Configuring RADIUS and LDAP authentication concurrently

Description

This article illustrates a scenario wherein the primary authentication in the SonicWall has been set to LDAP but since LDAP does not usually support CHAP/MSCHAP authentication, L2TP VPN clients and other CHAP/MSCHAP authentication cannot be authenticated by their AD user credentials.

The solution is to configure the new feature RADIUS may also be required for CHAPĀ to automatically divert CHAP/MSCHAP authentications to RADIUS.

This article assumes that L2TP settings have been configured in the SonicWall and describes only the configuration needed for L2TP authentication.Image

Resolution for SonicOS 7.X

This release includes significantĀ user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.

Ā 

Creating User Groups and configuring User Management for RADIUS Authentication in Active Directory

  1. OpenĀ Active Directory Users and ComputersĀ and create a user group in the Users folder. Ā  Ā Ā  Image
  2. Create a user and add the user as a member of the new User Group. Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā Ā  Image Ā  Ā  Ā  Ā Ā 
  3. Select theĀ Dial-inĀ tab and enable theĀ Allow accessĀ option underĀ Remote Access Permission. Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā Image

Ā 

Configuring the IAS Server to Support RADIUS Clients

  1. Ā Launch the IAS Console by clicking onĀ Start | All Program | Administrative Tools | Internet Authentication Service. The following IAS console will appear.
  2. Ā Right click theĀ RADIUS ClientsĀ folder in the left pane and selectĀ New RADIUS ClientĀ from the menu.
  3. Ā Enter a name for the new RADIUS client and enter the LAN IP Address of the SonicWall.
  4. Ā SelectĀ RADIUS Standard, (also the default option), enter aĀ Shared Secret. This shared secret is needed later on the SonicWall security appliance, so note this for future reference.
  5. Ā ClickĀ Finish. Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā Image Ā Ā  Image
  6. To setup the access criteria for users, right click on theĀ Remote Access PoliciesĀ and selectĀ New Remote Access Policy. Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā Image
  7. ClickĀ NextĀ onĀ New Policy Wizard. SelectĀ Ā Set up a custom policyĀ Ā radio button and then enter a name for this policy.
  8. ClickĀ AddĀ on theĀ Policy Conditions window. Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Image
  9. From this list, selectĀ Windows Groups, and clickĀ OK. By selectingĀ Windows Groups, you can authenticate a user who is a member of a User Group in the Windows AD. Image
  10. ClickĀ Add, then enter the Windows User Group "Full Access". ClickĀ OK. Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Image
  11. Back on theĀ New Remote Access PolicyĀ window, clickĀ Next. Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Image
  12. Select theĀ Grant remote access permissionĀ radio button under the optionĀ If a connection request matches the specified conditions. Ā  Image
  13. On theĀ ProfileĀ window click on theĀ Edit Profile button. Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā Image
  14. TheĀ Edit Dial-in ProfileĀ window will appear. Click on theĀ Authentication tab. Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā Image
  15. Under theĀ AuthenticationĀ tab selectĀ MS-CHAP-V2, MS-CHAP and PAP as authentication method. Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā Image
  16. The following message box appears, ClickĀ No on the help message box. Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  Image
  17. ClickĀ NextĀ on theĀ Policy WindowĀ and then clickĀ FinishĀ to complete.
  18. Ā TIP:Ā This completes the IAS configuration. If you have other groups on the AD that needs different access, you can add more Remote authentication policies.

    Ā 

    Ā 

    Ā 

  19. Ā Ā Ā 

    Enabling Reversibly Encrypted Passwords

    Ā NOTE:Ā Reversibly encrypted passwords are saved during the change-password process, so existing users must change their passwords to use CHAP. For a Windows 2000-based remote access server that is a member of a domain, you can select the Store password using reversible encryption for all users in the domain option on the domain server as described below.


    Alternatively, you can enable reversible storage of passwords for individual users. By using the Directory Services snap-in, you can select this feature through the properties of an individual user. Again, note that reversibly encrypted passwords are saved during the change-password procedure, so existing users must change their passwords to use CHAP.

    Enabling reversibly encrypted passwords (CHAP) in a domain (Active Directory server) Group PolicyĀ 

    1. Open Active Directory Users and Computers.
    2. In the console tree, double-clickĀ Active Directory Users and Computers, right-click the domain name, and then clickĀ Properties.
    3. OnĀ the Group PolicyĀ tab, clickĀ Default Domain Policy, and then clickĀ Edit.
    4. In the console tree, click onĀ Windows Settings.
    5. ClickĀ Security Settings.Ā 
    6. ClickĀ Accounting Policies.Ā 
    7. ClickĀ Password Policy.
    8. In the details pane, double-clickĀ Ā Store password using reversible encryption for all users in the domain.
    9. ClickĀ Enabled, and then clickĀ OK.

