Resolution for SonicOS 7.X
This release includes significantĀ user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
Ā
Creating User Groups and configuring User Management for RADIUS Authentication in Active Directory
- OpenĀ Active Directory Users and ComputersĀ and create a user group in the Users folder. Ā Ā Ā

- Create a user and add the user as a member of the new User Group. Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā
Ā Ā Ā Ā Ā - Select theĀ Dial-inĀ tab and enable theĀ Allow accessĀ option underĀ Remote Access Permission. Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā

Ā
Configuring the IAS Server to Support RADIUS Clients
- Ā Launch the IAS Console by clicking onĀ Start | All Program | Administrative Tools | Internet Authentication Service. The following IAS console will appear.
- Ā Right click theĀ RADIUS ClientsĀ folder in the left pane and selectĀ New RADIUS ClientĀ from the menu.
- Ā Enter a name for the new RADIUS client and enter the LAN IP Address of the SonicWall.
- Ā SelectĀ RADIUS Standard, (also the default option), enter aĀ Shared Secret. This shared secret is needed later on the SonicWall security appliance, so note this for future reference.
- Ā ClickĀ Finish. Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā
Ā Ā 
- To setup the access criteria for users, right click on theĀ Remote Access PoliciesĀ and selectĀ New Remote Access Policy. Ā Ā Ā Ā Ā Ā Ā Ā

- ClickĀ NextĀ onĀ New Policy Wizard. SelectĀ Ā Set up a custom policyĀ Ā radio button and then enter a name for this policy.
- ClickĀ AddĀ on theĀ Policy Conditions window. Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā

- From this list, selectĀ Windows Groups, and clickĀ OK. By selectingĀ Windows Groups, you can authenticate a user who is a member of a User Group in the Windows AD.

- ClickĀ Add, then enter the Windows User Group "Full Access". ClickĀ OK. Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā

- Back on theĀ New Remote Access PolicyĀ window, clickĀ Next. Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā

- Select theĀ Grant remote access permissionĀ radio button under the optionĀ If a connection request matches the specified conditions. Ā

- On theĀ ProfileĀ window click on theĀ Edit Profile button. Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā

- TheĀ Edit Dial-in ProfileĀ window will appear. Click on theĀ Authentication tab. Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā

- Under theĀ AuthenticationĀ tab selectĀ MS-CHAP-V2, MS-CHAP and PAP as authentication method. Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā

- The following message box appears, ClickĀ No on the help message box. Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā

- ClickĀ NextĀ on theĀ Policy WindowĀ and then clickĀ FinishĀ to complete.
-
Ā TIP:Ā This completes the IAS configuration. If you have other groups on the AD that needs different access, you can add more Remote authentication policies.
Ā
Ā
Ā
-
Ā Ā Ā
Enabling Reversibly Encrypted Passwords
Ā NOTE:Ā Reversibly encrypted passwords are saved during the change-password process, so existing users must change their passwords to use CHAP. For a Windows 2000-based remote access server that is a member of a domain, you can select the Store password using reversible encryption for all users in the domain option on the domain server as described below.
Alternatively, you can enable reversible storage of passwords for individual users. By using the Directory Services snap-in, you can select this feature through the properties of an individual user. Again, note that reversibly encrypted passwords are saved during the change-password procedure, so existing users must change their passwords to use CHAP.
Enabling reversibly encrypted passwords (CHAP) in a domain (Active Directory server) Group PolicyĀ
- Open Active Directory Users and Computers.
- In the console tree, double-clickĀ Active Directory Users and Computers, right-click the domain name, and then clickĀ Properties.
- OnĀ the Group PolicyĀ tab, clickĀ Default Domain Policy, and then clickĀ Edit.
- In the console tree, click onĀ Windows Settings.
- ClickĀ Security Settings.Ā
- ClickĀ Accounting Policies.Ā
- ClickĀ Password Policy.
- In the details pane, double-clickĀ Ā Store password using reversible encryption for all users in the domain.
- ClickĀ Enabled, and then clickĀ OK.
To enable reversibly encrypted passwords (CHAP) in a domain (stand-alone server) Local Security PolicyĀ Ā Ā
- StartĀ |Ā RunĀ |Ā gpedit.msc.
- In the console tree, selectĀ Computer ConfigurationĀ -|Ā Windows SettingsĀ -|Ā Security SettingsĀ -|Ā Account Policy-|Ā Password Policy.
- EnableĀ Store password using reversible encryption.


