Dell™ Sonicwall™ Directory Services Connector 4.0: Administration Guide
Dell™ Sonicwall™ Directory Services Connector 4.0: Administration Guide
Connector 4.0
Administration Guide
This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a
software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the
applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying and recording for any purpose other than the purchasers personal use without the written
permission of Dell Inc.
The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or
otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT
AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO
LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR
INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS
OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of
the contents of this document and reserves the right to make changes to specifications and product descriptions at any time
without notice. Dell does not make any commitment to update the information contained in this document.
If you have any questions regarding your potential use of this material, contact:
Dell Inc.
Attn: LEGAL Dept.
5 Polaris Way
Aliso Viejo, CA 92656
Refer to our website (software.dell.com) for regional and international office information.
Patents
For more information, go to http://software.dell.com/legal/patents.aspx.
Trademarks
Dell, the Dell logo, SonicWALL, and all other SonicWALL product and service names are trademarks of Dell Inc. Other trademarks
and trade names may be used in this document to refer to either the entities claiming the marks and names or their products.
Dell disclaims any proprietary interest in the marks and names of others.
Legend
CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.
WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death.
IMPORTANT NOTE, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information.
Dell SonicWALL Directory Services Connector Administration Guide
Updated - December 2016
Software Version - 4.0
232-002911-00 Rev. C
Contents
Part 1. Introduction
Using This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Organization of This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Directory Services Connector Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
About Directory Services Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
About Polling and Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
About Single Sign-On and the SSO Agent with Active Directory . . . . . . . . . . . . . . . . 8
About User Identification Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
About Client Probing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
About Domain Controller Querying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
About Exchange Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
About Novell eDirectory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
About Using Samba on Linux/UNIX Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
About NetBIOS Name Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Platform Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
SonicWALL Appliance/Firmware Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . .13
Virtual Environment Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
eDirectory Server Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Exchange Server Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Domain Controller Server Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
SSO Agent Platform Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Client Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Citrix or Terminal Services Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Part 3. Appendices
Warranty and Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
GNU General Public License (GPL) Source Code . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
Limited Hardware Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
End User Licensing Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50
About Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Part 1
Introduction
Using This Guide
Directory Services Connector Overview
1
Using This Guide
About This Guide
The Dell SonicWALL Directory Services Connector Administration Guide provides information about installing
and configuring the Dell SonicWALL Single Sign-On Agent and other elements of Directory Services Connector
(DSC).
Always check https://support.sonicwall.com/ for the latest version of this manual as well as other Dell
SonicWALL products and services documentation.
2
Directory Services Connector Overview
This section provides an overview of the Dell SonicWALL Directory Services Connector (DSC). It includes an
introduction to DSC and the SSO Agent, along with the supported user identification methods and platform
compatibility.
Topics:
Dell SonicWALL SuperMassive series, E-Class NSA series, NSA series, and TZ
600/500/400/300/215/210/205/200/105/100 series appliances to achieve transparent, automated
Single-Sign-On integration with both Active Directory and Novell eDirectory.
SonicWALL PRO and TZ 190/180 series appliances to achieve Single-Sign-On integration with Active
Directory.
The Dell SonicWALL appliance can use Active Directory or Novell eDirectory to authenticate users and determine
the filtering policies to assign to each user or user group. The SSO Agent identifies users by IP address and
automatically determines when a user has logged out to prevent unauthorized access.
Along with the username information, the SSO Agent sends the following information to the appliance:
The User Detection mechanism used by the Agent to find logged in users.
NOTE: It is normal for the system running Dell SonicWALL Directory Services Connector to have high CPU
activity for the first 24 hours after installation, while the software creates a database of the user
network.
Topics:
About Single Sign-On and the SSO Agent with Active Directory on page 8
Note to Step 6: The appliance polls users if the identify mechanism is WMI/NetAPI. If the identify
mechanism is DC Security log mode, the SSO Agent sends log off notifications to the firewall.
User names learned through SSO are reported in the Dell SonicWALL appliance logs of traffic and events from
the users. The configured inactivity timer applies with SSO, but the session limit does not, though users who are
logged out are automatically and transparently logged back in when they send further traffic.
Users logged into a workstation directly, but not logged into the domain, cannot be authenticated. For users
that are not logged into the domain, an Authentication Required screen displays, indicating that a manual login
is required for further authentication. If the workstation joins the Windows domain, the logged on user can be
detected by WMI/NetAPI. The returned user name includes a Local: prefix. For example, Local:user01.
Users that are identified, but lack the group memberships required by the configured policy rules, are
redirected to an Access Barred page.
WMI methods in the Windows Firewall, you can select Windows Management Instrumentation in the
Control Panel > All Control Panel Items > Windows Firewall > Allowed Programs.
The NetAPI method in Windows Firewall, you can select File and Printer Sharing.
Because the Windows API does not provide an interface to set the timeout for both probing methods, the
default timeout is set to three seconds when the IP address is not accessible or when the connection is dropped
by the Windows Firewall. The SSO Agent first creates a TCP connection to the target machine to check the
connectivity. For WMI, the port is 445. For NetAPI, the port is 135. The default timeout is 3 seconds for both
methods.
If a user logs onto a machine using a local account instead of a Windows domain account, the SSO Agent can
only identify this user through a Client Probing method. This is because the other methods all involve Active
Directory. When the administrator enables the WMI/NetAPI Scanner option in Directory Services Connector, the
SSO Agent will repeatedly probe these IP addresses using Client Probing methods. The SSO Agent can detect
when the user has logged off, and it sends a log off notification to SonicOS.
About Using Non-Admin Accounts to Access the DC Security Logs for SSO on page 11
10
Setting Group Policy to Enable Audit Logon on Windows Server 2008 on page 34
Setting Group Policy to Enable Audit Logon on Windows Server 2003 on page 35
11
For this user identification method, the SSO Agent repeatedly queries the eDirectory using the LDAP protocol;
see Figure 2.