    To enable reversibly encrypted passwords (CHAP) in a domain (stand-alone server) Local Security PolicyĀ  Ā Ā 

    1. StartĀ |Ā RunĀ |Ā gpedit.msc.
    2. In the console tree, selectĀ Computer ConfigurationĀ -|Ā Windows SettingsĀ -|Ā Security SettingsĀ -|Ā Account Policy-|Ā Password Policy.
    3. EnableĀ Store password using reversible encryption.

Image

Image

Ā 

Configuring SonicWall User Settings forĀ RADIUS Authentication.

  1. Login to the SonicWall management GUI.
  2. Navigate to Device | UsersĀ |Ā Settings.
  3. Click on the Configure button underĀ RADIUS may also be required for CHAP. Ā  Image
  4. Enter the IP address of the RADIUS Server and the Shared Secret for the RADIUS server.
    NOTE: Ā The Shared Secret has to be identical to the one entered in the RADIUS Client in IAS.

  5. ClickĀ RADIUS Users tab and select the radio button under Use RADIUS Filter-Id attribute on RADIUS server.
  6. Click Apply and then click on the Test tab. Type in the user name created earlierĀ  (User-1) and enter password and test the authentication. Ā  Ā  Image

How to Test

  • Initiate a connection from a remote L2TP client.
  • When prompted for username and password, enter the username "user-1"Ā  and the password set for that user.
  • On successfully connecting after being authenticated, try to ping the IP Address of a host in the LAN.
  • Enter the IP address of the RADIUS Server and the Shared Secret for the RADIUS server.Ā Note:Ā The Shared Secret has to be identical to the one entered in the RADIUS Client in IAS.
  • Click on theĀ RADIUS UsersĀ tabĀ and select the radio button underĀ Use RADIUS Filter-Id attribute on RADIUS server.
  • ClickĀ ApplyĀ and then click on theĀ TestĀ tab. Type in the user nameĀ created earlierĀ Ā (User-1)Ā and enter password and test the authentication.Ā 

Ā 

Image

Resolution for SonicOS 6.5

This release includes significantĀ user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.

Ā 

Creating User Groups and configuring User Management for RADIUS Authentication in Active Directory

  1. OpenĀ Active Directory Users and ComputersĀ and create a user group in the Users folder.
    Image

  2. Create a user and add the user as a member of the new User Group.
    Image

  3. Select theĀ Dial-inĀ tab and enable theĀ Allow accessĀ option underĀ Remote Access Permission.
    Image



Configuring the IAS Server to Support RADIUS Clients

  1. Ā Launch the IAS Console by clicking onĀ Start | All Program | Administrative Tools | Internet Authentication Service. The following IAS console will appear.
  2. Ā Right click theĀ RADIUS ClientsĀ folder in the left pane and selectĀ New RADIUS ClientĀ from the menu.
  3. Ā Enter a name for the new RADIUS client and enter the LAN IP Address of the SonicWall.
  4. Ā SelectĀ RADIUS Standard, (also the default option), enter aĀ Shared Secret. This shared secret is needed later on the SonicWall security appliance, so note this for future reference.
  5. Ā ClickĀ Finish.
    Image
    Image

  6. To setup the access criteria for users, right click on theĀ Remote Access PoliciesĀ and selectĀ New Remote Access Policy.
    Image

  7. ClickĀ NextĀ onĀ New Policy Wizard. SelectĀ Ā Set up a custom policyĀ Ā radio button and then enter a name for this policy.
  8. ClickĀ AddĀ on theĀ Policy ConditionsĀ window.
    Image

  9. From this list, selectĀ Windows Groups, and clickĀ OK. By selectingĀ Windows Groups, you can authenticate a user who is a member of a User Group in the Windows AD.
    Image

  10. ClickĀ Add, then enter the Windows User Group "Full Access". ClickĀ OK.
    ImageĀ 

  11. Back on theĀ New Remote Access PolicyĀ window, clickĀ Next.
    Image

  12. Select theĀ Grant remote access permissionĀ radio button under the optionĀ If a connection request matches the specified conditions.
    Image

  13. On theĀ ProfileĀ window click on theĀ Edit ProfileĀ button.
    Image

  14. Ā TheĀ Edit Dial-in ProfileĀ window will appear. Click on theĀ AuthenticationĀ tab.
    Image

  15. Ā Under theĀ AuthenticationĀ tab selectĀ MS-CHAP-V2, MS-CHAP and PAPĀ as authentication method.
    Image

  16. The following message box appears, ClickĀ NoĀ on the help message box.
    Image

  17. Ā ClickĀ NextĀ on theĀ Policy WindowĀ and then clickĀ FinishĀ to complete.

