Multitech ROUTE FINDER RFIPSC-1 user manual

User manual for the device Multitech ROUTE FINDER RFIPSC-1

Device: Multitech ROUTE FINDER RFIPSC-1
Category: Network Router
Manufacturer: Multitech
Size: 1.19 MB
Added : 3/30/2013
Number of pages: 54
Print the manual

Download

How to use this site?

Our goal is to provide you with a quick access to the content of the user manual for Multitech ROUTE FINDER RFIPSC-1. Using the online preview, you can quickly view the contents and go to the page where you will find the solution to your problem with Multitech ROUTE FINDER RFIPSC-1.

For your convenience

If looking through the Multitech ROUTE FINDER RFIPSC-1 user manual directly on this website is not convenient for you, there are two possible solutions:

  • Full Screen Viewing - to easily view the user manual (without downloading it to your computer), you can use full-screen viewing mode. To start viewing the user manual Multitech ROUTE FINDER RFIPSC-1 on full screen, use the button Fullscreen.
  • Downloading to your computer - You can also download the user manual Multitech ROUTE FINDER RFIPSC-1 to your computer and keep it in your files. However, if you do not want to take up too much of your disk space, you can always download it in the future from ManualsBase.
Multitech ROUTE FINDER RFIPSC-1 User manual - Online PDF
Advertisement
« Page 1 of 54 »
Advertisement
Print version

Many people prefer to read the documents not on the screen, but in the printed version. The option to print the manual has also been provided, and you can use it by clicking the link above - Print the manual. You do not have to print the entire manual Multitech ROUTE FINDER RFIPSC-1 but the selected pages only. paper.

Summaries

Below you will find previews of the content of the user manuals presented on the following pages to Multitech ROUTE FINDER RFIPSC-1. If you want to quickly view the content of pages found on the following pages of the manual, you can use them.

Abstracts of contents
Summary of the content on the page No. 1

SSH IPSec Client
Models RFIPSC-1/5/10/50
Quick Start Guide

Summary of the content on the page No. 2

Summary of the content on the page No. 3

Quick Start Guide 82013151 Revision B SSH IPSec Client Model # RFIPSC-1/5/10/50 for RouteFinder Model # RF650VPN This publication may not be reproduced, in whole or in part, without prior expressed written permission from Multi-Tech Systems, Inc. All rights reserved. Copyright © 2001, by Multi-Tech Systems, Inc. Multi-Tech Systems, Inc. makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for an

Summary of the content on the page No. 4

iv

Summary of the content on the page No. 5

Contents Chapter 1 – Introduction and Description Introduction ......................................................................................... 7 Product Description .............................................................................. 7 Internet Protocol (IP)............................................................................ 8 Internet Protocol Security (IPSec)......................................................... 8 About this Manual and Related Manuals ...........

Summary of the content on the page No. 6

Figures Figure Number Title Page Number Figure 1 The SSH Sentinel installation package icon. 12 Figure 2. SSH Sentinel Welcome screen. 12 Figure 3. Licensing Agreement 13 Figure 4. Choose Destination Path. 14 Figure 5. Generating the Authentication Key. 15 Figure 6. Authentication Key Generation Done. 15 Figure 7. Inquiring Certificate Identity. 16 Figure 8. Choosing the Enrollment Method. 17 Figure 9. Online Enrollment Settings. 18 Figure 10. Off-line Certification Request. 19 Figure

Summary of the content on the page No. 7

RFIPSC Quick Start Guide Chapter 1 – Introduction and Description Introduction Welcome to Multi-Tech’s new RouteFinder, model RF650VPN. The RF650VPN is an Internet security appliance that lets you use data encryption and the Internet to securely connect to telecommuters, remote offices, customers or suppliers while avoiding the cost of expensive private leased lines. The SSH Sentinel IPSec VPN Client software is available in 1-, 5-, 10- and 50-user packages. The RF650VPN provides SSH Sentinel ve

Summary of the content on the page No. 8

PN 82013151 Internet Protocol (IP) The open architecture of the Internet Protocol (IP) makes it a highly efficient, cost- effective and flexible communications protocol for local and global communications. IP is widely adopted, not only on the global Internet, but also in the internal networks of large corporations. The Internet Protocol was designed to be highly reliable against random network errors. However, it was not designed to be secure against a malicious attacker. In fact, it is vulnera

Summary of the content on the page No. 9

RFIPSC Quick Start Guide About this Manual and Related Manuals This Quick Start Guide manual contains four chapters and one appendix, and is intended to provide the experienced client user or system administrator with the information needed to quickly get the SSH IPSec Client software up and running. The full Sentinel SSH IPSec Client User Guide manual is provided on the SSH IPSec Client CD-ROM included in the license pak. Please address comments about this manual to the Multi-Tech Publications

Summary of the content on the page No. 10

PN 82013151 10

Summary of the content on the page No. 11

RFIPSC Quick Start Guide Chapter 2 - SSH IPSec Client Installation and Setup Introduction This section describes the SSH Sentinel software, an IPSsec client product by SSH Communications Security Corp, providing secure communications over a TCP/IP connection. The Sentinel SSH software is used by client devices for secure connection to the Multi-Tech RouteFinder model RF650VPN. The SSH Sentinel client installation and setup procedures are described in the following sections. The installation of

