SonicWALL Welding System UTM Appliance Manuale Utente

Pagina di 57
 
 
LDAP 
Leveraging LDAP Groups/ Users with SonicWALL UTM Appliance 
 
 
 
 
 
 
Contents 
Contents .............................................................................................................................................................. 1 
Integrating LDAP/Active Directory with Sonicwall UTM ...................................................................................... 3 
LDAP over SSL ............................................................................................................................................... 3 
Configuring the CA on the Active Directory Server ..................................................................................... 3 
Exporting the CA Certificate from the Active Directory Server............................................................................ 4 
Importing the CA Certificate onto the SonicWALL .............................................................................................. 4 
Configuring the SonicWALL Appliance for LDAP........................................................................................ 4 
Authentication.................................................................................................................................................... 13 
Single Sign-On Agent (SSO)......................................................................................................................... 13 
Logon to Appliance – Configuring User Level Authentication Settings......................................................... 14 
SonicOS Options That Leverage Groups/Users ............................................................................................... 17 
Creating Firewall Rules with LDAP Groups/Users ........................................................................................ 17 
Firewall Rules with Bandwidth Management & Logging ............................................................................... 20 
Blocking Websites (Domain Names) for Groups/Users .................................................................................... 22 
Blocking Domains with Firewall Rules....................................................................................................... 22 
Allowing Specific Domains and Blocking All Others with Firewall Rules ...................................................... 24 
Blocking HTTPS (SSL) Domains with SSL Control....................................................................................... 30 
Configuring a SSL Blacklist and Whitelist ................................................................................................. 31 
Applying Different CFS Policies to Groups ....................................................................................................... 33 
Creating Custom CFS Policies.................................................................................................................. 35 
Enforcing CFS Policies without Requiring All Users to Authenticate ............................................................ 39 
Variables for Custom Block Page in SonicOS 5.2 .................................................................................... 40 
Basic Sample Code for SonicOS 5.2 ........................................................................................................ 41 
Advanced Sample Code for SonicOS 5.2 ................................................................................................. 41 
Sample JavaScript Code for SonicOS 5.2 ................................................................................................ 44 
Sample Code for SonicOS 5.1 or Earlier .................................................................................................. 44 
Applying Application Firewall Polices to Groups/Users................................................................................. 45 
Blocking All Websites except a Select Few with Application Firewall....................................................... 49 
Tightening Control over the Browsing Behavior of Users ................................................................................. 50 
Applying Intrusion Prevention Service Signatures to Groups/Users................................................................. 51