Release Notes. Contents. Release Purpose. Platform Compatibility. SonicWALL Appliance / Firmware Compatibility. Directory Connector.



Similar documents
Release Notes. Contents. Release Purpose. Platform Compatibility. SonicWALL Appliance / Firmware Compatibility. Directory Connector.

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7

Single Sign-On in SonicOS Enhanced 5.6

SONICWALL SONICOS ENHANCED 5.6 SINGLE SIGN-ON

Single Sign-On in SonicOS Enhanced 5.5

Dell SonicWALL Directory Services Connector

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Single Sign-On in SonicOS Enhanced 4.0

Single Sign-On. Document Scope. Single Sign-On

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Synchronizer Installation

Global VPN Client Getting Started Guide

Freshservice Discovery Probe User Guide

Installation Guide for Pulse on Windows Server 2012

NETASQ SSO Agent Installation and deployment

NSi Mobile Installation Guide. Version 6.2

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

Installation Guide for Pulse on Windows Server 2008R2

Table of Contents. FleetSoft Installation Guide

TechNote. Contents. Overview. System or Network Requirements. Deployment Considerations

Avalanche Remote Control User Guide. Version 4.1.3

Using Logon Agent for Transparent User Identification

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

XenClient Enterprise Synchronizer Installation Guide

XenDesktop Implementation Guide

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

Networking Best Practices Guide. Version 6.5

Diamond II v2.3 Service Pack 4 Installation Manual

WhatsUp Gold v16.3 Installation and Configuration Guide

SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

LepideAuditor Suite for File Server. Installation and Configuration Guide

Pro Bundle Evaluator s Guide Software Pursuits, Inc.

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide

Installing and Configuring WhatsUp Gold

2X ApplicationServer & LoadBalancer Manual

Desktop Surveillance Help

NETWRIX EVENT LOG MANAGER

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

NETWRIX ACCOUNT LOCKOUT EXAMINER

2XApplication Server XG v10.1

2X ApplicationServer & LoadBalancer Manual

Enterprise Manager. Version 6.2. Installation Guide

Pearl Echo Installation Checklist

2X ApplicationServer & LoadBalancer Manual

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Request Manager Installation and Configuration Guide

Global VPN Client Getting Started Guide

DameWare Server. Administrator Guide

2XApplication Server XG v10.6

Dell SonicWALL Aventail Connect Tunnel User Guide

Using RADIUS Agent for Transparent User Identification

Cloud Services ADM. Agent Deployment Guide

ThinPoint Quick Start Guide

NETWRIX WINDOWS SERVER CHANGE REPORTER

User-ID. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Integrating LANGuardian with Active Directory

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Aspera Connect User Guide

Installation Notes for Outpost Network Security (ONS) version 3.2

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

WhatsUpGold. v3.0. WhatsConnected User Guide

Ekran System Help File

Installation Guide: Delta Module Manager Launcher

7.x Upgrade Instructions Software Pursuits, Inc.

Quick Start Guide for VMware and Windows 7

VERITAS Backup Exec TM 10.0 for Windows Servers

Velocity Web Services Client 1.0 Installation Guide and Release Notes

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

SonicOS Enhanced Release Notes

Installation Instruction STATISTICA Enterprise Server

Discovery Guide. Secret Server. Table of Contents

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide

Remote Support Jumpoint Guide: Unattended Access to Computers in a Network 3. Requirements and Considerations to Install a Jumpoint 4.

XStream Remote Control: Configuring DCOM Connectivity

Hosting Users Guide 2011

How To - Implement Clientless Single Sign On Authentication with Active Directory

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

Setting Up a Unisphere Management Station for the VNX Series P/N Revision A01 January 5, 2010

Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

EventTracker Enterprise v7.3 Installation Guide

Using DC Agent for Transparent User Identification

GE Healthcare Life Sciences UNICORN Administration and Technical Manual

Live Maps. for System Center Operations Manager 2007 R2 v Installation Guide

SonicWALL SRA Virtual Appliance Getting Started Guide

Quick Start - Virtual Server idataagent (VMware)

