScript enabled. WorkPlace provides a range
of access methods for you to choose from:
z
Basic Web (HTTP) resources are accessible using the Web translation engine, a reverse proxy
that provides single sign-on and fine-grained access control.
z
Web resources are also ac cessible through custom port mapped and custom FQDN mapped Web
access. This type of proxy handles Web programming technologies such as AJAX without the
limitations of URL rewriting used in translation.
z
File system resources are accessible from the Web-based Network Explorer that is integrated
in WorkPlace.
z
Client/server traffic (TCP/IP) is accessible using one of the network redirection clients,
OnDemand Tunnel. The client is automatically provisioned or activated when the user logs in to
WorkPlace.
Page 14
4 | Chapter 1 - Introduction
The access method you choose will be based on several factors, including the network protocols
used by your applications, your security requirements, end-user convenience, and the target
platforms. Here’s what your company’s WorkPlace portal might look like:
Connect and OnDemand Tunnel clients
T unnel clients provide network -level access to all resources, effectively making each user device a
virtual node on your network.
z
The Connect Tunnel client provides full network and application access from a Web-deployed
Windows client for computers running a Windows 7, Windows Vista, Windows XP, Macintosh, or
Linux operating system. The cl ient can be provisioned either transparently using a link from the
WorkPlace portal or through an executable installation package. The Connect Tunnel client
provides split-tunneling control, granular access controls, and automatic proxy detection and
authentication.
z
The OnDemand Tunnel agent provides the same features as the Connect T unnel, except that it
can’t be used as a dial-up adapter for domain logins, and is integrated into WorkPlace.
OnDemand can operate in either split-tunnel mode or redirect all traffic mode.
Connect Mobile client
Connect Mobile provides remote TCP/IP access to Windows Mobile-powered devices. The Connect
Mobile client is installed by a stand-alone installer package, and is managed by the Web proxy
service.
End Point Control (EPC)
EPC components ensure that your network is not compromised when a ccessed from PCs in
untrusted environments by enabling you to “interrogate” devices and determine whether they are
running the programs that you require. Advanced EPC simplifies granular end point protection by
allowing you to set up device profiles (for clients running on Microsoft Windows) using a
comprehensive predefined checklist that includes security solutions from leading vendors like
OPSWAT, McAfee, Computer Associates, Sophos, and Kaspersky. Advanced EPC is included wi th the
EX7000 and EX-2500 appliances and licensed separately for the other appliances in the EX-series.
Page 15
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 5
Note
z
Prior to version 10 of the SonicWALL Aventail E-Class SRA EX-Series firmware, there was an
OnDemand proxy agent that provided access to resources protected by the Web proxy service.
This agent and its settings are still available to you if you are upgrading from a previous version
of the firmware; new customers will not ha ve this agent and will use OnDemand Tunnel instead.
What’s New in This Release
Version 10.5 of the Sonic W ALL E- Class Secure Remote Access software incl udes the fo llowing ne w
and enhanced features:
z
Firefox 3.5 Support—Full support for Mozilla Firefox 3.5.
z
Internet Explorer 8 Support—Full support for Microsoft Internet Explorer 8.
z
Safari 4.0 Support—Full support for Apple Safari 4.0.
z
Mac OS X Snow Leopard Support—Full support for Mac OS X Snow Leopard (10.6).
z
Windows 7 Support—Full support for Microsoft Windows 7.
z
Vista SP2 Support—Full support for Microsoft Vista SP2.
z
Vista 64-bit Support—Full support for Microsoft Vista 64-bit.
z
Virtual Assist Remote Helpdesk Support—Allows remote helpdesk technicians to see and
configure user’s desktops. SonicWALL Virtual Assist is a remote support tool that enables an
administrator or help desk technician to assume control of a user’s PC or laptop in order to
provide remote technical assistance. With the user’s permission, the technician gains instant
access to the computer using a Web browser and can then diagnose and fix a problem remotely .
See “Virtual Assist” on page 369 for more information.
z
Tunnel URL Filtering for Web Policy and SSO Tunnel Support—Enforces the URL-based
rules that administrators define for ExtraW eb within VPN tunnel sessions. This feature not only
provides more effective security, but also leverages single sign-on logic for Web applications.
See “Configuring Web Resource Filtering” on page 355
z
OPSWAT Cache Cleaner—Provides VPN administrators with an end-point data protection tool
to ensure data downloaded or accessed during a session is functionally wiped from the user ’s
system. This feature remove s Web browser information, such as cookies, browsing history, and
stored passwords upon termination of the session. The OPSWAT Cache Cleaner is supported on
Windows and Mac platforms.
z
OPSWAT Secure Desktop Emulator—Provides VPN administrators with an additional endpoint data protection tool that prevents end users from copying or moving data from an endpoint system to other locations that hav e not been qualified for security clear ance. When a client
device is classified into a zone that requires the desktop emulator, the emulator will
automatically deploy for the user. The secure desktop emulator is available for Windows
platforms.
See “How OPSWAT Secure Desktop Emulator Works” on page 314 and “Zones and Device
Profiles” on page 257.
z
Apple iPhone and Symbian Support with ActiveSync for Exchange—Extends SonicWALL ’s
clientless ActiveSync support for Exchange email to Apple iPhones, iPads, Google Android
mobile operating system, and devices running the popular Symbian operating system. Symbian
runs on many Nokia and Samsung devices that are popular choices for corporate mail. This
feature also leverages the device’s ID capability to link the device to a single user, providing a
first layer of end-point control.
See “End Point ControlIntegration with Third-Party Components” on page 12 for support
information, “Exchange ActiveSync Web Access” on page 324 for general information, and
“Example: Supporting Exchange on iPhones” on page 126 for an example configuration.
z
Password Management for Sun and Novell Directory Servers—Provides support to Novell
and Sun LDAP servers for improved password management. This new feature calls upon the
Policy server to probe and predetermine the directory server and the applicable version. End
users will be able to enter LDAP credentials and be notified through the appliance when their
password needs to be changed due to expiration or backend policies, and will then allow users
to change the password.
Page 16
6 | Chapter 1 - Introduction
z
Extension Configurations in Management UI—A new page has been added to the
Maintenance section of the AMC management interface to allow simple configurations to be
completed for extensions. This new feature assists administrators in making configuration
adjustments that appear in maintenance releases or hotfixe s, an d allows for the configura ti on
of arbitrary key-value pairs.
z
Zero-client Web Access Capabilities Extended—Custom port mapped and custom FQDN
mapped Web access support for modern Web applications such as AJAX without installation of
a client agent.
See “Web Access” on page 323 for more information.
z
Persistent Desktop Device Identity—Limits the set of devices that any giv en user ma y use
to access protected resources.
See “Collecting Equipment IDs from Unregistered Devices” on page 277 for more information.
z
UDP Tunnel Mode—Use of Encapsulating Security Payload (ESP) improves the performance of
UDP streaming applications like VoIP.
See “UDP Tunnel Mode” on page 172 for more information.
z
FIPS Certification—EX-Series 6000 and 7000 appliances are being certified as FIPScompliant.
See “FIPS Certification” on page 240 for more information.
z
Control Session Termination for Tunnel Clients—Improves security and license usage by
providing an option to terminate OnDemand Tunnel or Connect Tunnel sessions when the
credentials for the community expire.
See “Session Termination” on page 174.
z
Intermediate CA Support—Certificate authority management is now more flexible with
support for wildcard server and client certificate s signed by intermediate certificate authorities.
z
Option to Disable Authorization Checks—Prevents authorization check errors by providing
an option not to query directory servers for group information. Typically used for secondary
authentication servers, this option can also increase the speed of the authentication process for
users.
See “Disabling Authorization Checks” on page 83 for more information.
z
Enforce Single User Name in Chained Authentication—Improves security. The
administrator has the option of requiring that the same user identifier is used for each step of
chained authentication.
See “Configuring Chained Authentication” on page 109 for more information.
z
Enhance Terminal Services and Citrix Shortcut Configuration Options—New Web client
options for administrator include the ability to choose whether to allow copy and paste, user
screen size control, and other options during shortcut creation. A new check box for terminal
services shortcuts allows the option of automatically reconnecting when the session is
interrupted. Workplace users can control screen resolution when accessing shortcuts.
See “Adding Graphical Terminal Shortcuts to Individual Hosts” on page 362 for more
information.
z
AMC Navigation Improvements for Resources and Rules—Filtering drop boxes have been
added on a number of AMC pages to provide for more efficient searching.
See “Filters” on page 40 for more information.
z
Simplified OPSWAT Configuration in AMC—A new Any product from this vendor check
box is available for antivirus, antispyware, and personal firewall program vendors in Windows
device profiles during End Point Control configuration. Selecting this option allows the
administrator to create a pro file that do es n ot requ ire updat ing e ver ytime the v e ndor rele ases
a new version. When this option is selected, the administrator can still specify additional
criteria, such as signatures updated, file system scanned, and real-time protection enabled, as
long as all the versions of all the products in the list support that functionality.
See “Advanced EPC: Extended Lists of Security Programs” on page 272 for configuration
information.
z
Deployment of EPC Using Browser on Windows Mobile—End Point Control can be
performed on mobile devices without requiring Connect Mobile installation. The device must be
running Windows Mobile 6.5 or 6.1 with the corresponding version of Pocket Internet Explorer.
No configuration or separate device profile is necessary in the AMC. When logging into a
community that requires EPC, the user is prompted to install or upgrade the Aventail
Interrogator client. Interrogator communicates the EPC classification of the device to the
appliance.
Page 17
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 7
z
Suspend and Resume a Spike License—Instead of having a fixed ex piration date once it is
activated, a Spike License can now be suspended and later resumed. Once it is activated, you
will see the total number of allowed users, the activation date, and the number of days
remaining on the license. A Spike License enables you to temporarily increase the number of
remote users you can support.
See “Managing a Spike License” on page 248 for more information.
System Requirements
This section describes the system requirements for the administrator (server) and client
components for the SonicWALL SSL VPN.
Server Components
The system requirements for the administ rator components and authen tication servers are listed in
the following tables.
System Administration
Operating systemBrowser
Aventail Management Console (AMC)
z
Windows Vista SP2
z
Windows Vista x64
z
Windows XP Professional SP3
z
Linux kernel 2.4.20 or later
z
Internet Explorer 8.0
z
Internet Explorer 7.0
z
Mozilla Firefox 3.0
z
Mozilla Firefox 3.0
Page 18
8 | Chapter 1 - Introduction
Authentication Servers
Operating system/VersionNotes
Active Directory
Windows Server platform:
z
Windows 2008 Server
z
Windows 2003 Server
LDAP servers
z
LDAP version 3 compatible servers
z
IBM Directory Server, versions 5 and 6
RADIUS
z
Version 5.2
RSA
z
RSA Authentication Manager, version 7.1
z
RSA Authentication Manager, version 6.1
Single sign-on
z
RSA ClearTrust, version 4.6
z
General support, including password change
z
No LDAP password change support
z
LDAP password change supported on IDS
z
Supports IP address assignment
Citrix Server Farms
ServersNotes
z
Citrix XenApp 5.0
z
Citrix XenApp 4.5
z
Citrix Presentation Server 4
z
EOL has been announced for Citrix MetaFrame XP and
Citrix MetaFrame 1.8
Compatible Server Components
Server platforms, browsers, and third-party applications that are compatible with the appliance are
shown in the following table. There are no kno w n issues with compatible configurations, and we
continue to offer technical support for them, but they have not been specifically tested in the
current release and future product changes will not take them into account.
The following platforms and browsers remain compatible with this release, but will be deprecated
in a future release:
Operating SystemsAuthentication and Citrix Servers
z
Windows XP Professional SP2
z
Windows Vista (32-bit/64-bit) No
Service Pack
z
Windows Vista (32-bit/64-bit)
SP1
z
Windows 2000 Server
z
Active Directory on Windows 2000 Server
z
RADIUS v5.0
z
RSA Authentication Manager v5.2
z
Citrix MetaFrame XP
Citrix XML service must be running on the
MetaFrame server.
z
Citrix MetaFrame v1.8
MetaFrame 1.8 must have a license for Service Pack
2 and Feature Release 1 (SP2/FR1)
Page 19
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 9
Client Components
The system requirements for client components are listed in the following tables:
z
“Tunnel Clients” on page 10
z
“Web-Based Clients” on page 10
z
“Proxy Clients” on page 12
z
“Virtual Assist Clients” on page 11
z
“End Point ControlIntegration with Third-Party Components” on page 12
z
“End Point ControlIntegration with Third-Party Components” on page 12
z
“Compatible Client Components” on page 14
Page 20
10 | Chapter 1 - Introduction
Tunnel Clients
Operating systemBrowserNotes
Connect Tunnel Client
z
Windows 7 (32-bit/64-bit)
z
Windows Vista SP2
(32-bit/64-bit)
z
Windows XP Pro, SP3
Windows Server platform:
z
Windows 2003 Server
z
Mac OS X 10.6
(32-bit/64-bit)
z
Mac OS X 10.5
z
Linux kernel 2.4.20 or later
(32-bit)
z
Linux kernel 2.6.0 or later
(64-bit)
Connect Tunnel Service
Windows Server platform:
z
Windows Server 2008 SP1
(32-bit/64-bit)
z
Windows Server 2003 SP2
OnDemand Tunnel Agent
z
Windows 7 (32-bit/64-bit)
z
Windows Vista SP2
(32-bit/64-bit)
z
Windows XP Pro, SP3
z
Mac OS X 10.6
z
Mac OS X 10.5
z
Linux kernel 2.4.20 or later
z
Linux kernel 2.6.0 or later
(64-bit)
z
n/a
z
n/a
z
Mozilla Firefox 3.5
z
n/a
z
Internet Explorer 8.0
(32-bit only)
z
Internet Explorer 7.0
(32-bit only)
z
Mozilla Firefox 3.5
z
Safari 4.0
z
Safari 3.0
z
Mozilla Firefox 3.5
z
ActiveX, or JRE 1.6.0
update 14 or later is
required
z
Administrator rights
required for installation
z
Administrator rights
required for installation
z
Administrator rights
required for installation
z
Browser required only for
proxy detection
z
No support for End Point
Control
z
ActiveX, or JRE 1.6.0
update 14 or later is
required
z
Administrator rights
required for installation
z
JRE 1.6.0 update 14 or
later
z
Administrator rights
required for installation
z
JRE 1.6.0 update 14 or
later
z
Administrator rights
required for installation
Web-Based Clients
Operating systemBrowser
WorkPlace Portal, Translated/Custom Port Mapped/Custom FQDN Mapped Web access
z
Windows 7 (32-bit/64-bit)
z
Windows Vista SP2
(32-bit/64-bit)
z
Windows XP Pro, SP3
z
Mac OS X 10.6
z
Mac OS X 10.5
z
Internet Explorer 8.0
(32-bit only)
z
Internet Explorer 7.0
(32-bit only)
z
Mozilla Firefox 3.5
z
Safari 4.0
z
Safari 3.0
Page 21
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 11
Operating systemBrowser
z
Linux kernel 2.4.20 or later
z
Web-enabled mobile devices
z
Mozilla Firefox 3.5
z
The browser appropriate for your device
The following table shows W eb-based applications that are supported and tested for different types
of custom access:
Custom Access TypeSupported and Tested Web Applications
z
Translation
z
Custom Port Mapped
z
Custom FQDN Mapped
z
Outlook Web Access 2003
z
Outlook Web Access 2007
z
Sharepoint 2003
z
Sharepoint 2007
z
Outlook Web Access 2003
z
Outlook Web Access 2007
z
Sharepoint 2003
z
Sharepoint 2007
z
Domino Web Access 8.0
z
Domino Web Access 8.5.x
Virtual Assist Clients
Operating systemBrowserNotes
Customer Application
z
Windows 7 (32-bit/64-bit)
z
Windows Vista SP2
(32-bit/64-bit)
z
Windows XP Pro, SP3
z
Mac OS X 10.6 (32-bit/64-bit)
z
Mac OS X 10.5
z
Internet Explorer 8.0
(32-bit only)
z
Internet Explorer 7.0
(32-bit only)
z
Mozilla Firefox 3.5
z
Safari 4.0
z
Safari 3.0
z
ActiveX, or JRE 1.6.0
update 14 or later is
required
z
JRE 1.6.0 update 14 or
later
Technician Application
z
Windows 7 (32-bit/64-bit)
z
Windows Vista SP2
z
Standalone application
(32-bit/64-bit)
z
Windows XP Pro, SP3
Page 22
12 | Chapter 1 - Introduction
Proxy Clients
Operating systemBrowserNotes
OnDemand Proxy Agent
z
Windows 7 (32-bit/64-bit)
z
Windows Vista SP2
(32-bit/64-bit)
z
Windows XP Pro, SP3
z
Mac OS X 10.6
(32-bit/64-bit)
z
Mac OS X 10.5
z
Linux kernel 2.4.20 or later
z
Linux kernel 2.6.0 or later
(64-bit)
Web Proxy Agent
z
Windows 7 (32-bit/64-bit)
z
Windows Vista SP2
(32-bit/64-bit)
z
Windows XP Pro, SP3
Connect Mobile Client
z
Windows Mobile 6.5
z
Windows Mobile 6.1
z
Internet Explorer 8.0
(32-bit only)
z
Internet Explorer 7.0
(32-bit only)
z
Mozilla Firefox 3.5
z
Safari 4.0
z
Safari 3.0
z
Mozilla Firefox 3.5
z
Internet Explorer 8.0
(32-bit only)
z
Internet Explorer 7.0
(32-bit only)
z
n/a
z
ActiveX, or JRE 1.6.0
update 14 or later is
required
z
Port-mapped mode
requires ActiveX or Java;
for users who can’t run
ActiveX, JRE is used.
z
64-bit support on Windows
7 and Windows Vista is
only supported for
OnDemand Mapped Mode
z
JRE 1.6.0 update 14 or
later
z
JRE 1.6.0 update 14 or
later
z
ActiveX, or JRE 1.6.0
update 14 or later is
required
z
Includes Mobile2Market
certification
z
Supports Pocket PC
devices and smartphones
z
Does not support some
legacy devices, such as
Audiovox SMT5600,
Motorola MPx200 and
MPx220, Sierra Wireless
Voq, Samsung i600, iMate
SP2, and so on.
