SonicWall SonicOS - RADIUS Configuration for Authentication Manager - RSA Ready Implementation Guide
This article describes how to integrate SonicWall SonicOS with Authentication Manager using RADIUS.
Configure RSA Authentication Manager
Perform these steps to configure RSA Authentication Manager using RADIUS.
Procedure
- Sign in to Security Console.
- Go to RADIUS > RADIUS Servers and make a note of the IP address of the selected RADIUS server.
- Click the RADIUS > RADIUS Clients > Add New.
- On the Add RADIUS Client page, enter the following:
- Client Name: Enter a descriptive name for the RADIUS client.
- IPv4 Address: Enter the IP address of the RADIUS client.
- Make / Model: Select SonicWall.
- Shared Secret: Create and enter a secure shared secret. This secret will be used for secure communication between the RADIUS client and the RADIUS server.
- Click Save & Create Associated RSA Agent.
- On the Add New Authentication Agent page, click Save, and confirm by clicking Yes, Save Agent.
Notes
- RSA Authentication Manager RADIUS server listens on ports UDP 1645 and UDP 1812.
- The relationship of agent host record to RADIUS client in the Authentication Manager can 1 to 1, 1 to many or 1 to all (global).
- Shared Secret must be an alphanumeric string between 1 and 31 characters in length and is case-sensitive.
Configure SonicWall SonicOS
Perform these steps to configure SonicWall SonicOS using RADIUS.
Procedure
- Log in to SonicWall Management app.
- In the top menu, select the Device tab. Go to Users > Settings
- Select RADIUS as the User Authentication Method.
- Click Configure next to Configure RADIUS.
- In the RADIUS Configuration popup window, select the Settings tab and click ADD to add a RADIUS Server.
- Enter the Hostname or IP address of the RSA RADIUS server and specify the appropriate port (the default RADIUS port is 1812).
- In the Shared Secret field, enter the shared secret used in the RSA Cloud Authentication Service configuration.
- Click Save.
- In the RADIUS Configuration window, go to the General Settings tab, set the RADIUS Server Timeout to 60 seconds, and adjust the Retries to 3.
- Go to the RADIUS Users tab and choose the mechanism for setting user group memberships from the available options.
- If you do not plan to retrieve user group information from RADIUS, select Local configuration only.
- Select the appropriate group from the Default user group drop-down menu for all RADIUS users.
- Click Save.
- Scroll to the bottom of the screen and click Accept.
- Go to the Network tab in the top menu and select IPSec VPN > Rules and Settings.
- To configure the WAN Group VPN policy, select it and click the edit icon to make modifications.
- Click the General tab and enter a shared secret. You can leave the other settings at their default values.
- Go to the Advanced tab and enable the Require authentication of VPN clients by XAUTH toggle switch.
- Navigate to the User group for XAUTH users and select the appropriate group to grant permission. Ensure that this group has VPN access to the desired subnets.
- Click the Client tab and set Cache XAUTH User Name and Password on Client to Single Session.
- Click Save.
- Go to SSL VPN > Server Settings in the left pane. Enable the WAN option.
- On the SSL VPN Server Settings page, enable Use RADIUS toggle switch and select the MSCHAPv2 mode radio button.
- Select the Device tab in the top menu and go to Users > Local Users and Groups.
- Click the arrow next to All RADIUS Users to collapse its options. Hover over the Everyone group and click the edit icon to modify the user group settings.
- Go to the VPN Access tab and choose the different networks that should be accessible to VPN users.
- Click Save.
Notes
- If your organization expects multiple remote users, enabling WAN GroupVPN is advisable for better management and security. However, if only a few users need access, you might consider whether the added complexity of enabling WAN GroupVPN is necessary, as it is not strictly required for the Global VPN Client (GVC) in SonicOS.
- SSL VPN is not mandatory for RADIUS authentication in SonicOS, but it is highly beneficial for secure remote access. You can use RADIUS for user authentication without an SSL VPN if your setup does not require remote access.
Return to SonicWall SonicOS - RSA Ready Implementation Guide
Related Articles
SonicWall SonicOS - RADIUS Configuration for Cloud Authentication Service - RSA Ready Implementation Guide 23Number of Views RSA SecurID Access Free Trial SonicWall Global VPN Guide 78Number of Views SonicWall SonicOS - RSA Ready Implementation Guide 26Number of Views Want to pass a configuration file to the FIM 3.0 / 3.1 Bulk Federation Utility 7Number of Views RSA Authentication Manager 8.7 SP2 Performance and Scalability Guide 149Number of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process
Don't see what you're looking for?