Dell SonicWall Network Security Appliance Integration
General Overview
This guide explains the configuration of multi-factor authentication (MFA) for Dell SonicWall Network Security Appliance utilizing Mirket as the identity provider.
Prior configuration and deployment of SonicWall Network Security Appliance are required before setting up MFA with Mirket. SonicWall Network Security Appliance offers various MFA configuration modes. In this integration, we've configured RADIUS authentication with Mirket.
The integration was tested using SonicOS Enhanced 6.2.7.1-23n on SonicWall Network Security Appliance TZ 400.
Preparation Steps
Before proceeding with these procedures, ensure the following:
You've completed the installation and configuration of the Mirket (go to Mirket Installation Steps).
End-users can access the SonicWall Network Security Appliance.
Configuring SonicWall Network Security Appliance
RADIUS Server Configuration
For RADIUS authentication in the SonicWall Network Security Appliance, you need to configure a RADIUS server (the Mirket server IP address) within the users configuration.
Access the SonicWall Network Security Appliance web UI.
Go to Users > Settings.

Click on the Configure RADIUS option.
Input 60 in the RADIUS Server Timeout(seconds) field.
Choose the Simple-Name option from the User Name Format dropdown list.
Input the IP address of the Mirket (Radius Server) in the Name or IP Address field, under the Primary Server section.
Input a shared secret key to communicate with the RADIUS server (Mirket Radius) in the Shared Secret field, under the Primary Server section. In Mirket use this same secret key when configuring a RADIUS client resource.
Input the port number for communication with the Mirket (Radius Server) in the Port Number field, under the Primary Server section. The default ports are 1812 and 1645.

Select the RADIUS Users tab. Then choose the Use RADIUS Filter-Id attribute on RADIUS server radio box.
Choose SSLVPN Services option from the Default user group to which all RADIUS users belong dropdown list. Then click on OK to confirm settings.

Configuring User Authentication Settings
Afterward, activate RADIUS user authentication in the user authentication settings.
Go to Users > Settings.
Choose the RADIUS option from the User authentication method dropdown list. Then click on Accept to confirm settings.

Configuring SSL VPN Server Settings
Go to SSL VPN > Server Settings. Then, choose WAN option under the SSL VPN Status on Zones section.
Input the port number to use in the SSL VPN Port field.
Enter your domain name in the User Domain field. Then, click on Accept to confirm settings.

Configuring SSL VPN Client Settings
Go to SSL VPN > Client Settings. Then click on the Configure option under the Default Device Profile section.

Choose Create a new network option from the Network Address IPV4 dropdown list.

Enter a identifier network name in the Name field.
Choose Network option from the Type dropdown list.
Input an IP address in the Network field.
Input a network mask value in the Netmask/Prefix Length field. Then click on OK to confirm settings.

Now, you can choose the network you created from the Network Address IPV4 dropdown list.

Select the Client Routes tab. Then, choose one or more networks from the Networks list and include them in the Client Routes list.

Select the Client Settings tab and configure your client settings. Then click on OK to confirm settings.

Configure Mirket
To enable Mirket to receive authentication requests from SonicWall, follow these steps:
Define SonicWall as a RADIUS client resource within Mirket.
Create an authentication policy for the SonicWall RADIUS client resource or include it in an existing authentication policy.
Attach the SonicWall resource to the Mirket Radius.
Add SonicWall as a Resource in Mirket with Radius Gateway
Before starting, ensure that you have installed Mirket Radius Gateway from the Configuration > Gateway. To add a Radius Gateway to the Mirket, follow these steps:
Go to Configuration > Gateway and click on the Add Radius Gateway button.
On the displayed screen, enter a name for your Radius Gateway in the Name field.
Enter the SAM value of the gateway in the Sam Value field. In Mirket, user identification is done using the SAM (Security Account Manager) name. This is preferred over the standard username. This username is used for authentication and access controls.
Enter the IP address of the server where the gateway is installed in the Host IP Address field.
Enter the authentication port value you set for the gateway in the Auth Port field. The default value is 1812.
Enter the accounting port value you specified for the gateway in the Acc Port field. The default value is 1813. Note: After completing these fields, you must create a RADIUS client for the newly created RADIUS Gateway.
Click on the Add Radius Client option at the bottom of the displayed screen.
Enter a name for your Radius Client in the Radius Client field.
Enter the IP address of the client(firewall) that will communicate with the gateway in the IP Address field.
Enter the secret key that the client will communicate with the gateway in the Secret Key field.

Click on the Save button to confirm the settings.

Configuring Radius Gateway
After creating the Radius Gateway, click on the Download > Config from the menu on the right side of the gateway.

This option will generate a script related to the gateway, which will be displayed from the RADIUS Setup config file. The config file will automatically begin downloading once this option is selected.

Replace the existing config file in the
"C:\MirketRadius"
directory with the downloaded file. Alternatively, copy the displayed script and paste it into the config file in"C:\MirketRadius"
.

Then, restart the Mirket Radius Service.

You can check whether the Radius Gateway you created is active by navigating to Configuration > Gateway.
User and Group configuration on Mirket
To set up multifactor authentication, make sure you have at least one user or group in Mirket.
If it is preferred to use a local user, you can first create a local group and then create a local user and make the user a member of the group. Alternatively, you can create a local user without creating a local group.
If it is preferred to use LDAP users, the priority External Source is created by pulling users from Active Directory or OpenLDAP in Mirket. Note: Before proceeding, ensure that you have installed Mirket LDAP Gateway. (Refer to create LDAP Gateway.)
Add a Radius Rule to Mirket
Radius Rules define user access to resources and the authentication methods available (such as SMS, Approve / Deny, OTP, etc.).
First, you should follow these steps:
Go to Configuration > Radius Rules.
Click on the Add Radius Rule button.
On the displayed screen, enter a name for the rule in the Name field.
Enter the rule description in the Description field.
Select the Radius Client to which the rule will apply from the Radius Client dropdown list.
Enter the source IP addresses to which the rule will apply in the Source Adress field.
Select the source countries where the rule will be applied from the Source Country dropdown list.
Click on the Next button.

Specify whether the rule will be applied to a user or a group.
After specifying, click on the Next button.

Select the users or groups to which the rule will apply. Transfer your selections to the Selected Users/Groups table by clicking the arrow icon next to the Available Users/Groups table.
Click on the Next button.


Select the time period when the rule will run.
All: The rule will run every day.
Recurring: The rule will run on the specified days and times.
One Time: The rule will run within the date range you specify.
After selecting, click on the Next button.

Specify whether the user or group will be granted access based on the rule in the Action field.
Select the authentication provider to which the rule will apply from the Auth Method dropdown list.

Click on Save to confirm the settings.

Test the Integration
To validate the integration between Mirket MFA and your SonicWall Network Security Appliance, perform authentication using a mobile token on your mobile device. For RADIUS resources, available authentication methods include Approve/Deny authentication.
In this example, we illustrate the use of the Approve/Deny authentication method.
Launch the SonicWall NetExtender client application.
Input the SonicWall Network Security Appliance WAN Interface IP address and SSL VPN port in the Server field.
Enter your Mirket username in the Username field.
Input the password in the Password field.
Enter the domain for your remote SSL VPN connection in the Domain field.
Click on Connect. Then, select the 'Approve' option(found in the Mirket mobile app) immediately and make sure it doesn't time out.

Click on the Accept option in the Security Alert warning box.

Related Topics
Last updated