End Point ControlIntegration with Third-Party Components
Operating systemBrowserNotes
Interrogator and Installer
z
Windows 7 (32-bit/64-bit)
z
Windows Vista SP2
(32-bit/64-bit)
z
Windows XP Pro, SP3
z
Internet Explorer 8.0
(32-bit only)
z
Internet Explorer 7.0
(32-bit only)
z
Mozilla Firefox 3.5
z
ActiveX, or JRE 1.6.0
update 14 or later is
required
Page 23
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 13
Operating systemBrowserNotes
z
Windows Mobile 6.5
z
Windows Mobile 6.1
z
Pocket Internet Explorer
6.1
z
Pocket Internet Explorer
6.0
z
Interrogator only; both
Windows Mobile
Workplace (with Pocket
IE) and Connect Mobile
are supported, and can
coexist on the device
z
Windows Mobile 2003
z
n/a
z
Interrogator only;
Connect Mobile is
required
z
Mac OS X 10.6 (32-bit/64bit)
z
Mac OS X 10.5
z
Linux kernel 2.4.20 or later
z
Linux kernel 2.6.0 or later
z
Safari 4.0
z
Safari 3.0
z
Mozilla Firefox 3.5
z
JRE 1.6.0 update 14 or
later
z
JRE 1.6.0 update 14 or
later
(64-bit)
Cache Cleaner
z
Windows 7 SP1
(32-bit/64-bit)
z
Windows 7
z
Internet Explorer 8.0
z
Internet Explorer 7.0
z
Mozilla Firefox 3.5.x
(32-bit/64-bit)
z
Windows Vista SP2
(32-bit/64-bit)
z
Windows XP SP3
(32-bit)
z
Mac OS X 10.6.x
z
Mac OS X 10.5.x
z
Safari 5.0
z
Safari 4.0
Advanced EPC / Secure Desktop Emulator
z
Windows 7 SP1
(32-bit/64-bit)
z
Windows 7
z
Internet Explorer 8.0
z
Internet Explorer 7.0
z
Mozilla Firefox 3.5.x
(32-bit/64-bit)
z
Windows Vista SP2
(32-bit/64-bit)
z
Windows XP SP3
(32-bit)
ActiveSync
SonicWALL supports clientless ActiveSync support for Exchange email to Apple iPhones, iPads,
Google Android mobile operating system, and devices running the popular Symbian operating
system. Symbian runs on many Nokia and Samsung devices that are popular choices for corporate
mail. ActiveSync support also l everages the device’ s ID capability to link the device to a single user,
providing a first layer of end-point control.
ActiveSync - Certified With ActiveSync - Compatible With Mobile Operating System
z
Apple iPhoneGoogle Android 2.x
SymbianApple iPad (with valid
certificates)
Windows Mobile 6.5
z
Windows Mobile 6.1
Page 24
14 | Chapter 1 - Introduction
Terminal Services and Citrix
The SonicWALL appliance integrates with several popular security programs. In some cases, the
files necessary for integration are already on the appliance, and in other cases they must be copied
to the appliance.
DescriptionNotes
Windows Terminal Services agent
Windows (ActiveX control)
Cross-platform (Java applet)
Citrix agent
Windows (ActiveX control)
Cross-platform (Java applet)
z
Version 6.0
z
Version 5.2
z
Version 8.6
z
Requires JRE 1.5 or later
z
Versions 9.x and 10.x. Version 11 is also
supported, but only if the agent is
downloaded separately and installed using
Microsoft Windows Installer (MSI).
z
Version 9.x and l ater
z
Requires JRE 1.5 or later
Compatible Client Components
Client platforms, browsers, and Java versions that are compatible with the appliance are shown in
the following table. There are no known issues with compatible components, and we continue to
offer technical support for them, but they have not been specifically tested in the current release
and future product changes will not take them into account.
The following platforms and browsers remain compatible with this release, but will be deprecated
in a future release:
Operating SystemsBrowsersJava Versions
z
Windows XP Professional SP2
z
Windows Vista (32-bit/64-bit)
No Service Pack
z
Windows Vista (32-bit/64-bit)
SP1
z
Windows 2000 Server, SP4
z
Mac OS X 10.4
z
Windows Mobile 6.0
z
Windows Mobile 5.0
The following browsers are deprecated in this release:
Browsers
z
Internet Explorer 6.0
z
Firefox 2.0 (Windows)
z
Firefox 2.0 (Linux)
z
Firefox 3.0 (Windows)
z
Firefox 3.0 (Linux)
z
Safari 2.0
z
JRE 1.6.0 updates previous
to 14
z
JRE 1.5.0
Page 25
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 15
About the Docu m en ta tio n
This document contains detailed informat ion about installing, configuring, and maintaining the
appliance. Its contents are also available as context-sensitive Help from AMC; see “Getting Help”
on page 45 for more information.
Your SonicW ALL appliance also comes with a printed Getting Starte d Guide that explains important
VPN concepts and components and will aid in planning to deploy your VPN. For access to electronic
copies of all of the product documentation, log in to your mySonicWALL.com account and register
your appliance. See “Registering Your SonicWALL E-Class SRA Appliance” on page 247 for more
information.
Document Conventions
Throughout this document, “external” refers to the network interface connected to the Internet.
“Internal” refers to the network interface connected to your internal corporate network. This
document uses the following typographical conventions:
Typographical convention Usage
BoldUser interface components (such as text boxes or buttons on a
Monospace fontInformation you are supposed to type.
ItalicFile names and directories, examples, and selections from drop-
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 17
Internal
interface
External
interface
SonicWALL Aventail Appliance
Firewall
Internet
Firewall
Corporate network
File
Server
Application
Server
Web
Server
Chapter 2
Installation and Initial Setup
This section shows where the appliance fits into your network environment, provides installatio n
and cabling instructions, and explains how to use the Web-based Setup Wizard (or alternatively use
the command-line Setup Tool) to perform basic network configuration.
Network Architecture
All of the SonicWALL appliances can be set up in either a dual interface or single interface
configuration, both of which are discussed in this section.
z
The EX7000, EX6000, EX-2500, and EX-1600 appliances include three physical network
interfaces and can be set up in a cluster for high availability (see “Installing and Configuring a
Cluster” on page 390 for more information), or one that uses an external load balancer (see
“Configuring a High-Capacity Cluster” on page 453).
z
The EX-750 appliance includes two physical network interfaces.
Dual-homed configuration (internal and external interfaces)
One network interface is used for external traffic (that is, to and from the Internet), and the other
interface is used for internal traffic (to and from your corporate network).
A single network interface is used for both internal and external traffic. In this configuration, the
appliance is usually installed in the demili tarized zone (or DMZ, also known as a perimeter network).
Internet
Firewall
DMZ
Internal interface
Firewall
SonicWALL Aventail Appliance
Corporate network
File
Server
Application
Server
Web
Server
In both configurations, incoming requests to the SonicWALL services—including HTTP/S traffic for
the Web proxy service—are sent over port 80 (HTTP) and port 443 (HTTPS). Traffic from the
OnDemand agent is always sent over port 443. Because most networks are configured to enable
traffic over these ports, you shouldn’t need to reconfigure firewalls on your network.
You should install the appliance in a location where it can connect to resources on your network,
including:
z
Application servers and file servers, including Web servers, client/server applications, and
Windows file servers.
z
External authentication repositories (such as an LDAP, Microsoft Active Directory, or RADIUS
server).
z
One or more Domain Name System (DNS) servers.
z
Optionally, a Windows Internet Name Service (WINS) server. This is required for browsing
Windows networks using WorkPlace.
CAUTION The SonicWALL appliance does not provide full firewall capabilities and should be
!
secured behind a firewall. Running without a firewall makes the appliance vulnerable to
attacks that can compromise security and degrade performance.
Although not required, enabling the appliance to communicate with these additional resources
provides greater functionality and ease of use:
z
Network Time Protocol (NTP) server for synchronizing the time on the appliance.
z
External server for storing syslog output.
z
Administrator’s workstation for secure shell (SSH) access.
You can configure the appliance to use a self-signed server certificate, or, for enhanced security,
you can obtain a certificate from a commercial certificate authority (CA). For more information, see
“Obtaining a Certificate from a Commercial CA” on page 68.
Preparing for the Installation
Before beginning the installation, you need to gather information about your networking
environment and verify that your firewalls are properly configured to permit traffic to and from the
appliance.
Page 29
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 19
Gathering Information
Before configuring the appliance, you need to gather the following information. You are prompted
for some of this information when running Setup Wizard (see “Web-Based Configuration Using
Setup Wizard” on page 32) or Setup Tool (see “Configuring a New Appliance Using Setup Tool” on
page 400), but most of it will be used when you configure the appliance in AMC (see “Network and
Authentication Configuration” on page 55).
If you are installing a cluster , you need some additional information. See “Installing and Configuring
a Cluster” on page 390 and “Configuring a High-Capacity Cluster” on page 453.
Settings required in order to start Aventail Management Console
z
The root password for administering the appliance
z
The name for the appliance (becaus e this n ame is used only in log files, you don’t need to add
it to DNS)
z
The internal IP address and, optionally, an external IP address
z
Select a routing mode and supply IP addresses for the network gateways to the Internet, and
your corporate network.
Certificate information
Several pieces of information are used to ge ne rate the server and AMC certificates:
z
A fully qualified domain name (FQDN) for the appliance and for any W orkPlace sites that use a
unique name. These names should be added to your public DNS; they are also visible to users
when they connect to Web-based resources.
z
A FQDN for the Aventail Management Console (AMC) server. The AMC server name is used to
access AMC, which is a Web-based tool for administering the appliance.
Name lookup information
z
Internal DNS domain name of the network to which the appliance is connected
z
Primary internal DNS server address (additional DNS servers are optional)
z
IP address for an internal WINS server and the name of your Windows domain (required to
browse files on a Windows network using WorkPlace, but are otherwise optional)
Authentication information
z
Server name and login information for your authentication servers (LDAP, Active Directory, or
RADIUS)
Virtual Address pool information
z
If you are planning to deploy either network tunnel client (Connect Tunnel or OnDemand
Tunnel), you must allocate IP addresses for on e or more address pools. F or m ore i nformation ,
see “Configuring IP Address Pools” on page 349.
Optional configuration information
z
To enable SSH access from a remote machine, you need to know the remote host’s IP address.
z
To synchronize with an NTP server, you need to know the IP addresses for one or more NTP
servers.
z
To send data to a syslog server, you need to know the IP address and port number for one or
more syslog servers.
Verifying Your Firewall Policies
For the appliance to function correctly, you must open ports on your external (Internet-facing) and
internal firewalls.
Page 30
20 | Chapter 2 - Installation and Initial Setup
External firewall
For secure access to the appliance from a Web browser or OnDemand, you must make sure that
ports 80 and 443 are open on firewalls at your site. Opening your firewall to permit SSH access is
optional, but can be useful for performing administrative tasks from a remote system.
Traffic typePort/protocolUsageRequired?
HTTP80/tcpUnencrypted network access x
HTTPS443/tcpEncrypted network access x
SSH22/tcpAdm inistrative access to the appliance
Internal firewall
If you have a firewall on the internal network, you may need to adjust its policy to open ports for
back-end applications with which the appliance must communicate. In addition to opening ports for
standard network services such as DNS and email, you may need to modify your firewall policy in
order for the appliance to access the following services.
Traffic typePort/protocolUsage
Microsoft networking
z
z
z
z
z
LDAP (unencrypted)389/tcpCommunicate with an LDAP directory or
LDAP over SSL
636/tcpCommunicate with an LDAP directory or
(encrypted)
RADIUS1645/udp or 1812/udpCommunicate with a RADIUS
NTP123/udpSynchronize the appliance clock with an
Syslog 514/tcpSend system log information to a syslog
SNMP 161/udpMonitor the appliance from an SNMP
138/tcp and 138/udp
137/tcp and 137/udp
139/udp
162/snmp
445/smb
Used by WorkPlace to perform WINS name
resolution, browse requests, and access
file shares
Microsoft Active Directory
Microsoft Active Directory over SSL
authentication server
NTP server
server
management tool
Helpful Management Tools
To manage the appliance from a remote system running Microsoft Windows, you may find the
following management tools useful. Both of these tools use encryption to protect information from
eavesdropping, unlike standard FTP or Telnet utilities:
z
A Secure Shell (SSH) client enables you to securely log in to the appliance and configure it
from the command line. This is useful for backing up the system, viewing log files, and
configuring advanced network settings. A popular SSH client for Windows is V anDyke Software’s
SecureCRT. A trial download is available at http://www.vandyke.com/products/securecrt/.
Another popular client is PuTTY, a free implementation of Telnet and SSH for Windows
platforms
To connect to the appliance using SSH, you type root as the username and type the password
you created using Setup Wizard.
z
A Secure Copy (scp) client makes it easy to securely transfer files from a PC running
Windows to the appliance. This is useful for copying certificates and other data to the appliance.
A popular Windows client is WinSCP, available at http://winscp.sourceforge.net/eng/.
. PuTTY is recommended by Cisco.
Page 31
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 21
Most of the configuration management tasks that you need to perform—backing up and restoring
your appliance configuration, applying upgrades, and so on—can be done on the Maintenance
page in AMC, as described in “Managing Configuration Data” on page 224. If you prefer to handle
these tasks on the command line, see “Appliance Command-Line Tools” on page 399.
Installation and Deployment Process
This section outlines the process of installing, configuring, and testing the appliance, and then
deploying it in a production environment. Here’s an overview of the steps:
Installation stepDescription
Make a note of your appliance serial
number and authentication code
Rack-mount the appliance and connect the
cables
Turn on the appliance and begin
configuration
Run Setup WizardThe wizard guides you through the process of initial
Register your appliance on MySonicWALLRegister your appliance on MySonicWALL. Product
You’ll need this information when you register your
product on MySonicWALL. It is displayed in one or
two places, depending on your appliance model:
z
EX7000 and EX6000: The serial number and
authentication code are printed on your appliance
label; they are also displayed on the General Settings page in AMC.
z
EX-2500, EX-1600 and EX-750: The serial
number is printed on your appliance label; the
General Settings page in AMC displays both the
serial number and authentication code.
See “Specifications and Rack Installation” on
page 22 and “Connecting the Appliance” on page 29.
To connect to your appliance on your internal
network you must specify an internal IP address, the
subnet mask, and indicate whether your appliance is
part of a cluster. How you do this depends on your
appliance model:
z
For all appliance models except the EX-750: Use
the controls on the front of the appliance. See
“Powering Up and Configuring Basic Network
Settings” on page 31.
z
EX-750: Use a command-line tool on the
appliance; see “Configuring a New Appliance
Using Setup Tool” on page 400.
setup for your SonicWALL SRA appliance. See “WebBased Configuration Using Setup Wizard” on
page 32.
registration gives you access to essential resources,
such as your license file and updates. In order to
register, you ne ed both the serial number for your
appliance and its authentication code.
Page 32
22 | Chapter 2 - Installation and Initial Setup
The SonicWALL appliance uses a few different types of licenses. All license files must be retrieved
from www.mysonicwall.com and imported to the appl iance, as described in “Software Licenses” on
page 243:
z
Administration test license: To begin setting up your SonicWALL appliance, log in to
MySonicWALL to retrieve your initial user license , which is valid for one user (the administrator
plus one end user) for an unlimited number of days. To become familiar with the Aventail
Management Console (AMC) and test it in your environment with additional users, either
retrieve an appliance license, or request a lab license to add a few more users.
z
Appliance licenses: The number of concurrent users supported with the appliance license
varies, depending on the appliance model you have:
{
EX7000 or EX-2500: up to 2,000 users
{
EX6000 or EX-1600: up to 250 users
{
EX-750: up to 50 users
z
Component licenses: If the license for an appliance component (such as OnDemand) has
expired, users attempting to use that component see an error message in Av entail WorkPlace.
In the case of a Spike License, the date on which it was activated and how many days still
remain is displayed in AMC.
If a license is about to expire, th e Aventail Management Console (AMC) displays a license warning
message in the status area that links to the Licensing page.
Notes
z
Both Setup Wizard and Aventail Management Console (AMC) are Web-based applications for
configuring the appliance. PCs running these applications must have JavaScript enabled.
JavaScript must also be enabled on the browsers used for accessing WorkPlace.
z
If you are installing a cluster, see “Installin g and Configuring a Cluster” on page 390 and
“Overview of Clustering” on page 453.
Specifications and Rack Installation
After you’ve unpacked the box, you’re ready to install the appliance on your network and prepare
for the configuration process. The appliances are designed to fit on a standard, 19-inch telecom
rack. Before connecting the appliance, make sure that you have sufficient space and adequate
power. The specificat ions for each appliance model are listed below.
SRA E-Class SRA EX-Series Hardware
The SRA E-Class EX7000 and EX6000 include the following:
z
Rails (in kit, not attached)
z
Standard IEC 60320 C13 to NEMA 15 USA only power cords
z
Crossover cable (a network cable that crosses the transmit and receive lines)
z
1 GB Ethernet ports
z
2 USB ports
z
80 GB SATA hard drive
z
Serial connection to appliance (115,200 baud)
The models differ from each other most in terms of processor power, RAM, network ports, and
power supply:
SRA EX7000SRA EX6000
Regulatory Model/Type1RK15-0591RK20-05A
Intel processorCore2 Duo 2.1GHz CPUCeleron 2.0GHz CPU
RAM2Gig DDR533 1Gig DDR533
PCIe Gig network ports6 (5 + 1 HA)4 (3 + 1 HA)
Power supplyDual hot swappableFixed
Page 33
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 23
SRA EX7000SRA EX6000
Front panel (illustration) See “EX7000 Appliance Front
Panel Controls” on page 24
See “EX6000 Appliance Front
Panel Controls” on page 25
Aventail EX-Series
The Aventail EX-2500, EX-1600, and EX-750 differ from each other as follows:
EX-2500EX-1600EX-750
AC power supply300W PFC185W PFC200W PFC
AC voltage6 amp at 120 V, or
3 amp at 240 V
Front panel
(illustration)
See “EX-2500 Appliance
Front Panel Controls” on
page 26
4 amp at 120 V, or
2 amp at 240 V
See “EX-1600
Appliance Front Panel
Controls” on page 27
5 amp at 100 V, or
3 amp at 240 V
See “EX-750
Appliance Front Panel
Controls” on page 28
Best Practices for Rack Installation of the Appliance
To mount the appliance in an equipment rack, you must install the rack hardware. The product
packaging for all models of the appliance contains a slide rail kit for mounting the appliance in a
four-post cabinet.
z
Avoid elevated operating ambient temperature: If installed in a closed or multi-unit rack
assembly, the operating ambient temperature of the rack environment may be greater than
room ambient. Therefore, consideration should be given to installing the equipment in an
environment compatible with the maximum ambient temperature (Tma) specified by the
manufacturer.
z
Avoid reduced air flow: Installation of the equipment in a rack should be such that the
amount of air flow required for safe operation of the equipment is not compromised.
z
Provide even mechanical loading: Mounting of th e equipment in the rack should be such
that a hazardous condition is not achieved due to uneven mechanical loading.
z
Avoid circuit overloading: Consideration should be given to the connection of the equipment
to the supply circuit and the effect that overloading of the circuits might have on overcurrent
protection and supply wiring. Appropriate consideration of equipment nameplate ratings should
be used when addressing this concern.
z
Maintain reliable earthing: Reliable earthing of rack-mounted equipment should be
maintained. Particular attention should be given to supply connections other than direct
connections to the branch circuit (for example, use of power strips).
Front Panel Controls and Indicators
Before powering up the appliance, you should familiarize yourself with the front panel controls.