Kaspersky Lab Mobile Device Management Deployment Guide

Installing and Configuring vcenter Multi-Hypervisor Manager

Docufide Client Installation Guide for Windows

Advanced Event Viewer Manual

WhatsUp Gold v16.1 Installation and Configuration Guide

IBM Security QRadar Version (MR1) WinCollect User Guide

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014


Nexio Connectus with Nexio G-Scribe

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Transcription:

Directory Connector SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Enhancements in Directory Services Connector 3.6.56... 3 Known Issues... 4 Resolved Issues... 5 Overview of Dell SonicWALL Directory Services Connector... 7 About SonicWALL SSO and the SSO Agent with Active Directory... 8 About Novell edirectory Support and the Dell SonicWALL SSO Agent... 37 Related Technical Documentation... 43 Release Purpose Dell SonicWALL Directory Services Connector 3.6.56 is a maintenance release that provides enhancements and fixes some known issues. It contains all the enhancements and fixes from version 3.6.25 and earlier. Platform Compatibility SonicWALL Appliance / Firmware Compatibility SonicWALL Directory Services Connector version 3.6.56 software is a supported release for use with the following SonicWALL platforms: SuperMassive 9200 / 9400 / 9600 running SonicOS 6.1 and above SuperMassive E10200 / E10400 / E10800 running SonicOS 6.0.x NSA 2600 / 3600 / 4600 / 5600 / 6600 running SonicOS 6.1 and above NSA E-Class E5500 / E6500 / E7500 / E8500 / E8510 running SonicOS 5.0 and above NSA 240 / 2400 / 3500 / 4500 / 5000 running SonicOS 5.0 and above NSA 220 / 220W / 250M / 250MW running SonicOS 5.8.1 and above TZ 215 / 215W / 205 / 205W / 105 / 105W running SonicOS 5.8.1 and above TZ 210 / 210W / 200 / 200W / 100 / 100W running SonicOS 5.0 and above TZ 190 / 190W / 180 / 180W running SonicOS 4.0 and above PRO 2040 / 3060 / 4060 / 4100 / 5060 running SonicOS 4.0 and above Note: SonicOS 5.5 or newer is required for Novell edirectory Support. Note: When configuring Active-Active on a SonicWALL SuperMassive E10000 Series appliance, SonicWALL Directory Services Connector version 3.4.51 or newer is required.

Virtual Environment Compatibility Recommended Virtual Environments for Directory Services Connector version 3.6.56 include: VMware ESX 5.5 VMware ESX 5.1 VMware ESX 4.x Microsoft Hyper-V 2012 R2 Microsoft Hyper-V 2008 R2 Virtual Machine host configuration requirements: OS - Windows Server 2008/2012 R2 32-bit/64-bit CPU Intel Xenon (4 processors) Memory - 4GB Domain Controller Server Compatibility SonicWALL Directory Services Connector version 3.6.56 software is supported for use with Domain Controllers running the following operating systems: Windows Server 2012 R2 Windows Server 2012 Windows Server 2008 R2 Windows Server 2008 Windows Server 2003 Server Compatibility SonicWALL Directory Services Connector version 3.6.56 software is supported for installation on 32-bit and 64-bit servers running the following operating systems: Windows Server 2012 Windows Server 2008 R2 Windows Server 2008 Windows Server 2003 On all Windows 32-bit and 64-bit servers, a.net Framework must be installed. The following versions of.net Framework are supported:.net Framework 4.5.NET Framework 4.0.NET Framework 3.5.NET Framework 3.0.NET Framework 2.0 The following Microsoft Windows operating systems and service packs are not supported as servers: Windows 8 All versions Windows 7 All versions Windows Vista All versions Windows XP All versions Windows 2000 All versions 2

