Skip to main content

Configuration Tutorial

This tutorial walks you through the configuration and activation of a USP deployment after installation. It focuses on a typical production scenario where USP forwards external SFTP connections from a business partner to a UDMG Server.

The setup follows Deployment Model 2 - No Pre-Authentication with Credential Passthrough. In this model, USP terminates the inbound SFTP session at the DMZ and relays the client's credentials directly to UDMG for authentication.

In practice, this means:

  • An external SFTP client connects to USP.
  • USP breaks the session at the DMZ without validating the username or password.
  • The client's credentials are forwarded through the Tunnel.
  • UDMG performs the actual SFTP authentication and either accepts or rejects the connection.

This guide shows how to define the required keys, certificates, Configuration Items, and deployment logic in the USP Admin UI to enable secure SFTP forwarding.

Prerequisites

Before beginning this tutorial, ensure the following:

USP Manager Installation is complete, including access to the USP Admin UI.

USP Server Installation is complete, including certificates required for USP Manager and USP Server mTLS authentication.

USP Client Installation is complete, including the two sets of public and private key pairs, used for authentication between the USP Client and the USP Server.

You have a private host key (in PEM format) for the Inbound Node, used to authenticate the USP Server to external SFTP clients.

You have the public key content (in OpenSSH host key format) for the Outbound Node, used to verify the identity of the UDMG Server.

Overview

Configuration Tutorial Diagram

In this tutorial, you will perform the following steps in USP Admin UI to configure a working deployment that forwards SFTP connections to UDMG:

StepDescription
Step 1: Add Two Private KeysRequired to authenticate the USP Server to the SFTP incoming connection and the USP Client.
Step 2: Add Two Public KeysUsed to verify the USP Client and the UDMG Server.
Step 3: Add a CA CertificateCertificate authority used to validate the USP Server's TLS certificate.
Step 4: Add a TLS CertificateCertificate and private key that identify the USP Manager to the USP Server.
Step 5: Add a RuleDefines how inbound connections are authenticated and how outbound credentials are sourced.
Step 6: Add a RouteContainer that links Inbound and Outbound Nodes.
Step 7: Add an IP FilterControls which inbound IP addresses are allowed (allow all for this tutorial).
Step 8: Add an Inbound NodeVirtual server in the DMZ that accepts external connections. The Inbound Node needs its own host key to present to clients.
Step 9: Add an Outbound NodeInternal target system that USP forwards traffic to — in this tutorial, the UDMG Server.
Step 10: Add a ListenerPort on the USP Server that accepts external incoming connections and maps them to the Route.
Step 11: Add a Proxy ServerRepresents the USP Server instance in USP Manager, including its TLS settings.
Step 12: Add a TunnelPort on the USP Server dedicated to accepting connections from given Proxy Clients.
Step 13: Add a Proxy ClientRepresents the USP Client instance and its public key.
Step 14: Add a DeploymentLinks the Listener, Proxy Server, Tunnel, and Proxy Client to form an operational deployment.
Step 15: Push the ConfigurationPush the configuration from USP Manager to the USP Server to activate it.

At the end of these steps, your USP deployment will be able to accept SFTP connections from an external partner and securely forward them to UDMG.

Steps

Authentication

info

Step 1: Add Two Private Keys

This configuration tutorial demands two Private Keys:

#Added toPurposeRelated Documentation
1Inbound NodePresented to external incoming connections for host verification.USP Server Host Key Verification
2TunnelUsed by the USP Server to authenticate itself when accepting connections from the USP Client.Authentication Between USP Clients and Tunnels

To add the first Private Key, follow these steps:

  1. From the Sidebar, click Authentication > Keys.
  2. Click Private Keys.
  3. Click Add Private Key.
  4. Complete the fields following this table:
FieldValue
NameMy_Inbound_Node_Host_Private_Key
DescriptionPrivate Key used by the USP Server to identify itself to external incoming connections.
Key

PLACEHOLDER

info

The corresponding public key must already be distributed to and trusted by the SFTP clients.

  1. Click Save.
  2. Repeat steps 1 to 5 using this other table:
FieldValue
NameMy_Tunnel_Private_Key
DescriptionPrivate Key used by the USP Server to identify itself during incoming connections from USP Clients.
Key

PLACEHOLDER

info

Its counterpart is the public key found under the tunnel.host_key argument of the USP Client configuration file.

If you followed the Generating SSH Keys for USP Tunnels guide, the PLACEHOLDER content is in the usp-tunnel-key file.

Step 2: Add Two Public Keys

This configuration tutorial demands two Public Keys:

#Added toPurposeRelated Documentation
1Proxy ClientUsed by the USP Server to verify the identity of the connecting USP Client during SSH authentication.Authentication Between USP Clients and Tunnels
2Outbound NodeUsed to verify the identity of the UDMG Server during SSH handshake.Remote Host Key Verification in Outbound Nodes

To add the first Public Key, follow these steps:

  1. From the Sidebar, click Authentication > Keys.
  2. Click Public Keys.
  3. Click Add Public Key.
  4. Complete the fields following this table:
FieldValue
NameMy_Proxy_Client_Public_Key
Description

Public Key used by the USP Server to verify the USP Client identity.