Page 34
24 | Chapter 2 - Installation and Initial Setup
EX7000 Appliance Front Panel Controls
This section describes the front panel controls for the EX7000 appliance. The power switch is located
on the rear panel.
LCD
controls
Console
The following table describes the controls and indicators on the front panel.
ItemDescription
LCD display screen
and controls
ConsoleConnects the appliance to a personal computer with a
USB portsThere are two USB ports.
LED indicatorsFrom left to right, the LED indicators are:
X0: Internal networkConnects the appliance to your internal network.
X1: External networkConnects the appliance to your external network.
X2: Cluster interfaceConnect the appliance to another appliance in a high-availability
X3-X5Not used.
PW1
PW2
X1
X3
X5
X0
USB
ports
X4
X2
HD
Alarm
Test
Displays status and configuration about the appliance. Keypad
buttons are used to display appliance status and configure initial
settings:
z
For more information on displaying appliance status and using
the keypad to shut down or reboot the appliance, see “LCD
Controls for the EX7000, EX6000, EX-2500 and EX-1600” on
page 28.
z
For information on using the LCD controls during initial
configuration (so that you can run Setup Wizard), see
“Configuring an EX7000, EX6000, EX-2500, or EX-1600
Appliance” on page 32.
DB-9 serial cable.
z
Power 1 and 2
z
Test
z
Alarm
z
Hard disk drive—red indicates disk activity.
cluster.
Page 35
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 25
EX6000 Appliance Front Panel Controls
This section describes the front panel controls for the EX6000 appliance. The power switch is located
on the rear panel.
PWR
X1
X3
LCD
controls
Console
USB
ports
HD
Alarm
X2
X0
Test
The following table describes the controls and indicators on the front panel.
ItemDescription
LCD display screen
and controls
Displays status and configuration about the appliance. Keypad
buttons are used to display appliance status and configure initial
settings:
z
For more information on displaying appliance status and using
the keypad to shut down or reboot the appliance, see “LCD
Controls for the EX7000, EX6000, EX-2500 and EX-1600” on
page 28.
z
For information on using the LCD controls during initial
configuration (so that you can run Setup Wizard), see
“Configuring an EX7000, EX6000, EX-2500, or EX-1600
Appliance” on page 32.
ConsoleConnects the appliance to a personal computer with a
DB-9 serial cable.
USB portsThere are two USB ports.
LED indicatorsFrom left to right, the LED indicators are:
z
Power
z
Test
z
Alarm
z
Hard disk drive
X0: Internal networkConnects the appliance to your internal network.
X1: External networkConnects the appliance to your external network.
X2: Cluster interfaceConnect the appliance to another appliance in a high-availability
cluster.
X3Not used.
Page 36
26 | Chapter 2 - Installation and Initial Setup
EX-2500 Appliance Front Panel Controls
This section describes the front panel controls for the EX-2500 appliance. The power switch is
located on the rear panel.
The following table describes the controls and indicators on the front panel.
LetterItemDescription
A and ELCD display screen
and controls
BConsole serial portConnects the appliance to a personal computer with a
CUSB portThere is one USB port.
DLED indicatorsFrom left to right, the LED indicators are:
FInternal networkConnects the appliance to your internal network.
GExternal networkConnects the appliance to your external network.
HReserved connectorsThe first three Ethernet connectors are not used by the
ICluster interfaceConnect the appliance to another appliance in a high-
Displays status and configuration about the appliance.
Keypad buttons are used to display appliance status and
configure initial settings:
z
For more information on displaying appliance status
and using the keypad to shut down or reboot the
appliance, see “LCD Controls for the EX7000,
EX6000, EX-2500 and EX-1600” on page 28.
z
For information on using the LCD controls during
initial configuration (so that you can run Setup
Wizard), see “Configuring an EX7000, EX6000, EX2500, or EX-1600 Appliance” on page 32.
DB-9 serial cable.
z
Status (not used by this appliance)
z
Hard disk drive—red indicates disk activity.
z
Power LED—green indicates power is on.
appliance.
availability cluster.
Page 37
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 27
EX-1600 Appliance Front Panel Controls
This section describes the front panel controls for the EX-1600 appliance. The power switch is
located on the rear panel.
This section describes the front panel controls for the EX-1600 appliance. The power switch is
located on the rear panel.
The following table describes the controls and indicators on the front panel.
LetterItemDescription
A and B LCD display screen
and controls
CPowerGreen LED indicates that the power is on.
DLED indicatorsFrom left to right, these three LED indicators show the
EConsole serial portConnects the appliance to a personal computer over a
FUSB portsThere are two USB ports.
GInternal networkConnects the appliance to your internal network.
HExternal networkConnects the appliance to your external network.
ICluster interfaceConnects the appliance to another appliance in a high-
Displays status and configuration about the appliance.
Keypad buttons are used to display appliance status and
configure initial settings:
z
For more information on displaying appliance status
and using the keypad to shut down or reboot the
appliance, see “LCD Controls for the EX7000,
EX6000, EX-2500 and EX-1600” on page 28.
z
For information on using the LCD controls during
initial configuration (so that you can run Setup
Wizard), see “Configuring an EX7000, EX6000, EX2500, or EX-1600 Appliance” on page 32.
status for the following:
z
Internal network
z
External network
z
High availability cluster
DB-9 serial cable.
availability cluster.
Page 38
28 | Chapter 2 - Installation and Initial Setup
EX-750 Appliance Front Panel Controls
This section describes the front panel controls for the EX-750 appliance.
The following table describes the controls and indicators on the front panel of the EX -750 appliance.
LetterItemDescription
AReset buttonReboots the system.
BPower buttonToggles the system power on/off.
LCD Controls for the EX7000, EX6000, EX-2500 and EX-1600
The four-button keypad to the right of the LCD display on the E-Class SRA EX-Series appliances
(with the exception of the EX-750) can be used to display status and configuration information
about the appliance, and to shut down or reboot the appliance.
CAUTION — EX7000 and EX6000 appliances: Remove any USB devices from the
!
appliance before you reboot it. If a USB device is plugged in to your appliance when it is
rebooted, the appliance tries to use it as a boot device. As a result, the boot information stored
in the BIOS on the appliance is overwritten, and the EX7000 or EX6000 becomes unusable.
The following table describes the keypad functions:
Keypad FunctionDescription
Left buttonPress the Left button once to reboot the appliance. The following
prompt is displayed:
Restart appliance?
<Yes No>
Press the Left button again to reboot the appliance, or press the
Right button to cancel the reboot.
Page 39
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 29
Keypad FunctionDescription
Up buttonPress the Up button once to display the configuration of the
Right buttonPress the Right button once to shut down the appliance. The
Down buttonTo return to the default view at any time, or to refresh the
appliance’s network settings. Each time you press it, the displa y
shows another network setting:
z
Internal address
z
External address
z
Default gateway
z
Host name
z
Domain name
z
IP address
z
Netmask
following prompt is displayed:
Shut down now?
<Yes No>
Press the Left button again to shut down the appliance, or press
the Right button to cancel the shutdown.
display, press the Down button once.
Connecting the Appliance
Follow the appropriate instructions for your appliance model to connect the appliance to your
network.
Connecting the EX7000 Appliance
For a diagram of the appliance, see “EX7000 Appliance Front Panel Controls” on page 24.
X To connect the EX7000 appliance
1. Connect a network cable from your internal network to the internal interface on the appliance
(X0).
2. Optionally, connect a cable from your external network to the external interface on the
appliance (X1).
3. If you are setting up a cluster, connect one end of the supplied network crossover cable to the
cluster interface adapter (X2). Connect the other end to the X2 port on the other appliance in
the cluster.
4. Connect a standard AC power cord to the power supply.
Connecting the EX6000 Appliance
For a diagram of the appliance, see “EX6000 Appliance Front Panel Controls” on page 25.
X To connect the EX6000 appliance
1. Connect a network cable from your internal network to the internal interface on the appliance
(X0).
2. Optionally, connect a cable from your external network to the external interface on the
appliance (X1).
3. If you are setting up a cluster, connect one end of the supplied network crossover cable to the
cluster interface adapter (X2). Connect the other end to the X2 port on the other appliance in
the cluster.
4. Connect a standard AC power cord to the power supply.
Page 40
30 | Chapter 2 - Installation and Initial Setup
Connecting the EX-2500 Appliance
The EX-2500 appliance uses up to five connections, as shown in the following illustration.
X To connect the EX-2500 appliance
1. Connect a network cable from your internal netwo rk into the Ethernet adapter labeled “1” in
the illustration.
2. Optionally, connect a cable from your external network into the Ethernet adapter labeled “2”.
3. If you are setting up a cluster, conne ct one end of the supplied network crossover cable into
the cluster interface adapter. Connect the other end to the cluster interface adapter on the
other appliance in the cluster.
4. Connect a standard AC power cord to the power supply.
Connecting the EX-1600 Appliance
The EX-1600 appliance uses up to five connections, as shown in the following illustration.
X To connect the EX-1600 appliance
1. Connect a network cable from your internal netwo rk into the Ethernet adapter labeled “1” in
the illustration.
2. Optionally, connect a cable from your external network into the Ethernet adapter labeled “2”.
3. If you are setting up a cluster, conne ct one end of the supplied network crossover cable into
the cluster interface adapter. Connect the other end to the cluster interface adapter on the
other appliance in the cluster.
4. Connect a standard AC power cord to the power supply.
Page 41
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 31
Connecting the EX-750 Appliance
The EX-750 appliance uses up to three connections, as shown in the following illustration.
X To connect the EX-750 appliance
1. Connect a network cable from your internal network into the internal Ethernet adapter
(marked INT 2) and labeled “1” in the illustration.
2. Optionally, connect a cable from your external network into the external Ethernet adapter
(marked EXT 1) and labeled “2”.
3. Connect the supplied DB9 cable from a laptop computer or terminal to the rear serial port. This
provides full console access to the appliance; see “Powering Up and Configuring Basic Network
Settings” on page 31 for more information.
4. Connect a standard AC power cord to the power supply.
Powering Up and Configuring Basic Network Settings
After you’ve connected the appliance, you’re ready to power up for the first time and begin the
configuration process. You’ll use a W eb-based Setup Wizard to configure the settings needed to get
the appliance up and running quickly, but in order to start the wizard you must first enter
information that will enable a Web browser to connect to your appliance.
Once your appliance is configured you can control its configuration and operation from AMC, the
Aventail Management Console. On the LCD screen of the appliance (which is present on all of the
appliance models except for the EX -750) you can also see basic inform ation about the appliance (its
name and internal address, for example) or restart it, which is useful if your appli ance is not in the
same area as the browser you use to run AMC.
Notes
z
You cannot run Setup Wizard on an appliance that has already been configured unless you first
restore the appliance’s factory default configuration settings. This applies whether you initially
configured the appliance using Setup Wizard, or by running setup_tool from the command
line. See “Re-Running Setup Wizard” on page 33.
Configuring Basic Network Settings
In order to start Setup Wizard you must first enter information that will enable a Web browser to
connect to your appliance. There are a couple of ways to do this, depending on your appliance
model:
z
EX7000, EX6000, EX-2500, and EX-1600: The recommended procedure for initial setup is to
use the LCD controls (to the right of the LCD screen on the front of your appliance) to enter
minimal settings and then run Setup Wizard. Alternatively, you have the option of using Setup
Tool on the command-line. Both procedures are outlined below.
z
EX-750: You must establish a serial connection to the appliance using a laptop computer or
terminal and then use Setup Tool before you can run Setup Wizard, explained below.
Once your basic settings are ente red you’ll be able to run the Web-based Setup Wizard, as described
in “Web-Based Configuration Using Setup Wizard” on page 32.
Page 42
32 | Chapter 2 - Installation and Initial Setup
Configuring an EX7000, EX6000, EX-2500, or EX-1600 Appliance
To the right of the LCD screen on the front of your appliance are four buttons you'll use to enter
your settings.
X Configuring basic network settings using the LCD controls
1. Press the Up and Down controls to read the welcome screen, and press Right to continue past
it.
2. Set the IP address for your internal interface: To change the IP address that appears, use the
Left and Right buttons to position your cursor over the number you want to change, and then
use Up and Down to change the number. Press Right to continue to the next screen.
3. Enter your subnet mask: Again, use the four buttons to change the IP address displayed on
the LCD screen. Press Right to continue to the next screen.
4. Cluster configuration: Specify whether the appliance you are configuring will be part of a
cluster (a high-availability pair of appliances), and which node it is (the master is “1” and the
slave node is “2”). Press Right to continue to the next screen.
5. Confirm your settings: Review your settings and confirm them. In a few moments your
settings are saved and you’ll see instructions on browsing to a URL on your deskto p computer.
This is the URL for continuing your appliance configuration with Setup Wizard. For instance,
the LCD display might read as follows:
Please browse to: https://172.31.0.140:8443
For a description of configuring your appliance using Setup Wizard, see “Web-Based Configuration
Using Setup Wizard” on page 32.
Configuring an Appliance Using Setup Tool on the Command Line
To set the minimum configur ati on i tems nece ssar y for runn ing S etu p Wiz ard , you mu st u se Se tup
Tool. Below is an overview of your steps; see “Configuring a New Appliance Using Setup Tool” on
page 400 for detailed instructions.
X Overvi ew of configuring basic network settings using Setup Tool
1. Use a terminal emulation program to establish a serial connection with the appliance from a
laptop computer or terminal.
2. Turn the appliance on. The first time you start the system from a serial connection, Setup Tool
automatically runs. When prompted to log in, type root for the username.
3. To configure the appliance, you are prompted to provide the following information:
{
IP address and subnet mask for the internal interface
{
Default gateway used to access the internal interface (optional)
{
In the case of a cluster, identify whether the appliance is the master node (1) or slave
node (2); a clustered deployment is possible on all appliances except the EX-750
For a description of configuring your appliance using Setup Wizard, see “Web-Based Configuration
Using Setup Wizard” on page 32.
Web-Based Configuration Using Setup Wizard
Setup Wizard guides you through a series of required and optional steps for configuring the
appliance. The AMC home page includes a Setup Checklist that indicates which items you have
completed.
Running Setup Wizard requires the same system configuration as AMC (see “System Requirements”
on page 7 for details); in addition, JavaScript must be enabled in the browser.
1. License agreement: Read the terms of the End User License Agreement.
2. Basic Settings:
{
Specify the password you'll use to access the Aventail Management Console (AMC). Your
password must be at least eight characters long, but no longer than 20 characters.
Page 43
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 33
{
(Optional) Select a time zone, and then click Change to set the current time. If you wish
to synchronize the time with an NTP server, that can be configured later in the AMC; for
more information, see “Configuring Time Settings” on page 195. It’s important to ensure
that the appliance’s date and time settings are correct for your time zone before you
import your license file.
3. Network Settings:
{
Enter a name for the appliance (the default is AventailSSLVPN). Because this name will be
used only in log files, you don’t need to add it to DNS.
{
The IP address and subnet mask for the internal interface (connected to your private
network) is shown here. For a dual-homed configuration, enter the IP address and subnet
mask for the external interface.
4. Routing: To leverage an existing router, select the dual gateway option to reach your
resources. To restrict incoming appliance traffic to just a few routes or subnets, select a single
gateway option and enter the routes or subnets as static routes later in the AMC.
If the appliance is on a different network than the computer you will use to access AMC, you
must set up routing in order to maintain access to AMC.
5. Name Resolution: The appliance must be able to perform name resolution in order to reach
resources on your internal network. Enter a default domain, which is the domain in which the
appliance is located (such as yourcompany.com).
6. User access: You can give users full network access by provisioning the OnDemand Tunnel
access agent. If you do, you’ll also need to specify the Source NAT address that will appear to
back-end servers as the source of client traffic. This must be an IP address that is on the same
subnet as the internal interface, and is not in use elsewhere.
Decide on an initial access policy for users (you can refine it later in AMC). This can be
completely permissive (granting access to the entire network protected by the SSL VPN), very
strict (deny all access), or in-between (give users access to all resources as you define them in
AMC).
At the end of the Setup Wizard process you’ll see your settings and then proceed to AMC, the
management console, for the last steps in the configuration process. See “Configuring the Appliance
Using the Management Console” on page 33 for details.
Re-Running Setup Wizard
After you run Setup Wizard to initially configure the appliance, you can’t re-run it unless you first
restore the appliance to its factory default configuration settings. Before you can re-run Setup
Wizard, you must run Config Reset Tool from the command line; this will delete all of your existing
system configuration data. For more information, see “Restoring Factory Default Configuration
Settings” on page 403.
Configuring the Appliance Using the Management Console
The final installation and deployment settings are done in AMC. The following is a checklist of
configuration items and pointers to detailed information.
1. Log in to AMC.
Log in to AMC, the Web-based application used to administer the appliance, and look at the
setup checklist on the right.
2. Register the appliance on MySonicWALL and retrieve your license file.
When you register your appliance on www.mysonicwall.com, you must enter both your serial
number and your authentication code, which is the hardware identifier for the appliance you
purchased:
{
The serial number is printed on a label on the outside of your appliance.
{
The authentication code is displayed in AMC: click General Settings from the main
navigation menu, and then look in the Licensing area.
When you receive your SonicWALL appliance there is a single user license on it, valid for an
unlimited number of days. To become familiar with the Aventail Management Console (AMC)
and test it in your environment with additional users, request a lab license. After initial setup
Page 44
34 | Chapter 2 - Installation and Initial Setup
and testing, download your license file from www.mysonicwall.com and then import it to the
appliance.
See “Managing Licenses” on page 246.
3. Define one or more authentication servers.
Authentication is used to verify the identity of users. When configuring an authentication
server, you are prompted to specify a directory type (LDAP, Microsoft Active Directory,
RADIUS, or local users) and a credential type (username/password, token, or digital
certificate).
See “Managing User Authentication” on page 80.
4. Configure a server certificate.
The appliance encrypts information using the Secure Sockets Layer (SSL) protocol. You can
create a self-signed certificate us ing AMC, or optionally obtain a certificate from a commercial
certificate authority (CA).
See “Certificates” on page 66.
5. Define application resources and groups.
Application resources include TCP/IP-based resources (such as client/server applications, file
servers, or databases), Web-based resources (including Web applications or Web sites) that
run over HTTP, and Windows network share resources (to be accessed in WorkPlace). Resource
definitions can include variables, so that a single resource can, for example, that derive its
network name or address based on each user.
See “Creating and Managing Resources” on page 115.
6. Define users and groups.
User and group definitions are used in access control rules to cont rol access to application
resources.
See “Managing Users and Groups” on page 181.
7. Define realms and communities.
Realms enable the appliance to directly integrate with authenticat ion servers, eliminating the
need to create and manage accounts for each user who needs access to your network.
Communities aggregate users with similar access needs and End Point Control requirements.
See “Managing User Authentication” on page 80.
8. Create access control rules.
Access control rules determine what resources are available to users and groups.
See “Access Control Rules” on page 144.
9. Configure shortcuts for WorkPlace.
To provide your users with easy access to a Web, file system, or graphical terminal resource
from within WorkPlace, you may want to create shortcuts in WorkPlace.