Client Compatibility Release Notes Directory Services Connector 3.6.56 is compatible with the following client operating systems for the purpose of determining the logged in username and other information necessary for user authentication: Windows 8 All versions Windows 7 All versions Windows Vista All versions Windows XP All versions Windows 2000 Professional Mac OS X 10.6.0 Linux machines using Windows domain accounts, with SSO Agent set to use DC Security Log as the Query Source Linux/UNIX machines running Samba 3.0 or newer Enhancements in Directory Services Connector 3.6.56 This section describes the enhancements that are included in Dell SonicWALL Directory Services Connector 3.6.56. Agent-to-Agent Communication When multiple SSO Agents are configured in Directory Services Connector 3.6.56, these Agents can communicate with each other to share information. This allows a global user database to be shared among all SSO Agents. In previous releases, only standalone Agents were supported. The benefits of Agent-to-Agent Communication include: Shared User-detection Times - User detection information is shared among more than one Domain Controller (DC). For example, when agent1 fetches logs from DC1 and DC2, and agent2 fetches logs from DC3 and DC4, both agents can update each other when new users have been added. Even when user1 is logged on to DC3 or DC4, the Dell SonicWALL network security appliance is able to retrieve information from agent1. Both agents share user-identification times along with each add/update notification, which helps to identify recently logged-in users. Decreased Redundancy - When Query Source is set to DC Security Log and no fallback query method is configured, new and identified users logging in to that DC could be missed if that agent were to fail. Agentto-agent communication takes over for the failed agent, preserving currently-identified users and logs. It then begins fetching logs from the DC on the failed agent s behalf; ensuring that agents are always correctly reporting usernames. Smart NetAPI/WMI Scanners When one agent is overloaded with requests while other agents are comparatively free, polling requests can be transferred to one of the free agents. For more information, see About Agent-to-Agent Communication. NetBIOS Name Mapping The NetBIOS user name is now consistently sent to the network security appliance. In previous releases, the Agent sent either the NetBIOS user name or the Kerberos Realm user name, depending on the initial event ID when the user was discovered. Remote Debugging for SSO Windows Service Remote Debugging is a diagnostics feature that provides data from the service about a logged-in user, the last username sent to an appliance for any IP address, the logged-in user stored in the service for a specified IP address, and the scanner statistics that include information such as the number of threads running on a specific queue. 3

Agent-to-Domain Controller Time Synchronization A warning message has been added to alert users when the time synchronization mechanism between agents and Domain Controllers does not match. The message can be displayed after adding a new Domain Controller or Agent. Known Issues This section contains a list of known issues in the Directory Services Connector 3.6.56 release. Symptom Condition / Workaround Issue The SSO Agent sends out a login notification to the appliance 10 seconds after sending a logout notification for a user who has logged off. In the Users > Status page in SonicOS, the user disappears after the logout, but reappears as an inactive user after the login notification 10 seconds later. The View Logs screen incorrectly displays the error message, Failed to get Domain Controller security log when using LogWatcher. The pop-up error dialog box is partially hidden behind the InstallShield wizard window when an incorrect password is entered for the Service User. The publisher is displayed as Unknown during installation. Occurs when the Domain Controller is a Windows Server 2003 machine and the agent is installed on a Windows Server 2008 64-bit machine, with Query Source set to DC Security Log. Does not occur when the DC is on Windows Server 2008 or when using LogWatcher. Occurs when the Add LogWatcher Support option is selected in the Configuration Tool, and other LogWatcher fields are correctly configured. Although the DC Security Log method is not used in this configuration, LogWatcher is not yet independent from DC Security Log, and so gives this error if the Domain Controller is not configured. Occurs when first entering the domain administrator credentials for the Domain Controller during Directory Connector installation. After a second attempt (still incorrect password), the error dialog is not hidden. Occurs when installing Directory Services Connector using the SoniCON.exe installer file. 133663 134106 134551 135055 4