Figure 2. User identification with eDirectory
The user logs into the network and authenticates with eDirectory.
The user initiates a request for an Internet resource (such as a Web page, an audio or video stream, or a
chat program). The Dell SonicWALL network security appliance detects the request.
The SSO Agent queries the eDirectory server about the user.
The SSO Agent communicates the users content filtering policies to the Dell SonicWALL appliance, based on the
users individually assigned policies and any policies inherited from groups and from organizational units. The
Dell SonicWALL appliance allows, logs, or blocks the users request, based on the users content filtering
policies.
12
exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including
the top-level domain and the root zone.
Both the NetBIOS name and the FQDN domain name can be found through an LDAP search. The SSO Agent
connects to the DC using these service credentials and completes the LDAP search.
The SSO Agent remembers these names and sends the correct domain name to the firewall according to the
administrators configuration of the SSO Agent. By default, it sends the NetBIOS name.
Platform Compatibility
To use Dell SonicWALL Single Sign-On, it is required that the SSO Agent be installed on a server that can
communicate with the Active Directory or eDirectory server and with clients and the Dell SonicWALL security
appliance directly using the IP address or using a path, such as VPN. The following requirements must be met in
order to run the SSO Agent:
Port 2258 must be open; the firewall uses UDP port 2258 by default to communicate with the SSO Agent;
if a custom port is configured instead of 2258, then this requirement applies to the custom port
NetAPI or WMI (unless using DC Windows Security Log as the Client Probing Method)
Dell SonicWALL Directory Services Connector and SSO Agent runs as either a 32-bit or 64-bit application. This
improves the performance of 64-bit agent machines, especially in cases where the agent is set to use NetAPI or
WMI as the Client Probing Method.
Topics:
NSA 2600 / 3600 / 4600 / 5600 / 6600 running SonicOS 6.1 and above
NSA E-Class E5500 / E6500 / E7500 / E8500 / E8510 running SonicOS 5.0 and above
NSA 240 / 2400 / 3500 / 4500 / 5000 running SonicOS 5.0 and above
NSA 220 / 220W / 250M / 250MW running SonicOS 5.8.1 and above
13
TZ 215 / 215W / 205 / 205W / 105 / 105W running SonicOS 5.8.1 and above
TZ 210 / 210W / 200 / 200W / 100 / 100W running SonicOS 5.0 and above
PRO 2040 / 3060 / 4060 / 4100 / 5060 running SonicOS 4.0 and above
NOTE: SonicOS 5.5 or newer is required for Novell eDirectory Support.
NOTE: SSO Agent performance is sensitive to the round trip network time during frequent information
exchanges with the network security appliance. The Agent machine should be as close as possible to the
appliance for a recommended round-trip time of less than 1 ms.
Memory - 4GB
14
It is recommended to run the SSO Agent service using a domain administrator account. An account with fewer
permissions, such as a domain user account, does have sufficient privileges for all service components to
interact with the Domain Controller.
Windows 8 32/64-bit
Windows 7 32/64-bit
Windows XP 32/64-bit
On all Windows 32-bit and 64-bit servers, a .NET Framework must be installed. The following versions of.NET
Framework are supported:
The following Microsoft Windows operating systems are not supported as servers:
Limitations
The following limitations exist in Windows operating systems prior to Windows Server 2008 or Windows 7:
Certain Windows API elements are not supported, including the Event Subscription API for
communicating with the Domain Controller. This requires Directory Services Connector to use the WMI
event subscription mechanism on older Windows versions, which is much slower than event subscription.
Single Sign-On related functions may operate at approximately half the performance on older Windows
versions.
Client Compatibility
Directory Services Connector is compatible with the following client operating systems for the purpose of
determining the logged in username and other information necessary for user authentication:
Windows 8 32/64-bit
Dell SonicWALL Directory Services Connector 4.0
Administration Guide
15
Windows 7 32/64-bit
Windows XP 32/64-bit
16
Part 2
Installation and Configuration
Installing and Configuring the SSO Agent
17
3
Installing and Configuring the SSO Agent
This section provides information about installing and configuring the SSO Agent using the Directory Services
Configuration Tool.
NOTE: For best performance, SonicWALL recommends installing the SSO Agent on a dedicated system.
When using NetAPI or WMI, one SSO Agent can support up to approximately 2500 users, depending on the
performance level of the hardware that it is running on, how it is configured on the firewall and other networkdependent factors. When configured to read from domain controller security logs, one SSO Agent can support a
much larger number of users identified via that mechanism, potentially 50,000+ users depending on similar
factors.
Topics
Topics:
18
You can find these on https://www.mysonicwall.com under Directory Services Connector. The installer is
an MSI file signed by SonicWALL Inc.
2
Accept the terms of the license agreement, and then click Next.
TIP: To print a copy of this agreement, click Print.
19
To specify a custom location, click Change, select the folder, and then click Next.
For new installations, the Service User Configuration screen displays. Go to Step 7.
If your system has an older version of DSC SSO, a Service Configuration screen displays asking if
you want to use the existing configuration. The Check this check box if want to use old
configuration checkbox is selected by default.
Do one of these:
To use the old configuration, click Next. The Service User Configuration screen displays. Go to
Step 7.
To reconfigure the SSO product, uncheck Check this check box if want to use old configuration.
and click Next.
20
Use the Service User Configuration screen to configure a common service account that the SSO Agent
will use to log into a specified Windows domain.
TIP: This section can be configured at a later time. To skip this step and configure it later, click
Skip. Go to Step 8.
a
Enter the domain name of the account in the Domain Name field.
Enter the username of an account with administrative privileges in the Username field.
Click Next.
Use the Appliance Configuration screen to configure the IP address and port used for communication
with the firewall.
Enter the IP address of your Dell SonicWALL security appliance in the Dell SonicWALL Appliance
IP field.
Type the port number for the same appliance into the Dell SonicWALL Appliance Port field. The
default port number is 2258.
