Black Box EncrypTight Appliance Trim Kit User Manual


 
Working with Policies
EncrypTight User Guide 335
Related topics:
“Using EncrypTight Distributed Key Policies” on page 335
“Creating Layer 2 Point-to-Point Policies” on page 335
Using EncrypTight Distributed Key Policies
After you have configured the ETEPs for network operation, use the Policy Manager (ETPM) to create
and deploy distributed key policies.
ETPM can create Layer 2 mesh policies and the following types of Layer 3 policies:
Mesh
Hub and spoke
Multicast
Point-to-point
To launch ETPM from ETEMS:
1 Do one of the following from any EncrypTight perspective:
In the Window menu, click Open. Click Other. In the Open Perspective window, select ETPM
and click OK.
On the Perspective tab in the upper right corner of the screen, click the Open Perspective button
. Click Other. In the Open Perspective window, select ETPM and click OK.
Related topics:
“Getting Started with ETPM” on page 131
“Creating Distributed Key Policies” on page 181
“Creating Layer 2 Point-to-Point Policies” on page 335
Creating Layer 2 Point-to-Point Policies
Layer 2 point-to-point policies are created using the policy editor in the ETEMS Policy tab. The
following settings are prerequisites for using this feature:
1 On the Features tab, set the Encryption Policy Setting to Layer 2:Ethernet.
2 On the Features tab, clear the Enable EncrypTight checkbox.
On the Policy tab, just a few settings are needed to configure the ETEP to encrypt traffic. The policies on
the two ETEPs must use the identical preshared key and group ID, and be assigned. opposite roles
(primary and secondary). As with any other appliance configuration setting, you have to push the policy
to the ETEPs for it to take effect.