

- #Add url connection to sonicwall ssl vpn client how to#
- #Add url connection to sonicwall ssl vpn client password#
See Check Password With Repository SonicWall SSL VPN Configuration Login Page Customisation This is an option to enter the AD password of users for authentication Setting up Swivel Dual Channel Transports
#Add url connection to sonicwall ssl vpn client how to#
For a software only install see Software Only Installationįor further information see Single Channel How To Guide To test your configuration you can use the following URL using a valid PINsafe username: Go to the ‘Single Channel’ Admin page and set ‘Allow Session creation with Username:’ to YES. It is this mechanism that is used to return the TURing image to the VPN sign in page. The Swivel appliance can be configured so that it returns an image stream containing a TURing image by presenting the username via the XML API or the SCIMage servlet. All users will be able to authenticate via this NAS unless authentication is restricted to a specific repository group. You can specify an EAP protocol if required, others CHAP, PAP and MSCHAP are supported. The IP address has been set to the IP of the VPN virtual or hardware appliance, and the secret that will be used on both the Swivel appliance and VPN RADIUS configuration. Enter a name for the SonicWall SSL VPN server. Set up the NAS using the Network Access Servers page in the Swivel Administration console. Note: for virtual or hardware appliances, the Swivel appliance VIP should not be used as the server IP address, see VIP on PINsafe Appliances This means that the server will answer all RADIUS requests received by the server regardless of the IP address that they were sent to. (leaving the field empty has the same result).

In this example (see diagram below) the RADIUS Mode is set to ‘Enabled’ and the HOST IP (the Swivel server) is set to 0.0.0.0. Swivel Configuration Configuring the RADIUS serverĬonfigure the RADIUS settings using the RADIUS configuration page in the Swivel Administration console.

Authentication requests are made from the SonicWall SSL VPN using RADIUS. The SSL VPN appliance and the Swivel server are usually located within the DMZ. SonicWALL SSL VPN 2 and Firmware 3.5 onwards Swivel server must be accessible by client when using Single Channel Images, such as the TURing Image. The customisation script can be downloaded from hereĪ customisation script that also includes refresh for the TURing is here Swivel login script for the SonicWall SSL VPN Swivel 3.x configured with users and SMS gateway The PINsafe virtual or hardware appliance is configured with a proxy port to allow an additional layer of protection. The client requests the images from the PINsafe server, and is usually configured using Network Address Translation, often with a proxy server. To use the Single Channel Image such as the Turing Image, the PINsafe server must be made accessible.

This document will use the following steps: The image is served from the PINsafe server to the client. If Strong authentication is required using Single Channel such as TURing, Pinpad then the image can be displayed in the login page or in the Taskbar. Swivel can provide Two Factor authentication such as SMS, Token, Mobile Phone Client and strong Single Channel Authentication TURing, Pinpad or in the Taskbar using RADIUS. 6.2 Configuring SonicWall SSL VPN Domain Settings.5.4 Setting up Swivel Dual Channel Transports.5.3 Enabling Session creation with username.