Enter the hexadecimal representation (an even number of digits using only hexadecimal numbers)
of the shared key in the Shared Key field.
21
10 Wait for the installation to complete. A warning screen requesting permission to install files may display;
click OK.
The status bar displays while the SonicWALL SSO Agent installs.
Program and service files are installed, including the SSOAgentService. If the SSO Agent 3.x service is
running, the installer stops that service and then starts the newly installed service.
22
IMPORTANT: To run the SSO agent, .NET Framework v4.0 must be installed. If it is not installed, an
error message appears:
11 When the installation is complete, optionally select the Launch Dell SonicWALL Directory Connector
checkbox to launch the Dell SonicWALL Directory Connector Configuration Tool. This option is not
selected by default.
12 Click Finish.
If you selected the Launch Dell SonicWALL Directory Connector checkbox, the Directory Connector
Configuration Tool displays.
23
Installed Files
Topics:
Program Files
The installer places all the program files into C:\Program Files\Dell SonicWALL\SSOAgent by default:
The installer also creates short cuts in the Start menu and on the desktop.
Log Files
Log files and crash dump files are placed in C:\ProgramData\Dell SonicWALL\SSOAgent.
The Friendly Name, Port, IP address, and Status of each appliance is displayed.
Launch the Directory Services Connector Configuration Tool either from the Start menu or by doubleclicking the desktop shortcut.
24
In the Appliance Port field, accept the default port of 2258 or type in a custom port. The appliance
sends the SSO protocol packets to the Agent on this port.
In the Friendly Name field, type in a descriptive name for this appliance.
Click the Generate Key button to let the computer generate a random shared key.
Select the Check to show Shared key as clear Text checkbox to view the key in clear text. This option is
not selected by default.
25
Launch the Directory Services Connector Configuration Tool either from the Start menu or by doubleclicking the desktop shortcut.
NOTE: The Configuration Tool communicates with the Windows service through JSON RPC. The RPC
port is 127.0.0.1:12348. If the service is stopped, the Configuration Tool tries to start the
service first.
26
In the left panel, right click SonicWALL SSO Agent, and then select Properties. Configuration settings
display in the right panel.
For Host IP, select an IP address from the drop-down menu. The default IP address is 0.0.0.0.
27
The SSO Agent binds the UDP socket at this IP address and the port number specified in the Port field.
The Agent receives the SSO protocol packets from the firewall on this socket.
NOTE: If the Host IP address is 0.0.0.0, the SSO Agent accepts packets from any interface.
In the Port field, accept the default port or type in a custom port. By default, the SSO Agent uses UDP
port 2258 to receive the SSO protocol packets.
In the Sync Port field, accept the default port or type in a custom port. By default, the SSO Agent uses
TCP port 2260 to receive the agent synchronize datagrams.
28
From the Logging Level the drop-down menu, select the level of events to be logged in the log file in the
program data directory. The log file is useful for diagnostics and debugging. The default logging level is 2
- Warning.
In the Max Thread Count field, accept the default of 100 or type in a custom value within the indicated
range.
The SSO Agent starts the configured number of threads at run time. Most of the threads are used for
client probing. These threads periodically query the IP addresses that are present in the Scanner queue.
After completing each query, the agent adds or updates the user or error information in its cache. The
thread count adjusts the trade off between simultaneity and overall performance.
In the Cache Duration field, accept the default of 7200 seconds (2 hours) or type in a custom value
within the indicated range.
If a user does not log off the computer properly, for example by pulling the power plug, the SSO Agent
does not receive a log-off message for the user. In this case, the SSO Agent keeps the user information in
its cache. After the cache duration time expires, the SSO Agent removes the user from the cache and
sends a log-out notification to the firewall. The default time of 2 hours is based on the typical duration
after which the log-in status is refreshed on the Domain Controller. Cache duration functions only apply
to users whose session ID is not equal to zero.
Upon a user information request for any IP address from the appliance, the SSO Agent checks for the IP
address in its cache. If the IP address is not present in the cache, the SSO Agent treats the request as the
first request for that IP Address and adds the IP Address to its Scanner queue for further processing.
To save information about previously identified users when the SSO Agent service is restarted, select the
Preserve Users During Restart checkbox. This option is not selected by default.
Because the SSO Agent must be restarted for Properties changes to take effect, this option allows the
Agent to maintain current user information across these restarts. The SSO Agent saves the user
information in an XML file that contains a timestamp. If the file is less than 15 minutes old when the SSO
Agent restarts, it uses this file to fill its cache; otherwise, the SSO Agent ignores the file to avoid
restoring outdated information.
29
Disabled
Probe user using NetAPI first, then WMI (this is the default option)
30
When the SSO Agent receives an IP Address request from the firewall and the user is not found in its
cache, it uses the selected Client Probing Method to identify the username.
NOTE: NetAPI provides faster, though possibly slightly less accurate, performance. With NetAPI,
Windows reports the last login to the workstation whether or not the user is still logged in. This
means that after a user logs out from his computer, the appliance still shows the user as logged in
when NetAPI is used. If another user logs onto the same computer, then at that point the previous
user is logged out from the Dell SonicWALL appliance.
The handling of non-responsive workstations to queries from WMI and NetAPI is optimized in Dell
SonicWALL Directory Services Connector. The appliance repeatedly polls the SSO Agent with multi-user
requests, and often sends more than one such request at a time. The number of concurrent requests
increases when workstations do not respond to the requests, potentially overloading the Agent. To avoid
this, a time-out mechanism is included in multi-user requests from the appliance. If the request does not
complete within this time, the agent silently aborts it.
13 For Domain name type, select one of the following options from the drop-down menu:
SonicOS can handle both domain name types. The default option is NetBIOS Domain Name.
14 Click Apply.
15 Click OK.
31
DC Security Log
Server Session
Using Microsoft Windows, the DC Security Log contains login and logout activity records or other securityrelated events specified by the Domain Controllers audit policy.
