Step-by-Step Guide to NPS Configuration for SonicWall Firewall
- Gajendra Rathod
- Feb 8
- 2 min read
Configuring Network Policy Server (NPS) for authentication with a SonicWall firewall using RADIUS ensures secure and centralized user authentication. This guide provides a detailed step-by-step approach to setting up NPS on a Windows Server and integrating it with SonicWall.
Note: This SonicWall configuration has not been tested in a production environment. Please test in a lab setup before implementing it in production.
Step 1: Install NPS Role on Windows Server
Open Server Manager.
Navigate to Manage > Add Roles and Features.
In the Roles section, select Network Policy and Access Services and click Next.
Under Role Services, select Network Policy Server and complete the installation.
Step 2: Add RADIUS Servers to NPS
Open NPS Console
Press Windows Key + R, type nps.msc, and press Enter.
Configure RADIUS Clients
In the NPS console, navigate to NPS (Local) > RADIUS Clients and Servers > RADIUS Clients.
Right-click RADIUS Clients and select New RADIUS Client.
Enter the details:
Check Add to the list of RADIUS clients.
Click OK.
Step 3: Create and Configure the Network Policy for SonicWall
In the Network Policies section, ensure that policies responsible for authenticating users are correctly set up.
Ensure both primary and secondary RADIUS servers send the correct SonicWall-Privilege-Level attribute:
Enable Unencrypted Authentication (PAP, SPAP)
Open the policy.
Select Unencrypted authentication (PAP, SPAP).
Step 4: Add SonicWall VSAs Manually
Edit the Network Policy.
Navigate to the Settings tab.
Under Standard Settings, find and select Vendor-Specific.
Click Add.
Configure SonicWall Vendor-Specific Attributes:
Click OK and apply changes.
Step 5: SonicWall RADIUS Configuration
Enable RADIUS Authentication
Log in to the SonicWall firewall.
Navigate to Users > Settings.
Enable RADIUS Authentication.
Configure RADIUS Server
Navigate to Users > RADIUS Servers.
Click Add and configure:
Assign RADIUS to User Groups
Navigate to Users > Local Groups.
Add the RADIUS users to the required groups.
Enable RADIUS for Administrative Access
Go to System > Administration.
Under Authentication Method for Admins, select RADIUS + Local Users.
Click Apply.
Step 6: SonicWall CLI Configuration (Similar to Cisco’s AAA Configuration)
config terminal
radius-server host 192.168.1.35 key radiuskey
radius-server timeout 5
radius-server retransmit 3
radius-server authentication 1812
radius-server accounting 1813
exitAAA Authentication and Authorization
config terminal
aaa authentication login default radius local
aaa authorization exec default radius local
exitEnable RADIUS for SSH Access
config terminal
line vty 0 4
login authentication default
authorization exec default
transport input ssh
exitConclusion
This guide provides a comprehensive step-by-step configuration of NPS for SonicWall firewall integration. Ensure to test the setup in a lab environment before applying it to production. If you have any questions or require further clarifications, feel free to comment below.









Comments