CA - Signed certificate for Guest User Access/Authentication

Description

Guest users are presented with a certificate on redirection to an interface IP

Cause

if a self-signed certificate is in use, on the firewall, guest users will be redirected to the interface IP, when connecting to the guest network, and will receive a certificate warning.

Image

Importing a CA signed certificate and redirecting the Interface to the Firewall's Domain Name will ensure that that browser no longer displays a warning message.

To import a signed certificate and redirect the browser to the Firewall's Domain Name the following steps are required:


  1. Import a CA signed certificate under Device | settings | Certificates

    Image



  2. After the firewall has been restarted select the certificate under Device | settings |Administration | Management

    Image

    You will then be prompted to restart the firewall again


  3. Add the Firewall’s Domain Name under Device | Settings | Administration | Firewall Administrator

    Image

  4. Select its configured domain name under Device | Users | Settings | Web Login

    Image
  5. Enable DNS Proxy by adding a rule under Policy | Rules and Policies | DNS Rules

    Image
  6. Add a DNS Proxy Cache Entry under Network | DNS | DNS Proxy | Static DNS Proxy Cache Entries

    Image
  7. On the Guest DHCP scope add the Guest zone interface IP as the DNS server

    Image
  8. Enable guest services on the zone

    Image

Related Articles

  • SSH password authentication fails after OpenSSH upgrade
    Read More
  • Where can I download SonicWall stencils?
    Read More
  • Configuring High Availability Monitoring settings
    Read More
not finding your answers?