This page walks administrators through the initial setup process for Scout routers, establishing the foundation of a secure, managed network.
Overview
Scout routers are designed for simple, secure deployment that works right out of the box. Once powered and connected, each router automatically establishes an encrypted VPN tunnel to the Scout network, providing protected access, traffic inspection, and centralized monitoring.
Completing this setup ensures your network begins its journey toward a mature, managed security posture.
Step-by-Step Setup
- Connect the provided Ethernet cable to the WAN port on the Scout router.
- Plug the other end into any LAN port on your existing internet router or gateway.
- Connect the power adapter and wait up to 5 minutes while the router initializes and connects to the Scout VPN.
- When setup is complete, the front indicator light will change from pulsing blue to solid white.
- Join the default secure Wi-Fi network:
- Network Name:
Bastion - Password:
ScoutSecured
- Network Name:
If setup does not complete within 5 minutes, confirm your internet connection and submit a support request if the router does not appear online in the dashboard.
Strengthen Security
After confirming the router is connected, immediately update its default Wi-Fi name and password to prevent unauthorized access. Follow the Wi-Fi Settings Guide for detailed instructions.
Changing these credentials ensures your router cannot be targeted using known defaults and helps personalize your deployment for easier identification.
Notes and Recommendations
- Portability: Scout routers can be used in remote offices, home setups, or while traveling. Connect to any available internet source to activate protection.
- Network Inspection: All traffic routed through Scout is automatically inspected and protected in real time, providing visibility and early threat detection.
- Visibility: Once online, your router and connected devices will appear in the Dashboard for ongoing monitoring.
Maturity Alignment
Completing this setup moves your environment into the Foundation level of the Scout Security Maturity Model. At this stage, the organization has established secure network access, centralized inspection, and the groundwork for visibility and control.