Black Box ET1000A Appliance Trim Kit User Manual


 
Table of Contents
EncrypTight User Guide 7
Editing PEPs ......................................................................................................................................151
Editing PEPs From ETEMS.........................................................................................................151
Editing Multiple PEPs ..................................................................................................................152
Editing PEPs From ETPM ...........................................................................................................152
Changing the IP Address of a PEP .............................................................................................153
Changing the PEP from Layer 3 to Layer 2 Encryption...............................................................153
Deleting PEPs....................................................................................................................................153
Chapter 11: Managing Key Management Systems .............................................................. 155
Adding ETKMSs.................................................................................................................................156
Editing ETKMSs.................................................................................................................................157
Deleting ETKMSs...............................................................................................................................157
Chapter 12: Managing IP Networks....................................................................................... 159
Adding Networks................................................................................................................................159
Advanced Uses for Networks in Policies............................................................................................161
Grouping Networks into Supernets..............................................................................................161
Using Non-contiguous Network Masks........................................................................................162
Editing Networks ................................................................................................................................164
Deleting Networks..............................................................................................................................164
Chapter 13: Managing Network Sets..................................................................................... 167
Types of Network Sets.......................................................................................................................168
Adding a Network Set ........................................................................................................................170
Importing Networks and Network Sets...............................................................................................172
Editing a Network Set.........................................................................................................................174
Deleting a Network Set ......................................................................................................................174
Chapter 14: Creating VLAN ID Ranges for Layer 2 Networks............................................. 177
Adding a VLAN ID Range ..................................................................................................................177
Editing a VLAN ID Range...................................................................................................................179
Deleting a VLAN ID Range ................................................................................................................179
Chapter 15: Creating Distributed Key Policies .................................................................... 181
Policy Concepts .................................................................................................................................181
Policy Priority...............................................................................................................................182
Schedule for Renewing Keys and Refreshing Policy Lifetime.....................................................182
Policy Types and Encryption Methods ........................................................................................183
Encapsulation........................................................................................................................183
Encryption and Authentication Algorithms ............................................................................184
Key Generation and ETKMSs .....................................................................................................185
Addressing Mode.........................................................................................................................185
Using Encrypt All Policies with Exceptions..................................................................................185
Policy Size and ETEP Operational Limits....................................................................................186
Minimizing Policy Size .................................................................................................................187
Adding Layer 2 Ethernet Policies.......................................................................................................188
Adding Layer 3 IP Policies .................................................................................................................191
Adding a Hub and Spoke Policy..................................................................................................191
Adding a Mesh Policy..................................................................................................................195