Multitech RFIPSC-1 User Manual

Page of 54
RFIPSC Quick Start Guide
7
Chapter 1 – Introduction and
Description
Introduction
Welcome to Multi-Tech’s new RouteFinder, model RF650VPN. The RF650VPN is an
Internet security appliance that lets you use data encryption and the Internet to
securely connect to telecommuters, remote offices, customers or suppliers while
avoiding the cost of expensive private leased lines.
The SSH Sentinel IPSec VPN Client software is available in 1-, 5-, 10- and 50-user
packages. The RF650VPN provides SSH Sentinel version 1.1.1 client software (30-day
trial Internet Pilot version with Static IP support). It allows client computer connection
to the RF650VPN using PSK (Pre Shared Keys) in a Host-to-Net connection.
Chapter 2 of this manual describe the SSH IPSec VPN client installation and setup
process for the full 1-, 5-, 10- or 50-user Sentinel SSH IPSec VPN client packages with
these Multi-Tech model numbers:
Model
Description
RFIPSC-1
SSH IPSec VPN Client 1-User License
RFIPSC-5
SSH IPSec VPN Client 5-User License
RFIPSC-10
SSH IPSec VPN Client 10-User License
RFIPSC-50
SSH IPSec VPN Client 50-User License
Product Description
SSH Sentinel is a software product for securing Internet Protocol (IP) based traffic using
the IPSec protocol - as specified by Internet Engineering Task Force (IETF) standards.
SSH Sentinel is an easy-to-use product designed for end users. It allows you to encrypt
and authenticate important network connections, like remote access to corporate
networks remote administration, file transfer, sending and receiving email (SMTP, POP)
and IP telephony.
SSH Sentinel software currently supports the following Microsoft Windows operating
systems: Windows 95, Windows 98, Windows NT4, Windows Me and Windows 2000.
SSH Sentinel is designed to be a client type IPSec application. The features are
designed for a single user workstation using a single network adapter and the Internet
Protocol (IP). SSH Sentinel supports all network connection types, including dial-up.
The product is designed to be secure and robust, easy to use, and quick to adapt to the
environment at hand.
Key characteristics include intuitive installation and configuration, as well as an easy
way to use certificates for authentication.