See “Working with WorkPlace Shortcuts” on page 292.
10.(Optional) Configure the network tunnel service.
If you plan to deploy the network tunnel clients, you must configure the n etwork tunnel
service and allocate IP address pools for the clients.
See “Configuring the Network Tunnel Service” on page 348.
11.(Optional) Enable and configure End Point Control.
End Point Control optionally deploys data protection components designed to safeguard
sensitive data and ensure that your network is not compromised when accessed from PCs in
untrusted environments. End Point Control is deployed through communities.
See “End Point Control” on page 249 and “Using End Point Control Restrictions in a
Community” on page 168.
12. Apply your changes.
To activate your configuration changes, you must apply them.
See “Applying Configuration Changes” on page 52.
13. Test system accessibility.
Now you can verify that the appliance can access your external user repositories, and make
sure that the resources on your network are accessible.
Page 45
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 35
See “Troubleshooting” on page 407.
Moving the Appliance into Production
After you have tested the appliance sufficiently in your network environment and determined how
you want it to work, you’re ready to move it into its permanen t home. This secti on describes ste ps
you may need to perform when moving the appliance into production.
1. Reconfigure the appliance with new address information.
If the network environment changed when you moved the appliance into production, you must
reconfigure the basic network settings and adjust any of the following values if they have
changed:
{
IP addresses for the internal and external interfaces
{
Default gateway IP addresses
{
Static routes
{
Default DNS domain and DNS server IP address
If you have a large number of configuration changes to make, you may find it convenient to
restore the appliance to its default settings and start over from scratch. This can be done using
Config Reset Tool; see “Restoring Factory Default Configuration Settings” on page 403 for
more information.
2. Register the appliance with DNS.
If you haven’t already registered the appliance with your company’s DNS, do this now. This
ensures that external users can access your network resources using a fully qualified domain
name instead of an IP address. Edit your DNS server’s database to include the fully qualified
domain name contained in the appliance’s certificate, and any WorkPlace sites.
3. Obtain a commercial SSL certificate.
You may want to obtain a commercial certificate for the appliance to assure users of its
identity. (Generally, a self-signed certificate is adequate for AMC.) For more information on
generating server certificates, see “Obtaining a Certificate from a Commercial CA ” on page 68.
4. Adjust your firewall policies.
If you have an Internet-facing firewall, you may need to adjust its policy to open ports
required by the appliance. By default, the Web pro xy service communicates using port 443/tcp
(it uses port 443/tcp for HTTPS and port 80/tcp for HTTP). If you want to use SSH to connect
to the appliance from outside the network, you'll need to open port 22/tcp.
If you have a firewall that faces the internal network, you may need to adjust the policy for
that firewall to open ports for any back-end applications with which the appliance must
communicate (if these ports are not already open). For instance, if you use an LDAP or
Microsoft Active Directory server for authentication, you must open port 389/tcp on your
internal firewall. For RADIUS, open ports 1645/ucp and 1812/udp.
If you’re using WorkPlace to access Windows network shares, you must also open internal
ports on your internal firewall so that WorkPlace can perform name resolution, make browse
requests, and connect to file shares. For more information, see “Gathering Information” on
page 19.
5. Create shortcuts and deploy WorkPlace.
If you use WorkPlace as an interface to Web-based resources and to provide Web-based
access to Windows network share and graphical terminal resources, you must create shortcuts
(see “Working with W orkPlace Short cuts” on page 292). You should also publish the WorkPlace
URLs so your users know how to access resources through your VPN.
You may want to customize the appearance of WorkPlace for your environment. See
“Configuring WorkPlace General Settings” on page 291 for more information.
Powering Down and Restarting the Appliance
When it’s time to power down or restart the appliance, be sure to follow the proper procedure. The
appliance stores important data in memory while it is running, and that data must be written to the
hard disk before you turn off the power.
Page 46
36 | Chapter 2 - Installation and Initial Setup
CAUTION Powering down the appliance improperly can result in loss of data and leave the
!
system’s files in an inconsistent state. EX7000 and EX6000 appliances: Remove any USB
devices from the appliance before you reboot it. If a USB device is plugged in to your appliance
when it is rebooted, the appliance tries to use it as a boot device. As a result, the boot
information stored in the BIOS on the appliance is overwritten, and the EX7000 or EX6000
becomes unusable.
X To power down or restart the appliance in AMC
1. From the main navigation menu, click Maintenance.
2. On the Maintenance page, click the appropriate button:
{
To restart the appliance, click Restart. AMC stops responding. After the appliance
restarts, you can log in to AMC again.
{
To shut down the appliance, click Shutdown. AMC stops responding and the appliance
automatically powers down. You do not need to press the power button on the front panel.
Notes
z
All appliance models, with the exception of the EX- 750, s can be shut down or restarted at the
appliance:
a. On the front of the appliance, press the Down button on the four-button keypad to get to
the main LCD menu.
b. Scroll down until you reach the option you want, Restart or Shutdown.
c. Both options display a confirmation message; press the Left button to continue.
The results are the same as restarting or shutting down in AMC:
{
AMC stops responding; after the appliance restarts, you can log in to AMC again.
{
AMC stops responding and the appliance automatically powers down. You do not need to
press the power button on the front panel.
Next Steps
After you have completed the initial network setup, use AMC to continue configuring the appliance.
AMC is accessible using a Web browser:
z
If you’re new to AMC, you might want to read “Working with AMC” on page 37.
z
If you’re ready to continue configuring the appliance, see “Network and Authentication
Configuration” on page 55.
Page 47
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 37
Chapter 3
Working with AMC
This section introduces the Aventail Management Console (AMC) , a Web-based interface for
managing the appliance.
Accessing AMC
This section explains how to access AMC using your Web browser and how to log out.
Logging In to AMC
Before logging in to AMC, you need the host name or IP address you typed for the internal interface
during the initial setup with Setup Tool.
X To log in t o AMC
1. Start your Web browser and type the URL https://<ipaddress>:8443/console, where
<ipaddress> matches the address you specified for the internal interface w hen you ran Set up
Tool or Setup Wizard. Press Enter.
2. On the login screen, type admin in the Username box.
3. In the Password box, type the root password you created using Setup Tool.
4. Click Login. The AMC home page appears.
5. There’s a Setup Checklist in the lower-right corner of the home page to help guide you
through initial configuration:
{
{
{
Click each link and perform the required configuration.
When you return to the AMC home page, the item is checked off the list and you’re ready
for the next one.
Click Help on any page for more information.
Page 48
38 | Chapter 3 - Working with AMC
For information on changing the AMC password, see “Editing Administrator Accounts” on page 47.
Notes
z
You should avoid having multiple administrators making changes to AMC at the same time. For
more information, see “Avoiding Configuration File Conflicts with Multiple Administrators” on
page 49.
Logging Out
It is important to preserve the security of your AMC administrator account. When you’re finished
working in AMC, click Log out in the upper-right portion of the screen. If you terminate a session
by simply closing your W eb browser, your session remains active until it times out (after 15 minutes
of inactivity). There is an exception to this rule that you should be aware of; see “Appli a nce
Sessions” on page 432 for details.
AMC Basics
This section describes the basics of working with AMC. All configuration data is encrypted using S SL
as it’s transferred between AMC and your browser, ensuring that it remains secure. To increase
security, AMC should be used within a trusted network (on an internal network that is behind a
firewall). See “Certificate FAQ” on page 79 for more details.
A Quick Tour of the AMC Interface
The AMC interface will be familiar to anyone who has worked with similar Web-based security
management applications. Here are some basic notes about working with AMC.
Summary pages
Several top-level pages in AMC are summary pages that provide quick access to subordinate
configuration pages and display summaries of key configuration settings and other status
information. These summary pages are:
z
Agent Configuration
z
General Settings
z
Network Settings
z
SSL Settings
z
Authentication Servers
z
Services
Page 49
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 39
For example, the Agent Configuration page provides links to pages for configuring End Point Control,
Aventail access, and other agents. Y ou can see right away on this summary page whether a specific
agent is enabled or disabled.
Tables and tabs
Many AMC pages use a tabular layout to present the objects you’ll be ma naging. The ta bles include
scroll bars, which make it easier for you to keep the main elements on the page (including the
navigation bar, header , and footer) in view when working with long lists. Y ou can also sort the data
displayed in some tables by clicking the underlined column headings.
Page 50
40 | Chapter 3 - Working with AMC
In some cases, you’ll use tabs to switch between modes. For example, you’ll use tabs to swit ch
between managing resources, groups of resources, and variables used in defining resources.
Filters
On pages in AMC that contain a list of items that can grow to many pages in a large configuration,
filtering is available to make it easier for you to find what you are looking for. Filters are available
on the following pages in AMC:
z
Resources
z
Reso urce Groups
z
Access Control
z
Users
z
Groups
z
Shortcuts
z
Shortcut Groups
z
Browse for Users (creating an access rule)
z
Browse for Resources (creating an access rule)
The exact filters vary slightly with each page, but the following functionality is consistent across all
pages:
z
There is a reset link that resets the filter fields to their default values.
z
There is a red active indicator that indicates that the page was loaded using filters, meaning
that the list may not be displaying all the configured items.
z
There is a Refresh button that reloads the page with the specified filters applied.
z
The filters are stored so that the next tim e you loads the page, it uses the same fil ters that were
last applied. The filters are stored across sessions, so even if you log out and log back in, the
same filters will be used.
Page 51
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 41
z
There is a footer at the bottom of the list that shows the number of items displayed and the
total number of items in the list. If filtering is active, there is a (filtered) indicator and a Show all link that will reset the filters to the defaults and refresh the page to display all items in the
list.
In general, the available filters map to the displayed columns in the list. In some cases, such as
Resource Groups or Shortcut Groups, you can filter the list based on the members of the group,
which is not a column in the list. As another example, on the Resources page you could filter the
list based on something in the Value attribute, which is not a column but is visible when an item
in the list is expanded.
One way that you could use this feature for custom filtering is to create your own “tags” by adding
a custom string to the Description field of related items. For example, if a certain set of resources
are all used by one department or for one customer, you could add a keyword or tag to the
description of those resources, and then use the filtering capability to quickly display only the
resources that contain the special keyword or tag.
Page links
T o save space, some AMC pages use a multi-page format with links at the top of the pages to access
the related configuration settings. The Configure Community page is an example of this:
Editing an object
In most of the tables used to display lists of objects, notice that the name field (or in the case of
the Access Control page, the rule number) is hyperlinked. To edit an object, click its hyperlink.
Page 52
42 | Chapter 3 - Working with AMC
Changing the page view
Some of the longer , more complex pages in AMC hide the edit controls used to configure advanced
features. This makes it easier for you to focus on the most important configur ation options. To view
hidden options, click the down arrow button (click the up arrow to hide them again):
Expanded view of list details
AMC pages that display lists of objects, such as the Access Control page, let you view details about
an object by clicking the plus sign (+) to the left of it. To return to the one-line view, click the minus
sign (-).
Required fields and errors
Required fields are indicated in AMC with an asterisk. If you omit a value for a required field and
click Save, a red message appears beneath the field indicating that it is required. A red message
is also used to indicate an error (for example, if you type an invalid value).
Assigning names and descriptions
Most of your time in AMC will be spent managing three types of objects:
z
Access control rules
z
Resources
z
Users and groups
When you create these object s, AMC requi res t hat y ou t ype a na me. AMC also has a spac e for y ou
to type an optional description.
Although not required, meaningful descriptions can help you remember critical details about the
objects you’re managing, such as the purpose of an access rule or what resources are in a subnet
range. A good description is especially helpful when managing a group of objects; when you return
to AMC later to manage a large group of network resources, for example, you’ll be glad to have a
description reminding you of what’s in the group.
Saving changes on a page
On some AMC pages you can Save or Cancel the changes you make. If you click Cancel, or use
the Back button in your browser, your changes are not saved.
Page 53
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 43
The AMC status area
A status area just beneath the AMC header displays important information:
Status area linkDescription
If your appliance license or a component license has expired, click License
warning to review and manage software licenses.
If more than one administrator is logged into AMC, click Multiple
administrators and check the list on the Administrator Sessions page.
If this appliance is configured to receive policy updates, click
Configuration recipient to see the appliances with which it will be
synchronized.
If you’ve made configuration changes but have not applied them, click
Pending changes. On the Apply Changes page you can activate or
discard the pending changes.
The SonicWALL version number and product serial number
The version of the current system software and the product serial number are displayed at the
bottom of the left-hand navigation bar on every page in AMC. If the appliance is configured to send
or receive configuration data, its replicati on name is shown here.
In addition to the version number, the System Status and Maintenance pages display a list of
any hotfixes that have been applied. The version number and hotfix information is useful for
planning system updates, and you need to have it when contacting SonicWALL Technical Support.
Adding, Editing, Copying, and Deleting Objects in AMC
AMC features a standardized user interface for managing most objects, such as resources, access
control rules, users, communities, End Point Control zones and device profiles, and other items used
to organize and operate your VPN.
Following are the basic procedures for adding, editing, copying, and deleting objects in AMC,
although there may be some minor variations depending on the object and AMC page you’re
working on. The examples provided here use the End Point Control Zones page.
X To add a new object in AMC
1. On the page listing the type of object you want to create, click New.
Page 54
44 | Chapter 3 - Working with AMC
2. Complete the relevant information for the object, and then click Save.
X To edit an object in AMC
1. On the page that lists the object you want to edit, click the link for the name (or in some
cases, the number) of the object you want to mo dify. For a quick description of the object, an
expand (+) button is available on most lists.
2. Make any changes to the information for the object, and then click Save.
Page 55
Getting Help
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 45
X To copy an object in AMC
1. On the page that lists the object you want to copy, select the check box to the left of the
object, and then click Copy.
2. Make any changes to the information about the source object, and be certain to assign the
object a new name, and then click Save.
X To delete an object in AMC
z
On the page that lists the object you want to delete, select the check box to the left of the
object, and then click Delete.
Notes
z
You cannot delete an object that is still associated with other objects. For information, see
“Deleting Referenced Objects” on page 54.
Every AMC page includes a Help button (in the upper right portion of the screen) that displays
context-sensitive online Help.
Help appears in a new browser window; its navigation bar includes the following buttons:
ButtonDescription
Displays the Help navigation pane, containing Contents, Index, and Search
buttons. (This button appears when the Help navigation pane is closed.)
Synchronizes the table of contents to display the current topic. (This button
appears when the Help navigation pane is in view.)
Displays the next or previous Help topic.
Displays a list of related Help topics.
Page 56
46 | Chapter 3 - Working with AMC
ButtonDescription
The Help navigation includes the following tabs, which change the content in the left frame:
z
Contents displays a hierarchical list of Help topics.
z
Index displays an alphabetical list of keywords in Help.
z
Search displays a full text search engine for Help. Type a word or short phrase in the box, click
Go!, and then choose a topic from the list of results.
z
Favorites allows you to create a custom list of help topics to which you frequently refer.
Administrator Accounts
This section describes how to manage AMC administrator accounts and how to avoid problems if
more than one administrator is managing the appliance.
Managing Administrator Accounts and Roles
AMC enables you to create multiple administrator accounts, each with a separate username and
password. You can then assign roles to administrators, specifying which features in AMC they can
use, and their levels of access.
By default, AMC is configured with a primary administrator role that has full access to all areas of
AMC. Only the primary administrator can add, edit, or delete other administrator accounts.
Prints the current Help topic.
Adding Administrator Accounts
You can create additional administrator accounts if more than one person is responsible for
managing policy and you want each person to have individual login credentials. Only the “primary”
administrator—whose default name of admin cannot be changed—can create, modify, and delete
secondary administrator accounts.
X To add an administrator account
1. From the main navigation menu, click General Settings.
2. In the Administrator accounts area, click Edit. The Manage Administrator Accounts
page appears.
3. Click New. The Add/Edit Administrator page appears.
4. In the Username box, type the secondary administrator’s username.
5. In the Description box, type a descriptive comment about the administ rator (for example, his
full name or title). This field is optional, but a description can be helpful when viewing the list
of administrators later.
6. In the Password box, type a password for the administrator. Be sure to share the password
with the administrator. The administrator can change this password at any time.
{
Your password must contain at least eight characters, and is case-sensitive. A password
containing a combination of uppercase and lowercase letters and numbers is
recommended, and it should not consist of words found in a dictionary.
{
If the password for the primary administrator (whose username is admin) is changed, the
password for logging in to the appliance directly (as root) is also changed.
7. In the Confirm password box, type the password again to confirm it.
8. In the Role list, select a role for the secondary administrator. AMC provides the following
preconfigured roles, which are defined on the Add/Edit Administrator Role page. You can
Page 57
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 47
modify these preconfigred roles, or create new roles (see “Defining Administrator Roles” on
page 47):
Preconfigured roleDescription
Super AdminHas read/write access to all pages in AMC
Security AdminHas read/write access to security administration
and monitoring pages in AMC, and view access
to system settings
System AdminHas read/write access to system and monitoring
pages, and view access to security pages
9. Click Save.
Notes
z
For information on deleting administrator accounts, see “ Adding, Editing, Copying, and Deleting
Objects in AMC” on page 43.
z
By default, the preconfigured roles include the ability to view all forms of session data and to
terminate sessions. See “Viewing User Sessions” on page 209 and “Ending User Sessions” on
page 211 for more information.
Editing Administrator Accounts
T o help keep your AMC password secure, y ou should change it from time to time. Each administrator
can edit his or her own account to change the password or update the description. The primary AMC
administrator (whose username is “admin”) can edit the account settings for any other
administrator.
Your password must contain between eight and 20 characters, and is case-sensitive. A “strong”
password—with a combination of uppercase and lowercase letters, and numbers—is recomme nded.
You should also avoid using words found in a dictionary.
After you change your password, record it somewhere and keep it secure. If you change a
secondary administrator’s password, be sure to share the password with the appropriate
administrator.
X To edit an administrator account
1. From the main navigation menu, click General Settings.
2. On the General Settings page, in the Administrator accounts area, click Edit.
3. In the Name column on the Manage Administrator Accounts page, click the name of the
administrator whose account you want to edit.
4. On the Add/Edit Administra to r page, change the textual description, login password, or
role.
Notes
z
The username and role of the primary administrator cannot be changed.
z
If the password for the primary administrator (whose username is “admin”) is changed, the
password for logging in to the appliance directly (as “root”) is also changed.
Defining Administrator Roles
AMC’s role-based administration enables the primary administrator to gr ant limited administrative
control to secondary AMC administrators.
Page 58
48 | Chapter 3 - Working with AMC
For defining administrator roles, AMC’ s features are grouped into four categories. For each category ,
you must specify the permissions you want to grant a role. The four categories of administrator
permissions in AMC are described in the following table:
CategoryAdministrator permissions
Security administrationControls administrator access to pages for access co ntrol rules,
System configurationCont r ols administrator access to pages for network settings,
System maintenanceControls administrator permission to shut down or restart the
System monitoringView access permits the administrator to view system logs and
The permission level for each category can be set as follows:
resources, users and groups, WorkPlace, OnDemand, and End
Point Control.
general appliance settings, SSL settings, access and network
services, authentication servers, and realms.
appliance, update or roll back the system software, and i mport
or export configuration data.
graphs, view active users, and run troubleshooting tools (such
as starting, stopping, downloading, and deleting network
traces). Modify provides additional permissions to terminate
user sessions and modify log settings.
