
- SONICWALL 2FA GLOBAL VPN HOW TO
- SONICWALL 2FA GLOBAL VPN INSTALL
- SONICWALL 2FA GLOBAL VPN UPDATE
- SONICWALL 2FA GLOBAL VPN FULL
- SONICWALL 2FA GLOBAL VPN SERIES
SONICWALL 2FA GLOBAL VPN INSTALL
You must download and install the NPS extension on your servers that NPS will be configured on.
SONICWALL 2FA GLOBAL VPN HOW TO
While I will not be walking through how to configure any of these prerequisites, as there is plenty of information available on these topics, you should review them and confirm they are in place so you don’t run into issues following the rest of this guide. While both of the vendor documents I’ve linked contain information on how to configure each piece of this solution separately, I am going to walk through the exact steps you need to take to implement the solutions so they fully work together. By configuring that solution and then configuring your SonicWall firewall to use RADIUS authentication for VPN clients via the same server running NPS, you are able to enforce MFA on new VPN connections. Resetting and re-configuring it is the work-around (super annoying).Microsoft’s Network Policy Server (NPS) extension allows you to add your existing Azure AD MFA to your infrastructure by pairing it with a server that has the NPS role installed. App Control: Be aware that either due to firmware updates, or bugs - app control will behave poorly (cause packet loss, or outright blocking) with normal and legitimate activities. It is so annoying, most clients avoid this capability, just nullifying the whole purpose of it. They have to wait an indeterminate amount of time, and try again to see if it works. A user will click to download a new type of file, and nothing happens. AVOID! AGSS / ATP: This is poorly implemented. No proper or modern 2FA for additional security. You will have 4 different methods, 3 different clients, 2 licenses and all of this to have a horrible VPN connectivity. You have to pay for licenses (most competitive vendors include this by default). If VPN is important for you - look elsewhere. We have but all given up trying to make it work reliably. Do not even consider NetExtender - probably one of the most horrific, nightmare grade Java-based VPN clients. Global VPN client issues and mobile connect issues. VPN: Site-to-site is another problem area - Client-based VPN is another hot mess. Their Cloud GMS product is weak, barely out of beta (buggy). MSP: They are not ready for managed security services. This is an expensive, licensed feature, with a complex application or appliance back-end. Logging/reporting: You need their analyzer to properly generate reports. In any case, a firewall doing anti-spam might be a low cost solution, but it is not your best strategy.
SONICWALL 2FA GLOBAL VPN UPDATE
It requires a specific Java version on the server side (do not update it, otherwise it will break).
SONICWALL 2FA GLOBAL VPN SERIES
Perhaps for an SMB, the integrated WiFi in their TZ series has a niche. It is a terrible strategy to have a firewall act as an AP controller, in any case. It has improved - it actually works now, but performance is substandard. The new SonicWall will tell you it has been resolved and improved. Wireless: What a disaster this has been historically.

SONICWALL 2FA GLOBAL VPN FULL
Compare with the need to get 1Gbps throughput with full security (common nowadays), you are looking at NSA 5700. CPU: The CPUs are not able to compete with a similar price point to the Fortinet, WatchGuard, or Palo Alto product.

They are clueless in some regards, which is unfortunate as they have the potential. It is now recovering, but it may take time to get competitive again. During its tenure with Dell, it was severely damaged (its reputation, innovation, etc.).