By default, all of the DC Security Log options require a Domain Administrator account or a Local Administrator
account on the Domain Controller to read the DC Security Log.
If an account with administrator privileges is not available, user identification through the DC Security Log can
be configured for WMI with a non-administrator domain account. This account must have read access to the
security log. For more information, refer to the Configuring a Non-Admin Domain Account for SSO Agent to
Read Domain Security Logs configuration guide.
Topics:
Setting Group Policy to Enable Audit Logon on Windows Server 2008 on page 34
Setting Group Policy to Enable Audit Logon on Windows Server 2003 on page 35
In the Directory Connector Configuration Tool, expand SonicWALL SSO Agent in the left pane.
Refresh
This option refreshes the known Domain Controller information, and the right panel displays the
Host Address, Friendly Name, Domain Name, NETBIOS Name, and Status of known DCs.
Add
Select this option to manually add a Domain Controller to the SSO Agent configuration. Go to Step
3.
32
Auto Discovery
Select this option to have the SSO Agent use DNS queries to find DCs to which the Agent host
machine belongs. The right panel displays the Host Address, Friendly Name, Domain Name,
NETBIOS Name, and Status of the discovered DCs
Config All
Select this option to configure the settings for all known DCs in a pop-up window.
If you selected the Add option, the right panel displays the available settings. In the IP Address field,
type the Domain Controller IP address.
In the Friendly Name field, enter a descriptive name for the Domain Controller.
Server Session
This option causes the SSO Agent to request the server session information from the DC at the
time interval indicated in the Pull every field. Accept the default of 10 seconds or type in the
desired interval. The minimum is 5 seconds and the maximum is 300 seconds.
To test the connection to the Domain Controller using the configured IP address, click Test Connection.
33
If the IP address does not belong to a machine with a role of Domain Controller, the Configuration Tool
displays an error message.
7
Browse to the following location: Domain Name > Domains > Domain Name > Group Policy
Objects, where Domain Name is replaced with your domain.
Under Group Policy Objects, right-click on Default Domain Policy, and then select Edit.
34
Double-click on Audit account logon events, select Success, and then click OK.
Double-click on Audit logon events, select Success, and then click OK.
Double-click on Audit Directory Service Access, select Success, and then click OK.
Double-click on Audit Object Access, select Success, and then click OK.
Browse to the following location: Domain Name > Domains > Domain Name > Group Policy
Objects, where Domain Name is replaced with your domain.
35
Expand the Group Policy Objects folder and find your new policy.
Browse to the following location: Policy Name > Computer Configuration > Windows
Settings > Security Settings > Local Policies > Audit Policy.
Left-click on Audit Policy. The policy settings are displayed in the right pane.
Double-click on Audit account logon events, select Success, and then click OK.
Dell SonicWALL Directory Services Connector 4.0
Administration Guide
36
10 Double-click on Audit logon events, select Success, and then click OK.
11 Double-click on Audit Directory Service Access, select Success, and then click OK.
12 Close the Group Policy window.
Expand the SonicWALL Directory Connector and SonicWALL SSO Agent trees in the left column by clicking
the + button.
In the Friendly Name field, type in a descriptive name for the Exchange server.
For Server Monitoring Method, select one of the following methods for the SSO Agent to get the event
logs from the server:
37
If Pull every <> seconds is selected, accept the default polling interval of 10 seconds or type in
the desired interval in the provided field. The minimum is 1 second and the maximum is 60
seconds.
7
Click OK.
Expand the SonicWALL Directory Connector and SonicWALL SSO Agent trees in the left column by clicking
the + button.
In the IP Address field, type in the IP address of the Novell eDirectory server.
In the Port(1-65535) field, type in the port for the service. The default port is:
In the Password field, type in the password for the service user.
User DN:
cn=xxx,o=xxx
38
Base DN:
o=xxx
In the Polling Interval(1-60 Sec) field, type in the number of seconds for the polling interval. The
default value is 10 seconds, the minimum is 1 second, and the maximum is 60 seconds.
Click the Test Connection button to verify that the SSO Agent can connect with the eDirectory server.
10 Click OK.
11 Click OK in the popup dialog indicating that the configuration is saved.
Expand the SonicWALL Directory Connector and SonicWALL SSO Agent trees in the left column by clicking
the + button.
In the Agent IP field, type in the IP address of the remote SSO Agent.
In the Sync Port field, accept the default of 2260 or type in the custom sync port.
By default, the SSO Agent uses TCP port 2260 to receive the Agent synchronize data. When an SSO Agent
starts up, it sends a TCP Reset notification to all the configured remote Agents. When a remote Agent
receives this reset notification, it sends its user cache to the requesting Agent. Thereafter, the remote
Agent sends any incremental changes.
In the Friendly Name field, type in a descriptive name for the remote SSO Agent.
Click OK.
39
Click on Remote SSO Agents to display all the configured remote SSO Agents in the right panel. You can
see the friendly name, IP address, port, and status of each remote Agent.
10 To modify the configuration of an existing remote SSO Agent, click on its IP address in the left panel,
enter the desired values as in Step 4 through Step 8, and then click OK.
Topics:
40
Each button is only active when a relevant item is selected in the left panel. Not all buttons are active at the
same time.
The status bar displays the current SSO Agent status along the bottom of the screen. The installed version of the
SSO Agent is also displayed there.
All of the Action menu options are also available on the right-click menu for the SonicWALL SSO Agent from
within the Configuration Tool.
Topics:
41
The Agent keeps up to five logs at a time and stores them in C:\ProgramData\Dell SonicWALL\SSOAgent:
SSOPacket.log - This is the packets log between the firewall and Agent.
Rpc.log - This is the RPC log between the Config Tool and Agent service.
More logs are created with higher logging levels. Debug is the highest level.
In the case of troubleshooting, all files in this folder should be sent for investigation by the Support team.