Key

PLACEHOLDER

info

Its counterpart is the private key found under the key argument of the USP Client configuration file.

If you followed the Generating SSH Keys for USP Tunnels guide, the PLACEHOLDER content is in the usp-client-1-key.pub file.

  1. Click Save.
  2. Repeat steps 1 to 5 using this other table:
FieldValue
NameMy_Outbound_Node_Remote_Host_Key
DescriptionSSH host key used to verify the identity of the UDMG Server.
Key

PLACEHOLDER

info

The value can be retrieved from UDMG Admin UI, under the Key Definition section of the Credentials Private Key record.

Step 3: Add a CA Certificate

This CA Certificate is added to the Proxy Server item and used by the USP Manager to validate the TLS certificate presented by the USP Server during mutual TLS authentication.

To add this CA Certificate, follow these steps:

  1. From the Sidebar, click Authentication > Certificates.
  2. Click CA Certificates.
  3. Click Add CA Certificate.
  4. Complete the fields following this table:
FieldValue
NameMy_Proxy_Server_CA
DescriptionCA Certificate used by the USP Manager to validate the TLS certificate presented by the USP Server.
Certificate

PLACEHOLDER

info

If you followed the mTLS Certificates Generation Guide, the PLACEHOLDER content is in the ca.crt file.

  1. Click Save.

Step 4: Add a TLS Certificate

This TLS Certificate is added to the Proxy Server item and used by the USP Manager to identify itself to the USP Server during mutual TLS authentication.

To add this TLS Certificate, follow these steps:

  1. From the Sidebar, click Authentication > Certificates.
  2. Click TLS Certificates.
  3. Click Add TLS Certificate.
  4. Complete the fields following this table:
FieldValue
NameMy_Proxy_Server_TLS
DescriptionTLS Certificate used by the USP Manager to identify itself to the USP Server.
Certificate

PLACEHOLDER

info

If you followed the mTLS Certificates Generation Guide, the PLACEHOLDER content is in the manager.crt file.

Key

PLACEHOLDER

info

If you followed the mTLS Certificates Generation Guide, the PLACEHOLDER content is in the manager.key file.

  1. Click Save.

Configuration Items

Once the required certificates and keys have been added, you can begin defining the Configuration Items in USP Manager.

Step 5: Add a Rule

A Rule defines how inbound connections are authenticated and how outbound credentials are sourced. It is central to determine the security posture of the associated Route.

To add a new Rule:

  1. From the Sidebar, click Configuration > Rules.
  2. Click Add Rule.
  3. Complete the fields following this table:
FieldValue
NameMy_Rule
DescriptionA Rule with no pre-authentication and credential passthrough.
Inbound Authentication MethodPassword
Authentication at the ProxyDisabled
Outbound Credential SourcePassthrough Credentials
ICAP ScannerNone
  1. Click Save.
info

This Rule configuration means credentials are not validated at the proxy; however, a username and password are expected before the session break, which are then passed to the UDMG Server for authentication.

Step 6: Add a Route

A Route is a container for Inbound Nodes and Outbound Nodes.

To add a Route, follow these steps:

  1. From the Sidebar, click Configuration > Routes.
  2. Click Add Route.
  3. Complete the fields following this table:
FieldValue
NameMy_Route
DescriptionA Route from the the Inbound Node to the UDMG Server Outbound Node.
  1. Click Save.

Step 7: Add an IP Filter

An IP Filter defines which source IP addresses are allowed or blocked when connecting to USP Server. For this tutorial, you will create an IP Filter that allows all incoming connections. This filter will be assigned to the Inbound Node in the next step.

To add an IP Filter:

  1. From the Sidebar, click Authentication > IP Filtering.
  2. Click Add IP Filter.
  3. Complete the fields following this table:
FieldValue
NameMy_IP_Filter
DescriptionAn IP Filter that allows all incoming connections.
Default ActionAllow.

Step 8: Add an Inbound Node

An Inbound Node defines the virtual server configuration on a USP Server instance that handles incoming client connections.

To add an Inbound Node, follow these steps:

  1. Within the Route's page, go to the Inbound Nodes tab.
  2. Click Add Inbound Node.
  3. Complete the fields following this table:
FieldValue
NameMy_Inbound_Node
DescriptionInbound Node that defines the virtual server configuration.
IP Address Filter ListMy_IP_Filter
Priority Number1
RuleMy_Rule
Host Private KeyMy_Inbound_Node_Host_Private_Key

Step 9: Add an Outbound Node

This Outbound Node defines the configuration for the UDMG Server to which the USP Server connects.

To add an Outbound Node, follow these steps:

  1. Back on the Route's page, go to the Outbound Nodes tab.
  2. Click Add Outbound Node.
  3. Complete the fields following this table:
FieldValue
NameMy_Outbound_Node
DescriptionOutbound Node that defines the configuration for the UDMG Server.
HostnameIP address or domain name of the UDMG Server.
PortPort of the UDMG Server.
Remote Host KeyMy_Outbound_Node_Remote_Host_Key
  1. Click Save.