Permission levelDescription
ModifyPermits read/write access within a category.
ViewProvides read-only access within a category.
NoneDisables access to the relevant AMC pages within a category.
X To create an administrator role
1. From the main navigation menu, click General Settings.
2. On the General Settings page, click Edit in the Administrator roles area. The Manage Administrator Roles page appears and displays an overview of administrators’ roles and
permission levels.
When you select None as the permission level for a category,
AMC will not display either the pages within that category, or
the main navigation menu commands that lead to those pages.
Page 59
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 49
3. Click New. The Add Administrator Role page appears.
4. In the Name box, type a meaningful name for the administrator role.
5. In the Description box, type a descriptive comment about the role.
6. In the Administrator permissions area, select one or more categories of permissions that
will be granted to the role.
7. Click Save.
Editing Administrator Roles
The primary AMC administrator can modify any secondary administrator role to change permission
levels, and can also delete secondary roles. For more information, see “Defining Administrator
Roles” on page 47.
Avoiding Configuration File Conflicts with Multiple Administrators
If more than one administrator is managing your appliance, you should avoid working in AMC at the
same time. If multiple administr ators make changes to the same object, AMC sa ves the most recent
one. This can cause unintentional results, and potentially cause security problems if conflicting
changes are made to access control rules.
Page 60
50 | Chapter 3 - Working with AMC
If more than one administrator is logged into AMC, you are alerted by a link in the upper-right
corner of AMC:
T o see a list of the usernames and IP addresses of all administrators who are logged into AMC, click
this link: the Administrator Sessions page appears in a separate window. If an administrator has
multiple instances of the Web browser logged into AMC, the administrator’s user name and IP
address is listed more than once.
You should contact the other administrators and coordinate your activities to avoid configuration
file conflicts.
X To view the complete list of AMC administrators
1. Click General Settings in the main AMC navigation menu.
2. Click Edit in the Administrator accounts area. The Manage Administrator Accounts page
lists all of the administrators, and shows which ones are currently logged in.
Notes
z
The management console audit log tracks any AMC configuration changes made by
administrators. See “Management Audit Log” on page 202.
z
T o end an AMC session you must click Log Out; if you terminate a session by closing your Web
browser, the session appears in the list of active sessions until it times out (by default, in 15
minutes).
Managing Multiple SonicWALL Devices
You can configure a SonicWALL SRA EX-Series appliance to be managed by Global Management
System (GMS), to be included in ViewPoint reports, or both.
z
The Global Management System (GMS) gives you a single management interface for centrally
managing and deploying SonicWALL appliances and security policy configurations. GMS also
provides centralized real-time monitoring, and policy and compliance reporting.
z
The ViewPoint Reporting Module is a separate W eb-based reporting tool that gives you detailed
reports for individual SonicWALL appliances. You can tr ack network utilization, monitor critical
network events and activity—such as security threats, inappropriate Web use, and bandwidth
levels—using a customizable dashboard and a variety of historical reports.
T o configure ce ntralized ma nagement in AMC, you must specify the settings for these servers, such
as the server address and port, and supply a password that will be used by GMS and the ViewPoint
server to gain access to the SRA EX-Series appliance.
Page 61
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 51
Configuring an Appliance for GMS
The Global Management System (GMS) gives you a single management interface for centrally
managing and deploying SonicWALL appliances and security policy configurations. GMS also
provides centralized real-time monitoring, and policy and compliance reporting. You can schedule
appliance reports to be automatically sent by email on a regular basis. These reports currently
contain the following:
z
User authentication-related events: The user login report shows the user name, source host IP
address, and time of login for users who have logged in to the appliance during the specified
day; the failed login report shows unsuccessful login attempts, which is useful for identifying
unauthorized access attempts and potentially malicious activity.
z
Status information: The GMS can log in to the Aventail appliance automatically and request its
up/down status and appliance details, such as its model and serial numbers, language, up-time,
and firmware version.
z
Resource access events: The aggregated data on GMS is summarized by access method and
user/realm name; you can also go into further detail and see individual access items. If a user
has logged in to WorkPlace, for example, and clicked on various links, that information is
relayed to GMS and can be viewed in summary or detailed reports.
You can also configure the SonicWALL appliance to be included in ViewPoint reporting.
X To configure your SRA EX-Series appliance for GMS or ViewPoint
1. Click General Settings in the main AMC navigation menu.
2. Click Edit in the Centralized management area.
3. Select the Enable GMS/ViewPoint check box, and then enter the host name or IP address of
the GMS or ViewPoint server, and its port number.
4. In the Heartbeat interval text box, set the interval (in seconds) at which the appliance
indicates its readiness to send a report on authentication-related events, in addition to status
information (status.xml). An interval of 60 seconds is typical.
5. Select Send only heartbeat status messages if you want to just manage the appliance, and
not generate any reports.
6. If needed, enable an addi tional server in the Additional ViewPoint server area.
7. In the GMS/ViewPoint credentials area, enter and confirm the password that will be used
to add the SRA E-Class appliance. On the GMS/ViewPoint Add Unit screen, you will add this
SonicWALL Aventail appliance by entering GMS as the login name and the credentials you
specified in the Password box.
8. Select Enable single sign-on for AMC configuration if you want to be able to open the
Aventail Management Console and make changes to its configuration from within GMS. If this
setting is cleared, you can still open AMC, but you must first enter your AMC login credentials;
this is less convenient, but more secure.
9. Click Save.
Notes
z
Refer to the documentation for the SonicWALL Global Management System on
www.mysonicwall.com for further information.
Configuring an Appliance for ViewPoint
The ViewPoint Reporting Module is a separate Web-based reporting tool that gives you detailed
reports for individual SonicWALL appliances. You can track ne twork utilization, monitor critical
network events and activity—such as security threats, inappropriate Web use, and bandwidth
levels—using a customizable dashboard and a variety of historical reports. Information is sent from
the appliance as a stream of syslog data and stored in the ViewPoint database or as files on the
hard disk.
X To configure your SRA EX-Series appliance for ViewPoint
1. Click General Settings in the main AMC navigation menu.
Page 62
52 | Chapter 3 - Working with AMC
2. Click Edit in the Centralized management area.
3. Select the Enable ViewPoint reporting check box, and then enter the host name or IP
address of the ViewPoint server, and its port number.
4. In the GMS/ViewPoint credentials area, enter and confirm the password that will be used
on the ViewPoint server to add the SRA E-Class appliance (the login name is GMS).
5. Select Enable single sign-on for AMC configuration if you want to be able to open the
Aventail Management Console and make changes to its configuration from the ViewPoint
server. If this setting is cleared, you can still open AMC, but you must first enter your AMC
login credentials; this is less convenient, but more secure.
6. Click Save.
Working with Configuration Data
This section explains how to save and activate configuration changes in AMC.
Saving Configuration Changes to Disk
When you’re finished making change s on a page in AMC and you click Save, your changes are sav ed
to disk. If you click Cancel or use the Back button in your browser, your changes are not saved.
X To save configuration changes to disk
1. Make any changes on a page in AMC.
2. Click Save at the bottom of the page.
Configuration changes are saved to disk, but are not applied to the active configuration. The status
area in AMC changes to indicate that you have pending changes that need to be applied to the
appliance.
See “Applying Configuration Changes” on page 52 for more information.
Notes
z
There are several options for managing configuration data—exporting it or saving it on the
appliance, or restoring it, for example. See “Managing Configuration Data” on page 224 for
more information.
Applying Configuration Changes
As you make configur ation changes to the a ppliance, they are saved to disk but are not immediately
applied. These changes can either be activated (described in this section) or discarded (see
“Discarding Pending Configuration Changes” on page 53 for more information).
To activate your changes, you must apply them. You can apply most changes without interrupting
service to users, and new connections will use the new configuration. Low-level configuration
changes (for example, an IP address change) are a bit more disruptive: network services are
automatically restarted and user connections are terminated, forcing users to reauthenticate. If
possible, you should apply these sorts of configuration changes during off-peak hours (perhaps
during a maintenance window) and notify your users beforehand.
If you need to restart services manually, see “Stopping and Starting the SonicWALL Access
Services” on page 348.
X To apply your changes
1. From the main navigation menu, click Maintenance.
Page 63
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 53
2. On the Maintenance page, click Apply changes. ( You can also click the Pending changes
link in the upper-right corner of AMC.)
3. Assess the impact of applying your changes by looking at the message on the Apply Changes
page:
Warning messageDescription
z
Applying changes will restart all services
and terminate all user connections.
z
Applying changes will terminate existing
TCP/IP user connections.
z
Applying changes will terminate existing
Applying any of these changes terminates
existing user connections.
CAUTION: This requires users to
reauthenticate, and may cause them to lose
data.
HTTP user connections.
Your changes will require AMC to restart, which
will end your current administrative session.
When the request is complete, open a new
AMC will be unavailable after your current
session ends. Close your browser and then
log in to AMC again.
browser and log in to AMC again.
No authentication realms are enabled. This will
prevent users from accessing any resources.
At least one authentication realm must be
enabled for users to have access to
resources. Otherwise, users cannot
authenticate to the appliance.
4. Click Apply Changes to apply configuration changes.
Notes
z
When you apply configuration changes to WorkPlace, AMC performs a restart of the services.
Users do not need to reauthenticate to WorkPlace, but if they provided Windows login
credentials to access a network share, they are prompted to re-enter them when WorkPlace
restarts.
z
Any connections that exist when you apply changes continue to use the old configuration unt il
the connection terminates. Because Web conn ections are short-lived, most users accessing W eb
resources pick up configuration changes fairly quickly. On the other hand, client/server
connections can survive for a long period of time.
z
If the new configuration fails to load, existing connections remain in effect but new connection
attempts will fail. For details on what to do in this situation, see “AMC Issues” on page 411.
Discarding Pending Configuration Changes
Configuration changes you make in AMC are saved to disk, but they are not in effect until you apply
them, as described in “Applying Configuration Changes” on page 52. You can use the AMC log file
to find out what changes are pending, and go to the Apply changes page in AMC to discard them.
Pending changes can only be discarded as a group: you cannot discard them selectively.
X To discard pending changes
1. (Optional) You can review the list of pending changes in the management console audit log
file.
a. From the main navigation menu, click Logging, and then select Management Console
audit log in the Log file list.
Page 64
54 | Chapter 3 - Working with AMC
b. Any Info level item added since the last Applied configuratio n changes message appears is
a change that can be discarded.
See “Management Audit Log” on page 202 for more information.
2. From the main navigation menu, click Maintenance, and then click Apply changes.
3. On the Apply Change s pag e, click Discard. The time- and date-stamp of the configuration
that will be restored when you discard pending changes is displayed.
4. Click OK to confirm that you want to discard changes.
Deleting Referenced Objects
You cannot delete an object (such as a resource or a user) if it is still referenced by another object
(the check box next to it in AMC cannot be selected). In this example, the resource ahsiple cannot
be deleted:
In order to delete an object that is in use by anther object—such as a Web shortcut, a WorkPlace
layout, or an access rule—you must first out what objects are using it. To do this, expand the list
item by clicking on the plus (+) sign next to it. In this example the resource is used by a WorkPlace
shortcut named DFS; it can be deleted only after the WorkPl ace shortcut is removed. (The resource
is also part of a resource group named Default Resources, but it can be deleted if that is the only
reference.)
The following table lists the object types that cannot be deleted if they are referenced by other
objects.
This object type...Can be referenced by this object type
Resource Access control rules, resource groups, WorkPlace Web shortcuts
Resource groupsAccess control rules
UsersAccess control rules
User groupsAccess control rules
RealmsUsers, user groups
Authentication serversRealms
CommunitiesRealms
Web application profilesResources
End Point Control zonesAccess control rules, communities
Device profilesEnd Point Control zones
Page 65
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 55
Chapter 4
Network and Authentication Configuration
This section provides information about essential network configuration tasks, including configuring
network interfaces, selecting a routing mode, configuring network gatew ays, defining static routes,
and name resolution. It also explains how to manage SSL and CA certificates, and configure user
authentication.
This is the minimal network configuration required to get the appliance up and running. For
information on configuring additional services—including NTP , SSH, ICMP, and syslog—see “System
Administration” on page 193.
Page 66
56 | Chapter 4 - Network and Authentication Configuration
Configuring Basic Network Settings
All basic network settings—including IP interfaces, routing, and name resolution—are configurable
in AMC. The starting point in AMC for configuring network options is the Network Settings page.
Specifying System Identity
You must name the appliance and specify the domain name in which it is located.
X To specify system identity
1. From the main navigation menu in AMC, click Network Settings.
2. In the Basic area, click Edit. The Configure Basic Network Settings page appears.
3. The Appliance name helps you differentiate appliances in several contexts (especially if more
than one appliance is running). The name is not visible to users:
{
It sets the command prompt for the SonicWALL appliance.
{
It is saved to a log file, so you can identify the appliance to which a particular log message
applies.
Page 67
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 57
{
When you export a configuration file for the appliance (on the Maintenance page in
AMC), the Appliance name is prepended to the file name.
4. In the Default Domain box, type the name of the domain in which the appliance is located
(for example, yourcompany.com). This name defines the DNS namespace used to identify
hosts accessed by the appliance.
Configuring Network Interfaces
T o configure the network interfaces, specify the IP address, subnet mask, and interface speed. You
can run the appliance using both the internal and the external interfaces (a dual-homed
configuration), or optionally just the internal interface (a single-homed configuration). For more
information on the interface configuration options, see “Network Architecture” on page 17.
X To configure network interfaces
1. From the main navigation menu in AMC, click Network Settings.
2. In the Basic area, click Edit. The Configure Basic Network Settings page appears.
3. In the Network interfaces area, configure the settings for the internal interface connected to
your internal (or private) network. Click the link for Internal and then configure these
settings:
a. Type an Address and Netmask for the interface.
b. Select the appropriate interface Speed from the list (the default is Auto).
c. Click OK.
4. To configure the settings for the interface connected to the external network (or Internet) do
the following:
a. Click the link for External.
b. Select the Enabled check box.
c. Type the Address and Netmask settings used to access the SonicWALL appliance from
the Internet. The external IP address must be publicly accessible.
d. Select the appropriate interface Speed from the list (the default is Auto).
e. Click OK.
5. Click Save.
6. Click Pending changes and then apply the changes. (For more information, see “Applying
Configuration Changes” on page 52.)
Notes
z
If you configure the appliance to use both the internal and external interfaces, verify your
routing settings to make sure that you have a network route to the internal interface. If the
appliance is on a different network than the computer you’re using to access AMC, you must
set up routing (configure an internal default network gateway that will pass traffic to an internal
router, or define a static rout e to the network on which the appliance is installed) to maintain
access to AMC after you apply your network configuration changes. For mor e information, see
“Configuring Routing” on page 59.
Configuring ICMP
Enabling ICMP (Internet Control Messaging Protocol) will let you use the ping command to test
network connectivity on any interface.
To enable pings, select the Enable ICMP pings check box. To disable pings, clear the che ck box.
Page 68
58 | Chapter 4 - Network and Authentication Configuration
Viewing Fully Qualified Domain Names and Custom Ports
The Fully qualified domain names section of the page provides a table of the IP addresses,
FQDNs, and the WorkPlace sites and URL resources they are used by. You can sort the list forward
or backward by any column heading by clicking the column heading link. Under Used by, click a
WorkPlace site name or URL resource name that appears as a link to go to that page in AMC where
you can edit the settings for it.
The Custom ports sectio n provides a table showing the custom port number and the URL resource
that uses that port for all URL resources configured to use custom ports. Under Used by resource,
click a URL resource name that appears as a link to go to the Resources > Edit Resource page to
edit the resource settings.
Configuring Fallback Servers for Connect Tunnel
You can set up one or more fallback servers for Connect T unnel users in case their primary appliance
becomes unavailable due to a planned outage, for example, or a natural disaster. Users don’t need
to know the names of the fallback servers you set up: any time a client successfully connects to an
appliance that has any fallback servers specified, the list of fallback servers is transmitted to the
client and stored there.
Page 69
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 59
X To specif y a fall back server for Connect Tunnel users
1. From the main navigation menu, click Network Settings.
2. In the Tunnel service area, click Edit. The Configure Network Tunnel Service page
appears.
3. In the Fallback servers area, click New.
4. Specify the fallback Server by host name or IP address.
5. In the Realm box you have two choices:
{
Leave it blank: Whatever realm the user was logged in to before the primary server
became unavailable is the same realm name that will be used on this particular fallback
server.
{
Specify a realm: Force users to log in to a particular realm when they connect to this
server.
Notes
z
Fallback server settings are not replicated as part of policy replication. In a group of servers
that have designated fallback servers, each appliance has a unique list that should not be
replicated on the other servers.
Fallback Servers and the User Experience
If an existing connection fails, the Connect T unnel client automatically attempts a connection to any
fallback servers that are specifie d. This fe ature is available to Connect Tunnel clients running on a
Windows, Macintosh, or Linux operating system. Users will not be aware that a fallback server is
being contacted, except for an initial pause of about 20 seconds as the connection is attempted,
and a status message indicating that a backup host is being contacted.
Session Limits
If the login credentials for users include a PIN or other parameter that is valid for only a limited
period of time, you should be aware of what your session limits are. For example, if Credential lifetime is set to only 30 seconds and the client works through several fallback servers while
attempting to make a connection, the user’s PIN or other parameter may time out before the list of
possible servers is exhausted.
There are a few settings that govern how long a session can be resumed without requiring
reauthentication:
z
z
Notes
z
z
z
z
Configuring Routing
Credential lifetime is a global setting that is specified on the Configure General Appliance
Options page (click General Settings in the main navigation menu, and then click Edit in the
Appliance options area).
Limit session length to credential lifetime is a setting that is configured on a per-
community basis. When selected, tunnel client sessions in a given community terminate and
require reauthentication after the length of time specified by Credential lifetime.
If the client connects to a fallback server and the requested realm (as configured in AMC) is
unavailable, the connection fails with an authentication error.
Users connecting to a high-availability pair of appliances operate with the same fallback
information, regardless of which member of the pair they initially connect to.
Once a server has been contacted, fallback will not continue even if the login attempt fails.
If a user manually changes from one appliance that has a fallback list of servers to another, the
second server will display the last known realm the user selected for that host.
The SonicWALL SSL VPN appliance can be configured to route traffic using network gateways or
static routes. These routing methods can be used separately or in combination with each other.
Page 70
60 | Chapter 4 - Network and Authentication Configuration
Configuring Network Gateways
A network gateway is the address of a router that serves as point of access to another network.
