Black Box EncrypTight Enforcement Point (ETEP) Installation Guide manual

Page 9

Product Overview

Figure 1 Multipoint Ethernet Encryption using EncrypTight

The ETEP interfaces with network equipment through two data ports, the local port and the remote port. Unencrypted traffic that originates from a trusted, local network is received on the local port, where the ETEP applies security processing to it. The encrypted traffic is then sent from the remote port to an untrusted network such as the Internet. At the opposite endpoint the process is reversed. Encrypted traffic is received on the ETEP remote port and decrypted. Then the decrypted traffic is sent from the local port to the destination.

The ETEP is managed in-line or out-of-band through a dedicated Ethernet management interface. The ETEP can be managed in two ways, depending on the size and complexity of your deployment:

Command Line Interface (CLI)

The CLI is all you need to manage a standalone deployment, typically a pair of ETEPs. CLI commands are available to perform initial setup of the ETEP, along with diagnostic and troubleshooting commands. In Layer 2 deployments, you can configure the ETEPs for operation and create Layer 2 point-to-point policies using the CLI commands.

EncrypTight Policy and Key Manager™

EncrypTight is an application for managing group encryption deployments. EncrypTight separates the functions of policy management, key generation and distribution, and policy enforcement. As a result, multiple ETEPs can use common keys. This works for complex mesh, hub and spoke, and multicast networks, as well as in straightforward point-to-point topologies. Figure 1 shows ETEPs deployed in a multipoint Ethernet network.

EncrypTight includes the following components:

EncrypTight Element Management System (ETEMS) for appliance configuration and management

EncrypTight Policy Manager (ETPM) for policy definition and deployment

EncrypTight Key Management System (ETKMS) for key generation and distribution

10

ETEP Installation Guide

Image 9
Contents EncrypTight Enforcement Point Etep Installation Guide Table of Contents Initial Setup Index Table of Contents Etep Installation Guide Contacting Black Box Technical Support About This DocumentAbout This Document Etep Installation Guide Etep Introduction Product OverviewMultipoint Ethernet Encryption using EncrypTight ET0010A Physical Description Front Panel ConnectorsIndicator Light State Indication Status IndicatorsRear Panel ET0100A Physical DescriptionET0100A Front Panel Connectors LED IndicatorsET0100A Rear Panel ET0100A Front Panel LED IndicatorsET1000A Physical Description ET1000A Front Panel ConnectorsET1000A Front Panel LED Indicators ET1000A LED IndicatorsET1000A Rear Panel Power Supply #Etep Feature Summary FeaturesCategory Feature Etep Hardware ComparisonET0010A Mechanical and Environmental Specifications SpecificationsSpecification CategoryCategory Specification ET0100A Mechanical and Environmental SpecificationsET1000A Mechanical and Environmental Specifications Installation Safety GuidelinesBefore You Start Software Requirements Third party management station softwareSoftware How it’s used Vendor Etep Site Preparation Ambient temperatureFirewall Ports Installing the ET0010AFirewall ports Standalone Cipher Protocol Port Description ETEPs EngineCabling Requirements ET0010A Installation StepsUnpacking the Shipping Carton ET0010A ET0010A Standard CablesAccessory screws and feet Installation Instructions ET0010ABottom rear view of the ET0010A, with rack mount brackets To install the Etep in a rackInstallation To install the Etep on a solid surface Front view of ET0010A mounting brackets and power supplyScrew holes for rubber feet installation on bottom of unit To cable the ET0010A Connecting the Cables ET0010AET0010A Cabling Powering On the ET0010ATo power on the Etep Installing the ET0100AET0100A Installation Steps Cabling Requirements ET0100AUnpacking the Shipping Carton ET0100A Rack-Mount Installation ET0100AET0100A Standard Cables ET0100A Port Cabling Supplied byTo cable the ET0100A Connecting the Cables ET0100ATo power on the ET0100A Powering on the ET0100AImproperly seated ET0100A power cable Installing the ET1000ACabling Requirements ET1000A ET1000A Installation StepsET1000A Standard Cables ET1000A Port Cabling Supplied byUnpacking the Shipping Carton ET1000A Rack Mount Installation ET1000ATo install the ET1000A in a rack Connecting the Cables ET1000ATo cable the ET1000A Powering on the ET1000ATo power on the ET1000A Dual power supplies on the ET1000A rear panelShutting Down the Etep Shutdown operational codesAppliance model Operational code Related topic To shut down the Etep from the CLIInitial Setup OverviewLogging In Through a Serial Link Configuring the Management Port To log in to the CLI via a serial linkAbout the management port IP address, mask and gateway Link speeds on the management port Management Port Default Gateway About auto-negotiationLink speeds on the management port To configure the management portSetting the Date and Time Management port autoneg command descriptionAttribute Description To set the date and time Entering a Throughput LicenseEtep Throughput Speeds Model Available ThroughputTo add a license from the command line Configuration ExampleManaging the Etep To view the Etep throughput speedEtep CLI User Guide EncrypTight User Guide Preventative Maintenance MaintenanceReplacing the ET1000A Power Supply Obtaining a License for Replacement UnitsTo replace a power supply in the ET1000A What To Do If an Appliance FailsPower cord is removed from power supply # Etems Tamper Switch and ZeroizationCable Pinouts To recover the Etep following zeroizationRS-232 Serial Cable ET0010A RJ-45 Pin DB-9 PinPin RS-232 Serial Cable ET0100A/ET1000ASymptoms and Solutions TroubleshootingLED Indicators Symptom Explanation and Possible SolutionError State Error State Symptoms and SolutionsSymptom Explanation and Possible Solutions Status Codes ET0010A Diagnostic Code DisplayET0010A Self-Tests ET0010A Operational CodesDiagnostic Codes ET0100A and ET1000A ET0100A/ET1000A Self-TestsET0100A/ET1000A Operational Codes Appendix a Environmental and Regulatory Information Weee DirectiveRoHS Directive ET0010A Regulatory Information Regulatory InformationEuropean Notice ET0100A Regulatory InformationET0100A Cabling ET1000A Regulatory InformationInstrucciones DE Seguridad Normas Oficiales Mexicanas NOM Electrical Safety StatementEnvironmental and Regulatory Information Index Index See also license entering Index Etep Installation Guide Black Box Tech Support FREE! Live /7