Resolved Issues This section contains a list of issues that are resolved in the Directory Services Connector 3.6.56 release. Symptom Condition / Workaround Issue An invalid appliance or server IP address and port number are allowed during installation. The Windows Service Users for a second firewall appliance do not display in the SSO Agent until the SSO Agent is restarted. Keyboard shortcuts do not work in the Directory Connector Configurator. The SSO Agent sends the format domain/user to the firewall appliance, but the appliance displays the format as domain.user instead. The appliance IP, port number and edirectory server IP address are not properly validated during Directory Services Connector installation. In Demo mode, an event viewer error message is displayed and communication between the firewall appliance and the SSO Agent fails. The pop-up dialog box telling the admin to restart the SSO Agent service is not always displayed. The Set Default selection is not displayed in the right-click menu for either appliance in the DSC Configuration Tool. Occurs when installing the SSO Agent or Novell edirectory and an invalid IP address or port number is entered for the SonicWALL appliance or edirectory server. Occurs when two firewall appliances are associated with the SSO Agent. Upon switching the second appliance to the default, and then viewing the Windows Service Users, the Windows Service Users only display for the first appliance. Workaround: After setting the second firewall appliance as the default, restart the SSO Agent. Occurs when trying to use keyboard shortcuts while configuring the SSO Agent in the Directory Connector Configurator. Occurs when sending a packet to the firewall appliance. The SSO Agent does not keep the domain/user format. Occurs when invalid characters are accepted for the appliance IP and port number fields on the Appliance configuration page, and a valid IP address is rejected for the edirectory server on the Admin user page. Occurs when doing a load test in Demo mode using the DC Security query mode. For the load test, the registry on the SSO Agent server is changed to set LOADTEST=DEMO and the SSO Agent service is restarted. Occurs when the following fields are changed in the Properties screen by simply removing the last zero in the field: Cache refresh time Max thread count Scanner thread count Workaround: Clear the field and type in the new value. Occurs when a second appliance is set to the default after it is added in the Configuration Tool and encryption keys are generated for it, then keys are generated for the first appliance, then the changes are applied and the agent is restarted. When attempting to set the first appliance as the default, the Set Default option is not available. 87197 103858 107717 117347 124765 / 133911 127550 134306 134330 5

Symptom Condition / Workaround Issue The Launch Directory Connector option is not displayed at the end of the InstallShield Wizard. The View Logs screen in the Configuration Tool does not display any log messages, although it shows a value for the number of messages and shows the date/time for the messages. Users need to re-enter credentials because the SSO Agent reports logons/logoffs as DC Log events that are not direct workstation logons/logoffs or screen lock/unlock events. The list of Windows Service Users in the SSO Agent database is not updated to stay in sync with the firewall. In the Directory Connector Configurator, the Users and Hosts window does not open a second time, after opening once. In SonicOS, testing the IP address of a client with a known active user displays No User Found as the result. Occurs when using the wizard to upgrade from a previous version of SonicWALL Directory Services Connector. Occurs when Directory Services Connector is installed on a 2008 R2 Hyper-V Host Server, after changing the query type to Diagnostic and adding the agent into the appliance, then checking the View Logs screen. Occurs when the SSO Agent is configured using the DC Logs + NetAPI query method, and the users access other services for which logon/logoff events are generated, such as Exchange or Windows File Shares. Occurs when some Windows Service Users are removed from the list configured on the Users > Settings page on the firewall. Occurs when attempting to open the Users and Hosts window a second time by right-clicking SonicWALL SSO Agent and then clicking on Users and Hosts. Occurs when WSL+NETAPI+WMI is configured as the Query Source for the SSO Agent, and the Check User option is tested in the Test Authentication Agent Settings screen of the SSO Agent configuration in Users > Settings on the firewall. 134363 134908 144678 144785 145014 147221 6

