SSH Sentinel Quick Start Guide Internet Protocol (IP) The open architecture of the Internet Protocol (IP) makes it a highly efficient, cost-effective, and flexible communications protocol for local and global communications. IP is widely adopted, not only on the global Internet, but also in the internal networks of large corporations.
Multi-User Software License Agreement one Registration Card If any of these items are missing, contact Multi-Tech Systems or your dealer or distributor. Inspect the contents for signs of any shipping damage. If damage is observed, do not install the software;...
This section describes the SSH Sentinel software, an IPSec client product by SSH Communications Security Corp, providing secure communications over a TCP/IP connection. The Sentinel SSH software is used by client devices for secure connection to Multi-Tech‘s RouteFinders RF650VPN and RF550VPN. The SSH Sentinel client installation and setup procedures are described in the following sections.
Starting the SSH Sentinel Installation The SSH Sentinel installation requires that you have full access rights for the system files on your computer. On a Windows NT system, you must log in with administrator rights. 1. Insert the Client CD into the CD-ROM drive. The startup screen displays in your Web browser. 2.
Page 10
SSH Sentinel Quick Start Guide 4. The SSH Sentinel Setup InstallShield Wizard screen displays. The self-extracting package automatically initiates InstallShield software to install and set up SSH Sentinel Client software. On the Installation screen, click The installer will run the Installation Wizard, which creates the initial configuration and sets up the SSH Sentinel client software.
Page 11
Chapter 2 – SSH Sentinel Client Installation and Setup 5. When started, the Installation Wizard goes through a sequence of basic installation dialogs, displaying the licensing agreement and allowing you to select the installation directory and the program folder. The installation can only be performed on a local computer. Remote installation of SSH Sentinel is not possible, because the installation program updates kernel mode components related to networking and remote access.
Page 13
Chapter 2 – SSH Sentinel Client Installation and Setup 7. Choose your Destination Path and click Next, then select a destination folder for the SSH Sentinel icon and click Next>. Next, the screen displays to let you know that SSH Sentinel is performing the Setup Status requested operations.
SSH Sentinel Quick Start Guide Authentication Key Generation 8. On this screen, move your mouse or type some random text to generate a host authentication keypair. When complete, click Next The SSH Sentinel Installation Wizard generates a primary authentication key for IPSec peer (host) authentication purposes.
Page 15
Chapter 2 – SSH Sentinel Client Installation and Setup 9. Once the authentication key generation is complete, click Next> to proceed with the installation.
SSH Sentinel Quick Start Guide Certificate Information 10. Enter the information to identify the authentication key. SSH Sentinel uses certificates and digital signatures as its primary authentication method. SSH Sentinel processes certificates according to the IETF Public-Key Infrastructure X.509v3 standards, allowing you to take advantage of the public-key infrastructure (PKI).
Choose the Enrollment Method 11. Choose your Certificate Enrollment Protocol and click Next A certification request can be created as part of the installation process. You can either enroll online, in other words create and send the request immediately, or save the request in a file and deliver it later to the certification authority (CA).
Page 18
SSH Sentinel Quick Start Guide SSH Sentinel Online Enrollment Information To enroll online, you must locate the certification authority server and you must possess the certification authority certificate. Most often, you can download the certificate of the certification authority from its web site. You must specify the enrollment protocol.
Page 19
Chapter 2 – SSH Sentinel Client Installation and Setup Key (F) This selection is used . The selected is a shared only in connection with the CMP protocol secret granted by the certification authority to be used in the certification request. This is used for verification of the user requesting a certificate.
SSH Sentinel Quick Start Guide Encryption Speed Diagnostics 12. Let the algorithm diagnostics run or skip them. SSH Sentinel runs diagnostics on the encryption algorithms as the last step of the installation. You can bypass this step by clicking the Skip> button on the dialog box. These diagnostics reveal the speeds of the encryption algorithms compared to each other.
Completing the Installation 13. Click Finish and re-start your computer (recommended). The installation of the SSH Sentinel client software adds kernel-mode components to the operating system network management. For this reason, you must restart the computer before using the SSH software. The SSH Sentinel installation is complete.
RouteFinder. Before you can setup the SSH Sentinel client, you will have to configure your gateway. For gateway configuration, see Multi-Tech’s RouteFinder RF650VPN documentation, Multi-Tech’s RouteFinder RF550VPN documentation, or other vendor’s documentation. This Quick Start Guide covers only the SSH Sentinel client setup.
Page 23
SSH Sentinel to connect a remote client to the VPN gateway to the LAN at Site A. The information to the left of the diagram is a list of Multi-Tech’s RF550VPN configuration for this example. Chapter 3 – Client Setup Examples...