EncrypTight Enforcement Point (ETEP) Installation Guide specifications

The Black Box EncrypTight Enforcement Point (ETEP) is a robust solution designed to enhance data security by ensuring that sensitive information is securely transmitted and stored. This article provides a comprehensive installation guide that highlights the main features, technologies, and characteristics of ETEP.

The EncrypTight ETEP operates by providing a secure gateway between different networks. It employs advanced encryption algorithms to safeguard data from potential threats, ensuring that unauthorized access is thwarted. A core feature of the ETEP is its ability to support a range of encryption standards, including AES, RSA, and ECC, thus allowing organizations to choose the most suitable protocols for their specific needs.

One of the standout technologies integrated within the ETEP is its end-to-end encryption capability. This ensures that data remains encrypted during transmission from the sender to the receiver, making it virtually impossible for any third-party entities to decipher the information even if they manage to intercept it.

The ETEP also boasts a user-friendly interface that simplifies installation and configuration processes. Administrators can easily set up the system without requiring extensive technical knowledge. Furthermore, the system is designed to integrate seamlessly with existing IT infrastructure, ensuring minimal disruption during deployment.

Another critical characteristic of the ETEP is its scalability. As businesses grow and evolve, the ETEP can be easily adjusted to accommodate increased data traffic and changing security requirements. This flexibility makes it an ideal solution for organizations of all sizes, from small businesses to large enterprises.

Moreover, the ETEP employs state-of-the-art threat detection and response mechanisms. It continuously monitors network activity, identifying anomalies that may indicate potential security breaches. This proactive approach ensures that organizations can respond swiftly to threats, thereby minimizing potential damage.

The installation of the Black Box EncrypTight ETEP typically involves the following steps: first, assess the current network architecture; second, select the appropriate hardware and software components; third, configure encryption settings; and finally, conduct thorough testing to ensure the system is functioning as expected.

In conclusion, the Black Box EncrypTight Enforcement Point installation is a crucial step in bolstering an organization’s data security framework. With its advanced features, reliable technologies, and user-centric design, the ETEP stands out as an essential tool for businesses looking to safeguard their sensitive information against ever-evolving cybersecurity threats.