Overview of Dell SonicWALL Directory Services Connector Dell SonicWALL Directory Services Connector 3.6.56 allows Dell SonicWALL SuperMassive series, E-Class NSA series, NSA series, and TZ 215/210/205/200/105/100 series appliances to achieve transparent, automated Single- Sign-On (SSO) integration with both Active Directory and Novell edirectory, and allows SonicWALL PRO and TZ 190/180 series appliances to achieve Single-Sign-On (SSO) integration with Active Directory. The Dell SonicWALL appliance can use Active Directory or Novell edirectory to authenticate users and determine the filtering policies to assign to each user or user group. The Dell SonicWALL SSO Agent identifies users by IP address and automatically determines when a user has logged out to prevent unauthorized access. Dell SonicWALL Directory Services Connector also has an option for the SSO Agent to identify logged in user information from the Domain Controller's Windows Security Log. Along with the username information, Directory Services Connector sends the following information to the appliance: The Domain Controller on which information about logged in users is found. The User Detection mechanism used by the Agent to find logged in users. Note: It is normal for the system running Dell SonicWALL Directory Services Connector to have high CPU activity for the first 24 hours after installation, while the software creates a database of the user network. Dell SonicWALL Directory Services Connector 3.6.23 and higher versions run as a 32-bit application. This improves the performance of 64-bit agent machines, especially in cases where the agent is set to use NETAPI or WMI as the Query Source. Upon identifying a logged in user or finding updated user information, the SSO Agent sends login notifications to the appliance in the following cases: If the Query Source is set to DC Security Log, the agent sends a notification with the User IP Address, User Name and Login Session ID, User ID Mechanisms, Domain Controller IP Address, and Login Time. If using NETAPI or WMI, the agent sends a login notification only if an In_Progress status was previously sent for the same IP address. The agent does not send a notification for an updated user, but only updates its internal cache with the updated user information. When the appliance sends a multi-user request to the SSO Agent and includes an Operation Timeout value, the agent divides the time by the number of IP addresses present in the request. If the query times out, it is aborted and an Operation_Time_Out status is included in the agent s reply to the appliance. The Dell SonicWALL SSO Agent is not supported in a Citrix or Terminal Services Environment. In these environments, you can use the Dell SonicWALL Terminal Services Agent (TSA) to communicate with Dell SonicWALL SSO. The TSA is not included as part of this release. For more information about the TSA, see the latest Terminal Services Agent Release Notes, the latest SonicOS Administrator s Guide and the SonicOS Enhanced Single Sign-On Feature Module, available on http://www.sonicwall.com/us/support.html. 7

About SonicWALL SSO and the SSO Agent with Active Directory Single Sign-On (SSO) is a transparent user authentication mechanism that provides privileged access to multiple network resources with a single workstation login. Dell SonicWALL security appliances provide SSO functionality using the SonicWALL Single Sign-On Agent (SSO Agent) to identify user activity based on workstation IP address. SSO is configured in the Users > Settings page of the SonicOS management interface. SSO is separate from the authentication method for login settings, which can be used at the same time for authentication of VPN/L2TP client users or administrative users. SonicWALL Single Sign-On Solution Architecture with Active Directory or LDAP 8

When installed without the Novell edirectory Support option, the Dell SonicWALL SSO Agent identifies users by IP address using a protocol compatible with Active Directory and automatically determines when a user has logged out to prevent unauthorized access. Based on data from the SSO Agent, the Dell SonicWALL security appliance queries LDAP or the local database to determine group membership. Memberships are optionally checked by firewall policies to control who is given access, and can be used in selecting policies for Content Filtering and Application Firewall to control what they are allowed to access. User names learned via SSO are reported in the Dell SonicWALL appliance logs of traffic and events from the users. The configured inactivity timer applies with SSO but the session limit does not, though users who are logged out are automatically and transparently logged back in when they send further traffic. Users logged into a workstation directly, but not logged into the domain, cannot be authenticated. For users that are not logged into the domain, an Authentication Required screen displays, indicating that a manual login is required for further authentication. Users that are identified, but lack the group memberships required by the configured policy rules, are redirected to an Access Barred page. To use Dell SonicWALL SSO, it is required that the SSO Agent be installed on a server that can communicate with the Active Directory server and with clients and the Dell SonicWALL security appliance directly using the IP address or using a path, such as VPN. The following requirements must be met in order to run the SSO Agent: Port 2258 must be open; the firewall uses UDP port 2258 by default to communicate with the SSO Agent; if a custom port is configured instead of 2258, then this requirement applies to the custom port Windows Server, with latest service pack.net Framework 2.0 or above NETAPI or WMI (unless using DC Windows Security Log as the Query Source) The SSO Agent must run under Domain Admin privileges The following sections provide more information about various features of the SSO Agent and Directory Connector Configuration Tool: About NETAPI and WMI...10 NETAPI / WMI Scanner...10 Non-Responsive Workstation Handling...11 About the Domain Controller Windows Security Log Method...12 Configuring the Domain Controller Information...17 About Agent-to-Agent Communication...21 About LogWatcher...24 LogWatcher Requirements...24 Installing LogWatcher...24 Configuring LogWatcher on the Domain Controller...25 Enabling Logon Audit on the Domain Controller...25 Configuring/Enabling LogWatcher in Directory Services Connector...28 Viewing LogWatcher Information in Users and Hosts Page...29 About the SSO Agent Cache...30 About Using Samba on Linux/UNIX Clients...30 Installing the SonicWALL SSO Agent with Active Directory...30 Using the Actions Menu...35 Users and Hosts Statistics...36 Dell SonicWALL Appliance SSO Agent Novell edirectory Solution Architecture...37 Installing the SonicWALL SSO Agent with Novell edirectory Support...38 LDAP over TLS with Novell edirectory...42 9

