Quick start
This guide walks you through getting Access Gate operational in about 15 minutes. By the end, you'll have visibility into your network and a working protected enclave with access controls in place.
Prerequisites
Before starting, ensure you have:
- Access Gate appliance with power supply
- Three Ethernet cables
- Available switch port with network access
- IP address for Access Gate management interface
- Web browser (Chrome, Firefox, or Edge)
- Administrator credentials for initial setup
- Understood the final network architecture layout
At the end of this tutorial, we will have add three capabilities to your network:
- Access Gate will be accessible from a Web browser on IP 10.0.4.10 (part of the admin network)
- Access Gate will listen to netflow data on IP 10.0.3.100 (part of the existing OT network)
- A Secure Twin will be created to steer traffic through Access Gate for control
Overview: Four Steps to Visibility and Control
- Connect: Integrate Access Gate into your existing network
- Discover: Let Access Gate build your asset inventory
- Segment: Create a protected enclave around sensitive assets
- Authorize: Grant users access with identity-based policies
Time required: 15-20 minutes
Step 1: Physical Connection
Access Gate offers six physical ports, which can be configured to perform specific functions (Secure Twin overlay, administration, network monitoring).
We recommend starting with the following configuration:
- Port 1 (Overlay): To deploy access control capabilities
- Port 5 (Monitor): For network visibility and traffic inspection
- Port 6 (Admin): To access the admin interface
Basic Connection Topology:
Connection Steps:
- Connect Port 1 directly to your router (prefer 2.5Gb ports with CAT6 Ethernet cable for best performance)
- Connect Port 5 to your existing OT network
- Connect Port 6 to your management network (same VLAN as your admin workstation)
- Power on the appliance
- Wait 60 seconds for boot sequence to complete
The appliance will obtain an IP address via DHCP on Port 6, or fall back to 10.0.0.1/24 if DHCP is unavailable.
Finding Access Gate's IP Address:
The IP address can be found in your DHCP server logs.
Step 2: Initial Configuration
To access the admin interface:
- Open a web browser and navigate to Access Gate's IP address:
https:// - Accept the self-signed certificate warning (we'll configure proper TLS later)
- Log in with default credentials: Username: admin, password: hello
- Once connected, head to Settings → Accounts.
- Change the admin password.
- Create a dedicated user for yourself with the adequate permission levels
Step 3: Asset Discovery
Now comes the interesting part: seeing what's actually on your network.
Start Discovery:
- Configure the second port as Monitor
- Head to your router to send Netflow towards this monitoring port
- The dashboard will begin populating with traffic & discovered devices
Generate Asset Inventory
- From the Monitor tab, click on the button Register Asset for unknown devices to add them to your inventory
- Fill the name of the asset
- Head to the Asset tab to see the inventory populated
For each asset, you can specify more information, from Name, Serial, Risk Level... by clicking on the pencil icon.
Step 4: Create a Protected Enclave
Now that you can see your network, you can deploy the protection pillars.
Configure Port 1 as Overlay
- Navigate to Settings → Device Ports Configuration
- Click on the first port (or the one you would like to configure)
- Enter the information relevant for your network
- Click Save
💡 Tip: We recommend configuring this as a dedicated route, with the interface IP set to 100.65.0.6/29 and the gateway to 100.65.0.1. On your router, you can then create a simple route that points traffic to the Access Gate
Configure The Secure Twin
Nota Bene: Trout Secure Twin is a unique approach for deploying network security. If you still have questions, do not hesitate to reach out!
A Secure Twin is a virtual copy of your existing network, that allows controlled migration from your existing set-up to a fully secure network, without downtime. Our explainer goes into greater details.
- Navigate to Settings → Twin Subnets
- Add a Twin block with the information relevant for your network.
- Enter a DNS Name (for example acme.tr-sec.net)
- Click Save
💡 Tip: We recommend setting a twin network in the 100.64/16 range. This range is reserved and should not conflict with your existing network, allowing a smooth deployment.
💡 Tip: Entering a DNS name will deploy a built-in DNS at the Access Gate. Any given asset in your asset inventory is then given a url, simplifying access later on.You can configure this functionality as a split DNS, or full DNS.
Now, in your router, you will need to install:
- A interconnect vlan between your router and the port 1 of access gate (in the
100.65.0.0/29range here) - A route to send all traffic on the secure twin to access gate
/ip/address/add interface=ether1 address=100.65.0.1/29
/ip/route/add gateway=100.65.0.4 dst-address=100.64.0.0/16
Create the Enclave
- Navigate to Enclaves → Create Enclave
- Give your enclave a descriptive name: Production_Floor or CUI Systems Sales Access
- Fill the Description & Security Level
- Click Save
Add Assets & Principal
- Navigate to your newly created enclave Enclaves → [Your Enclave]
- Add Assets & Principals by clicking on the Edit Principals button
- Select the entities you want to manage in this enclave.
At this point, the enclave exists but we need to now grant access.
Step 5: Configure Access Control
Now, let's define permissions within the enclave
Grant Access
- In the table view in front of you, click a Blocked tile
- Use the toggle to grant access
- The Advanced drop-down will show you advanced Access Control capabilities: TLS, VPN, Access Screen
- Click Save
This is the moment where Access Gate begins actively controlling access.
Step 6: Test Access
Let's now test the access via the enclave and the proxy security:
- From your computer, check that you are now resolving for this asset:
nslookup {asset_name}.{DNS_name} /// for example cui_server.acme.tr-sec.net - Now, check you can ping the IP that has been returned
- And now let's test the intended protocol is accessible:
curl http://cui_server.acme.tr-sec.net /// for example for an HTTP server
Access Gate's proxy transparently intercepts and forwards traffic based on permissions.
What You've Accomplished
In 15-20 minutes, you have:
- Network visibility - Asset inventory across IT, OT, and IoT
- Protected enclave - Sensitive systems isolated with overlay networking
- DNS Access - Ability to resolve assets IP based on url
- Zero infrastructure changes - No VLAN modifications or IP reassignments
This baseline configuration addresses multiple compliance requirements immediately:
- Asset inventory and classification
- Access control and authentication
- Network segmentation
Next Steps
Next, implement identity-based access, so users must authenticate before reaching protected assets. Head over here.
Troubleshooting
Access Gate not responding on management interface
- Check physical cable connections
- Verify switch port is active (link light on)
- Confirm IP address with DHCP or network logs
- Ensure no firewall rules blocking HTTPS (port 443)
- Ensure you are trying to access the admin interface with HTTPS
No devices appearing in discovery
- Verify monitor port receives mirrored traffic (check switch netflow configuration)
- Ensure monitor port includes both ingress and egress traffic
- Check that monitored VLAN includes active devices
- Review Settings → Logs** to see if any error is raised by the Access Gate
Enclave assets unreachable from Access Gate
- Verify Access Gate can reach assets on underlay network
- Check that asset firewalls allow Access Gate's IP
- Check two routes have been created on your router, one for the Access Gate, one for the overlay range