Step 10: Add a Listener

A Listener defines the port on which a USP Server accepts external incoming connections and specifies the Outbound Node that connects to the UDMG Server.

To add a Listener, follow these steps:

  1. From the Sidebar, click Configuration > Listeners.
  2. Click Add Listeners.
  3. Complete the fields following this table:
FieldValue
NameMy_Listener
DescriptionListener that defines the port on which the USP Server instance accepts SFTP incoming connections.
PortUSP Server port for external incoming connections.
RouteMy_Route
Default Outbound NodeMy_Outbound_Node
  1. Click Save.

Step 11: Add a Proxy Server

A Proxy Server is the top-level Configuration Item that represents a specific USP Server instance.

To add a Proxy Server, follow these steps:

  1. From the Sidebar, click Configuration > Proxy Servers.
  2. Click Add Proxy Server.
  3. Complete the fields following this table:
FieldValue
NameThis name must match exactly the name configured in the name field of the USP Server's .hcl configuration file.
DescriptionProxy Server representing my USP Server instance.
HostnameUSP Server instance's IP address or domain name.
PortThis port must match exactly the port configured in the web.config_host field of the USP Server's .hcl configuration file (default value is 8900).
CA CertificateMy_Proxy_Server_CA
TLS CertificateMy_Proxy_Server_TLS
warning

The Common Name (CN) or Subject Alternative Name (SAN) fields in the TLS Certificate must match. If there's a mismatch, mTLS authentication between the USP Manager and USP Server fails.

  1. Click Save.

Step 12: Add a Tunnel

A Tunnel defines a port within a Proxy Server, which is dedicated to accepting connections from a list of Proxy Clients.

To add a Tunnel, follow these steps:

  1. Within the Proxy Server's page, go to the Tunnels tab.
  2. Click the Add Tunnel button.
  3. Complete the fields following this table:
FieldValue
NameMy_Tunnel
DescriptionTunnel that defines the port dedicated to accepting connections from Proxy Clients.
PortThis port must match exactly the port configured in the tunnel.port field of the USP Client's .hcl configuration file (default value is 8900).
Private KeyMy_Tunnel_Private_Key
  1. Click Save.

Step 13: Add a Proxy Client

A Proxy Client represents an instance of a USP Client.

To add a Proxy Client:

  1. From the Sidebar, click Configuration > Proxy Servers.
  2. Click the Name of the Proxy Server you created earlier.
  3. Go to the Tunnels tab.
  4. Click My_Tunnel.
  5. Go to the Proxy Clients tab.
  6. Click the Add Proxy Client button.
  7. Complete the fields following this table:
FieldValue
NameThis name must match exactly the name configured in the name field of the USP Client's .hcl configuration file.
DescriptionProxy Client that represents my USP Client instance.
Public KeyMy_Proxy_Client_Public_Key

Step 14: Add a Deployment

Deployments tie a Listener to a specific USP Server and optionally associate it with a tunnel and client configuration. This is the final step before activating your configuration.

To add a Deployment:

  1. From the Sidebar, click Configuration > Listeners.
  2. Click the Listener named My_Listener.
  3. Go to the Deployments tab.
  4. Click Add Deployment.
  5. Complete the fields following this table:
FieldValue
Proxy ServerSelect the name of the Proxy Server added earlier.
Startup ModeAuto
DescriptionDeployment linking the Listener to the specified USP Server, Tunnel, and Proxy Client.
TunnelMy_Tunnel
Proxy ClientSelect the name of the Proxy Client added earlier.
  1. Click Save.

Push Configuration

Step 15: Push the configuration

Now, everything is set up to push the configuration to the USP Server. To do so:

  1. From the Sidebar, click Monitoring > Status.
  2. The Proxy Server that was added before appears in the list
  3. Click the Name of the USP Server instance.
  4. The Proxy Server Details are displayed. The Server Status should display Online
  5. Go to the Configuration tab.
  6. A side-by-side comparison of the current configuration on the USP Server instance versus the new configuration is displayed.
  7. Click Push Configuration.
  8. A success message should appear at the bottom right of the screen.
  9. Go to the Details tab.
  10. The status of the USP Server's Tunnels and Listeners are reported on the bottom of the page.
  11. Go to the Live Tunnels tab.
  12. The Tunnel is listed as running and the Proxy Client is reported in the Connected Client column.

Deployment Complete

At this point, your USP Server is fully configured and ready to operate:

  1. The USP Server listens for inbound SFTP connections on the configured Listener's port.
  2. Upon receiving a connection, the session break mechanism terminates the client session, authenticates it as configured, and initiates a second connection to the internal UDMG server over a secure SSH tunnel.
  3. Once the USP Server authenticates the forwarded connection, data and commands flow between the external client and internal target, with the USP Server acting as a secure, controlled intermediary.
info

For more information on configuration options, tunneling strategies, and advanced deployment models, refer to the corresponding documentation sections.