Getting Started with ETPM
146 EncrypTight User Guide
9 Click the New Point-to-Point Policy editor and configure a point-to-point IPSec policy using the
components you created in the preceding steps. See “Adding Layer 3 IP Policies” on page 191 for
more information.
To create a policy for the sample illustrated in Figure 50, click and drag Network Set A to the Point A
box and Network Set B to the Point B box. For information on other settings you can specify for
policies, see “Policy Concepts” on page 181.
10 Deploy the policies to the ETKMSs and PEPs (Tools > Deploy).