NOTE: When the SSO Agent service crashes, the crash dumps are located at C:\ProgramData\Dell
SonicWALL.
42
To display the Users and Hosts page, click Action and select Users and Hosts.
43
44
45
Adding a User
You can add a user to the service users list by clicking Add in the Add Local User section and adding the name
in the Excluded user name pattern field. Local users can include a domain name.
TIP: You can also add Windows service users from SonicOS (see the SonicOS Administration Guide for
details).
46
10.0.0.0,user0
10.0.0.1,user1
10.0.0.2,domain\user2
If this file exists, the SSO Agent loads it at service start time and checks and reloads this file every 5 seconds.
You can view the test users and IP addresses in the Action > Users and Hosts screen of the DSC Configuration
Tool, in the User Information list.
Send Feedback
Select Send Feedback to display a popup window in which you can enter feedback about Directory
Services Connector and the SSO Agent and send it to the Support team. Fill in the Subject, Email ID
(your email address), Name (your name), and Comment fields, and then click Submit.
About
Select About to display a popup dialog with the installed version number of Directory Services Connector
and the SSO Agent.
47
Part 3
Appendices
Warranty and Licensing
About Dell
48
A
Warranty and Licensing
Topics:
49
MAXIMUM EXTENT ALLOWED BY APPLICABLE LAW. TO THE EXTENT AN IMPLIED WARRANTY CANNOT BE EXCLUDED,
SUCH WARRANTY IS LIMITED IN DURATION TO THE WARRANTY PERIOD. BECAUSE SOME STATES OR JURISDICTIONS
DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS, THE ABOVE LIMITATION MAY NOT
APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, AND YOU MAY ALSO HAVE OTHER RIGHTS
WHICH VARY FROM JURISDICTION TO JURISDICTION. This disclaimer and exclusion shall apply even if the express
warranty set forth above fails of its essential purpose.
DISCLAIMER OF LIABILITY. DELL SONICWALL'S SOLE LIABILITY IS THE SHIPMENT OF A REPLACEMENT PRODUCT AS
DESCRIBED IN THE ABOVE LIMITED WARRANTY. IN NO EVENT SHALL DELL SONICWALL OR ITS SUPPLIERS BE LIABLE
FOR ANY DAMAGES WHATSOEVER, INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS
INTERRUPTION, LOSS OF INFORMATION, OR OTHER PECUNIARY LOSS ARISING OUT OF THE USE OR INABILITY TO
USE THE PRODUCT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL, OR PUNITIVE DAMAGES HOWEVER
CAUSED AND REGARDLESS OF THE THEORY OF LIABILITY ARISING OUT OF THE USE OF OR INABILITY TO USE
HARDWARE OR SOFTWARE EVEN IF DELL SONICWALL OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY
OF SUCH DAMAGES. In no event shall Dell SonicWALL or its suppliers' liability to Customer, whether in contract,
tort (including negligence), or otherwise, exceed the price paid by Customer. The foregoing limitations shall
apply even if the above-stated warranty fails of its essential purpose. BECAUSE SOME STATES OR JURISDICTIONS
DO NOT ALLOW LIMITATION OR EXCLUSION OF CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION
MAY NOT APPLY TO YOU.
(i) execute and use the Software on the Hardware with which the Software is provided (pre-installed) in
accordance with the applicable Documentation; and,
(ii) for Software provided in standalone form (without Hardware), install, execute and use the Software
on the Hardware or hardware device(s) on which it is intended to be used in accordance with the
applicable Documentation and the License purchased. If Customer purchased multiple copies of
standalone Software, Customers License to such standalone Software includes the right to install, use
and execute up to the number of copies of Software Licenses purchased.
In addition, the License includes the right to (x) make a reasonable number of additional copies of the Software
to be used solely for non-productive archival purposes, and (y) make and use copies of the end user
50
documentation for Hardware and/or Software provided with the Products (Documentation) as reasonably
necessary to support Customers authorized users in their use of the Products.
(b) License Limitations. Order acknowledgments, Documentation and/or the particular type of the Products/
Licenses purchased by Customer may specify limits on Customers use of the Software, and which limits apply to
the License(s) granted hereunder for such Software. Such limits may consist of limiting the term of the License,
or the number or amount of nodes, storage space, sessions, calls, users, subscribers, clusters, devices, ports,
bandwidth, throughput or other elements, and/or require the purchase of separate Licenses to use or obtain
particular features, functionalities, services, applications or other items. Use of the Software shall be subject
to all such limitations.
(c) For Customers Internal Business. Each License shall be used by Customer solely to manage its own internal
business operations as well as the business operations of its Affiliates. Notwithstanding the foregoing, if
Customer is in the regular business of providing firewall, VPN or Security management for a fee to entities that
are not its Affiliates (MSP Customers), Customer may use the Products for its MSP Customers provided that
either (i) Customer, and not MSP Customers, maintain control and possession of the Products, or (ii) if MSP
Customers have possession and/or control of Products in whole or in part, this Agreement must be provided to
MSP Customers and they must agree that their use of the Products is subject to the terms and conditions of this
Agreement. Customer agrees to indemnify and hold SonicWALL harmless from and against any claims by MSP
Customers against SonicWALL relating to the Products and/or Customers services for MSP Customers. Affiliate
means any legal entity controlling, controlled by, or under common control with a party to this Agreement, but
only for so long as such control relationship exists.
(d) Evaluation License. If the Software is provided by SonicWALL or a Reseller at no charge for evaluation
purposes, then Section 1(a) above shall not apply to such Software and instead Customer is granted a
nonproduction License to use such Software and the associated documentation solely for Customers own
internal evaluation purposes for an evaluation period of up to thirty (30) days from the date of delivery of the
Software, plus any extensions granted by SonicWALL in writing (the Evaluation Period). There is no fee for
Customers use of the Software for nonproduction evaluation purposes during the Evaluation Period, however,
Customer is responsible for any applicable shipping charges or taxes which may be incurred, and any fees which
may be associated with usage beyond the scope permitted herein. Notwithstanding anything otherwise set forth
in this Agreement, Customer understands and agrees that evaluation Software is provided AS IS and that
SonicWALL does not provide a warranty or maintenance services for evaluation Licenses.
