Setting up Time-based One-time Passwords on SonicWall UTM Appliances

SonicWall recently added the ability to integrate their appliances with Time-based Google and other 3rd party authenticators. Time-based passwords generally represent a more cost effective method of generating one time passwords (compared for example to turn-based) and is a method employed by an increasing number of vendors. The following guide assists in deployment of the technology on SonicWall UTM appliances including the NSA and TZ series.


  • Make sure that at least Firmware is installed on the SonicWall UTM appliance.


  • Ensure the user has installed either Google Authenticator or Microsoft Authenticator (the procedure is the same for each).


  • Set up the relevant Authentication method on the SonicWall either local database, LDAP or Radius.


  • Import the User group for the VPN users to the SonicWall so it appears under Local Groups.



  • Get the User to download the relevant SSL VPN client to their device (SonicWall Mobile Connect for Android, iPhone / iPad, Apple OS Maverick +, Windows 8.1 + and) Windows 7, 8.1,10 and Linux can still use the Latest version of Netextender available from


  • Edit the User group on the SonicWall as below and enable TOTP as the One-Time password method and click Apply and Ok.


1 TOTP on SonicWall UTM



  • Get the User to go to https://YourURL:(SSL VPN port if not using 443) the Default it 4433. For the first time this is probably best done on a pc so the user can scan the barcode from the screen if not they can use the Text Code method and copy and paste from the mobile browser in to their chosen authenticator.


  • If they try and login using their SSL VPN client before they will get the error as below.


From Mobile Connect Client                                              From Netextender Client

2 TOTP on SonicWall UTM


  • The User logs in for the first time using the portal


3 TOTP on SonicWall UTM


  • The user will get presented with a screen like the below, as mentioned earlier they will need to scan the barcode or enter the Text Code in to their Authenticator App.


4 TOTP on SonicWall UTM


  • Once the User has scanned the code the Authenticator is setup.


  • When they next attempt to login using their SSL VPN client after they have entered their login details, they will get a popup like the below.·       


  • They just need to open their Authenticator app and choose the code from the relevant SonicWall Instance (if they are already using App the for Amazon etc…)


5 TOTP on SonicWall UTM



  •  Once they enter their OTP they will be logged in.


Once the user has completed the OTP set up the User will appear under the SonicWall/Users/Local Users section (don’t deleted this as it is keeping all the relevant information regarding their OTP).




Copyright NetThreat Ltd



Attachment: Setting_up_the_TOTP_on_SonicWall_UTM_appliances_Google_or_other_Authenticators.pdf