Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

Two-factor Authentication with Quest Defender for SonicWall Global VPN Clients

03/26/2020 80 People found this article helpful 101,764 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    Quest Defender enhances security by enabling two-factor authentication & multi-factor authentication to network, web and applications-based resources.  This article describes how to configure Quest Defender to perform two-factor authentication of Global VPN Clients (GVC).

    Resolution



    Quest Defender Configuration

    Defender installation involves installing the following components:

    • Defender Management Console: Installs MMC Snap-ins, Schema updates and a Defender OU in Active Directory Users and Computers.

    • Defender Security Server (DSS): Authenticates RADIUS and Defender Agent requests Access Nodes.

    • Defender Security Server User License

    • Defender Desktop Token License

    NOTE: The Screenshots and configuration steps described here are of Defender version 5.7.  Installation of the Quest Defender application is not covered here. Step by step instructions are described in Defender 5.7 Installation Guide.  For the purpose of this article all components are installed in a Windows 2008 server with trial Defender license and tokens.


    Defender Security Server configuration

    Click on Defender Security Server on the Start menu to open the Defender Security Server Configuration window.

    1. On the Active Directory LDAP tab, enter the IP address or hostname of the AD LDAP server

    2. Under Port, enter the LDAP port number: 389. Under SSL Port enter the LDAPs port number: 636. This is optional.

    3. Under Service Account Credentials, enter the DN of the user. In this example, a user called defender has been created with Domain Admin rights.

    4. Click on Apply to save the changes.

    Image
    On the Test Connection tab, click on the Test button to test the connectivity between DSS and the LDAP server.
    Image
    In the Service tab, you can stop and restart the Defender Security Server service.

    Image

    Defender Management Console

    The Defender Management Console enables you to create and configure Defender Security Servers. The Defender Security Server is the point in your network where user authentication is performed. If authentication is successful, the user is allowed access to the network.

    Open the Defender OU in Active Directory Users and Computers.

    Image
    Configure RADIUS Payload

    The RADIUS Payload is information that is passed from the Defender  Security Server to the Network Access Server where the user authentication attempt originated.

    1. Navigate to the RADIUS Payload page 
    2. Right click and click on New and select Defender RADIUS Payload to create a new RADIUS Payload.

    Image

    Configure Security Policy

    The security policy is assigned to a user, user group, access node or security  server.

    1. Navigate to the Defender | Policies page.

    2. Right click and click on New and select Defender Policy to create a Defender Security Policy.

    3. The authentication methods selected here are AD password and Token.

    4. The Logon Attempts have been set here as 1, this can be changed.

    Image
    For more information, see Page # 49 of the Defender 5.7 Configuration Guide

    Configure Defender Security Servers (DSS)

    The Defender Security Server is the point in your network where user authentication is performed. If authentication is successful, the user is allowed access to the network.

    1. Navigate to the Defender | Security Servers page.

    2. Right click and click on New and select Defender Security Server to create a DSS.

    3. The IP Address must be the IP Address of the machine where this Defender Security Server is located. In this example the DSS is the same as the management console.

    4. The Defender Security Server (prompts) can be left as it is.

    5. Click on OK to save.

    6. In the properties of the newly created DSS, click on the Policy tab and click on Select to select the Security Policy created earlier.

    7. Click on the RADIUS Payload tab, click on Select to select the RADIUS Payload created earlier.


    ImageImage

    The indicator light located in the top left hand corner of the Defender Security Server dialog box is red while the Defender Security Server is refreshing  the data. When the Access Nodes has been assigned, a green light is displayed. 

    Image
    Image
    For more information, see Page # 82 of the Defender 5.7 Configuration Guide

    Configure Access Node

    The Access Node is the point in your network where you need to challenge the  user to verify their identity, for example, a firewall or VPN server. At the access node, the user will be prompted to enter their logon credentials. This may be a user ID, password and token authentication information. The access node sends  the user’s logon credentials to the Defender Security Server for authentication.  If authentication is successful, the user is granted access to the network.

    1. Navigate to the Defender | Access Nodes page.

    2. Right click and click on New and select Defender Access Node to create a Defender Access Node.

    3. Enter the IP address or DNS name of the SonicWall X0 interface. 

    4. Set Auth Port as 1812, which is the default RADIUS port.

    5. Click on OK to save.

    6. In the properties of the newly created Access Node, under Node Type, select Radius Agent.

    7. In the Shared Secret field, enter a secret. This must be identical to the Shared Secret in the SonicWall RADIUS configuration.

    8. Set User ID as SAM Account Name.

    9. Under Assigned to, click on Assign to select the DSS earlier created.

    Image
    10. Under the Members tab, specify the users and/or groups of users who will be authenticated by the Defender Security Server via this Access Node
    Image
    11. Navigate to the Policy tab.
    12. Click on Select to select the Security Policy created earlier.
    Image
    13. Navigate to the RADIUS Payload tab.
    14. Click on Select to select the RADIUS Payload created earlier.
    Image
    For more information, see Page # 24 of the Defender 5.7 Configuration Guide

    Defender Tokens

    The Defender token serial number is used to associate the token with a user and can be used for later reference or for tracking purposes. A list of serial numbers for the tokens that you have purchased is supplied as part of your Defender package. The serial number is also located on the back of hardware tokens. 

    For importing Defender Token Serial Numbers, refer page # 102 of the Defender Configuration Guide .
    Image
    Assigning Security Policy to a User

    To assign a Security Policy to a user, perform the following steps:

    1. From Active Directory Users and Computers, select Users.
    2. Right-click the required user or group and select Properties from the menu.
    3. In the Properties window, navigate to the Policy table
    4. In the Policy tab, click on Select and select the Security Policy created earlier.
    Image
    Assign Hardware / Software Token

    Depending on your installation, install/configure hardware or software token. Refer the following Quest Defender documents:


    Defender Token Administration Guide
    Defender Hardware Token User Guide
    Quest Soft Token for Windows Desktop User Guide


    Select the Defender tab and click on Add to add a token.
    Image
    For more information, see Page # 119 of the Defender 5.7 Configuration Guide

    SonicWall RADIUS Configuration

    1. Login to the SonicWall management GUI.

    2. Navigate to the Users | Settings page.

    3. Select RADIUS as the authentication method and click on Configure.

    4. Configure the RADIUS settings as follows:

    ImageImage

    Connecting the SonicWall Global VPN Client with AD Username/Password and Windows Desktop Token.

    1. Start the GVC client connection.

    2. Enter your AD username and password at the authentication prompt.

    3. When prompted to enter Response, copy the SNK Challenge.

    4. Enter Challenge in the Defender Desktop Token app.

    5. Click on Get Response and copy it to clipboard.

    6. Enter Response.

    ImageImage

    ImageImage

    Image

    Related Articles

    • Analyzing TCP reset(RST)packets
    • ‘Error sending one-time password’ encountered when connecting to NetExtender
    • Supported SonicWall and 3rd party SFP and SFP+ modules that can be used with SonicWall NSsp series

    Categories

    • Firewalls > TZ Series
    • Firewalls > SonicWall SuperMassive E10000 Series
    • Firewalls > SonicWall SuperMassive 9000 Series
    • Firewalls > SonicWall NSA Series

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2022 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
    Scroll to top
    Trace:bc25ceab620983726ed9b9f9e3bc8474-80