(e) Restrictions. Customer may not (i) modify, translate, localize, adapt, rent, lease, loan, create or prepare
derivative works of, or create a patent based on the Software or any part thereof, (ii) make copies except as
expressly authorized under this Agreement, (iii) copy the Software onto any public or distributed network, (iv)
modify or resell the Software, use the Software in connection with the operation of any nuclear facilities, or use
for purposes which are competitive to SonicWALL, or (v) except as expressly authorized in Section 2(c) above,
operate the Software for use in any time-sharing, outsourcing, service bureau or application service provider
type environment. Unless and except to the extent authorized in the applicable Documentation, Software
provided with and/or as the Product, in part or whole, is licensed for use only in accordance with the
Documentation as part of the Product: Software components making up a Product may not be separated from,
nor used on a separate or standalone basis from the Product. Each permitted copy of the Software and
Documentation made by Customer hereunder must contain all titles, trademarks, copyrights and restricted
rights notices as in the original. Customer understands and agrees that the Products may work in conjunction
with third party products and Customer agrees to be responsible for ensuring that it is properly licensed to use
such third party products. Any Software provided in object code form is licensed hereunder only in object code
form. Except to the extent allowed by applicable law if located in the European Union, and then only with prior
written notice to SonicWALL, Customer shall not disassemble or reverse engineer the Software in whole or in
part or authorize others to do so. Customer agrees not to use the Software to perform comparisons or other
benchmarking activities, either alone or in connection with any other software or service, without
SonicWALLs written permission; or publish any such performance information or comparisons.
(f) Third Party Software. There may be certain third party owned software provided along with, or incorporated
within, the Products (Third Party Software). Except as set forth below, such Third Party Software shall be
considered Software governed by the terms and conditions of this Agreement. However, some Products may
contain other Third Party Software that is provided with a separate license agreement, in which case such Third
Party Software will be governed exclusively by such separate license agreement (Third Party License) and not
this Agreement. Any such Third Party Software that is governed by a Third Party License, and not this
Agreement, will be identified on the applicable Product page on SonicWALLs website and/or in a file provided
with the Product. Except as SonicWALL may otherwise inform Customer in writing, the Third Party License gives
Customer at least the license rights granted above, and may provide additional license rights as to the Third
Dell SonicWALL Directory Services Connector 4.0
Administration Guide
51
Party Software, but only with respect to the particular Third Party Software to which the Third Party License
applies. SUCH THIRD PARTY SOFTWARE UNDER A THIRD PARTY LICENSE IS PROVIDED WITHOUT ANY WARRANTY
FROM SONICWALL AND ITS SUPPLIERS, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. Notwithstanding the foregoing, SonicWALL shall
honor its warranty, maintenance and support obligations in respect to the SonicWALL Products regardless of
whether the warranty, maintenance or support issue is caused in whole or in part by the Third Party Software
provided by SonicWALL with the Product.
(g) Updates/Upgrades. If Customer purchases or otherwise is eligible to receive a SOFTWARE update or upgrade,
you must be properly licensed to use the Product identified by SonicWALL as being eligible for the update/
upgrade in order to install and use the SOFTWARE update/ upgrade. A SOFTWARE update/ upgrade replaces
and/or supplements the Software Product that formed the basis for your eligibility for the update/upgrade, and
does not provide you an additional License (copy) of the Software to use separately from the Software Product
to be updated/ upgraded. You may use the resulting updated/upgraded Product only in accordance with the
terms of this Agreement.
(h) Activation Keys May Expire. Certain Products, including Security Services that provide regular ongoing
updates for Software (e.g., Security Service consisting of anti-virus signature updates), may come with an
activation key or license key (a key that must be entered to activate the Product, Activation Key). If the
Activation Key for a Product is not activated within five (5) years from the date of issuance by SonicWALL, such
Activation Key(s) may expire and no longer activate the Product. Products that come with an expiring Activation
Key will operate for the contracted term of the License (or purchased Security Service), so long as the
Activation Key is activated within five (5) years from SonicWALLs date of issuance.
2. OWNERSHIP
SonicWALL and its licensors are the sole and exclusive owners of the Software, and all underlying intellectual
property rights in the Hardware. All rights not expressly granted to Customer are reserved by SonicWALL and its
licensors.
3. TERMINATION OF LICENSE(S)
All licenses to the Software hereunder shall terminate if Customer fails to comply with any of the provisions of
this Agreement and does not remedy such breach within thirty (30) days after receiving written notice from
SonicWALL. Customer agrees upon termination to immediately cease using the Software and to destroy all
copies of the Software which may have been provided or created hereunder.
4. SUPPORT SERVICES
SonicWALLs current Support Service offerings (Support Services) and the terms and conditions applicable to
such Support Services are set forth in SonicWALLs Support Services Terms located
https://support.software.dell.com/essentials/SonicWALL-Support-Offerings and are incorporated herein by
reference. Support Services may require an additional fee. Unless otherwise agreed to in writing, SonicWALLs
Support Services are subject to SonicWALLs Support Services Terms which are in effect at the time the Support
Services are purchased by Customer, and these terms and conditions will be incorporated herein by reference at
that time. SonicWALL reserves the right to change the Support Services Terms from time to time by posting such
changes on its website, which shall apply to any Support Services purchased on or after the date of such
posting.
