Black Box ET0010A Appliance Trim Kit User Manual


 
EncrypTight User Guide 37
3 Installation and Configuration
This section describes how to install and configure EncrypTight for the first time, including:
Before You Start
EncrypTight Software Installation
Management Station Configuration
Installing ETKMSs
Configuring ETKMSs
Policy Enforcement Point Configuration
Default User Accounts and Passwords
Managing Licenses
Next Steps
Before You Start
EncrypTight is a system that uses dedicated encryption devices referred to as Policy Enforcement Points
(PEPs), a central server for distributing encryption keys (the Key Management System, or ETKMS), and
a workstation running the management software.
Install the EncrypTight software on a secure workstation.
Install the ETKMS in a physically secure location and connect it to the network so that it can
communicate with the management workstation and the PEPs.
Install and configure the PEPs, usually at the point in your network where traffic is being sent to or
from an untrusted network.
The EncrypTight software (version 1.9 and later) and the throughput speed of ETEPs with software
version 1.6 and later are controlled by licenses. You must install a license for the EncrypTight software,
and a license on each ETEP in your deployment. For more information, see “Managing Licenses” on
page 56.
This chapter provides instructions for these tasks. If you plan on using enhanced security options such as
certificates, please refer to “Using Enhanced Security Features” on page 261 for additional configuration
instructions.
Before you install EncrypTight, review the following topics:
“Hardware Requirements” on page 38