The SonicWALL Secure Mobile Access (SMA) SMA 100 series includes the SMA 200, SMA 400, and SMA 500v. Support for the inline Duo Prompt on SMA series devices differs by firmware version:
10.0.0.0-16 and later: Supported. Users see the interactive Duo Prompt during browser login when the SSL VPN is configured to use
radius_server_iframe AND the login experience used is "Classic mode". "Contemporary mode" does not support the Duo inline prompt.
22.214.171.124-13 and later: Supported. Users see the interactive Duo Prompt during browser login when the SSL VPN is configured to use
126.96.36.199 to 188.8.131.52-11: Unsupported. To integrate with Duo on v9.0.x firmware versions before 184.108.40.206-13, you will need to use the radius_server_auto configuration.
220.127.116.11 to 18.104.22.168-19: Unsupported. To integrate with Duo on 8.6, you will need to use the radius_server_auto configuration.
You may find that the inline Duo authentication prompt is not displayed when the SonicWALL Web Application Firewall (WAF) for the SRA series is enabled. This happens when the WAF signature "Cross-site Scripting (XSS) Attack" blocks initialization of the Duo script.
To remedy this, log in to your SRA administrator console and navigate to the "Web Application Firewall > Signatures" page. Locate signature "9008 Cross-site Scripting (XSS) Attack" and click the Edit Signature Settings icon. On the "Edit WAF Signature-based Exclusions" page, change the action for the "Cross-site Scripting (XSS) Attack" signature to DETECT and click the Accept button. Click the Accept button at the top of the "Web Application Firewall > Signatures" page to deploy the change.
If your environment requires WAF prevention of XSS scripts, please use the VPN Client SRA SSL VPN deployment. That configuration does not use cross-site scripting.
While Duo does not explictly support SMA 1000 series devices with step-by-step instructions, you may be able to use our generic RADIUS instructions to add 2FA to SMA 1000 series VPN logins with automatic push requests.