Black Box ET1000A Appliance Trim Kit User Manual


 
Table of Contents
EncrypTight User Guide 9
ETKMS Log Files ..................................................................................................................241
PEP Log Files .......................................................................................................................242
ETKMS Troubleshooting Tools ..........................................................................................................242
ETKMS Server Operation............................................................................................................242
Optimizing Time Synchronization ................................................................................................243
Shutting Down or Restarting an External ETKMS .......................................................................243
Resetting the Admin Password ...................................................................................................243
PEP Troubleshooting Tools ...............................................................................................................243
Statistics ......................................................................................................................................244
Changing the Date and Time.......................................................................................................244
ETEP PEP Policy and Key Information .......................................................................................244
Replacing Licensed ETEPs .........................................................................................................245
Troubleshooting Policies....................................................................................................................245
Checking Traffic and Encryption Statistics ..................................................................................245
Solving Policy Problems ..............................................................................................................246
Viewing Policies on a PEP....................................................................................................246
Placing PEPs in Bypass Mode..............................................................................................246
Allowing Local Site Exceptions to Distributed Key Policies...................................................247
Expired Policies.....................................................................................................................247
Cannot Add a Network Set to a Policy..................................................................................248
Packet Fragments are Discarded in Point-to-Point Port-based Policies ...............................248
Solving Network Connectivity Problems ............................................................................................248
Modifying EncrypTight Timing Parameters ........................................................................................249
Certificate Implementation Errors.......................................................................................................249
Cannot Communicate with PEP ..................................................................................................249
ETKMS Boot Error.......................................................................................................................250
Invalid Certificate Error ................................................................................................................250
Invalid Parameter in Function Call...............................................................................................250
Part V: Reference
Chapter 19: Modifying the ETKMS Properties File .............................................................. 255
About the ETKMS Properties File ......................................................................................................255
Hardware Security Module Configuration ..........................................................................................256
Digital Certificate Configuration..........................................................................................................256
Logging Setup....................................................................................................................................256
Base Directory for Storing Operational State Data ............................................................................257
Peer ETKMS and ETPM Communications Timing.............................................................................257
Policy Refresh Timing ........................................................................................................................258
PEP Communications Timing ............................................................................................................258
Chapter 20: Using Enhanced Security Features.................................................................. 261
About Enhanced Security Features ...................................................................................................261
About Strict Authentication.................................................................................................................262
Prerequisites................................................................................................................................263
Order of Operations.....................................................................................................................263
Certificate Information .................................................................................................................264
Using Certificates in an EncrypTight System.....................................................................................265
Changing the Keystore Password......................................................................................................266