Summary of the content on the page No. 12

PN 82013151 To run the SSH Sentinel client software, you need a personal computer with at least the following configuration: • Processor Pentium 100 MHz • Memory (RAM) 32 MB for Windows 9x, or 64 MB for Windows NT4/2000 • Hard disk space 10 megabytes of free disk space • Network connection TCP/IP network protocol Starting the SSH Sentinel Installation The SSH Sentinel installation requires that you have full access rights for the system files on your computer. On a Windows NT system, you must l

Summary of the content on the page No. 13

RFIPSC Quick Start Guide The installer will run Installation Wizard, which creates the initial configuration and sets up the SSH Sentinel client software. Note: If a previous version of the SSH Sentinel software is installed on your computer and you try to install a new version, the wizard updates the software and the steps described here are skipped. 3. When started, the Installation Wizard goes through a sequence of basic installation dialogs, displaying the licensing agreement and allowing

Summary of the content on the page No. 14

PN 82013151 Figure 4. Choose Destination Path. Authentication Key Generation The SSH Sentinel Installation Wizard generates a primary authentication key for IPSec peer (host) authentication purposes. The primary authentication key is a 1024-bit RSA key pair that is used for digital signatures and strong authentication. Authentication key generation begins with random seed generation. A random pool of data is collected from the user moving the mouse or typing in random text. The data is then use

Summary of the content on the page No. 15

RFIPSC Quick Start Guide Figure 5. Generating the Authentication Key. Figure 6. Authentication Key Generation Done. 15

Summary of the content on the page No. 16

PN 82013151 Identity Information 5. SSH Sentinel uses certificates and digital signatures as its primary authentication method. SSH Sentinel processes certificates according to the IETF Public-Key Infrastructure X.509v3 standards, allowing you to take advantage of the public-key infrastructure (PKI). SSH Sentinel supports certificate revocation lists (CRLs) and authority revocation lists (ARLs, that is, CRLs for CAs) and is very configurable. However, you can run the software as stand-alone, se

Summary of the content on the page No. 17

RFIPSC Quick Start Guide Choose the Enrollment Method 6. A certification request can be created as part of the installation process. You can either enroll online, in other words create and send the request immediately, or save the request in a file and deliver it later to the certification authority (CA). If there is no certification authority available or you for some reason want to postpone the creation of the request, create a self-signed certificate. It should be noted that once you’ve inst

Summary of the content on the page No. 18

PN 82013151 Online Enrollment Information To enroll online, you must locate the certification authority server and you must possess the certification authority certificate. Most often, you can download the certificate of the certification authority from its web site. Figure 9. Online Enrollment Settings You must also specify the enrollment protocol. In addition, you may configure the Socks and proxy settings to get through the firewall if the local server is protected by one. Enrollment Protoco

Summary of the content on the page No. 19

RFIPSC Quick Start Guide either saved it in a file or copied the contents of it to the Windows clipboard. In a file, the certificate may be in binary (X.509), PEM (Privacy Enhanced Mail) or HEX format. Pasted from the clipboard, the certificate must be in PEM encoded format. Advanced button (D) Opens a dialog box for configuring the socks and proxy settings. Reference Number (E) (Key Identifier) The key identifier is used only in connection with the Certificate Management Protocol (CMP). The key

Summary of the content on the page No. 20

PN 82013151 you may prefer sending the request via email or using an enrollment service on the Web. Select PKCS#10 request file location In the text field (callout A in Figure 10 above), enter the path and the name of the file where the certification request will be stored. You can also click the Browse button to select. Click Next and continue installation. Encryption Speed Diagnostics 8. SSH Sentinel runs diagnostics on the encryption algorithms as the last step of the installation. You can


Alternative user manuals
# User manual Category Download
1 Multitech MULTIFRAD 3100 User manual Network Router 0
2 Multitech ROUTE FINDER RFIPSC-5 User manual Network Router 1
3 Multitech ROUTE FINDER RFIPSC-50 User manual Network Router 1
4 Multitech ROUTEFINDER RF820 User manual Network Router 2
5 Multitech ROUTEFINDER RF820-AP User manual Network Router 3
6 Multitech ROUTEFINDER RF830 User manual Network Router 7
7 Multitech ROUTE FINDER RFIPSC-10 User manual Network Router 0
8 Multitech ROUTEFINDER RF830-AP User manual Network Router 0
9 Multitech MULTIFRAD FR3060 User manual Network Router 0
10 Sony BKS-R3202/R3210/R3220 User manual Network Router 77
11 Sony DVS-V3232B/V3232M User manual Network Router 3
12 Sony BVS-V3232 User manual Network Router 8
13 Sony DMX-WL1 User manual Network Router 6
14 Sony BVS-A3232 User manual Network Router 6
15 Sony BKS-R1601 User manual Network Router 3