Ā
Configuring SonicWall User Settings forĀ RADIUS Authentication.
- Login to the SonicWall management GUI.
- Navigate to Device | UsersĀ |Ā Settings.
- Click on the Configure button underĀ RADIUS may also be required for CHAP. Ā

- Enter the IP address of the RADIUS Server and the Shared Secret for the RADIUS server.
NOTE: Ā The Shared Secret has to be identical to the one entered in the RADIUS Client in IAS.
- ClickĀ RADIUS Users tab and select the radio button under Use RADIUS Filter-Id attribute on RADIUS server.
- Click Apply and then click on the Test tab. Type in the user name created earlierĀ (User-1) and enter password and test the authentication. Ā Ā

How to Test
- Initiate a connection from a remote L2TP client.
- When prompted for username and password, enter the username "user-1"Ā and the password set for that user.
- On successfully connecting after being authenticated, try to ping the IP Address of a host in the LAN.
- Enter the IP address of the RADIUS Server and the Shared Secret for the RADIUS server.Ā Note:Ā The Shared Secret has to be identical to the one entered in the RADIUS Client in IAS.
- Click on theĀ RADIUS UsersĀ tabĀ and select the radio button underĀ Use RADIUS Filter-Id attribute on RADIUS server.
- ClickĀ ApplyĀ and then click on theĀ TestĀ tab. Type in the user nameĀ created earlierĀ Ā (User-1)Ā and enter password and test the authentication.Ā
Ā

Resolution for SonicOS 6.5
This release includes significantĀ user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
Ā
Creating User Groups and configuring User Management for RADIUS Authentication in Active Directory
- OpenĀ Active Directory Users and ComputersĀ and create a user group in the Users folder.

- Create a user and add the user as a member of the new User Group.

- Select theĀ Dial-inĀ tab and enable theĀ Allow accessĀ option underĀ Remote Access Permission.

Configuring the IAS Server to Support RADIUS Clients
- Ā Launch the IAS Console by clicking onĀ Start | All Program | Administrative Tools | Internet Authentication Service. The following IAS console will appear.
- Ā Right click theĀ RADIUS ClientsĀ folder in the left pane and selectĀ New RADIUS ClientĀ from the menu.
- Ā Enter a name for the new RADIUS client and enter the LAN IP Address of the SonicWall.
- Ā SelectĀ RADIUS Standard, (also the default option), enter aĀ Shared Secret. This shared secret is needed later on the SonicWall security appliance, so note this for future reference.
- Ā ClickĀ Finish.


- To setup the access criteria for users, right click on theĀ Remote Access PoliciesĀ and selectĀ New Remote Access Policy.

- ClickĀ NextĀ onĀ New Policy Wizard. SelectĀ Ā Set up a custom policyĀ Ā radio button and then enter a name for this policy.
- ClickĀ AddĀ on theĀ Policy ConditionsĀ window.

- From this list, selectĀ Windows Groups, and clickĀ OK. By selectingĀ Windows Groups, you can authenticate a user who is a member of a User Group in the Windows AD.

- ClickĀ Add, then enter the Windows User Group "Full Access". ClickĀ OK.
Ā
Back on theĀ New Remote Access PolicyĀ window, clickĀ Next.

- Select theĀ Grant remote access permissionĀ radio button under the optionĀ If a connection request matches the specified conditions.

- On theĀ ProfileĀ window click on theĀ Edit ProfileĀ button.

- Ā TheĀ Edit Dial-in ProfileĀ window will appear. Click on theĀ AuthenticationĀ tab.