5. SONICWALL WARRANTY
(a) Warranty. SonicWALL warrants to Customer (original purchaser Customer only) that for the applicable
warranty period (Warranty Period) the Hardware will be free from any material defects in materials or
workmanship and the Software, if any, will substantially conform to the Documentation applicable to the
Software and the License purchased (Limited Warranty). Except as may indicated otherwise in writing by
SonicWALL, the Warranty Period for Hardware is one year from the date of registration of the Hardware Product
(or if sooner, seven days after initial delivery of the Hardware Product to Customer), and the applicable
warranty period for Software is ninety days from the date of registration of the Software Product (or if sooner,
Dell SonicWALL Directory Services Connector 4.0
Administration Guide
52
seven days after initial delivery/download) of the Software Product to/by Customer. SonicWALL does not
warrant that use of the Product(s) will be uninterrupted or error free nor that SonicWALL will correct all errors.
The Limited Warranty shall not apply to any non-conformance (i) that SonicWALL cannot recreate after
exercising commercially reasonable efforts to attempt to do so; (ii) caused by misuse of the Product or by using
the Product in a manner that is inconsistent with this Agreement or the Documentation; (iii) arising from the
modification of the Products by anyone other than SonicWALL; or (iv) caused by any problem or error in third
party software or hardware not provided by SonicWALL with the Product regardless of whether or not the
SonicWALL Product is designed to operate with such third party software or hardware. SonicWALL's sole
obligation and Customer's sole and exclusive remedy under any express or implied warranties hereunder shall be
for SonicWALL to use commercially reasonable efforts to provide error corrections and/or, if applicable, repair
or replace parts in accordance with SonicWALLs Support Services Terms. Customer shall have no rights or
remedies under this Limited Warranty unless SonicWALL receives Customers detailed written warranty claim
within the applicable warranty period.
(b) Disclaimer. EXCEPT FOR THE EXPRESS WARRANTIES SET FORTH ABOVE, TO MAXIMUM EXTENT PERMITTED BY
APPLICABLE LAW SONICWALL HEREBY DISCLAIMS ON BEHALF OF ITSELF, ITS SUPPLIERS, DISTRIBUTORS AND
RESELLERS ALL WARRANTIES, EXPRESS, STATUTORY AND IMPLIED, APPLICABLE TO THE PRODUCTS, SERVICES
AND/OR THE SUBJECT MATTER OF THIS AGREEMENT, INCLUDING, BUT NOT LIMITED TO, ANY WARRANTY OF
MERCHANTABILITY, NON-INFRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE.
6. LIMITATION OF LIABILITY
The Products are not designed, manufactured, authorized or warranted to be suitable for use in any system
where a failure of such system could result in a situation that threatens the safety of human life, including
without limitation any such medical, life support, aviation or nuclear applications. Any such use and subsequent
liabilities that may arise from such use are totally the responsibility of Customer, and all liability of SonicWALL,
whether in contract, tort (including without limitation negligence) or otherwise in relation to the same is
excluded. Customer shall be responsible for mirroring its data, for backing it up frequently and regularly, and
for taking all reasonable precautions to prevent data loss or corruption. SonicWALL shall not be responsible for
any system downtime, loss or corruption of data or loss of production. NOTWITHSTANDING ANYTHING ELSE IN
THIS AGREEMENT OR OTHERWISE, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL
SONICWALL, ITS SUPPLIERS, DISTRIBUTORS OR RESELLERS BE LIABLE FOR ANY INDIRECT, INCIDENTAL, PUNITIVE
OR CONSEQUENTIAL DAMAGES, LOST OR CORRUPTED DATA, LOST PROFITS OR SAVINGS, LOSS OF BUSINESS OR
OTHER ECONOMIC LOSS OR COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, ARISING OUT OF OR
RELATED TO THIS AGREEMENT, THE PRODUCTS OR THE SERVICES, WHETHER OR NOT BASED ON TORT, CONTRACT,
STRICT LIABILITY OR ANY OTHER LEGAL THEORY AND WHETHER OR NOT SONICWALL HAS BEEN ADVISED OR KNEW
OF THE POSSIBILITY OF SUCH DAMAGES. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, SONICWALL'S
MAXIMUM LIABILITY TO CUSTOMER ARISING FROM OR RELATING TO THIS AGREEMENT SHALL BE LIMITED TO THE
AMOUNTS RECEIVED BY SONICWALL FOR THE PRODUCTS AND THE SERVICES PURCHASED BY CUSTOMER, PROVIDED
THAT WHERE ANY CLAIM AGAINST SONICWALL RELATES TO PARTICULAR PRODUCT AND/OR SERVICES,
SONICWALLS MAXIMUM LIABILITY SHALL BE LIMITED TO THE AGGREGATE AMOUNT RECIEVED BY SONICWALL IN
RESPECT OF THE PRODUCTS AND/OR SERVICES PURCHASED BY CUSTOMER AFFECTED BY THE MATTER GIVING RISE
TO THE CLAIM. (FOR MAINTENANCE SERVICES OR A PRODUCT SUBJECT TO RECURRING FEES, THE LIABILITY SHALL
NOT EXCEED THE AMOUNT RECEIVED BY SONICWALL FOR SUCH MAINTENANCE SERVICE OR PRODUCT PURCHASED
BY CUSTOMER DURING THE TWELVE (12) MONTHS PRECEDING THE CLAIM). CUSTOMER EXPRESSLY AGREES TO THE
ALLOCATION OF LIABILITY SET FORTH IN THIS SECTION, AND ACKNOWLEDGES THAT WITHOUT ITS AGREEMENT TO
THESE LIMITATIONS, THE PRICES CHARGED FOR THE PRODUCTS AND SERVICES WOULD BE HIGHER.
