1. Home
  2. SonicWall
  3. Configure RADIUS on Server 2012 R2 for Dell SonicWall

Configure RADIUS on Server 2012 R2 for Dell SonicWall

  1. Open Server Manager and select Manage
  2. Select Add Roles and Features
  3. Install the Network Policy and Access Services role
  4. On the Domain Controller create a new user group called VPN Users
  5. On the Network Policy Server, open Server Manager and go to Tools>Network Policy Server
  6. Right click RADIUS Clients and select New
  7. Enter a friendly name, the IP of the SonicWall and create a shared secret
  8. Under Policies>Network Policies, right click and select New
  9. Enter a friendly name and click Next
  10. Add a condition and select User Groups
  11. Select your VPN Users group and press OK
  12. Add another condition: ClientIPv4 Address
  13. Enter the IP of the SonicWall
  14. Once you have your Conditions configured click Next
  15. Select the following in the Specify Access Permissions:
    1. Access Granted
    2. Access is determined by User Dial-In properties
  16. Uncheck MS-CHAP option
  17. Configure any Constraints you would like
  18. Configure any Settings
  19. Review your Network Policy settings and click Finish
  20. Log into your SonicWall
  21. Go to Users and select Settings
  22. For User Authentication Method select RADIUS + Local Users
  23. Click Configure RADIUS…
  24. In the Settings tab, enter the IP or name of the Network Policy Server and the Shared Secret you made earlier
  25. In the RADIUS Users tab, select “User RADIUS Filter-Id attribute on RADIUS server” and then select SSLVPN Services in the Default user group
  26. Go to the SSL VPN node and select Server Settings
  27. In the RADIUS User Settings select “Use RADIUS In” and MSCHAPV2 mode
  28. Verify the WAN zone is green
  29. In the SSL VPN Server Settings, make sure the User Domain is the same as your AD Domain
  30. Select Client Settings
  31. Create a new Client Device Profile, you will need to create a new Network under Network Address IP V4 if you do not have one configured already
  32. Under client routes make sure you enable SSL VPN Users access to the LAN
  33. In the Client Settings, add your AD DNS server to the DNS Server entry, in the DNS Search list add your AD Domain Name and then enable “Create Client Connection Profile”
  34. Your domain users will now be able to VPN into your network as long as they are in the VPN Users Group.



Updated on December 19, 2017

Was this article helpful?

Related Articles

Leave a Comment