About NETAPI and WMI The SSO Agent can use either the NETAPI or WMI protocol to communicate with workstations. You can select the desired protocol as the Query Source option in the Directory Connector Configurator. NETAPI and WMI provide information about users that are logged into a workstation, including domain users, local users, and Windows services. NETAPI provides faster, though possibly slightly less accurate, performance. WMI provides slower, though possibly more accurate, performance. With NETAPI, Windows reports the last login to the workstation whether or not the user is still logged in. This means that after a user logs out from his computer, the appliance still shows the user as logged in when NETAPI is used. If another user logs onto the same computer, then at that point the previous user is logged out from the Dell SonicWALL appliance. NETAPI / WMI Scanner The SSO Agent Properties page in the DSC Configuration Tool provides the Enable Scanner checkbox to enable the NETAPI / WMI background scanner. The Scanner works with either NETAPI or WMI as the Query Source, and keeps track of logged in users from remote clients. Right-click the SSO Agent or use the Actions menu to go to the Properties page and set this option. Upon a user information request for any IP address from the appliance, the SSO Agent checks for the IP address in its cache. If the IP address is not present in the cache, the SSO Agent treats the request as the first request for that IP Address and adds the IP Address to its Scanner queue for further processing. Depending on the firmware version running on the appliance, the SSO Agent does one of the following when the entry is not present in its cache: Reply back to the appliance with an In_Progress status Not send any reply back to the appliance 10

The SSO Agent initially starts a configurable number of threads (Scanner Thread Count). These threads periodically query the IP addresses that are present in the Scanner queue. After completing each query, the agent adds or updates the user or error information in its cache. Upon identifying the user via NETAPI or WMI, the agent sends a login notification with the user name if an In_Progress status was previously sent for the same IP Address. If no reply was previously sent, the user information is simply cached. Bad IP Address Handling by Scanner If the query returns an error for any IP address and the SSO Agent is not able to identify the user information, the agent treats the IP address as a Bad IP. This can occur for network devices such as printers, non-windows computers or other workstations that do not understand the query options. While processing requests in the Scanner queue, the agent will skip any Bad IP addresses and add the IP address to the back of the queue for the next fetch. Priority Queues in the Scanner Several enhancements for the Scanner are included in Dell SonicWALL Directory Services Connector 3.6.23 and newer versions. These features provide better scalability when processing a high rate of user authentication requests, and work best when used with corresponding updates in the appliance firmware. Those updates are in the following Dell SonicWALL appliance firmware versions: SonicOS 5.9.0.1 and newer SonicOS 6.1.2.0 and newer The enhanced Scanner differentiates IP addresses into three queues, each with a specified priority: New IP request (High Priority) Succeeded IP (Mid Priority) Bad IP (Low Priority) Any IP address for which the agent already sent an In Progress status is treated as High Priority. For any IP Address present in either the Mid Priority queue or Bad IP queue, if the difference between the current time and the time of the last request is greater than session time, the agent will drop that IP address and move on to process another address in the queue. The number of processing threads allocated for the scanner is divided into three categories: High 70% of threads Mid 20% of threads Low 10% of threads This thread allocation is dynamic and depends on the frequency of requests for identifying new IP addresses from the appliance. This dynamic thread allocation ensures that no thread is idle or wasted in any scenario. To ensure that the agent will not process any IP address that has not been polled from the appliance for a considerable amount of time, the agent maintains the session time and the time of the last request from the appliance for each IP address. This allows the agent to minimize the queue size, ensures that threads are not wasted, and prevents unnecessary traffic from the agent for IP addresses that are not polled from the appliance. The session time can be modified from Windows registry settings using the registry value SESIONTIME. Non-Responsive Workstation Handling The handling of non-responsive workstations to queries from WMI and NETAPI is optimized in Dell SonicWALL Directory Services Connector. The appliance repeatedly polls the SSO Agent with multi-user requests, and often sends more than one such request at a time. The number of concurrent requests increases when workstations do not respond to the requests, potentially overloading the agent. To avoid this, a timeout mechanism is included in multi-user requests from the appliance. If the request does not complete within this time, the agent silently aborts it. 11

