Two Factor Authentication in SonicOS
Two Factor Authentication in SonicOS
in SonicOS
| 1
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your system.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Other product and company names mentioned herein may be trademarks and/or registered trademarks of
their respective companies and are the sole property of their respective manufacturers.
Document Scope
This document describes how to configure Two Factor Authentication on a Dell SonicWALL
network security appliance running SonicOS 5.9 or SonicOS 6.2.
This document contains the following sections:
• “Feature Overview” on page 3
• “Configuring Two Factor Authentication in SonicOS” on page 5
Feature Overview
This section provides an introduction to Two Factor Authentication in SonicOS. This section
contains the following subsections:
• “What is Two Factor Authentication?” on page 3
• “How does Two Factor Authentication Work?” on page 4
• “Benefits” on page 4
• “Supported Platforms” on page 4
Note CACs work with Microsoft Internet Explorer, but may not work with other browsers.
Note Using a CAC requires an external card reader that is connected on a USB port.
Note You must have administrator privileges to set up Two Factor Authentication on a Dell
SonicWALL network security appliance.
Benefits
Two Factor Authentication provides increased security by requiring two different methods of
authentication before a user can log into the Dell SonicWALL network security appliance.
Supported Platforms
Two Factor Authentication is supported on Dell SonicWALL network security appliances
running SonicOS 5.9 or SonicOS 6.2.
Step 3 Type the port number that you want into the HTTPS Port box.
The default port for HTTPS management is 443, but you can add another layer of security for
logging into the firewall by changing the default port.
Step 4 Select the Enable Client Certificate Check box.
The Enable Client Certificate Check box allows you to enable or disable client certificate
checking and CAC support on the firewall.
Step 5 From the Client Certificate Issuer drop-down list, select the appropriate Certification Authority
(CA) to sign your client certificate.
The Client Certificate Issuer drop-down menu contains a list of the Certification Authority (CA)
certificate issuers. If the appropriate CA is not in the list, you can import that CA that you need
into the list.
Step 6 To enable or disable OCSP checking for the client certificate, select the Enable OCSP
Checking box.
The Enable OCSP Checking box allows you to enable or disable the Online Certificate Status
Protocol (OCSP) verification for the client certificate to verify that the certificate is still valid and
has not been revoked.
Step 7 In the OCSP Responder URL field, enter the URL of the server that will verify the status of the
certificate. The URL should point to the Common Gateway Interface (CGI) on the server side,
which processes the OCSP verification. For example: http://10.103.63.251/ocsp
Note The wrong PIN will lead to login failure, and if the retry count reaches the upper limit (3 tries),
the CAC will be locked out.
After you confirm the certificate, the firewall checks the Client Certificate Issuer to verify that
the certificate is valid and has been signed by the CA. If it is verified, the user login page is
displayed.
Note You must have administrator privileges to use the Command Line Interface (CLI) for
SonicOS.
For more information on Certificates, refer to the System > Certificates chapter of any of the
following documents:
• SonicOS 5.9 Administrator’s Guide
• SonicOS 6.2 Administrator’s Guide
The System > Certificates chapter includes information about:
• Importing Certificates
• Deleting Certificates
• Generating a Certificate Signing Request
The Generating a Certificate Signing Request section includes information about how the
RSA algorithm is used with certificates in SonicOS.