7. GOVERNMENT RESTRICTIONS
Customer agrees that it will not export or re-export the Products without SonicWALL's prior written consent, and
then only in compliance with all requirements of applicable law, including but not limited to U.S. export control
regulations. Customer has the responsibility to obtain any required licenses to export, reexport or import the
Products. Customer shall defend, indemnify and hold SonicWALL and its suppliers harmless from any claims
arising out of Customers violation of any export control laws relating to any exporting of the Products. By
accepting this Agreement and receiving the Products, Customer confirms that it and its employees and agents
who may access the Products are not listed on any governmental export exclusion lists and will not export or reexport the Products to any country embargoed by the U.S. or to any specially denied national (SDN) or denied
entity identified by the U.S. Applicable export restrictions and exclusions are available at the official web site
Dell SonicWALL Directory Services Connector 4.0
Administration Guide
53
of the U.S. Department of Commerce Bureau of Industry and Security (www.bis.doc.gov). For purchase by U.S.
governmental entities, the technical data and computer software in the Products are commercial technical data
and commercial computer software as subject to FAR Sections 12.211, 12.212, 27.405-3 and DFARS Section
227.7202. The rights to use the Products and the underlying commercial technical date and computer software
is limited to those rights customarily provided to the public purchasers as set forth in this Agreement. The
Software and accompanying Documentation are deemed to be commercial computer software and
commercial computer software documentation, respectively, pursuant to DFAR Section 227.7202 and FAR
Section 12.212, as applicable. Any use, modification, reproduction, release, performance, display or disclosure
of the Software and accompanying Documentation by the United States Government shall be governed solely by
the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of
this Agreement.
8. GENERAL
a) Governing Law and Venue. This Agreement shall be governed by and construed in accordance with the laws of
the State of California, without giving effect to any conflict of laws principles that would require the
application of laws of a different state. The parties agree that neither the United Nations Convention on
Contracts for the International Sale of Goods, nor the Uniform Computer Information Transaction Act (UCITA)
shall apply to this Agreement, regardless of the states in which the parties do business or are incorporated. Any
action seeking enforcement of this Agreement or any provision hereof shall be brought exclusively in the state
or federal courts located in the County of Santa Clara, State of California, United States of America. Each party
hereby agrees to submit to the jurisdiction of such courts. Notwithstanding the foregoing, SonicWALL is entitled
to seek immediate injunctive relief in any jurisdiction in the event of any alleged breach of Section 1 and/or to
otherwise protect its intellectual property.
b) Assignment. Except as otherwise set forth herein, Customer shall not, in whole or part, assign or transfer any
part of this Agreement or any rights hereunder without the prior written consent of SonicWALL. Any attempted
transfer or assignment by Customer that is not permitted by this Agreement shall be null and void. Any
transfer/assignment of a License that is permitted hereunder shall require the assignment/transfer of all copies
of the applicable Software along with a copy of this Agreement, the assignee must agree to all terms and
conditions of this Agreement as a condition of the assignment/transfer, and the License(s) held by the
transferor Customer shall terminate upon any such transfer/assignment.
c) Severability. If any provision of this Agreement shall be held by a court of competent jurisdiction to be
contrary to law, such provision will be enforced to the maximum extent permissible and the remaining
provisions of this Agreement will remain in full force and effect.
d) Privacy Policy. Customer hereby acknowledges and agrees that SonicWALLs performance of this Agreement
may require SonicWALL to process or store personal data of Customer, its employees and Affiliates, and to
transmit such data within SonicWALL or to SonicWALL Affiliates, partners and/or agents. Such processing,
storage, and transmission may be used for the purpose of enabling SonicWALL to perform its obligations under
this Agreement, and as described in SonicWALLs Privacy Policy (http://www.sonicwall.com/us/en/PrivacyPolicy.html, Privacy Policy) and may take place in any of the countries in which SonicWALL and its Affiliates
conduct business, including countries outside of the European Economic Area. SonicWALL reserves the right to
change the Privacy Policy from time to time as described in the Privacy Policy.
e) Notices. All notices provided hereunder shall be in writing, delivered personally, or sent by internationally
recognized express courier service (e.g., Federal Express), addressed to the legal department of the respective
party or to such other address as may be specified in writing by either of the parties to the other in accordance
with this Section.
f) Disclosure of Customer Status. SonicWALL may include Customer in its listing of customers and, upon written
consent by Customer, announce Customer's selection of SonicWALL in its marketing communications.
g) Waiver. Performance of any obligation required by a party hereunder may be waived only by a written waiver
signed by an authorized representative of the other party, which waiver shall be effective only with respect to
the specific obligation described therein. Any waiver or failure to enforce any provision of this Agreement on
one occasion will not be deemed a waiver of any other provision or of such provision on any other occasion.
h) Force Majeure. Each party will be excused from performance for any period during which, and to the extent
that, it is prevented from performing any obligation or service as a result of causes beyond its reasonable
control, and without its fault or negligence, including without limitation, acts of God, strikes, lockouts, riots,
acts of war, epidemics, communication line failures, and power failures.
Dell SonicWALL Directory Services Connector 4.0
Administration Guide
54
i) Audit. Customer shall maintain accurate records to verify compliance with this Agreement. Upon request by
SonicWALL, Customer shall furnish (a copy of) such records to SonicWALL and certify its compliance with this
Agreement.
j) Headings. Headings in this Agreement are for convenience only and do not affect the meaning or
interpretation of this Agreement. This Agreement will not be construed either in favor of or against one party or
the other, but rather in accordance with its fair meaning. When the term including is used in this Agreement
it will be construed in each case to mean including, but not limited to.
k) Entire Agreement. This Agreement is intended by the parties as a final expression of their agreement with
respect to the subject matter hereof and may not be contradicted by evidence of any prior or contemporaneous
agreement unless such agreement is signed by both parties. In the absence of such an agreement, this
Agreement shall constitute the complete and exclusive statement of the terms and conditions and no extrinsic
evidence whatsoever may be introduced in any judicial proceeding that may involve the Agreement. This
Agreement represents the complete agreement and understanding of the parties with respect to the subject
matter herein. This Agreement may be modified only through a written instrument signed by both parties.
55
About Dell
Dell listens to customers and delivers worldwide innovative technology, business solutions and services they
trust and value. For more information, visit www.software.dell.com.
Contacting Dell
Technical support:
Online support
Product questions and sales:
(800) 306-9329
Email:
[email protected]
56