Black Box EncrypTight Enforcement Point (ETEP) Installation Guide manual To power on the ET1000A

Page 43

Installation

Figure 31 Dual power supplies on the ET1000A rear panel

Elements of Figure 31:

1)Power cord clips

2)Status LED for power supply 2

3)Power receptacle for power supply 2

4)Power receptacle for power supply 1

5)Status LED for power supply 1

To power on the ET1000A:

1On the appliance’s rear panel, plug the power cords into the power receptacles for each power supply.

2Attach the opposite end of the first power cord to a power source. Attach the second power cord to a a power source on a different circuit. The power supply status LED illuminates when power is applied.

3After the power cords are plugged in, secure the cords using the clips on the rear of the unit.

Figure 32 The power cord for power supply # 1 is secured with a clip

44

ETEP Installation Guide

Image 43
Contents EncrypTight Enforcement Point Etep Installation Guide Table of Contents Initial Setup Index Table of Contents Etep Installation Guide Contacting Black Box Technical Support About This DocumentAbout This Document Etep Installation Guide Etep Introduction Product OverviewMultipoint Ethernet Encryption using EncrypTight ET0010A Physical Description Front Panel ConnectorsIndicator Light State Indication Status IndicatorsRear Panel ET0100A Physical DescriptionET0100A Front Panel Connectors LED IndicatorsET0100A Rear Panel ET0100A Front Panel LED IndicatorsET1000A Physical Description ET1000A Front Panel ConnectorsET1000A Front Panel LED Indicators ET1000A LED IndicatorsET1000A Rear Panel Power Supply #Etep Hardware Comparison FeaturesEtep Feature Summary Category FeatureCategory SpecificationsET0010A Mechanical and Environmental Specifications SpecificationCategory Specification ET0100A Mechanical and Environmental SpecificationsET1000A Mechanical and Environmental Specifications Safety Guidelines InstallationBefore You Start Third party management station software Software RequirementsSoftware How it’s used Vendor Etep Site Preparation Ambient temperatureStandalone Cipher Protocol Port Description ETEPs Engine Installing the ET0010AFirewall Ports Firewall portsET0010A Standard Cables Installation StepsCabling Requirements ET0010A Unpacking the Shipping Carton ET0010AAccessory screws and feet Installation Instructions ET0010ABottom rear view of the ET0010A, with rack mount brackets To install the Etep in a rackInstallation To install the Etep on a solid surface Front view of ET0010A mounting brackets and power supplyScrew holes for rubber feet installation on bottom of unit To cable the ET0010A Connecting the Cables ET0010AET0010A Cabling Powering On the ET0010ACabling Requirements ET0100A Installing the ET0100ATo power on the Etep ET0100A Installation StepsET0100A Port Cabling Supplied by Rack-Mount Installation ET0100AUnpacking the Shipping Carton ET0100A ET0100A Standard CablesTo cable the ET0100A Connecting the Cables ET0100ATo power on the ET0100A Powering on the ET0100AImproperly seated ET0100A power cable Installing the ET1000AET1000A Port Cabling Supplied by ET1000A Installation StepsCabling Requirements ET1000A ET1000A Standard CablesUnpacking the Shipping Carton ET1000A Rack Mount Installation ET1000ATo install the ET1000A in a rack Connecting the Cables ET1000ATo cable the ET1000A Powering on the ET1000ATo power on the ET1000A Dual power supplies on the ET1000A rear panelShutdown operational codes Shutting Down the EtepAppliance model Operational code Related topic To shut down the Etep from the CLIOverview Initial SetupLogging In Through a Serial Link To log in to the CLI via a serial link Configuring the Management PortAbout the management port IP address, mask and gateway Link speeds on the management port Management Port Default Gateway About auto-negotiationLink speeds on the management port To configure the management portManagement port autoneg command description Setting the Date and TimeAttribute Description Model Available Throughput Entering a Throughput LicenseTo set the date and time Etep Throughput SpeedsTo view the Etep throughput speed Configuration ExampleTo add a license from the command line Managing the EtepEtep CLI User Guide EncrypTight User Guide Preventative Maintenance MaintenanceWhat To Do If an Appliance Fails Obtaining a License for Replacement UnitsReplacing the ET1000A Power Supply To replace a power supply in the ET1000APower cord is removed from power supply # Etems Tamper Switch and ZeroizationRJ-45 Pin DB-9 Pin To recover the Etep following zeroizationCable Pinouts RS-232 Serial Cable ET0010APin RS-232 Serial Cable ET0100A/ET1000ASymptom Explanation and Possible Solution TroubleshootingSymptoms and Solutions LED IndicatorsError State Symptoms and Solutions Error StateSymptom Explanation and Possible Solutions ET0010A Operational Codes Diagnostic Code DisplayStatus Codes ET0010A ET0010A Self-TestsET0100A/ET1000A Self-Tests Diagnostic Codes ET0100A and ET1000AET0100A/ET1000A Operational Codes Weee Directive Appendix a Environmental and Regulatory InformationRoHS Directive ET0010A Regulatory Information Regulatory InformationEuropean Notice ET0100A Regulatory InformationET0100A Cabling ET1000A Regulatory InformationInstrucciones DE Seguridad Normas Oficiales Mexicanas NOM Electrical Safety StatementEnvironmental and Regulatory Information Index Index See also license entering Index Etep Installation Guide Black Box Tech Support FREE! Live /7

EncrypTight Enforcement Point (ETEP) Installation Guide specifications

The Black Box EncrypTight Enforcement Point (ETEP) is a robust solution designed to enhance data security by ensuring that sensitive information is securely transmitted and stored. This article provides a comprehensive installation guide that highlights the main features, technologies, and characteristics of ETEP.

The EncrypTight ETEP operates by providing a secure gateway between different networks. It employs advanced encryption algorithms to safeguard data from potential threats, ensuring that unauthorized access is thwarted. A core feature of the ETEP is its ability to support a range of encryption standards, including AES, RSA, and ECC, thus allowing organizations to choose the most suitable protocols for their specific needs.

One of the standout technologies integrated within the ETEP is its end-to-end encryption capability. This ensures that data remains encrypted during transmission from the sender to the receiver, making it virtually impossible for any third-party entities to decipher the information even if they manage to intercept it.

The ETEP also boasts a user-friendly interface that simplifies installation and configuration processes. Administrators can easily set up the system without requiring extensive technical knowledge. Furthermore, the system is designed to integrate seamlessly with existing IT infrastructure, ensuring minimal disruption during deployment.

Another critical characteristic of the ETEP is its scalability. As businesses grow and evolve, the ETEP can be easily adjusted to accommodate increased data traffic and changing security requirements. This flexibility makes it an ideal solution for organizations of all sizes, from small businesses to large enterprises.

Moreover, the ETEP employs state-of-the-art threat detection and response mechanisms. It continuously monitors network activity, identifying anomalies that may indicate potential security breaches. This proactive approach ensures that organizations can respond swiftly to threats, thereby minimizing potential damage.

The installation of the Black Box EncrypTight ETEP typically involves the following steps: first, assess the current network architecture; second, select the appropriate hardware and software components; third, configure encryption settings; and finally, conduct thorough testing to ensure the system is functioning as expected.

In conclusion, the Black Box EncrypTight Enforcement Point installation is a crucial step in bolstering an organization’s data security framework. With its advanced features, reliable technologies, and user-centric design, the ETEP stands out as an essential tool for businesses looking to safeguard their sensitive information against ever-evolving cybersecurity threats.