- Ā Under theĀ AuthenticationĀ tab selectĀ MS-CHAP-V2, MS-CHAP and PAPĀ as authentication method.

- The following message box appears, ClickĀ NoĀ on the help message box.

- Ā ClickĀ NextĀ on theĀ Policy WindowĀ and then clickĀ FinishĀ to complete.
Ā TIP:Ā This completes the IAS configuration. If you have other groups on the AD that needs different access, you can add more Remote authentication policies.
Ā
Enabling Reversibly Encrypted Passwords
Ā NOTE:Ā Reversibly encrypted passwords are saved during the change-password process, so existing users must change their passwords to use CHAP. For a Windows 2000-based remote access server that is a member of a domain, you can select the Store password using reversible encryption for all users in the domain option on the domain server as described below.
Alternatively, you can enable reversible storage of passwords for individual users. By using the Directory Services snap-in, you can select this feature through the properties of an individual user. Again, note that reversibly encrypted passwords are saved during the change-password procedure, so existing users must change their passwords to use CHAP.
Enabling reversibly encrypted passwords (CHAP) in a domain (Active Directory server) Group PolicyĀ
- Open Active Directory Users and Computers.
- In the console tree, double-clickĀ Active Directory Users and Computers, right-click the domain name, and then clickĀ Properties.
- OnĀ the Group PolicyĀ tab, clickĀ Default Domain Policy, and then clickĀ Edit.
- In the console tree, click onĀ Windows Settings.
- ClickĀ Security Settings.Ā
- ClickĀ Accounting Policies.Ā
- ClickĀ Password Policy.
- In the details pane, double-clickĀ Ā Store password using reversible encryption for all users in the domain.
- ClickĀ Enabled, and then clickĀ OK.
To enable reversibly encrypted passwords (CHAP) in a domain (stand-alone server) Local Security PolicyĀ Ā Ā
- StartĀ |Ā RunĀ |Ā gpedit.msc.
- In the console tree, selectĀ Computer ConfigurationĀ -|Ā Windows SettingsĀ -|Ā Security SettingsĀ -|Ā Account Policy-|Ā Password Policy.
- EnableĀ Store password using reversible encryption.


Configuring SonicWall User Settings forĀ RADIUS Authentication.
- Login to the SonicWall management GUI.
- Navigate toĀ Manage |Ā UsersĀ |Ā Settings.
- Click on the Configure button underĀ RADIUS may also be required for CHAP.

- Enter the IP address of the RADIUS Server and the Shared Secret for the RADIUS server.
Ā NOTE:Ā The Shared Secret has to be identical to the one entered in the RADIUS Client in IAS.
- ClickĀ Ā RADIUS UsersĀ tabĀ and select the radio button underĀ Use RADIUS Filter-Id attribute on RADIUS server.
- ClickĀ ApplyĀ and then click on theĀ TestĀ tab. Type in the user nameĀ created earlierĀ Ā (User-1)Ā and enter password and test the authentication.Ā
Ā 
Ā
How to Test
- Initiate a connection from a remote L2TP client.
- When prompted for username and password, enter the username "user-1"Ā and the password set for that user.
- On successfully connecting after being authenticated, try to ping the IP Address of a host in the LAN.
- Enter the IP address of the RADIUS Server and the Shared Secret for the RADIUS server.Ā Note:Ā The Shared Secret has to be identical to the one entered in the RADIUS Client in IAS.
- Click on theĀ RADIUS UsersĀ tabĀ and select the radio button underĀ Use RADIUS Filter-Id attribute on RADIUS server.
- ClickĀ ApplyĀ and then click on theĀ TestĀ tab. Type in the user nameĀ created earlierĀ Ā (User-1)Ā and enter password and test the authentication.Ā
Ā 
Ā
Resolution for SonicOS 6.2 and Below
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
Ā
Ā
Ā
Creating User Groups and configuring User Management for RADIUS Authentication in Active Directory.
- Open Active Directory Users and Computers and create a user group in the Users folder.

- Create a user and add the user as a member of the new User Group.

- Select the Dial-in tab and enable the Allow access option under Remote Access Permission.

