How to configure USG Series to authenticate SSL VPN client with Microsoft Active Directory
For example, we have a AD server with the configuration as below:
- IP:192.168.1.35
- Domain name: cso.net
- Domain user: aduser
- Domain administrator: administrator
- Domain administrator's password: admin1234
[Configuration Steps]
Step 1: Building an SSL Application (wheter for Web application or File Sharing)
Step 2: Add a user on the Domain server named "aduser"
Step 3: Add a user on the ZyWALL and select the user type as Ext-User
Step 4: On the ZyWALL, click "SSL" from left panel and add the user "aduser" to the policy of the SSL Application that you added on step 2.
Step 5: Configuring the Auth.Method, add the "group ad" in the default method.
Step 6: Configuring the AAA server from "Object" > "AAA Server" > Active Directory and refer the parameters listed below to complete the settings.
[Paramaters]
Host: 192.168.1.35
Port: 389
Bind DN: cn=administrator,cn=users,dc=cso,dc=net
Server Search Base: dc=cso,dc=net
Bind DN: cn=administrator,cn=users,dc=cso,dc=net
Password: admin1234(Domain administrator's password)
Base DN: dc=cso,dc=net
CN Identifier: sAMAccountNAME
Search time limit: 5
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 145 Nebula Ideas
- 94 Nebula Status and Incidents
- 5.6K Security
- 239 USG FLEX H Series
- 267 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1.1K Wireless
- 40 Wireless Ideas
- 6.3K Consumer Product
- 247 Service & License
- 384 News and Release
- 83 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.2K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 83 About Community
- 71 Security Highlight