EncrypTight User Guide 37
3 Installation and Configuration
This section describes how to install and configure EncrypTight for the first time, including:
● Before You Start
● EncrypTight Software Installation
● Management Station Configuration
● Installing ETKMSs
● Configuring ETKMSs
● Policy Enforcement Point Configuration
● Default User Accounts and Passwords
● Managing Licenses
● Next Steps
Before You Start
EncrypTight is a system that uses dedicated encryption devices referred to as Policy Enforcement Points
(PEPs), a central server for distributing encryption keys (the Key Management System, or ETKMS), and
a workstation running the management software.
● Install the EncrypTight software on a secure workstation.
● Install the ETKMS in a physically secure location and connect it to the network so that it can
communicate with the management workstation and the PEPs.
● Install and configure the PEPs, usually at the point in your network where traffic is being sent to or
from an untrusted network.
The EncrypTight software (version 1.9 and later) and the throughput speed of ETEPs with software
version 1.6 and later are controlled by licenses. You must install a license for the EncrypTight software,
and a license on each ETEP in your deployment. For more information, see “Managing Licenses” on
page 56.
This chapter provides instructions for these tasks. If you plan on using enhanced security options such as
certificates, please refer to “Using Enhanced Security Features” on page 261 for additional configuration
instructions.
Before you install EncrypTight, review the following topics:
● “Hardware Requirements” on page 38