Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

How can I configure LDAP authentication for SSLVPN users?

10/14/2021 2,512 People found this article helpful 163,475 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    This article outlines all necessary steps to configure LDAP authentication for SSL-VPN users.

    Resolution

    Resolution for SonicOS 7.X

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.


    SSL-VPN Address Object

    1. Navigate to Object | Match Objects | Addresses and click on Add.

      Image


    2. In the pop-up window, enter the information for your SSL VPN Range. An example Range is included below:

      • Name: SSL VPN Range 
        TIP: This is only a Friendly Name used for Administration.

      • Zone: SSLVPN
      • Type : Range
        NOTE: You can use a Network or Host as well.

      • Starting IP Address: 192.168.168.100
      • Ending IP Address: 192.168.168.110

      Image


    SSLVPN Configuration

    1. Navigate to Network | SSL VPN | Server Settings.
    2.  Enable or disable SSL-VPN access by toggling the zone. Here we will be enabling SSL-VPN for WAN.
    3. Set the SSL VPN Port, and Domain as desired.
      NOTE: The SSLVPN port will be needed when connecting using Mobile Connect and NetExtender unless the port number is 443. Port 443 can only be used if the management port of the firewall is not 443.The Domain is used during the user login process.

      TIP:  If you want to be able to manage the firewall via GUI or SSH over SSLVPN these features can be enabled separately here as well.

      Image

    4. Navigate to Network | SSL VPN | Client Settings page. The SSL VPN | Client Settings page allows the administrator to configure the client address range information and NetExtender client settings, the most important being where the SSL-VPN will terminate (e.g. on the LAN in this case) and which IPs will be given to connecting clients.

      CAUTION: NetExtender cannot be terminated on an Interface that is paired to another Interface using Layer 2 Bridge Mode. This includes Interfaces bridged with a WLAN Interface. Interfaces that are configured with Layer 2 Bridge Mode are not listed in the "SSLVPN Client Address Range" Interface drop-down menu. For NetExtender termination, an Interface should be configured as a LAN, DMZ, WLAN, or a custom Trusted, Public, or Wireless zone, and also configured with the IP Assignment of Static.

    5. Click Configure for the Default Device Profile. 

      Image

    6. Set the Zone IP V4 as SSLVPN. Set Network Address IP V4 as the Address Object you created earlier (SSLVPN Range).

      Image

    7. The Client Routes tab allows the administrator to control what network access SSL VPN Users are allowed. The NetExtender client routes are passed to all NetExtender clients and are used to govern which networks and resources remote users can access via the SSL VPN connection.
      CAUTION: All SSL VPN Users can see these routes but without appropriate VPN Access on their User or Group they will not be able to access everything shown in the routes. Please make sure to set VPN Access appropriately.

      Image

    8. The Client Settings tab allows the administrator to input DNS, WINS, and Suffix information while also controlling the caching of passwords, user names, and the behavior of the NetExtender client.
    9. Input the necessary DNS/WINS information and a DNS Suffix if SSL VPN Users need to find Domain resources by name.
    10. Enable Create Client Connection Profile - The NetExtender client will create a connection profile recording the SSL VPN Server name, the Domain name and optionally the username and password.

      Image


    LDAP Settings

    1. Navigate to Device | Users | Settings.
    2. Select LDAP (or LDAP + Local Users) as authentication method.
    3. Click Configure LDAP.
    4. Click Add to add a new LDAP server.
    5. Enter the Name or IP address, Port Number, and indicate if you wish to Use TLS (SSL). Additionally, you will need to choose if this is the Primary, Secondary or a Backup/replica server.

      Image

    6. On the Login/Bind tab, Select the login type (Anonymous, login name in tree or bind distinguished name) and enter the Login user name, User tree for login to server and Password if applicable.

      Image

    7.  On the Directory tab, Make the necessary adjustments to the Trees containing users and the Trees containing user groups or use the AUTO-CONFIGURE button as appropriate.

      Image

    8. Click SAVE.
    9. In the LDAP configuration window, access the Users & Groups Tab and click Import Users.

      Image

    10. Select the appropriate LDAP server to import from along with the appropriate domain(s) to include.

      Image

    11. Choose the way in which you prefer user names to display.
      NOTE:  This is a personal preference and does not affect.

      Image

    12. Select the appropriate users you wish to import and click Save Selected.
      NOTE:  Make a note of which users or groups that are being imported as you will need to make adjustments to them in the next section of this article. 

      Image

    13. Click Save Selected.

    User Settings

    1. Navigate to the Device | Users | Local Users & Groups page.
    2. On the appropriate Local User or Local Groups Tab, Click configure on the newly imported LDAP User or Group.
      NOTE: This is dependant on the User or Group you imported in the steps above.  If you imported a user, you will configure the imported user, if you have imported a group, you will access the Local Groups tab and configure the imported group.

    3. Under VPN Access tab select the appropriate address objects/groups that your LDAP User or LDAP Group will need access to and click the right arrow to Add Network to Access List.

      Image

    4. Click Save .
    5. To make your User or Group a member of the SSLVPN Services group for access to SSLVPN, access the Local Groups tab and click Configure on SSLVPN Services.
    6. On the Members tab, Add your Imported user or group as to the Member Users and Groups.

      Image

    7. Click Save.
    8. As per the above configuration, only members of the Group will be able to connect to SSL-VPN.

      TIP:  Inorder for the LDAP users to be able to change their AD password via Netextender, make sure "ALL LDAP Users" group is added to the "SSLVPN Services" group.


    Resolution for SonicOS 6.5

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.



