Yes, the Duo Single Sign-On for SonicWall SMA 200 Series configuration will open a browser window for interactive SSO login and Duo authentication.
No, RADIUS iframe integrations that show the Duo traditional prompt today will reach end of support in March 2024. Migrate your RADIUS iframe SMA device configuration to Duo Single Sign-On for SonicWall SMA 200 Series if you want to offer your VPN users the Duo Universal Prompt experience, or change your RADIUS configuration to a RADIUS configuration that will remain supported, like RADIUS with automatic Duo Push. Learn more about Duo Universal Prompt and the Duo traditional prompt end of life.
The SonicWall Secure Mobile Access (SMA) SMA 100 series includes the SMA 200, SMA 400, and SMA 500v. Support for the RADIUS inline Duo Prompt on SMA 100 series devices differs by firmware version:
10.0.0.0-16 and later: Supported. Users see the interactive Duo Prompt during browser login when the SSL VPN is configured to use
188.8.131.52-13 and later: Supported. Users see the interactive Duo Prompt during browser login when the SSL VPN is configured to use
184.108.40.206 to 220.127.116.11-11: Unsupported. To integrate with Duo on v9.0.x firmware versions before 18.104.22.168-13, you will need to use the radius_server_auto configuration.
SRA devices which have reached end of life, which includes SRA 1600, SRA 4600, SRA EX6000, and SRA EX7000, are excluded.
You may find that the RADIUS inline Duo authentication prompt is not displayed when the SonicWALL Web Application Firewall (WAF) for the SRA series is enabled. This happens when the WAF signature "Cross-site Scripting (XSS) Attack" blocks initialization of the Duo script.
To remedy this, log in to your SRA administrator console and navigate to the "Web Application Firewall > Signatures" page. Locate signature "9008 Cross-site Scripting (XSS) Attack" and click the Edit Signature Settings icon. On the "Edit WAF Signature-based Exclusions" page, change the action for the "Cross-site Scripting (XSS) Attack" signature to DETECT and click the Accept button. Click the Accept button at the top of the "Web Application Firewall > Signatures" page to deploy the change.
If your environment requires WAF prevention of XSS scripts, please use the VPN Client SRA SSL VPN deployment. That configuration does not use cross-site scripting.
While Duo does not explicitly support SMA 1000 series devices with step-by-step instructions or with the Duo web prompt, you may be able to use our generic RADIUS instructions to add 2FA to SMA 1000 series VPN logins with automatic push requests or our generic SAML instructions to use Duo Single Sign-On for SMA 1000 logins with Universal Prompt.