{"id":61732,"date":"2022-04-15T11:00:00","date_gmt":"2022-04-15T15:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=61732"},"modified":"2024-02-20T18:27:09","modified_gmt":"2024-02-20T23:27:09","slug":"securely-access-sonicwall-firewalls-using-jumpcloud","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/securely-access-sonicwall-firewalls-using-jumpcloud","title":{"rendered":"Manage and Secure Access to SonicWall NSv with JumpCloud"},"content":{"rendered":"\n
Configuring remote access to network appliances that are popular among small and medium-sized enterprises (SMEs) often means using a prescribed configuration. IT admins will find that support articles and how-tos about how to configure SonicWall\u2019s NSv are centered around Active Directory and Windows Server. Multi-factor authentication (MFA) is out of band, requiring a separate system solely for SonicWall. Thankfully, there\u2019s an alternative available by using JumpCloud\u2019s smart groups, remote dial-in user service (RADIUS)<\/a>, and integrated time-based one-time password (TOTP<\/a>) MFA services.<\/p>\n\n\n\n This article is part of a series of how-tos that demonstrate how to use JumpCloud\u2019s capabilities to achieve added security, with minimal costs. JumpCloud\u2019s centralized platform provides single sign-on (SSO), delivering identity and access management (IAM) for every service your organization may use. That eliminates managing passwords everywhere<\/em>, <\/em>even your firewall.<\/p>\n\n\n\n SonicWall firewalls are widely used by managed service providers (MSPs) to provide affordable and effective perimeter security. The NSv is a next-generation firewall that runs in the cloud, or as a virtualized device in your data center, thereby reducing the costs of buying an appliance. JumpCloud reduces the management overhead for your IT department.<\/p>\n\n\n\n Here are the prerequisites for this setup:<\/p>\n\n\n\n This configuration leverages directory group memberships to grant access to your SonicWall instance. The group that you\u2019ll be creating will be binded to a RADIUS configuration that mandates MFA, using TOTP tokens. Users access the firewall with their JumpCloud username and password. The only difference is that passwords are amended to include a token every time a user logs into the appliance. Every login is then protected by a unique one-time password.<\/p>\n\n\n\n SonicWall will require you to have RADIUS server settings (including a few advanced options), import JumpCloud\u2019s RADIUS certificate, and ensure that remote management is permitted.You\u2019ll be able to decide which permissions group members will inherit on the firewall by default.<\/p>\n\n\n\n Let\u2019s start by setting up a RADIUS profile for your SonicWall device.<\/p>\n\n\n\n Every JumpCloud account includes RADIUS services, which are configured<\/a> using the following steps.<\/p>\n\n\n\n To configure RADIUS, MFA for a new server:<\/p>\n\n\n\n\n
The JumpCloud Configuration<\/h3>\n\n\n\n
SonicWall Configuration Overview<\/h3>\n\n\n\n
Setting Up JumpCloud RADIUS, MFA<\/h3>\n\n\n\n