About the Domain Controller Windows Security Log Method Dell SonicWALL Directory Services Connector provides an option for the SSO Agent to identify logged in user information from the Domain Controller's Windows Security Log (DC Security Log or WSL). When using DC Security Log mode, Directory Services Connector fetches security logs from the configured Domain Controller. It uses SonicWALL SSO UDP Protocol version 4.0. The DC Security Log method works in a fully trusted domain environment where all users are domain users using domain accounts to access Windows or Linux workstations. The DC Security Log method can optionally be used with either NETAPI or WMI as a fall back to support user identification from non-domain Windows PCs or Domain PCs using local accounts. Altogether, there are three Query Source options involving the DC Security Log: DC Security Log Users are identified from the Domain Controller's Windows Security Log; use this option if all users log into the domain. DC Security Log + NETAPI In addition to using the DC Security Log, this option provides a fall back to using NETAPI to identify users. In case the SSO agent fails to identify users from the Domain Controller, it uses traditional NETAPI queries to the user s workstation to fetch user information. DC Security Log + WMI In addition to using the DC Security Log, this option provides a fall back to using WMI to identify users. In case the SSO agent fails to identify users from the Domain Controller, it uses traditional WMI queries to the user s workstation to fetch user information. To use DC Security Log mode in Dell SonicWALL Directory Services Connector, ensure that the Agent machine has the following minimum requirements: Multi-Core processors: 2 or more, or a dual CPU Speed: 2GHz+ RAM: 2GB, minimum Note: For single core processors, CPU spikes may reach up to 100% periodically while using DC Security Log mode in Dell SonicWALL Directory Services Connector. To avoid this, optimization is provided for reading security logs. Also an option is available to read the security logs in current time, minimizing the initial log processing time. By default, all of the DC Security Log options require a Domain Administrator account or Local Administrator account on the Domain Controller to read the DC Security Log. The account information is entered during the configuration, described below. If an account with administrator privileges is not available, user identification via the Domain Controller Security Log can be configured for WMI with a non-administrator domain account. User identification via the Domain Controller Security Log can also be configured by using WMI with a Non-Administrator domain account. Although this option does not require use of the administrator domain account, it still requires read access to the security log, which can be accomplished by configuring a non-admin account. For more information, refer to the Configuring a Non-Admin Domain Account for SSO Agent to Read Domain Security Logs technical note in the Support > Product Documentation page for supported Dell SonicWALL appliances on www.sonicwall.com: http://www.sonicwall.com/app/projects/file_downloader/document_lib.php?t=tn&id=333 Windows Server uses the DC Security Log to record logon/logoff events and/or other security-related events specified by the system's audit policy. If the audit policy is set to record logins, a successful domain login records the user's user name and computer name in the Security Log. On Windows Server 2003 and above, the computer s IP address is also logged. To configure the DC Security Log method in Directory Services Connector, perform the following steps: 1. In the Directory Connector Configuration Tool, right-click SonicWALL SSO Agent in the left pane. 12