Configuring the IAS Server to Support RADIUS Clients
- Launch the IAS Console by clicking on Start | All Program| Administrative Tools | Internet Authentication Service. The following IAS console will appear.
- Right click the RADIUS Clients folder in the left pane and select New RADIUS Client from the menu.
- Enter a name for the new RADIUS client and enter the LAN IP Address of the SonicWall.
- Select RADIUS Standard, (also the default option), enter a Shared Secret. This shared secret is needed later on the SonicWall security appliance, so note this for future reference.
- Click Finish.


- To setup the access criteria for users, right click on the Remote Access Policies and select New Remote Access Policy.

- Ā Click Next on New Policy Wizard. Select āSet up a custom policyā radio button and then enter a name for this policy.
- Ā Click Add on the Policy Conditions window.

- Ā From this list, select Windows Groups, and click OK. By selecting Windows Groups, you can authenticate a user who is a member of a User Group in the Windows AD.

- Ā Click Add, then enter the Windows User GroupĀ Ā Full Access. Click OK.
Ā
- Ā Back on the New Remote Access Policy window, click Next.

- Select the Grant remote access permission radio button under the option If a connection request matches the specified conditions.

- On the Profile window clickĀ Edit Profile.

- The Edit Dial-in Profile window will appear. ClickĀ Authentication tab.

- Under the Authentication tab select MS-CHAP-V2, MS-CHAP and PAP as authentication method.

- The following message box appears, Click No on the help message box.

- Click Next on the Policy Window and then click Finish to complete.
- This completes the IAS configuration. If you have other groups on the AD that needs different access, you can add more Remote authentication policies.
Enabling Reversibly Encrypted Passwords
NOTE: Reversibly encrypted passwords are saved during the change-password process, so existing users must change their passwords to use CHAP. For a Windows 2000-based remote access server that is a member of a domain, you can select the Store password using reversible encryption for all users in the domain option on the domain server as described below.
Alternatively, you can enable reversible storage of passwords for individual users. By using the Directory Services snap-in, you can select this feature through the properties of an individual user. Again, note that reversibly encrypted passwords are saved during the change-password procedure, so existing users must change their passwords to use CHAP.
Enabling reversibly encrypted passwords (CHAP) in a domain (Active Directory server) Group PolicyĀ Ā
- Open Active Directory Users and Computers.
- In the console tree, double-click Active Directory Users and Computers, right-click the domain name, and then click Properties.
- On the Group Policy tab, click Default Domain Policy, and then click Edit.Ā
- In the console tree, clickĀ Windows Settings.
- ClickĀ Security Settings.
- ClickĀ Accounting Policies.Ā
- Click Password Policy..
- In the details pane, double-click Store password using reversible encryption for all users in the domain.
- Click Enabled, and then click OK.
To enable reversibly encrypted passwords (CHAP) in a domain (stand-alone server) Local Security PolicyĀ Ā Ā
- Start | Run | gpedit.msc.Ā
- In the console tree, select Computer Configuration -| Windows Settings -| Security Settings -| Account Policy-| Password Policy.
- EnableĀ Ā Store password using reversible encryption.Ā


Configuring SonicWall User Settings for RADIUS Authentication.
Ā
- Login to the SonicWall management GUI.
- Navigate to Users | Settings.
- Click Configure button under RADIUS May Also Be Required for CHAP.

- Enter the IP address of the RADIUS Server and the Shared Secret for the RADIUS server.
NOTE: Ā The Shared Secret has to be identical to the one entered in the RADIUS Client in IAS.
- ClickĀ RADIUS Users tab and select the radio button under Use RADIUS Filter-Id attribute on RADIUS server.
- Click Apply and then click on the Test tab. Type in the user name created earlierĀ (User-1) and enter password and test the authentication.Ā
Ā 
How to Test
- Initiate a connection from a remote L2TP client.
- When prompted for username and password, enter the username "user-1" and the password set for that user.
- On successfully connecting after being authenticated, try to ping the IP Address of a host in the LAN.