Network gateway options are based on your network architecture and depend on whether you have
configured the appliance as dual-homed (both internal and external interfaces are enabled) or
single-homed (only the internal interface is enabled). See “Network Architecture” on page 17 for
more information.
Choosing a Network Gateway Option
When configuring network gateways in a dual-homed environment, you can choose among four
routing mode options:
z
Dual gateway
z
Single gateway, restricted
z
Single gateway, unrestricted
z
No gateway
Use the following scenarios to help you decide which option is best for your needs.
Scenario 1: Using an Internal and Internet Router
If you have an internal router as well as an Internet router, use the Dual gateway option. You can
leverage your internal router to access your internal resources.
Sample scenario—Company A has resources and a number of subnets on their internal network,
and they already have a robust routing system in place. With the dual gateway routing mode on
the appliance, client requests destined for internal resources on the corporate network can be
delivered to an internal router.
Scenario 2: Managing Client Requests with Static Routes
If you’re not using an internal router, or prefer managing routing on the appliance, use the Single
gateway, restricted option. In this scenario you must define static routes for all of your client
requests. Client requests without a static route will be discarded by the appliance. This option
requires more effort, but allows greater control over in-bound traffic.
Page 71
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 61
Sample scenario—Company B does not use a lot of internal resources, and prefers to manage its
routing information on the appliance. They create a static route for each resource to which their
VPN users should have access. If a VPN user attempts to reach an address that is not defined within
the appliance’s routing table, then the traffic is discarded.
Scenario 3: Returning Client Requests to a Specified Gateway
With the Single gateway, unrestricted option, the appliance delivers all client requests that do not
match a static route to the gateway that you specify (on either the internal or external interface of
the appliance). This option is less secu re because it could allow traffic to pass to your Internet router
and out of your network, depending on the filtering and routing policies of your infrastructure. This
configuration is also more difficult to maintain.
Sample scenario—Like company B, compan y C pre f ers to manage its routing information on the
appliance and has created static routes for each resource to which VPN users need access. However,
some users in this organization also need access to Internet resources, and this traffic must be
redirected from the appliance. For example, a company’s users might need to access a public Web
server that requires pre-registered IP addresses. A user must first establish a VPN session with the
appliance; the request is then redirected to the external gateway of the appliance.
Page 72
62 | Chapter 4 - Network and Authentication Configuration
Scenario 4: Evaluating the Appliance in a Lab Setting
Use the No gateway option during evaluation if you will have the interfaces connected to your
testing networks without the need for routing.
Scenario 5: Deploying Network Tunnel Clients in “Redirect All” Mode
If you are planning to deploy network tunnel clients in “redirect all” mode, you may need to give
your network tunnel users access to both your internal network and the Internet (for more
information, see “Redirection Modes” on page 171). This can be accomplished by either of these
options:
z
Use the Dual gateway option, and make certain that your internal gateway router has been
configured with a route to the Internet.
z
Use the Single gateway, unrestricted option, and then configure the appliance to use a route to
the Internet; see “Enabling a Route to the Internet” on page 64.
Configuring Network Gateways in a Dual-Homed Environment
The following steps guide you through the setup of network gateways in a dual-homed
environment, where both the internal and external interfaces are enabled.
X To configure network gateways in a dual-homed environment
1. From the main navigation menu, click Network Settings.
Page 73
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 63
2. In the Routing area, click Edit. The Configure Routing page appears.
3. To route traffic to your network gateways, select a routing mode from the following options:
{
Dual gateway—Specify an IP address for both the external and the internal gateways.
Network traffic generated in response to client requests will be sent to the external
gateway. All other traffic that does not have a static route defined will be sent to the
internal gateway.
{
Single gateway, restricted—Specify an IP address for just the external gateway. All other
traffic that does not have a static route defined will be discarded.
{
Single gateway, unrestricted—Specify an IP address to be used as both the external and
internal gateway. Network traffic not matching a static route will be sent to the external
gateway.
{
No gateway—Network traffic received by the appliance but not matching a static route is
discarded.
4. Click Save.
Notes
z
For users upgrading to version 8.9.0: If your previous configuration used the Enable route
to Internet setting, you can simplify your configuration in version 8.9.0 by specifying a dual
gateway system, where an internal gateway offers a path to the Internet for all access methods.
Configuring Network Gateways in a Single-Homed Environment
The following steps guide you through the setup of network gateways in a single-homed
environment, where only the internal interface is enabled. This configuration is less common than
one that is dual-homed.
X To configure a network gateway in a single-homed environment
1. From the main navigation menu in AMC, click Network Settings.
2. In the Routing area, click Edit. The Configure Routing page appears.
3. To route traffic to your network gateway, select one of these routing modes:
{
Default gateway—Specify an IP address for the default gateway. Network traffic received
by the appliance, but not matching a static route will be sent to this address.
{
No gateway—Network traffic received by the appliance, but not matching a static route is
discarded.
4. Click Save.
Page 74
64 | Chapter 4 - Network and Authentication Configuration
Enabling a Route to the Internet
If Routing mode is set to Single gateway, unrestricted you can still enable a route to the Internet
for your network tunnel clients, provided your appliance is dual-homed (both internal and external
interfaces are enabled). When Enable route to Internet is set, all tunnel traffic originating from
the client and destined for the Internet (running in “redirect all” mode) will be routed to the
specified IP address instead of being discarded.
X To enable a route to the Internet
1. From the main navigation menu in AMC, click Network Settings.
2. In the Routing area, click Edit. The Configure Routing page appears.
3. Expand the Advanced area. The Connect Tunnel area appears.
4. Select the Enable route to Internet check box, and then type the IP address of your
Internet router.
5. Click Save.
Configuring Static Routes
Static routes are added as entries to the routing table for networks reached from the internal
interface. Managing static route tables can be cumbersome, especially at a large site: you may want
to create and edit the routing information in a comma-separated value (CSV) text file outside of
AMC and then import it. Static route information that you impor t into AMC must be in an ASCII text
file, with each entry on a new line (separated from the previous entry by a CR/LF), and three values
separated by commas: IP address, netmask, and gateway. When you import a file, its contents
entirely replace any static routes currently specified in AMC.
X To configure static routing information
1. From the main navigation menu in AMC, click Network Settings.
2. In the Routing area, click Edit. The Configure Routing page appears.
3. In the Static routes area, you can add or modify list entries one by one or as a group:
{
Add a single entry by clicking New and then typing the route information in the IP
address, Netmask, and Gateway boxes. To modify a list entry, click its link, and then
make your changes. After you add or modify an entry, click OK.
Page 75
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 65
{
Click Import to select the static route table you want to import. The static route
information must be in an ASCII text file in CSV format. Each entry must be on a new line
(separated from the previous entry by a CR/LF), and must have three values separated by
commas: IP address, netmask, and gateway. When you import a file, its contents entirely
replace any static routes currently specified in AMC.
{
In order to modify an existing list of routes, you must either click the list item that you
want to change, or export the entire list, modify its contents, and then import it.
4. Click Save when you are finished making changes.
X To delete a static route
1. On the Configure Routing page, select the check box to the left of any static routes you want
to remove, and then click Delete.
2. Click Save.
Notes
z
If you configure the appliance to use both the internal and external interfaces, verify the routing
settings to make sure that you have a network route to the internal interface. If the appliance
is on a different network than the comput er you’re using to access AMC , you must set up routing
(configure an internal default network gateway that will pass traffic to an internal router, or
define a static route to the network on wh ich the appliance is installed) to maintain access to
AMC after you apply your network configuration changes. For more information, see
“Configuring Routing” on page 59.
z
The routing information in AMC is sorted as follows:
{
The primary key is the Netmask, with entries sorted in descending order (from largest to
smallest)
{
The secondary key is IP address, with entries sorted in ascending order (from smallest to
largest)
z
If your internal network has a contiguous address space, you can combine multiple static routes
into one entry by specifying the proper subnet mask when you create the static route. The
following table provides two examples of using a subnet mask to route internal traffic to multiple
networks from a single static route entry:
To route traffic to these networks:Type this IP addressType this subnet mask
192.168.0.0
192.168.1.0
192.168.2.0
192.168.3.0
192.168.*.*
(all networks in 192.168 range)
If necessary, you can explicitly create additional static routes for other subnets; the routing
table searches netmasks from most to least specific.
Configuring Name Resolution
The appliance needs access to DNS servers to resolve host names to IP addresses. If you use
WorkPlace to browse Windows networks, you also need to sp ecify a WINS (Windows Int ernet Name
Service) server and Windows domain name.
Configuring Domain Name Service
Configuring a DNS server enables the appliance to correctly resolve host names. Properly
configuring DNS ensures that the appliance can provide access to your network resources.
X To configure DNS name resolution
1. From the main navigation menu in AMC, click Network Settings.
192.168.0.0255.255.252.0
192.168.0.0255.255.0.0
Page 76
66 | Chapter 4 - Network and Authentication Configuration
2. In the Name resolution area, click Edit. The Configure Name Resolution page appears.
Configuring Windows Network Name Resolution
Certificates
3. In the Search domains box, type the default DNS domain name for your company (such as
example.com). This domain name will be appended to unqualified host names to resolve
them. You can enter a maximum of six domain names, separated by semicolons.
4. In the DNS server boxes, type the IP addresses of your primary and (if applicable) two
backup DNS servers. The backup servers are used if the primary server is unavailable.
5. Click Save.
If you want to browse files on a Windows network using WorkPlace, you must specify a WINS
(Windows Internet Name Service) server and a Windows domain name. WorkPlace uses this
information to perform name resolution and build a list of resources for users to browse.
X To configure Windows network name resolution
1. From the main navigation menu in AMC, click Network Settings.
2. In the Name resolution area, click Edit. The Configure Name Resolution page appears.
3. In the Windows networking area, type:
{
The IP address of your primary and (if applicable) secondary WINS server.
{
Your Windows domain name using NetBIOS syntax (for example, mycompany).
4. Click Save.
The SonicWALL appliance uses SSL certificates to secure information that the client computer sends
to the server, and to validate the appliance’s identity to connecting users. It requires at least two
SSL certificates:
Page 77
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 67
z
The SonicWALL services use a certificate to secure user traffic from a Web browser to
WorkPlace, and from the Connect clients to the appliance. (If you want to provide several
WorkPlace sites, you can use a wildcard certificate for multiple sites, or associate a different
certificate with each one. In either case, the sites can have differe n t h os t an d domai n n ame s;
for more information, see “Adding WorkPlace Sites” on page 299.)
z
AMC uses a separate certificate to secure management traffic. This is usually a self-signed
certificate.
CA certificates are also used for securing connections to back-end servers and authentication using
client certificates. See “Importing CA Certificates” on page 75 for more details.
Server Certificates
To manage the SSL server certificates used to access WorkPlace and AMC, click SSL Settings in
the main navigation menu in AMC. This is where you view, import, and delete SSL and CA
certificates.
Certificate Strategy
There are two types of certificates: commercial and self-signed.
z
A commercial CA verifies y our company’ s identity , v ouching for your identity by provi ding you
with a certificate that the CA signs. A CA need not be commercial or third-party—a company
can be its own CA. Commercial certificates are purchased from a CA such as VeriSign
(http://www.verisign.com), and are usually valid for one year.
z
With a self-signed SSL certificate, you are verifying your own identity. The associated private
key data is encrypted using a password. A self-signed certificate can also be a wildcard
certificate, allowing it to be used by multiple servers which share the same IP address and
certificate, but have different FQDNs. Although this kind of certificate is secure, a self-signed
certificate is not in the browser’s built-in list of CAs, so the user is prompted to accept it before
each connection. There are a few ways to avoid this prompting:
{
{
{
When deciding which type of certificate to use for the servers, consider who will be connecting to
the appliance and how they will use resources on your network:
z
If business partners are connecting to Web resources through the appliance, they will likely
want some assurance of your identity before performing a transaction or providing confidential
information. In this case, you would probably want to obtain a certificate from a commercial CA
for the appliance.
Configure the SonicWALL clients to use the certificate root file.
Add the self-signed certificate to the user’ s list of Trusted Root Certificate Authorities in the
Web browser.
Use a commercial CA, which is widely trusted by default.
Page 78
68 | Chapter 4 - Network and Authentication Configuration
On the other hand, employees connecting to Web resources may trust a self-signed certificate.
Even then, you may want to obtain a third-party certificate so that users are not prompted to
accept a self-signed certificate each time they connect.
z
To accommodate users who connect to the appliance from small form factor devices, configure
the appliance with a certificate from a leading CA (such as VeriSign), or import the root
certificate from your CA to your users’ small form factor devices.
CAUTION: When the appliance is configured with a cert ificate from a CA that is not well
!
known, or one that is self-signed, small form factor device users may see an error message
and be unable to log in. Windows Mobile-powered devices, for example, are configured with
the root files for only VersiSign, CyberTrust, Thawte, and Entrust. For more information on
small form factor devices, see “WorkPlace and Small Form Factor Devices” on page 305.
Obtaining a Certificate from a Comme r ci al CA
Obtaining a certificate from a commercial CA provides verification of your identity for people who
connect to your network through the appliance. You must perform several steps to obtain and
configure a certificate from a commercial CA:
Generate a CSR
Create a certificate
signing request (CSR)
Configure
Aventail clients
Configure Aventail Connect
client to use the trusted
root file
These six steps describe how to obtain a commercial certificate.
Submit the CSR
to a CA
Submit the CSR to a
commercial certificate
authority (CA)
Apply
your changes
This restarts the services to
activate the certificates
Add CA's root file
to CSR response
(Optional) If the CA didn't
include a trusted root file in
the CSR response, add it
Import the CSR
response
Import the CSR response into
AMC to create a certificate
Step 1: Generate a Certificate Signing Request
Using AMC, you can generate a certificate signing request (CSR). This process creates an RSA key
pair that will be used to secure server information, and a CSR containing your public key and
identity information. The information you provide is used by the commercial CA to generate your
certificate, and may be visible to users who connect to the appliance.
X To generate a CSR
1. From the main navigation menu in AMC, click SSL Settings.
2. In the SSL certificates area, click Edit.
Page 79
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 69
3. In the Certificate signing requests list, click New. The Create Certificate Signing Request page appears.
4. The Certificate information you fill out is stored in the CSR and used by the commercial CA
when generating your certificate; it may be visible to users who connect to the appliance.
a. In the Fully qualified domain name box, type the server name as you want it to appear
in the certificate. Also known as a “common name” (or CN), this is usually composed of a
host and a domain name; for example, you might type vpn.example.com.
Users with a Web-based client will use this name to access the appliance (in other words,
to access WorkPlace), so it’s best to use a name that is easily remembered. You’ll also
reference this name when configuring the Connect or OnDemand components to provide
access to TCP/IP resources. You must add this name to your external DNS to make the
appliance accessible to users.
b. In the Organizational unit box, type your division or department name (for example, IT
Department).
c. In the Organization box, type your company or organization name as you want it to
appear in your SSL certificate.
d. In the Locality box, type the name of your city or town. Spell out the name in full (don’t
use an abbreviation).
e. In the State box, type the name of your state or province. Spell out the name in full (don’t
use an abbreviation).
f. In the Country box, type the two-letter abbreviation for your country. For a list of valid
country codes, see the International Organiza tion for Standardization (ISO) Web site at
http://www.iso.org and search for ISO 3166-1.
g. In the Key length list, select the key length you want to use for the key: 512, 768, 1024
(the default), 1280, or 1536. Larger keys increase security, but make the appliance run
more slowly. A key length of 1024 or 1280 is recommended for most installations.
Page 80
70 | Chapter 4 - Network and Authentication Configuration
5. Review the information to verify that you’ve typed it correctly, and then click Save to generate
the CSR. The Create Certificate Signing Request page appears.
6. Copy the contents of the CSR text from AMC to the clipboard or into a text file, and the n click
OK.
Notes
z
Some commercial CAs may have problems reading CSRs that contain characters produced by
pressing the SHIFT key, such as “&” or “!”. For example, when specifying your company name
or other information, you may want to spell out “&” (if used) as “and”.
Step 2: Submit the CSR to a Commercial CA
The process of submitting a CSR will vary, depending on which commercial CA you choose. Ve riSign
is a popular commercial CA that provides SSL certificates through their Secure Site Services; for
information see http://www.verisign.com.
X To submit a CSR to a commercial CA
1. Copy the contents of your certificate signing request from the Create Certificate Signing
Request page in AMC.
2. Submit it to the CA using the method they request (usually you either copy and paste the CSR
text into a form on the CA’s Web site, or attach it to an email message).
Depending on what is specified by the CA, you may need to paste all the text, or only the text
between the BEGIN NEW CERTIFICATE REQUEST and END NEW CERTIFICATE REQUEST banners
(including the banners themselves). If you’re not sure, contact the CA.
3. Wait for the commercial CA to verify your identity. You may be asked to produce one or more
documents attesting to your corporate identity (such as a business license or article of
incorporation).
Notes
z
Submit your CSR only once; you may otherwise be billed twice by the CA. This would also
change the internal private key, making the response from the CA unusable.
Page 81
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 71
Step 3: Review CSR Response and Add CA’s Root Certificate
After you’ve submitted your CSR, you must wait for the CA to verify your identity. After they
complete this process, the CA will send you the certificate reply . It is usually in one of two formats:
z
A file attached to an email message. In this case, you can save the file to your local file
system (the one from which you’ll access AMC) and then import it into AMC.
z
Text embedded within an email message. In this case, you copy the text and pas te it into
a text box provided in AMC. Be sure to include the BEGIN CERTIFICATE and END CERTIFICATE
banners.
If the CA does not provide a full certificate chain in the CSR response (a common practice), AMC
will try to complete the certificate chain when you import the CSR response. If it is unable to
complete the chain, AMC displays an error message. If this occurs, you must upload the CA’s root
certificate or any intermediary public certi ficates to the appliance. If you are acting as your own CA,
you will probably need to perform this step.
X To complete a certificate chain
1. Obtain the trusted root certificate or intermediary public certificate from the CA. Most external
commercial CAs provide the certifi cates on their Web site; if the CA is run by your company,
check with the server administrator.
2. From the main navigation menu in AMC, click SSL Settings.
3. In the SSL certificates area, click Edit.
4. In the Certificate signing requests list, click the Process CSR response link for the
appropriate certificate. The Import CSR Certificate page appears.
5. Upload the certificate:
{
If the certificate is in binary format, click Browse and then upload the certificate reply
from your local file system (that is, the computer from which you’ve logged in to AMC).
{
If the certificate is in base-64 encoded (PEM) text format, click Certificate text and then
paste the certificate into the text box. Be sure to include the BEGIN CERTIFICATE and END CERTIFICATE banners.
6. Click Import to return to the CA Certificates page.
7. To verify that the certificate was properly uploaded, click CA Certificate. The new certificate
should appear on the CA Certificates page.
Step 4: Import the CSR Response Into AMC
To create a certificate, import the CSR response into AMC.
X To import a certificate reply
1. From the main navigation menu in AMC, click SSL Settings.
2. In the SSL certificates area, click Edit.
3. In the Certificate signing requests list, click the Process CSR response link for the
appropriate certificate.