2. Select Properties. 13

3. In the right pane in the Query Source field, select one of the following options: DC Security Log DC Security Log + NETAPI DC Security Log + WMI DC Security Log + WMI + NETAPI 14

4. Select the desired number of seconds for the Event Polling Time fields. The Event Polling Time option is visible only if one of the DC Security Log options is selected in the Query Source field. The SSO Agent fetches event logs from the Domain Controller on a regular time interval to discover updated user information. The Event Polling Time option provides a way to specify this interval. The minimum is 5 seconds, and the maximum is 300 seconds, with a default of 10 seconds. 15

5. To save information about previously identified users when the SSO Agent service is restarted, select the Preserve users during service restart checkbox. Upon restarting the SSO Agent service, the user information is restored. Because the SSO Agent must be restarted for Properties changes to take effect, this allows the agent to maintain current user information across these restarts. To avoid restoring outdated information, if the backup is older than 15 minutes, the information is not restored. If this option is unchecked when using DC Security Log, the user information is not saved during a service restart. When the next user information request comes in for a previously logged in user, the DC logs are checked, but there is no new logon event and so the user is not identified. If the Query Source is set to DC Security Log only, the SSO Agent will send no user information to the appliance. If Query Source is set to DC Security Log with NETAPI or WMI, the agent will do a NETAPI or WMI query to the user PC to identify the user. 6. Next, configure the Domain Controller information in the Directory Connector Configurator, including the IP address of the DC, the administrator account, and the password. 16

Configuring the Domain Controller Information Only machines configured with a Domain Controller role can be set as the Domain Controller in the Directory Connector Configurator. 1. In the Directory Connector Configuration Tool, right-click Domain Controller in the left pane. 2. Select Add. 3. In the right pane on the Edit tab, type the DC IP address into the IP Address field. 4. In the Administrator User field, enter the domain and admin user name separated by a backslash, such as snwl\administrator. 5. In the Administrator Password field, type in the password for the admin user. 6. In the Initial Fetch Time field, select the time of day for the SSO Agent to begin service startup and fetch event logs from the Domain Controller for the first time. All event logs are fetched before the SSO Agent service is started. 17

7. To test the connection to the Domain Controller using the IP address and user credentials, click Test Connection. If the IP address does not belong to a machine with a role of Domain Controller, the Configurator will not accept the configuration and an error message is displayed. 8. If the IP address belongs to a machine with a role of Domain Controller, no error is displayed. Click OK. 9. Repeat this procedure to add another Domain Controller. Setting Group Policy to Enable Logon Audit on Windows Server 2008 Logon audit may need to be enabled on the Windows Server machine. To enable logon audit on Windows Server 2008, perform the following steps: 1. Start the Group Policy Management Console. 2. Browse to the following location: Domain Name > Domains > Domain Name > Group Policy Objects, where "Domain Name" is replaced with your domain. 3. Under Group Policy Objects, right-click on Default Domain Policy and select Edit. 18

The Group Policy Management Editor window is displayed. 4. Double-click on Audit account logon events and select Success. Click OK. 5. Double-click on Audit logon events and select Success. Click OK. 6. Double-click on Audit Directory Service Access and select Success. Click OK. 7. Double-click on Audit Object Access and select Success. Click OK. 8. Close the Group Policy window. Setting Group Policy to Enable Logon Audit on Windows Server 2003 By default, logon audit is disabled on Windows Server 2003. To enable logon audit on Windows Server 2003, perform the following steps: 1. Start the Group Policy Management Console. 2. Browse to the following location: Domain Name > Domains > Domain Name > Group Policy Objects, where "Domain Name" is replaced with your domain. 19

3. Right-click on Group Policy Objects and select New. 4. Give your policy a name and click OK. 5. Expand the Group Policy Objects folder and find your new policy. Right-click on the policy and select Edit... 6. Browse to the following location: Policy Name > Computer Configuration > Windows Settings > Security Settings > Local Policies > Audit Policy. 7. Left click on Audit Policy. The policy settings are displayed in the right pane. 8. Double-click on Audit account logon events and select Success. Click OK. 20