
EncrypTight User Guide 13
Preface
About This Document
Purpose
The EncrypTight User Guide provides detailed information on how to install, configure, and troubleshoot
EncrypTight components: ETEMS, Policy Manager (ETPM), and Key Management System (ETKMS). It
also contains information about configuring EncrypTight Enforcement Points (ETEPs) using ETEMS.
Intended Audience
This document is intended for network managers and security administrators who are familiar with setting
up and maintaining network equipment. Some knowledge of network security issues and encryption
technologies is assumed.
Assumptions
This document assumes that its readers have an understanding of the following:
● EncrypTight encryption appliance features, installation and operation
● Basic principles of network security issues
● Basic principles of encryption technologies and terminology
● Basic principles of TCP/IP networking, including IP addressing, switching and routing
● Personal computer (PC) operation, common PC terminology, use of terminal emulation software and
FTP operations
● Basic knowledge of the Linux operating system
Conventions used in this document
Bold Indicates one of the following:
• a menu item or button
• the name of a command or parameter
Italics Indicates a new term
Monospaced Indicates machine text, such as terminal output and filenames
Monospaced bold
Indicates a command to be issued by the user