Ā TIP:Ā This completes the IAS configuration. If you have other groups on the AD that needs different access, you can add more Remote authentication policies.

Ā 

Enabling Reversibly Encrypted Passwords

Ā NOTE:Ā Reversibly encrypted passwords are saved during the change-password process, so existing users must change their passwords to use CHAP. For a Windows 2000-based remote access server that is a member of a domain, you can select the Store password using reversible encryption for all users in the domain option on the domain server as described below.


Alternatively, you can enable reversible storage of passwords for individual users. By using the Directory Services snap-in, you can select this feature through the properties of an individual user. Again, note that reversibly encrypted passwords are saved during the change-password procedure, so existing users must change their passwords to use CHAP.

Enabling reversibly encrypted passwords (CHAP) in a domain (Active Directory server) Group PolicyĀ 

  1. Open Active Directory Users and Computers.
  2. In the console tree, double-clickĀ Active Directory Users and Computers, right-click the domain name, and then clickĀ Properties.
  3. OnĀ the Group PolicyĀ tab, clickĀ Default Domain Policy, and then clickĀ Edit.
  4. In the console tree, click onĀ Windows Settings.
  5. ClickĀ Security Settings.Ā 
  6. ClickĀ Accounting Policies.Ā 
  7. ClickĀ Password Policy.
  8. In the details pane, double-clickĀ Ā Store password using reversible encryption for all users in the domain.
  9. ClickĀ Enabled, and then clickĀ OK.

To enable reversibly encrypted passwords (CHAP) in a domain (stand-alone server) Local Security PolicyĀ  Ā Ā 

  1. StartĀ |Ā RunĀ |Ā gpedit.msc.
  2. In the console tree, selectĀ Computer ConfigurationĀ -|Ā Windows SettingsĀ -|Ā Security SettingsĀ -|Ā Account Policy-|Ā Password Policy.
  3. EnableĀ Store password using reversible encryption.
    Image
    Image



Configuring SonicWall User Settings forĀ RADIUS Authentication.

  1. Login to the SonicWall management GUI.
  2. Navigate toĀ Manage |Ā UsersĀ |Ā Settings.
  3. Click on the Configure button underĀ RADIUS may also be required for CHAP.
    Image

  4. Enter the IP address of the RADIUS Server and the Shared Secret for the RADIUS server.
    Ā NOTE:Ā The Shared Secret has to be identical to the one entered in the RADIUS Client in IAS.

  5. ClickĀ Ā RADIUS UsersĀ tabĀ and select the radio button underĀ Use RADIUS Filter-Id attribute on RADIUS server.
  6. ClickĀ ApplyĀ and then click on theĀ TestĀ tab. Type in the user nameĀ created earlierĀ Ā (User-1)Ā and enter password and test the authentication.Ā 
    Ā Image

Ā 

How to Test

  • Initiate a connection from a remote L2TP client.
  • When prompted for username and password, enter the username "user-1"Ā  and the password set for that user.
  • On successfully connecting after being authenticated, try to ping the IP Address of a host in the LAN.
  • Enter the IP address of the RADIUS Server and the Shared Secret for the RADIUS server.Ā Note:Ā The Shared Secret has to be identical to the one entered in the RADIUS Client in IAS.
  • Click on theĀ RADIUS UsersĀ tabĀ and select the radio button underĀ Use RADIUS Filter-Id attribute on RADIUS server.
  • ClickĀ ApplyĀ and then click on theĀ TestĀ tab. Type in the user nameĀ created earlierĀ Ā (User-1)Ā and enter password and test the authentication.Ā 
    Ā Image





Ā 

Resolution for SonicOS 6.2 and Below

The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.

Ā 

Ā 

Ā 

Creating User Groups and configuring User Management for RADIUS Authentication in Active Directory.