    SSL-VPN Address Object

    1. Login to the SonicWall management GUI.
    2. Click Manage in the top navigation menu
    3. Navigate to Objects | Address Objects and click Add at the top of the pane.Image
    4. In the pop-up window, enter the information for your SSL VPN Range. An example Range is included below:
    • Name: SSL VPN Range 

      TIP: This is only a Friendly Name used for Administration.

    • Zone: SSLVPN
    • Type : Range

      NOTE: You can use a Network or Host as well.

    • Starting IP Address: 192.168.168.100
    • Ending IP Address: 192.168.168.110
       Image

         

    SSLVPN Configuration

    1. Navigate to  SSL-VPN | Server Settings page.
    2. Click  Red Bubble for WAN, it should become Green. This indicates that SSL VPN Connections will be allowed on the WAN Zone.
    3. Set the SSL VPN Port, and Domain as desired.
      NOTE: The SSLVPN port will be needed when connecting using Mobile Connect and NetExtender unless the port number is 443. Port 443 can only be used if the management port of the firewall is not 443.The Domain is used during the user login process.

      TIP: If you want to be able to manage the firewall via GUI or SSH over SSLVPN these features can be enabled separately here as well.
      Image

    4. Navigate to SSL VPN | Client Settings page.The SSL VPN | Client Settings page allows the administrator to configure the client address range information and NetExtender client settings, the most important being where the SSL-VPN will terminate (e.g. on the LAN in this case) and which IPs will be given to connecting clients

      CAUTION: NetExtender cannot be terminated on an Interface that is paired to another Interface using Layer 2 Bridge Mode. This includes Interfaces bridged with a WLAN Interface. Interfaces that are configured with Layer 2 Bridge Mode are not listed in the "SSLVPN Client Address Range" Interface drop-down menu. For NetExtender termination, an Interface should be configured as a LAN, DMZ, WLAN, or a custom Trusted, Public, or Wireless zone, and also configured with the IP Assignment of Static.

    5. Click Configure for the Default Device Profile.
       Image

    6. Set the Zone IP V4 as SSLVPN. Set Network Address IP V4 as the Address Object you created earlier (SSLVPN Range).

      Image


    7. The Client Routes tab allows the administrator to control what network access SSL VPN Users are allowed. The NetExtender client routes are passed to all NetExtender clients and are used to govern which networks and resources remote users can access via the SSL VPN connection.

      CAUTION: All SSL VPN Users can see these routes but without appropriate VPN Access on their User or Group they will not be able to access everything shown in the routes. Please make sure to set VPN Access appropriately.Image

    8. The Client Settings tab allows the administrator to input DNS, WINS, and Suffix information while also controlling the caching of passwords, user names, and the behavior of the NetExtender client.
    9. Input the necessary DNS/WINS information and a DNS Suffix if SSL VPN Users need to find Domain resources by name.
    10. Enable Create Client Connection Profile - The NetExtender client will create a connection profile recording the SSL VPN Server name, the Domain name and optionally the username and password.
      ImageImage

    LDAP Settings

    1. Navigate to Users | Settings page.
    2. Select LDAP (or LDAP + Local Users) as authentication method and click  Configure LDAP.
    3. Click Add to add a new LDAP server.
    4. Enter the Name or IP address, Port Number, and indicate if you wish to Use TLS (SSL).  Additionally, you will need to choose if this is the Primary, Secondary or a Backup/replica server.

       Image

    5.   On the Login/Bind tab, Select the login type (Anonymous, login name in tree or bind distinguished name) and enter the Login user name, User tree for login to server and Password if applicable.
      Image

    6.  On the Directory tab, Make the necessary adjustments to the Trees containing users and the Trees containing user groups or use the AUTO-CONFIGURE button as appropriate.
      Image

    7. Click SAVE.
    8. In the LDAP configuration window, access the Users & Groups Tab and click Import Users.
      Image

    9. Select the appropriate LDAP server to import from along with the appropriate domain(s) to include.
      Image

    10. Choose the way in which you prefer user names to display.
      NOTE: This is a personal preference and does not affect 
      Image
    11. Select the appropriate users you wish to import and click Save Selected.

      NOTE: Make a note of which users or groups that are being imported as you will need to make adjustments to them in the next section of this article.

      Image
    12. Click OK.



    User Settings

    1. Navigate to the Users | Local Users & Groups page.
    2. On the appropriate Local User or Local Groups Tab, Click configure on the newly imported LDAP User or Group.

      NOTE: This is dependant on the User or Group you imported in the steps above.  If you imported a user, you will configure the imported user, if you have imported a group, you will access the Local Groups tab and configure the imported group.

    3. Under VPN Access tab select the appropriate address objects/groups that your LDAP User or LDAP Group will need access to and click the right arrow to Add Network to Access List.
      Image

    4. Click OK .
    5. To make your User or Group a member of the SSLVPN Services group for access to SSLVPN, access the Local Groups tab and click Configure on SSLVPN Services.
    6. On the Members tab, Add your Imported user or group as to the Member Users and Groups.
      Image

    7. Click OK save the settings and close the window.
    8. As per the above configuration, only members of the Group will be able to connect to SSL-VPN.

      TIP:  Inorder for the LDAP users to be able to change their AD password via Netextender, make sure "ALL LDAP Users" group is added to the "SSLVPN Services" group.

    Related Articles

    • Configuring and troubleshooting SonicWALL Switches
    • How can I get alerted if a WAN link goes down in a WAN fail-over scenario?
    • Configuring and troubleshooting High Availability

    Categories

    • Firewalls > NSa Series > SSLVPN
    • Firewalls > NSv Series > SSLVPN
    • Firewalls > TZ Series > SSLVPN
    • Firewalls > SonicWall SuperMassive 9000 Series > SSLVPN

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2022 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
    Scroll to top
    Trace:cc0750a261fdf1eb77a7d3e0cb0c4ff9-90