Black Box EncrypTight Appliance Trim Kit User Manual


 
EncrypTight User Guide 3
Table of Contents
Preface....................................................................................................................................... 13
About This Document.......................................................................................................................... 13
Contacting Black Box Technical Support............................................................................................ 14
Part I: EncrypTight Installation and Maintenance
Chapter 1: EncrypTight Overview ........................................................................................... 17
Distributed Key Topologies ..................................................................................................................17
EncrypTight Elements ...................................................................................................................19
EncrypTight Element Management System............................................................................20
Policy Manager .......................................................................................................................20
Key Management System.......................................................................................................20
Policy Enforcement Point........................................................................................................21
Point-to-Point Negotiated Topology .....................................................................................................22
Security within EncrypTight..................................................................................................................23
Secure Communications Between Devices...................................................................................24
Secure Key Storage within the ETKMS.........................................................................................24
Chapter 2: EncrypTight Deployment Planning ...................................................................... 25
EncrypTight Component Connections .................................................................................................25
Management Station Connections ................................................................................................26
ETPM to ETKMS Connections ......................................................................................................26
ETPM and ETKMS on the Same Subnetwork ........................................................................27
ETPM and ETKMS on Different Subnetworks ........................................................................27
External ETKMS to ETKMS Connections......................................................................................29
Connections for Backup ETKMSs...........................................................................................29
Connecting Multiple ETKMSs in an IP Network ......................................................................30
ETKMS to ETKMS Connections in Ethernet Networks...........................................................30
ETKMS to PEP Connections .........................................................................................................31
ETKMS to PEP Connections in IP Networks ..........................................................................31
ETKMS to PEP Connections in Ethernet Networks ................................................................32
Network Clock Synchronization ...........................................................................................................33
IPv6 Address Support ..........................................................................................................................33
Certificate Support ...............................................................................................................................34
Network Addressing for IP Networks ...................................................................................................35
Chapter 3: Installation and Configuration .............................................................................. 37
Before You Start...................................................................................................................................37
Hardware Requirements................................................................................................................38
Software Requirements .................................................................................................................38
Firewall Ports.................................................................................................................................39
EncrypTight Software Installation.........................................................................................................39
Installing EncrypTight Software for the First Time.........................................................................39
Upgrading to a New Version of EncrypTight .................................................................................40