How to setup CFS policies with LDAP and SSO to restrict internet access
How to setup CFS policies with LDAP and SSO to restrict internet access (SW7782)
Was this article helpful?
- Title
How to setup CFS policies with LDAP and SSO to restrict internet access
- Description
Using Multiple Custom content Filter policies with LDAP and SSO to restrict Internet access (CFS + LDAP + SSO)
- Resolution
This article explains about how to integrate Premium Content Filtering Service with LDAP (With Single Sign On).
Restricted user group on the active directory is imported to SonicWALL and give restricted web access to those users in that group. Wherein the Full Access User group has full access or partial access to websites
Click To See Full Image.
Deployment Steps
To integrate Premium Content Filtering Service with LDAP, follow these steps:
Step 1: Configuring Content Filter and Policies
Step 2: Configuring LDAP on SonicWALL
Step 3: Importing Groups from LDAP to SonicWALL unit
Step 4: Configuring SSO on SonicWALL
Step 5: Configuring Single Sign on Agent on Workstation
Step 6: Configuring Access Rule for the User Group
Step 7: Enabling CFS on the LAN Zone
Procedure:
Step 1: Configuring Content Filter and Policies
1. In the SonicWALL management interface, select Security Services > Content Filter
2. Select SonicWALL CFS from the Content Filter Type menu, and click Configure.
Note. Select Content Filter Service from the Content Filter Type menu when using 5.9 and above firmware.
3. The SonicWALL Filter Properties window is displayed. Go to the Policy tab
4. Make the Default Policy Most Restrictive.
Note: The Default CFS policy is always inherited by every user. To ensure proper content filtering, the Default CFS policy should be configured to be the most restrictive policy, and then each custom policy should be configured to grant privileges that are otherwise restricted by the Default policy.
Edit the Default Policy to make it the most restrictive
Please note that if a website is rated in more than one category, in order to block it, only one related category needs to be selected. In such scenario the SonicWALL doesn't apply the "less restrictive" logic to avoid a situation where we would need to create exceptions for other sites falling into the additional categories.
5. Creating Restricted Access CFS Policy for Restricted User Group
Click on Add, Add a Policy for Restricted Group with most of the categories enabled (Depends on what should be blocked)
Eg: Restricted user will have access only to E-mail and Search Engines and Portals category.
6. Creating a Full Access CFS Policy for Full Access User Group
Add second Policy for the Full Access Group with certain category enabled or all categories enabled (Depends on what should be allowed)
Eg: Full Access Users will have access to all the categories
Step 2: Configuring LDAP on SonicWALL
1. Go to Users > Settings page, in the Authentication method for login drop-down list, select LDAP + Local Users and Click Configure.
If you are connected to your SonicWALL appliance via HTTP rather than HTTPS, you will see a dialog box warning you of the sensitive nature of the information stored in directory services and offering to change your connection to HTTPS. If you have HTTPS management enabled for the interface to which you are connected (recommended), check the “Do not show this message again” box and click Yes.
2. On the Settings tab of the LDAP Configuration window, configure the following fields
Name or IP address: IP address of the LDAP server Port Number: 389 (Default LDAP Port) Server timeout (seconds): 10 Seconds (Default) Overall operation timeout (minutes): 5(Default) Select Give login name/location in tree Login user name: Specify a user name that has rights to Login Password: The password for the user account Protocol Version: LDAPv3 Use TLS (SSL) : Uncheck (If TLS is not used to |
3. On the Schema tab, configure the following fields: LDAP Schema:Microsoft Active Directory
4. On the Directory tab, configure the following fields:
Primary domain:The user domain used by your LDAP implementation
User tree for login to server:The location of where the tree is that the user specified in the settings tab
Click on Auto-configure
Select Append to Existing trees and Click OK.
Click To See Full Image.
This will populate the Trees containing users and Trees containing user groups fields by scanning through the directories in search of all trees that contain user objects.
5. On the LDAP Users tab, configure the following fields:
Default LDAP User Group: Trusted Group
6. On the LDAP Test tab, Test a Username and Password in Active directory to make sure that the communication is successful.
Step 3: Importing Groups from LDAP to the SonicWALL unit
1. Go to Users > Local Groups
2. Click on Import from LDAP
Click To See Full Image.
3. Select the Group in LDAP that has to imported to SonicWALL and Click Save
Click To See Full Image.
4. Click on Configure button for the Group that is imported from LDAP.
5. Go to CFS Policy tab, Select the appropriate CFS Policy from the drop down and Click OK
Step 4: Configuring Single Sign-On Method on SonicWALL
1. Navigate to Users > Settings.
2. In the Single-sign-on method drop-down menu, select SonicWALL SSO Agent.
3. Click Configure button.The SSO configuration page is displayed.
4. Under the Settings tab, Click on the Add button to add the IP address of the work station that has SSO agent running.
Click on the ADD button In Port Number, enter the port number of the workstation | Click To See Full Image. |
5. Once the SSO Agent is successfully added, under the Authentication Agent Settings a green light is shown for status
6. Click the Test tab. The Test Authentication Agent Settings page displays.
7. Select the Check agent connectivity radio button then click the Test button. This will test communication with the authentication agent. If the SonicWALL security appliance can connect to the agent, you will see the message Agent is ready.
Click To See Full Image.
8. Select the Check user radio button, enter the IP address of a workstation in the Workstation IP address field, and then click Test. This will test if the agent is property configured to identify the user logged into a workstation.
Note: Performing tests on this page applies any changes that have been made.
Tip: If you receive the messages Agent is not responding or Configuration error, check your settings and perform these tests again.
9. When you are finished, click OK.
Step 5. Configuring Single Sign-On Agent on Workstation
Refer Article :- UTM: Configuring the SonicWALL SSO Agent Software on workstation
Step 6: Configuring Access Rule for the User Group
Go to Firewall > Access rule, add a Rule form LAN to WAN
Caution: It is not recommended to do this change on a Production Environment because this changes are instant and can affect all the computers on the LAN. So it is best to schedule a downtime before proceeding further.
Service: HTTP | Click To See Full Image. |
Step 7: Enabling CFS for the LAN Zone
Caution: It is not recommended to do this change on a Production Environment because this changes are instant and can affect all the computers on the LAN. So it is best to schedule a downtime before proceeding further.
Go to Network > Zones, click on Configure Button for LAN Zone
Check the box Enforce Content Filtering Service, select the Default CFS Policy from the drop down.
How to TEST
Log out from the windows domain computer and log in back with a user from either the full access or restricted access groups and check whether the policy is getting enforced correctly for the user.
v
Comments