Page 24
Multi-Tech’s RouteFinder RF650VPN to connect the LAN at Site A to the external VPN gateway. SSH Sentinel to connect a remote client to the VPN gateway to the LAN at Site A. The information to the left of the diagram is a list of Multi-Tech’s RF650VPN configuration for this example.
Chapter 3 – Client Setup Examples Sentinel Configuration 1. Select the ) icon located on your task bar. Sentinel Policy Editor Then click...
Page 26
SSH Sentinel Quick Start Guide Click the Key Management Highlight and click the My Keys tab at the top of the SSH Sentinel Policy Editor window. button to create a new Authentication Key.
Page 27
Chapter 3 – Client Setup Examples 4. The screen displays. Click the button. New Authentication Key Create a Preshared Key Click Next.
Page 28
SSH Sentinel Quick Start Guide 5. The Create a Preshared Key Enter a for the key, a Name by retyping it. The shared secret needs to match what was entered for the RouteFinder. Example: Key Name = new preshared key Shared Secret = 1o2t3t4f Click Finish.
Page 29
6. This step will start with the First, click the button at the bottom of the screen. Apply Then click the Security Policy On the tab, double-click Security Policy Click Add. 7. On the Add VPN Connection Click the IP button at the end of the Gateway IP Address field, and enter the public (WAN) IP Address of the RouteFinder (Example: 204.26.122.103) Click the down arrow to move to the Authentication key field, and select the key...
Page 30
SSH Sentinel Quick Start Guide Then click the … button Remote Network IP address and the Subnet Mask for the LAN side of the RouteFinder (example: 192.168.2.0 and 255.255.255.0). 8. After clicking the button in the above dialog box, the Enter the Remote Network IP RouteFinder (example: 192.168.2.0 and 255.255.255.0).
Page 31
9. Now back at the Add VPN Connection Click 10. Now back at the Security Policy Highlight the connection you just created (example: 204.26.122.103). Click the button. Properties Chapter 3 – Client Setup Examples screen: tab under the screen: Policy Editor...
Page 32
SSH Sentinel Quick Start Guide 11. The Connection Properties | General Click the button under Settings Verify that the PFS Group screen displays. IPSec / IKE proposal is set to Group 2...
Page 33
12. Click the tab. Advanced Check the box for Open on start-up Click Then click to close the 13. Now back at the Policy Editor Click the button. Apply Double click VPN Connection Highlight the connection you just created (example: 204.26.122.103). Click the button.
Page 34
SSH Sentinel Quick Start Guide 14. Sentinel will probe for a connection to the RouteFinder and should be successful. 15. Click the button. Details of the newly-created connection display. Details Verify the connection details information. Click Close.
Page 35
16. On the screen, click OK to close the Policy Editor 17. Open a DOS command prompt window and attempt to PING the LAN located behind the RouteFinder. If the PING is successful, the configuration process to connect SSH Sentinel client to a RouteFinder is complete.
SSH Sentinel Quick Start Guide Chapter 4 – Updating and Removing SSH Sentinel Updating SSH Sentinel If you launch the installation package with a previous version of SSH Sentinel software on your computer, the existing version is automatically updated. The contents (i.e., the policies, the rules, the authentication keys, etc.) are preserved.
Appendix A – Technical Support When contacting Multi-Tech, be sure to have your RouteFinder information and details about the functioning of the software. Contacting Technical Support Country Using email France Support@multitech.fr Support@multitechindia.com India U.K. Support@multitech.co.uk Support@multitech.com Rest of World Recording RouteFinder Information Before placing a call to our Technical Support staff, record the following information about your Multi-Tech RouteFinder.
Acrobat Reader, download it from http://www.adobe.com. to load the SSH Sentinel software and either run the to view the Multi-Tech Multi-User Software to view and/or print the full online User Guide manual to view and/or print the online Quick Start...
2205 Woodale Drive, Mounds View, MN 55112. This is a legal agreement between you (either an individual or a single entity) and Multi-Tech Systems, Inc. for the Multi-Tech software product enclosed, which includes computer software and may include associated media, printed materials, and "online"...
Page 40
Multi-User Limited Warranty and License Agreement The software contained in this package is licensed by Multi-Tech Systems, Inc., to the original end- user purchaser, hereafter referred to as Licensee, of this product for site use. A site is defined as a single business, government, or academic location, such as a building, a floor of a building, a campus, etc., and covers no more than 250 users at that location.
Page 41
250 users inclusively. Software and manuals may be copied, with the inclusion of the Multi-Tech Systems, Inc., copyright notice, for use within that single site. Additional manuals may be ordered from Multi-Tech Systems, Inc., for a nominal charge.
Need help?
Do you have a question about the RF550VPN and is the answer not in the manual?
Questions and answers