4. Upload the certificate on the Import CSR Certificate page:
{
If the certificate is in binary format, click Browse and then upload the certificate reply
from your local file system (that is, the computer from which you have logged in to AMC).
{
If the certificate is in base-64 encoded (PEM) text format, select Certificate text and
paste the certificate into the text box. Be sure to include the BEGIN CERTIFICATE and END CERTIFICATE banners.
5. In the Used by list, select AMC or WorkPlace/access methods (select None if you want to build
a list of certificates from which to choose later). If you defined additional WorkPlace sites (in
addition to the default WorkPlace site), their names are included in this list.
6. Click Save.
7. To verify that the certificate was properly uploaded, click the plus sign (+) next to it on the
SSL Certificates page.
Page 82
72 | Chapter 4 - Network and Authentication Configuration
Step 5: Apply Your Changes
To start using a new certificate, you need to apply your configuration changes. For more
information, see “Applying Configuration Changes” on page 52.
After applying the change, the appliance examines the new certificate and begins using it for all
new connections. If the appliance fails to correctly process the certificate, you see a failure message
and the event log records information about the failure. Typically, this occurs if there is no
certificate, the certificate has expired (or is not yet valid), or the cached password in the encr ypted
password file is incorrect.
Notes
z
If your users authenticate using digital certificates, you must configure a trusted root file on the
server as well as on the clients. See “Configuring Client Certificate Revocation” on page 76.
Creating a Self-Signed Certificate
If you plan to use a self-signed SSL certificate (instead of obtaining a certificate from a commercial
CA), you can create one using AMC. A host is not selected for the certificate, because there is no
one to one mapping of certificates to hosts. Wildcard certificates allow one certificate to map to
multiple hosts.
X To create a self-signed certificate
1. From the main navigation menu in AMC, click SSL Settings.
2. In the SSL certificates area, click Edit.
3. Click New and then select Create self-signed certificate from the menu.
4. In the Fully qualified domain name box, type a wildcard domain name such as
*.sonicwall.com, or type the indivi dual server nam e as you want it to appear in the certificate:
{
The main appliance certificate can be a wildcard certificate, or you might type something
like vpn.example.com. You must add this name to your external DNS to ma ke the
appliance accessible to users.
This is the name users will enter for access to Web-based resources on your network. For
a wildcard certificate, the “*” matches any string of characters up to the dot, such as
specific server names. You will also reference this name when configuring the Connect
clients to provide access to TCP/IP resources.
{
If this certificate will be used by AMC (as opposed to WorkPlace), you might type
something like amc.example.com. In most cases, you should add this name to your
internal DNS to simplify access to AMC.
5. In the Organization box, type the company or organization name as you want it to appear in
your SSL certificate.
6. In the Country box, type the two-letter abbreviation for your country. For a list of valid
country codes, go to the International Organization for Standardization (ISO) Web site at
http://www.iso.org and look for information on ISO 3166-1.
7. Click Save.
8. Click Pending changes and then apply the changes. (For more information, see “Applying
Configuration Changes” on page 52.)
Creating the Trusted Root File for a Self-Signed Ce rt if icate
If you use a self-signed certificate, you will probably want to provide your users with a trusted root
file (otherwise they will see a security prompt at every login).
X To create a trusted root file for a self-signed certificate
1. Log in to the appliance.
2. Make a copy of the server.cert file, which is located in /usr/local/extranet/etc.
Page 83
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 73
3. Open the copied file in a text editor and remove everything except the root certificate. The file
will contain one or more certificates as well as the private key. The root certificate is the last
certificate block in the file, including the banners. In the following example, you would delete
the first certificate block and the private key block:
Certificate 1
Root certificate
Private key
The resulting file looks like this:
4. Distribute this file to your users. This increases security and prevents users from being
prompted to accept the SSL certificate each time they connect. See “Importing CA
Certificates” on page 75.
{
If you want increased security for your Web-based users, this file should be imported into
the browsers for these users.
Notes
z
Setup Tool creates a self-signed certificate for AMC. For most deployments, this self-signed
certificate is sufficient and there is no need to obtain a certificate from a commercial CA. It is
important, however, to use AMC within a trusted network. Self-signed certificates protect
against passive eavesdroppers but not against active attackers.
z
If you’re deploying OnDemand for Microsoft Internet Explorer users on Apple Macintosh
systems, you must obtain a commercial SSL certificate. A self-signed certificate will not work
because the Macintosh Java Virtual Machine (JVM) won’t accept a certificate signed from an
unknown CA.
Managing Server Certificates
This section describes tasks related to managing SSL certificates in AMC.
Importing an Existing Certificate from Another Computer
If you already have a certificate from a commercial CA, you may want to tran sfer it and its private
key to the appliance. After you import the certificate, it will be used by the servers to secure user
traffic on the appliance.
A host is not selected for the certificate, because there is no one to one mapping of certificates to
hosts. Wildcard certificates allow one certificate to map to multiple hosts .
The appliance stores certificates in the PKCS #12 format. If your certificate is stored in a different
format, convert it to PKCS #12 before importing. After performing the conv ersion, confirm that the
PKCS #12 file contains the complete certificate chain.
X To transfer an existing certificate to the appliance
1. From the main navigation menu in AMC, click SSL Settings.
2. In the SSL certificates area, click Edit.
Page 84
74 | Chapter 4 - Network and Authentication Configuration
3. Click New, and then select Import certificate from the menu.
4. On the Import Certificate page, click Browse and then upload the certificate from your local
file system (that is, the computer from which you have logged in to AMC).
5. In the Password box, type the password that was used to encrypt the private key.
6. Click Save.
The appliance uses the previous certificate until you apply your con f iguration change s.
Exporting an SSL Certificate
You can export the SSL certificate used to secure user traffic on the appliance. It will include the
private key and be saved in PKCS #12 format.
X To export the SSL certificate from the appliance
1. From the main navigation menu in AMC, click SSL Settings.
2. In the SSL certificates area, click Edit.
3. Select the check box next to the certificate you want to export, and then click Export. The
Export Certificate page appears.
4. In the Password box, type the password that you want to use to encrypt the private key.
5. Click Save, and then download the certificate file to your local file system (that is, the
computer from which you’ve logged into AMC).
6. Click OK.
CA Certificates
Every CA requires a certificate so that it can be “trusted” by entities that request digital certificates
from it. If a client trusts a CA certificate, it automatically trusts any other certificates that are issued
by that CA. CA certificates thus form one of the foundations of public key cryptography. The CA
certificate is either signed by the CA itself (a “root certificate”), or by a higher authority in a
hierarchy of CAs in a public key infrastructure (an “intermediate CA certificate”).
The appliance uses CA certificates to secure the following:
z
z
z
The appliance includes over 100 public root certificates from leading commercial CAs. If you’ve
obtained a certificate from a commercial CA, its root certificate o r intermediary public ce rtificate is
probably already installed on the appliance. However, if you are acting as your own CA you must
import a root or intermediary public certificate to the appliance. T o view the list of certificates, click
Edit in the CA Certificates area of the SSL Settings page. This is also where you delete CA
certificates.
Connections to a back-end LDAP or AD authentication server
Connections to a back-end HTTPS Web server
Device profiling (End Point Control), to verify the validity of certificates submitted b y users who
connect to the appliance. See Client certificate in “Device Profile Attributes” on page 267 for
more information.
Page 85
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 75
Importing CA Certificates
If the appliance is not configured with the necessary CA certificate, you must obtain a copy and
import it to the appliance using AMC. The procedure is the same, whether the certificate will be used
to secure connections to back-end resources, or to authenticate users by means of a client
certificate.
X To import a CA certificate to the appliance
1. Obtain the trusted root certificate or intermediary public certificate from the CA. Most external
commercial CAs provide the certifi cates on their Web sites; if the CA is run by your company,
check with the server administrator.
2. From the main navigation menu in AMC, click SSL Settings.
3. In the CA Cert ificates area, click Edit.
4. Click New. The Import CA Certificate page appears.
5. Do one of the following:
{
If the certificate is in binary format, click Browse and then upload the certificate reply
from your local file system (that is, the computer from which you’ve logged in to AMC).
{
If the certificate is in base-64 encoded (PEM) text format, click Certificate text and then
paste the certificate into the text box. Be sure to include the BEGIN CERTIFICATE and END CERTIFICATE banners.
6. Specify the connection types this certificate will be used to secure:
Connection typeDescription
Authentication server
connections (LDAPS)
Securing your LDAP or Active Directory (AD) connection with SSL
enhances security by preventing attempts to impersonate the LDAP
or AD server. To configure LDAP or AD over SSL, you must add the
root certificate for the CA that granted your LDAP or AD certificate
to the SSL trusted roots file.
Web server connections
(HTTPS)
If you have a back-end Web resource that is secured with SSL (that
is, it uses HTTPS instead of HTTP), configure the Web proxy service
to verify the root certificate presented by the back-end server. This
important security check will help ensure that you can trust the
identity of the back-end server. See “Configuring the Web Proxy
Service” on page 356 for details.
If the back-end server’s root certificate is not pre-installed on the
appliance, you must obtain a copy and import it in AMC.
Device profiling
(End Point Control)
EPC can be used to verify the validity of certificates submitted by
users who connect to the appliance. If a client certificate is used in
a device profile to classify users into an EPC zone, the appliance
must be configured with the root or intermediary certificates for the
CA that issued the client certificate to your users.
When the appliance interrogates the user’s computer to dete rmine
if the specified certificate is present, it can be configured to search
just the system store
(HKLM\SOFTWARE\Microsoft\SystemCertificates), or also include
the user store (HKCU\Software\Microsoft\SystemCertificates).
7. Click Import. The CA Certificates page appears and displays a confirmation message.
8. The new certificate appears in the alphabetical list on the CA Certificates page. When you
upload a CA certificate for use with client certificate authentication (and you apply the
change), network services are automatically restarted and user connections are terminated,
forcing users to reauthenticate. You may want to schedule the change during off-peak hours.
Page 86
76 | Chapter 4 - Network and Authentication Configuration
Notes
z
If the certificate is being used to secure authentication server connections, check to see that
the appropriate LDAP over SSL or Active Directory over SSL settings are enabled on the
Configure Authentication Server page in AMC.
z
By default, the Web proxy service is configured to verify the root certif icate presented by back end HTTPS Web servers. This important security check helps ensure that you can trust the
identity of the back-end server. See “Configuring the Web Proxy Service” on page 356.
z
If you do not want to trust a CA listed on the CA Certificates page, select the check box next
to it, and then click Delete.
z
When setting up devices profiles, avoid checking for client certificates within the same zone
more than three times. If there are multiple EPC checks for client certificates within the same
zone, users may see an error message (“An error was encountered encoding data to be sent to
the Logon Server”).
Configuring Client Certificate Revocation
Certificates installed on client devices can be used to authenticate users or devices, giving them
access to a particular realm. A certificate is usually valid until it expires, but it is possible for it to
be compromised before it expires. For example, a CA may decide th at a certificate was improperly
issued, or its private key may have been compromised. You can consult a certificate revocation list
(CRL) to check a certificate’s validity (its location—the CRL distribution point, or CDP—is typically
included in the X.509 certificate). If a certificate is no longer valid, the user is denied access.
Use the Manage CA Certificate page in AMC to configure certificate revocation checking for
individual certificates, and determine the connection types the certificate is us ed to secure.
X To veri fy th e va li di ty of a client certificate and configure certificate revoca tion
1. From the main navigation menu in AMC, click SSL Settings.
2. Under CA Certificates, click Edit.
3. To see details about a certificate, click the plus s ign (+) next to it in the Issued To li st. To edit
a certificate, click its link. For example, click the plus sign next to “Thawte Server CA” to see
details about this certificate from Thawte Consulting, and click the link to edit it.
4. In the Used for area, specify the connection types this certificate is used to secure.
{
Authentication server connections (LDAPS)—See “Configuring a PKI Authentication
Server” on page 103.
{
Web server connections (HTTPS)—See “CA Certificates” on page 74.
{
Device profiling (End Point Control)—See Client certificate in “Device Profile
Attributes” on page 267.
Page 87
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 77
5. To specify CRL settings, click Certificate revocation list (CRL) in the Certificate revocation checking area. The format for the CRL must be DER-based (.crl); the applian ce
cannot use a CRL that's been created in PEM format.
6. The appliance retrieves lists (using LDAP or HTTP) of revoked certificates from a CRL
distribution point (CDP). Specify the location of this CDP:
{
The CDP is usually specified in the c ertificate itself. In this case, click Use CDP from
client certificate.
{
Alternatively you can specify a URL for it. Click Use remote CDP; if a login is required for
it, type the credentials.
7. If Use remote CDP is selected, you can specify how often the CRL should be retrieved using
the Download CRL every <n> hours option. If you don’t specify a download interval, a new
CRL is retrieved when the old one expires. (CRLs are updated frequently so that when a
certificate is revoked, that information is distributed in a timely manner.)
8. The appliance checks client certificates against this list. To perform CRL checking for the entire
chain of certificates, starting with the CA root certificate, select the Validate the entire chain
check box.
9. Specify whether users should be allowed or denied access if the CDP is inaccessible by
selecting Allow user access or Block user access. The remote CDP you specified might be
offline, or it may not be indicated on the certificate. (It is an optional item for the X.509
standard, not a mandatory one.)
10. Click Save.
Managing CA Certificates
This section describes tasks related to managing certificates on the appliance; importing certificates
is described in “Importing CA Certificates” on page 75.
Viewing CA Certificate Details
You can view the details for the appliance certificate, such as the subject, issuer, start and end time,
serial number , and MD5 checksum. Details of a newly imported c ertificate are not available until you
have applied the configuration change.
Page 88
78 | Chapter 4 - Network and Authentication Configuration
X To view CA certificate details
1. From the main navigation menu in AMC, click SSL Settings.
2. In the CA Cert ificates area, click Edit.
3. Click the plus sign (+) to the left of the certificate you want to see details about.
Mapping Certificates to Hosts
Since multiple hosts on the appliance may use a single wildcard certificate, the Certificate usages
table provides a mapping of a single certificate to multiple sets of hosts. A set of hosts is defined
as one or more WorkPlace sites, Exchange ActiveSync sites, or custom FQDN mapped resources
that are on the same IP address. Any given set of hosts must use the same wildcard certificate and
therefore are treated as a single item for mapping certificates in the Certificate usages table.
AMC is treated as a separate host even if it is on the same IP address as other hosts on a singlehomed appliance.
X To map a new certificate to a host or set of hosts
1. From the main navigation menu in AMC, click SSL Settings.
2. In the SSL Certificates area, click Edit.
3. In the Certificates column of the Certificate usages table, click on the certifi cate to activate
an in-place editor with a drop-down certificate selector.
4. Select the certificate. For individual hosts, all certificates are available for selection. For a set
of multiple hosts, only wildcard certificates are available for selection.
5. Click OK.
Exporting CA Certificates
You can export a CA certificate and its private key to your local computer. The certificate is saved
in PKCS #12 format.
X To export a CA certif icate
1. From the main navigation menu in AMC, click SSL Settings.
2. In the CA Cert ificates area, click Edit.
3. Select the check box to the left of the certificate you want to export.
Page 89
4. Click Export.
5. In the Password text bo x , ty pe the password that will encrypt the private key.
6. Click Save. The certificate is saved (by default) to a file named server_cert.p12.
Deleting CA Certificates
To make the list of certificates more manageable, you might want to delete those that you know
you will never need.
X To delete a CA certificate
1. From the main navigation menu in AMC, click SSL Settings.
2. In the CA Cert ificates area, click Edit.
3. Select the check box to the left of any certificates you want to delete.
4. Click Delete.
Certificate FAQ
This section addresses frequently asked questions about working with certificates.
How do I obtain a certificate from a non-commercial CA?
The process is identical to the one for obtaining a certificate from a commercial CA, except that you
submit the CSR to a non-commercial CA (such as a Microsoft Self-Signed Certificate Authority). This
part of the process is outlined in “Step 2: Submit the CSR to a Commercial CA” on page 70.
When do certificates and CRLs expire?
Self-signed certificates are v alid for five years. The expiration date for third-party certificates varies,
depending on who issued the certificate; contact the CA for more information. A Certificate
Revocation List (CRL) is valid for a much shorter period of time: days, or even hours.
When using certificates and CRLs, it is important for the clock on the appliance to be accurate, since
it is used to determine when these items expire.
Are intermediate certificates supported for end user certificate verification?
Yes, intermediate certificates are supported for end user certificate verification. This covers PKI and
LDAP certificate methods. This allows an intermediate certifying authority to be imported to validate
a certificate chain, without requiring trust of the root certifying authority.
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 79
What are the different CA certificates on the appliance and how are they used?
To see the list of CA certificates available on the appliance, click SSL Se ttings on the main
navigation menu, and then click Edit in the CA Certificates area. By default, any certificate in the
list can be used to secure up to three connection types (authentication server, secure Web server,
and client certificate). Click on a certificate to set the connection types you want it to secure.
How many CA certificates can be stored on the applian ce?
The roots file can contain as many certificates as you want to trust. For instructions on how to
import additional CA certificates, see “Importing CA Certificates” on page 75.
Can private keys or CSRs generated from other tools be imported to the appliance?
Private keys and CSRs must be generated on the appliance using Setup Tool or the certificate
generation tool. However, you can copy private keys and CSRs from one SonicWALL appliance to
another using the procedure described in “Managing Server Certificates” on page 73. Any copied
certificates are overwritten if you make changes to them in AMC.
Where is the AMC certificate stored?
AMC’s self-signed certificate is stored on the appliance in /usr/local/app/mgmtserver/sysconf/active/.
For AMC, a self-signed certificate is sufficient for most environments. It is important, however, to
use AMC within a trusted network. Self-signed certificates protect against passive eavesdroppers
but not against active attackers.
Page 90
80 | Chapter 4 - Network and Authentication Configuration
Should I keep all of the CA certificat es on the appliance, or just the ones I need?
For the sake of convenience, the appliance includes more than 100 CA certificates. To make your
deployment more secure, you may want to pare this list down so that it includes only the CA
certificates you need for client certificates, LDAPS, and HTTPS. A shorter list is also easier to
manage.
Managing User Authentication
Authentication is the process of v erifying a user’ s identity to ensure th at the individual really i s who
he or she claims to be. (Authentication differs from authorization: it verifies identity, while
authorization specifies access rights.) This section describes how to reference external
authentication servers.
To manage user authentication, you must first define one or more external authentication servers
in AMC, and then set up realms that reference those authentication servers. These are the realms
that users will log in to. For information on realms, see “Using Realms and Communities” on
page 160. You can also configure a local authentication repository on the appliance for te s ti ng, as
described in “Configuring Local User Storage” on page 107.
About Intermediate Certificates
You can configure an authentication server to trust intermediate CAs without verifying the entire
chain. This provides benefits, such as distributing certificate management among several signing
authorities, several of whom might be remote to the root CA server and therefore would otherwise
be unable to issue certificates, and adds security because the compromise of any single signing
authority does not compromise the entire network.
