Secure Computing Soft-PK Version 5.1.3 Build 4 Manuale Utente
iv
Table of Contents
Managing pre-shared keys (passwords) . . . . . . . . . . . . . . . . . . 3-14
Configuring the VPN on the Sidewinder . . . . . . . . . . . . . . . . . . 3-15
Configuring the VPN on the Sidewinder . . . . . . . . . . . . . . . . . . 3-15
Soft-PK installation notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Starting Soft-PK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
Starting Soft-PK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
Determining Soft-PK status from icon variations . . . . . . . . . . . 4-3
Activating/Deactivating Soft-PK . . . . . . . . . . . . . . . . . . . . . . . 4-4
About the Soft-PK program options . . . . . . . . . . . . . . . . . . . . 4-5
Activating/Deactivating Soft-PK . . . . . . . . . . . . . . . . . . . . . . . 4-4
About the Soft-PK program options . . . . . . . . . . . . . . . . . . . . 4-5
Setting up Sidewinder self-signed certificates . . . . . . . . . . . . . 4-6
Setting up CA-based certificates . . . . . . . . . . . . . . . . . . . . . . . 4-7
Requesting a personal certificate from a CA on user’s behalf 4-8
Importing certificate in Soft-PK . . . . . . . . . . . . . . . . . . . . . . . . 4-9
Setting up CA-based certificates . . . . . . . . . . . . . . . . . . . . . . . 4-7
Requesting a personal certificate from a CA on user’s behalf 4-8
Importing certificate in Soft-PK . . . . . . . . . . . . . . . . . . . . . . . . 4-9
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Customizing the user worksheet . . . . . . . . . . . . . . . . . . . . . . . . . 5-4
Customizing the user worksheet . . . . . . . . . . . . . . . . . . . . . . . . . 5-4
Specifying dial-up network instructions . . . . . . . . . . . . . . . . . . 5-4
Specifying installation instructions . . . . . . . . . . . . . . . . . . . . . 5-4
Specifying certificate import/request instructions . . . . . . . . . . 5-5
Specifying security policy instructions . . . . . . . . . . . . . . . . . . . 5-6
Specifying basic connection information . . . . . . . . . . . . . . . . . 5-6
Specifying installation instructions . . . . . . . . . . . . . . . . . . . . . 5-4
Specifying certificate import/request instructions . . . . . . . . . . 5-5
Specifying security policy instructions . . . . . . . . . . . . . . . . . . . 5-6
Specifying basic connection information . . . . . . . . . . . . . . . . . 5-6