Black Box ET0100A Appliance Trim Kit User Manual


 
EncrypTight User Guide 349
Index
NTP, 149
O
OCSP
about, 289
communication preferences, 94
enabling in EncrypTight, 290
enabling in ETEPs, 291
enabling on ETKMSs, 291
open perspective, 131
out-of-band management
ETKMS to ETKMS connections, 30
ETKMS to PEP connections, 32
ETPM to ETKMS connections, 28
P
passing TLS traffic in the clear, 149
password
changing the ETKMS admin password, 47
changing the ETKMS root password, 48
configuring the ETEP password strength
policy, 327
default password conventions on the ETEP,
104
default passwords for EncrypTight
components, 56
setting on ETEPs, 106
setting the EncrypTight password, 62
strong password conventions on the ETEP,
104
payload only encryption, 185
PEP
adding, 148
adding new PEPs and using strict
authentication, 264
configuring for EncrypTight, 55
customized default configurations, 150
deleting, 153
editing, 151
enabling the SNTP client, 149
overview, 21
pushing configurations, 151
renaming, 152
troubleshooting tools, 243–??
viewing encryption statistics, 244
working with large numbers of PEPs, 150
performance data, viewing, 230
ping
pinging the management port, 227
setting a ping tool preference, 228
PMTU configuration
ETEP, 326
point-to-point policy
distributed key, adding, 203
Layer 2 example, 211
negotiated, 335
policies
See also policy management with ETPM
EncrypTight distributed key policies
overview, 17
starting ETPM, 131
ETEP
clearing policies on the ETEP, 334
negotiated Layer 2 point-to-point policies,
335
setting L2 or L3 encryption, 334
starting ETPM, 334
traffic handling, 338
reloading, 226
policy and key information
ETEP PEPs, 244
policy constraint extension, 271
policy editor
starting ETPM, 335
Policy Enforcement Point, see PEP
policy management with ETPM
allowing local site exETEPtions, 247
conETEPts, 181
deleting a policy, 209
deploying policies, 207
editing policies, 209
encapsulation method, 183
encrypt all policy with exETEPtions, creating,
185
encryption algorithms, 184
encryption methods, 183
Ethernet policies, adding, 188
hub and spoke policy, adding, 191
Layer 2 Ethernet policies, overview, 138
Layer 3 IP policies, overview, 138
Layer 4 payload encryption, 185
Layer 4 policy, creating, 206
lifetime, defining, 182
mesh policy, adding, 195
minimizing policy size, 187
multicast policy, adding, 199
point to point policy, adding, 203
policy design examples, 214
policy generation and distribution, 139
policy view, 135
priority, setting, 182
rekey interval, defining, 182
scheduling rekey interval and policy lifetime
refresh, 182
troubleshooting, 239, 245–248
Policy Manager