  1. Open Active Directory Users and Computers and create a user group in the Users folder.
    Image

  2. Create a user and add the user as a member of the new User Group.
    Image

  3. Select the Dial-in tab and enable the Allow access option under Remote Access Permission.
    Image


Configuring the IAS Server to Support RADIUS Clients

  1. Launch the IAS Console by clicking on Start | All Program| Administrative Tools | Internet Authentication Service. The following IAS console will appear.
  2. Right click the RADIUS Clients folder in the left pane and select New RADIUS Client from the menu.
  3. Enter a name for the new RADIUS client and enter the LAN IP Address of the SonicWall.
  4. Select RADIUS Standard, (also the default option), enter a Shared Secret. This shared secret is needed later on the SonicWall security appliance, so note this for future reference.
  5. Click Finish.
    Image
    Image

  6. To setup the access criteria for users, right click on the Remote Access Policies and select New Remote Access Policy.
    Image

  7. Ā Click Next on New Policy Wizard. Select ā€œSet up a custom policyā€ radio button and then enter a name for this policy.
  8. Ā Click Add on the Policy Conditions window.
    Image

  9. Ā From this list, select Windows Groups, and click OK. By selecting Windows Groups, you can authenticate a user who is a member of a User Group in the Windows AD.
    Image

  10. Ā Click Add, then enter the Windows User GroupĀ Ā Full Access. Click OK.
    ImageĀ 

  11. Ā Back on the New Remote Access Policy window, click Next.
    Image

  12. Select the Grant remote access permission radio button under the option If a connection request matches the specified conditions.
    Image

  13. On the Profile window clickĀ Edit Profile.
    Image

  14. The Edit Dial-in Profile window will appear. ClickĀ Authentication tab.
    Image

  15. Under the Authentication tab select MS-CHAP-V2, MS-CHAP and PAP as authentication method.
    Image

  16. The following message box appears, Click No on the help message box.
    Image

  17. Click Next on the Policy Window and then click Finish to complete.
  18. This completes the IAS configuration. If you have other groups on the AD that needs different access, you can add more Remote authentication policies.



Enabling Reversibly Encrypted Passwords

NOTE: Reversibly encrypted passwords are saved during the change-password process, so existing users must change their passwords to use CHAP. For a Windows 2000-based remote access server that is a member of a domain, you can select the Store password using reversible encryption for all users in the domain option on the domain server as described below.


Alternatively, you can enable reversible storage of passwords for individual users. By using the Directory Services snap-in, you can select this feature through the properties of an individual user. Again, note that reversibly encrypted passwords are saved during the change-password procedure, so existing users must change their passwords to use CHAP.

Enabling reversibly encrypted passwords (CHAP) in a domain (Active Directory server) Group PolicyĀ  Ā 

  1. Open Active Directory Users and Computers.
  2. In the console tree, double-click Active Directory Users and Computers, right-click the domain name, and then click Properties.
  3. On the Group Policy tab, click Default Domain Policy, and then click Edit.Ā 
  4. In the console tree, clickĀ Windows Settings.
  5. ClickĀ Security Settings.
  6. ClickĀ Accounting Policies.Ā 
  7. Click Password Policy..
  8. In the details pane, double-click Store password using reversible encryption for all users in the domain.
  9. Click Enabled, and then click OK.

To enable reversibly encrypted passwords (CHAP) in a domain (stand-alone server) Local Security PolicyĀ  Ā Ā 

  1. Start | Run | gpedit.msc.Ā 
  2. In the console tree, select Computer Configuration -| Windows Settings -| Security Settings -| Account Policy-| Password Policy.
  3. EnableĀ Ā Store password using reversible encryption.Ā 
    Image
    Image


Configuring SonicWall User Settings for RADIUS Authentication.

Ā 

  1. Login to the SonicWall management GUI.
  2. Navigate to Users | Settings.
  3. Click Configure button under RADIUS May Also Be Required for CHAP.
    Image

  4. Enter the IP address of the RADIUS Server and the Shared Secret for the RADIUS server.
    NOTE: Ā The Shared Secret has to be identical to the one entered in the RADIUS Client in IAS.

  5. ClickĀ RADIUS Users tab and select the radio button under Use RADIUS Filter-Id attribute on RADIUS server.
  6. Click Apply and then click on the Test tab. Type in the user name created earlierĀ  (User-1) and enter password and test the authentication.Ā 
    Ā Image



How to Test

  • Initiate a connection from a remote L2TP client.
  • When prompted for username and password, enter the username "user-1" and the password set for that user.
  • On successfully connecting after being authenticated, try to ping the IP Address of a host in the LAN.


Related Articles

  • SonicOS 8.1.0 FAQ
    Read More
  • SonicWall GEN8 TZs and GEN8 NSas Settings Migration
    Read More
  • Getting started with SonicWall firewalls
    Read More
not finding your answers?