To configure trusted intermediate certificates, see “Configuring a PKI Authentication Server” on
page 103.
For example, you could create a root certificate signing authority on a system that is not connected
to the corporate network. You can then issue a set of trusted intermediate signing authority
certificates to be deployed in various sectors of the network (often by department or organizational
unit). For the VPN, this is most often done to distribute machine or personal certificates to client
systems.
The other alternative is to obtain a signing certificate from a certificate authority such as VeriSign
or Thawte. In this case, your main CA is actually an intermediate CA itself.
By SSL rules, the root CA certificate must be accessible in order to validate the entire chain.
However, the appliance makes no distinction between importing a CA certificate for trust and
importing a CA certificate to validate a certificate chai n for the intermediate CA that you want the
appliance to trust. If no options are selected when a CA certificate is imported, the CA will only be
used to validate certificate chains. (The options are the connection types the certificate is used to
secure: Authentication server connections (LDAPS), Web server connections (HTTPS), and Device
profiling (End Point Control)). Any CA certificate used onl y to validate certificate chains is not
offered as a trusted signer during client certificate authentication or EPC certificate enforcement.
When an end user presents a client certificate signed by an intermediate CA, assuming the
appliance trusts the signing authority, the user is allowed to authenticate and access resources
normally.
When an end user presents a client certificate issued by a root CA of the truste d i nt ermedi ate CA,
unless the administrator has also imported the root CA for trust purposes, the end user
authentication attempt fails due to lack of valid and trust ed certificate.
If a client presents a certificate that is signed by a CA that exists only for chain validation, the
certificate will be rejected. This results in an authentication failure or a failure for certificate
authentication and in a failure to match the device profile for certificate EPC.
Page 91
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 81
Configuring Authentication Servers
Setting up authentication involves the following: a directory (such as LDAP or Microsoft Active
Directory), an authentication method (username/password, token or smart card, or digital
certificate), and other configuration items that make the authentication process unique (for
example, an LDAP search base, or adding custom prompts and messages). The SonicWALL
appliance supports the leading authentication directories and methods.
After you reference an authentication server in a realm and associate users with the realm, the
appliance checks users’ credentials against the credentials stored in the specified authentication
repository. You can also set up chained (two-factor) authentication; see “Configuring Chained
Authentication” on page 109 for details.
X To configure an authentication server
1. From the main navigation menu in AMC, click Authentication Servers, and then click New.
2. In the User store area, specify the directory type or authentication method you want to
configure:
Authentication directoryCredential typeFor more information
Microsoft Active Directory
and
z
Username/password“Configuring Microsoft Active
Directory Servers” on page 83
Microsoft Active Directory Tree
LDAP
z
Username/password
z
Digital certificate
“Configuring LDAP and LDAPS
Authentication” on page 94
Page 92
82 | Chapter 4 - Network and Authentication Configuration
Authentication directoryCredential typeFor more information
RADIUS
z
Username/password
z
Token-based
authentication (such as
SecurID or SoftID)
z
RSA Authentication Manager
Server
Token-based
authentication (such as
SecurID or SoftID)
Public key infrastructure
(PKI)
z
Digital certificate (with
optional certificate
revocation checking)
z
RSA ClearTrust
N/A“Configuring a Single Sign-On
(single sign-on)
z
Local users
(local user storage)
Username/password—
used primarily for
testing purposes and not
recommended in a
production environment
3. Select the Credential type of the authentication server (what types are available depends on
the User store you selected).
4. Click Continue. For information about the next step in the configuration process, follow the
link for the User store you selected in the previous step.
“Configuring RADIUS
Authentication” on page 99
“Configuring RSA Server
Authentication” on page 102
“Configuring a PKI
Authentication Server” on
page 103
Authentication Server” on
page 104
“Configuring Local User
Storage” on page 107
Defining Multiple Authentication Servers
The SonicWALL appliance supports the definition and use of multiple authenticatio n servers. A realm
references one or two authentication servers and determines which access agents are provisioned
to your users and what End Point Control restrictions (if any) are imposed. See “Overview: Users,
Groups, Communities, and Realms” on page 159 for more about realms.
Following are examples of using multiple authentication servers referenced by realms:
Example: RADIUS with Token/SecurID and LDAP with username/password
Users logging in to a realm are authenticated against two servers. You can configure AMC so
that users see only one prompt. See “Configuring Chained Au thentication” on page 109 for
details.
z
Use different servers to handle authentication and authorization
Example: RADIUS with Token/SecurID and Active Directory (for group information)
The user authenticates against one repository, and then the user’s group information is passed
from a second one. For more information, see “Enabling Group Affinity Checking in a Realm”
on page 112.
z
Multiple credential types and a single authentication server
Example: RADIUS with username/password and RADIUS with Token/SecurID
Suppose your company employees log in with usernames and passwords, but the employees
of your call-center log in with SecurID tokens. You could create an employee realm and a
callcenter realm, each referencing the appropriate credential type and RADIUS server.
z
Multiple instances of the same directory/authentication method using different backend servers
Example: Two RADIUS/password instances using different RADIUS servers
In this case you would define two authentication servers, each with the appropriate server
information.
Page 93
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 83
z
Multiple instances of the same directory/authentication method on the same server,
configured differently
Example: Two instances of LDAP with username/password on the same server but using
different search bases
In this case each realm would search a different subtree within the directory. For example,
suppose Partner A is in one LDAP subtree and Partner B is in another. You could define a
partnerA realm and a partnerB realm, each configured with the appropriate search base.
Disabling Authorization Checks
You can optionally disable the querying of group information used for authorization when
configuring an authentication server. A Use this authentication server to check group membership check box is available for each server type that can contain group information used
for authorization, including Active Directory, Active Directory Tree, and LDAP servers.
Usually, when you use a directory server as part of authentication, you also want the group
information stored there to be used in policy authorization. However, in some cases a directory
server is used for secondary authentication and does not contain group information. In other cases,
the secondary authentication server does not use the same identifier for the user.
If a group query is made on both a primary and a secondary server , the authentication process takes
longer. However, if the user name is different on the two servers, a group query using the name
from the primary server will result in an error from the secon dary server. Since the appliance policy
always defaults to closed, such an error will result in any deny rule being applied to the end user.
By disabling group authorization checks on the secondary server, you can avoid these problems.
If group checking is disabled for an authentication server, the server will not be available in the list
of available affinity servers on the realm configuration page. Conversely , if an authentication server
is in use as an affinity server for any realm, group checking cannot be disabled for that
authentication server. See “Enabling Group Affinity Checking in a Realm” on page 112 for more
information.
Configuring Microsoft Active Directory Servers
The appliance can validate username/password credentials against Microsoft Active Directory (AD)
configured with either a single root domain, or one or more subordinate (child) domains. The
following illustration shows typical Active Directory configuration options:
Credentials
Username
Password
To specify a single root domain with one or more
subordinate (or “child”) child domains, select MicrosoftActive Directory Tree as the authentication directory.
The AD tree choice uses additional ports that facilitate
searching and logons:
You must modify y our firewall or router to allow the appliance to communicate with your AD server.
The appliance uses standard LDAP and LDAPS ports to communicate with Active Directory:
SSL (port 443)
Internet
Firewall
ł Global catalog (3268/tcp)
ł Global catalog, using SSL to secure the
directory server connection (3269/tcp)
ł Kerberos (88/tcp)
SonicWALL Aventail E-Class
SRA Appliance
Microsoft Active
Directory
Subordinate
or child domain
LDAP (port 389)
LDAPS (port 636)
Subordinate
or child domain
Page 94
84 | Chapter 4 - Network and Authentication Configuration
z
LDAP (389/tcp)
z
LDAP over SSL (636/tcp)
With Microsoft Active Directory Tree there are additional ports, which facilitate searches and logons:
z
Global catalog (3268/tcp)
z
Global catalog using SSL (3269/tcp)
z
Kerberos (88/tcp)
After configuring an AD server, you can validate the realm configuration settings by establishing a
test connection. For more information, see “Testing LDAP and AD Authentication Configurations” on
page 108.
Configuring Active Directory with Username and Password
Perform the following steps to configure an Active Directory authentication server with
username/password validation.
Notes
z
If you are using Active Directory with digital certificates, you must configure AD as an LDAP
realm. See “Configuring LDAP to Authenticate Against Active Directory” on page 92.
z
If your AD authentication server has subordinate (child) domains, see “Configuring Active
Directory with Subordinate Domains” on page 88 for more information.
X To configure Active Directory
1. From the main navigation menu in AMC, click Authentication Servers, and then click New.
2. Under User store, click Microsoft Active Directory.
Page 95
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 85
3. The only Credential type that is available for AD is Username/Password. Click Continue.
The Configure Authentication Server page appears.
4. In the Name box, type a name for the authentication server.
5. In the Primary domain controller box, type the IP address or host name of the AD domain
controller. If you are using a failover server (optional), specify its address in the Secondary domain controller box.
If the AD server is listening on a something other than the well-known port (389 for
unencrypted connections, or 636 for SSL connections), specify a port number as a colondelimited suffix (for example, ad.example.com:1300).
6. To specify a particular AD domain, type it in the Active Directory domain name box. This
should be the domain that you want to use as the search base (in other words, the domain
that contains the appropriate cn=users container). For example, if you want to search a single
domain such as marketing, type marketing.example.com. If you want to search your entire
company’s domain, type
the first available default naming context on the domain controller.
7. To perform AD searches, the appliance must log in to Active Directory (unless you have
configured AD to allow anonymous searches). In the Login name box, type the username or
sAMAccountname attribute used to log in to the Windows domain ( such as jdoe or
jdoe@example.com).
example.com
. If you do not specify a domain, the appliance searches
Page 96
86 | Chapter 4 - Network and Authentication Configuration
The login should be for a user who has privileges to perform searches and view user records,
such as the administrator on that domain controller. You may also specify a non-administrator
user who has these privileges.
If you specify an AD domain, the appliance searches that domain for users. If you do not
specify a domain, the appliance searches the first available default naming context on the
domain controller. If the user information is not stored in either of these locations, you need to
configure this realm as an LDAP realm. See “Configuring LDAP to Authenticate Against Active
Directory” on page 92.
8. Type the Password that corresponds to the Login name. After you’ve entered credentials,
you can click the Test button for each server you specified in order to test the connection.
9. Complete the information listed under Group lookup:
{
To enable group checking on this server, select the Use this authentication server to
check group membership check box. When this box is unchecked, the nested controls
are disabled because they apply only to group checking behavior. This check box, when
unselected, allows an authentication server for LDAP, AD, or AD-Tree to be configured
without enabling it for authorization checks. This improves efficiency by allowing better
stacked/affinity authentication support.
{
To specify the depth of the search (how many sub-groups to include in it), enter a number
in the Nested group lookup check box. Be aware that this type of search can take some
time because it requires searching the entire Active Directory tree; enabling Cache group checking is highly recommended.
{
To reduce the load on your directory and get better performance, cache the attribute
group or static group search results. Select the Cache group checking check box and
then specify a Cache lifetime, in seconds. The default value is 1800 seconds (30
minutes).
10. To secure the AD connection with SSL, expand the Active Directory over SSL area, and the
configure the following settings:
a. Select the Use SSL to secure Active Directory connection check box.
b. To view your certificate details and to verify that the root certificate can be used by the
appliance, click the SSL Settings link. This list should show the name of the CA (or CAs)
that issued the client certificates and the SSL certificates. If your AD server’s CA is not
listed in the file, or if you use a self-signed certifi cate, you must add your cert ificate to this
file. See “Importing CA Certificates” on page 75 for details.
c. To have the appliance verify that the AD domain controller host name is the same as the
name in the certificate presented by the Active Directory server, select the Match certificate CN against Active Directory domain controller check box. Typically, your
server name will match the name specified in its digital certificate. If this is the case with
your server, SonicWALL recommends enabling this option in a production environment.
This makes it more difficult for an unauthorized server to masquerade as your AD server if
your digital certificate or DNS server is compromised.
Page 97
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 87
11. In the Advanced area, you can specify a username attribute, set up custom prompts, enable
users to be notified of expiring Active Directory passwords, configure NTLM authentication
forwarding options, and set up one-time passwords.
12. Type the Username attribute you want to use to match usernames. In most AD
implementations, sAMAccountName matches the user ID (for example, jdoe). You can use cn
instead, but that would require the user to authenticate with his full name (John Doe) instead
of his user ID (jdoe).
13. To change the prompts and other text that Windows users see when they log in to the
authentication server, select the Customize authentication server prompts check box. If
users should log in using an employee ID, for example, you could change the text for the
Identity prompt from Username: to Employee ID:. (If you plan to use chained authentication,
customized password prompts are especially useful so that users can differentiate between
them.)
Page 98
88 | Chapter 4 - Network and Authentication Configuration
14. If the connection between the appl iance and the authentication server is secured with SSL
(Use SSL to secure Active Directory connecti on is enabled), you can allow users to
change their passwords in WorkPlace by selecting Enable user-initiated password change.
15. To allow the Active Directory server to notify users that their passwords are going to expire,
select the Notify user before password expires check box. Indicate when the advance
notice should begin (the default is 14 days, and the maximum is 30 days). The password
prompt users see is controlled by the AD server.
To allow users to manage their own passwords, select the Allow user to change password
when notified check box. This setting can be changed only if the Use SSL to secure Active
Directory connection check box in the Active Directory over SSL area is selected.
Password management is available only to users with Web access and those who are using
Connect Tunnel.
16. To enable NTLM authentication forwarding, click one of the NTLM authentication forwarding options. For more information, see “NTLM Authentication Forwarding” on
page 105.
17. To configure authentication that includes an OTP, enable Use one-time passwords with this authentication server. You must also configure your mail server: if OTPs are going to
be delivered to external domains (for example, an SMS address or external webmail address),
you may have to configure the SMTP server to allow passwords to be sent from the appliance
to the external domain.
{
In the Primary email address attribute box, enter the directory attribute for the email
address to which one-time passwords will be sent. If the primary attribute exists on the
authentication server, it is used.
{
The Secondary email address attribute, if specified, is used if the primary email
address attribute cannot be found.
To have OTPs sent as a text message (instead of an email message), enter the corresponding
attribute name (for example, SMSphone instead of Mail). See “Configuring the AD or LDAP
Directory Server” on page 113 for more information.
18. Click Save.
Notes
z
The Login name and Password fields are not always required to connect to an Active
Directory server. However, if they are not provided (or you don’t specify a password) the
appliance will bind anonymously. In this case, if you have not configured Active Directory to
allow anonymous searches, the search will fail.
z
Users must have permission on the AD server to change their passwords during the password
notification period, and the administrator must have permission to change user passwords after
they expire. For security reasons, both of these operations replace passwords rather than reset
them.
z
If you define multiple Active Directory with SSL servers, you should specify the same Match
certificate CN against Active Directory domain controller setting for each server.
(SonicWALL recommends enabling this option for a production environment.) Although AMC
allows you to configure this setting on a per-realm basis, the appliance actually uses the setting
specified in the last loaded ADS realm. Fo r example, if you sel ect this check bo x for t hree ADS
realms, but clear it for a fourth, the functionality would be disabled for all four realms.
CAUTION If Active Directory over SSL is not enabled, passwords are transmitted in the
!
clear to the AD server. If the internal network is not trusted, you should en able SSL. Your AD
server must also be enabled to use SSL. See the Microsoft AD documentation for details.
Configuring Active Directory with Subordinate Domains
Perform the following steps to configure authentication settings for a Microsoft Active Directory
server that has a single root domain and one or more child domains in the AD tree. In a given
deployment, only one AD authentication server with subordinate domains can be specified. In
addition, a domain name server must be configured before the appliance can support an AD tree
authentication server; see “Configuring Domain Name Service” on page 65.
Page 99
SonicWALL Aventail E-Class SRA Installation and Administration Guide | 89
Notes
z
If you are using Active Directory with digital certificates, you must configure AD as an LDAP
realm. See “Configuring LDAP to Authenticate Against Active Directory” on page 92.
z
If your AD authentication server does not have any subordinate (child) domains, see
“Configuring Active Directory with Username and Password” on page 84 for information on
configuring it in AMC.
X To configure Active Directory Tree
1. From the main navigation menu in AMC, click Authentication Servers, and then click New.
2. Under User store, click Microsoft Active Directory Tree.
3. The only Credential type that is available for AD tree is Username/Password. Click
Continue. The Configure Authentication Server page appears.
4. In the Name box, type a name for the authentication server.
5. In the Root domain box, type the fully qualified name of the AD root domain. For example,
company.com.
Page 100
90 | Chapter 4 - Network and Authentication Configuration
6. In the Login name box, type a fully-qualified Windows domain username (for example,
vpn_admin@company.com). The login should be for a user who has read access to the entire
domain tree, such as the administrator on that domai n controll er. You may also spe cify a nonadministrator user who has these privileges.
7. Type the Password that corresponds to the Login name. After you’ve entered credentials,
you can click the Test button for the root domain controller to test the connection.
8. Specify a combination of user authentication options:
{
Users can enter a domain name
If this is the only option you specify, users must type a domain name during
authentication; for example, username@domain.
{
Specify a default domain
To allow users to log in without entering or specifying a domain, select this option. The
VPN will assume the domain you specify here and try to authenticate the user.
{
Users can choose from a list of domains
To display all of the domains that belong to this root domain, click Load all domains. You
can select all or some of the domains users will be able to choose from, and rearrange the
order of the list.
9. Complete the information listed under Group lookup:
{
To enable group checking on this server, select the Use this authentication server to
check group membership check box. When this box is unchecked, the nested controls
are disabled because they apply only to group checking behavior. This check box, when
unselected, allows an authentication server for LDAP, AD, or AD-Tree to be configured
without enabling it for authorization checks. This improves efficiency by allowing better
stacked/affinity authentication support.
{
To reduce the load on your directory and get better performance, cache the attribute
group or static group search results. Select the Cache group checking check box and
then specify a Cache lifetime, in seconds. The default value is 1800 seconds (30
minutes).
10. To secure the AD connection with SSL, expand the Active Directory over SSL area, and the
configure the following settings:
a. Select the Use SSL to secure Active Directory connection check box.
b. Every domain in the AD tree must have a certificate. To view your certificate details and to
verify that the root certificate can be used by the appliance, click the SSL Settings li nk.
This list should show the name of the CA (or CAs) that issued the client certificates and the
SSL certificates. If your AD server’s CA is not listed in the file, or if you use a self-signed
certificate, you must add your certificate to this file. See “Importing CA Certificates” on
page 75 for details.
c. To have the appliance verify that the AD domain controller host name is the same as the
name in the certificate presented by the Active Directory server, select the Match certificate CN against Active Directory domain controller check box. Typically, your
server name will match the name specified in its digital certificate. If this is the case with
your server, SonicWALL recommends enabling this option in a production environment.
This makes it more difficult for an unauthorized server to masquerade as your AD server if
your digital certificate or DNS server is compromised.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.