Black Box ET1000A, ET0010A manual Managing EncrypTight Accounts, Login preferences default settings

Page 64

Managing EncrypTight Accounts

Table 15

Login preferences default settings

 

 

 

 

 

Preference

 

 

Setting

User ID / Password Authentication

 

Enabled

Password Expiration

 

0

Login Session Inactivity Timer

 

0

Common Access Card Authentication

 

Disabled

U.S. DoD Login Banner

 

Disabled

 

 

 

 

Although the Login preferences are not saved, user data is preserved through an upgrade (user ID and password). If user authentication was disabled prior to the upgrade, it will be enabled in the new software version. You will be required to enter a user ID and password when starting EncrypTight after the upgrade. Take one of the following actions to avoid being locked out of the application after upgrading to a new version of EncrypTight.

Make sure that you know a valid EncrypTight administrator user name and password prior to upgrading.

Delete all users prior to upgrading. The default user ID and password of admin/admin will remain as a valid account after all other users are deleted.

You can see existing accounts in the User Accounts editor (Edit > User Accounts). If you have any doubts about how to log in to an existing account, reset the administrator password.

Related topics:

“Managing EncrypTight Accounts” on page 65

“Changing an EncrypTight User Password” on page 66

“Using a Common Access Card” on page 294

Managing EncrypTight Accounts

The EncrypTight administrator can manage user accounts as follows:

Create new EncrypTight users

Modify EncrypTight user names and passwords

Delete EncrypTight user accounts

Table 16 EncrypTight user name and password conventions

Parameter

User Name

Password

Length

1-32 characters

1-256 characters

Case sensitive

Yes

Yes

Invalid characters

< > & “

< > & “

Spaces allowed

Yes

Yes

Must be unique

Yes

No

Other conventions

N/A

N/A

 

 

 

EncrypTight User Guide

65

Image 64
Contents EncrypTight User Guide Table of Contents Managing EncrypTight Users Getting Started with Etems Provisioning AppliancesManaging Appliances 117 Managing Key Management Systems Managing IP NetworksManaging Network Sets Creating Vlan ID Ranges for Layer 2 NetworksPolicy Design Examples 211 Using Enhanced Security Features Modifying the Etkms Properties FileEtep Configuration 299 302 Index 343 Preface About This DocumentContacting Black Box Technical Support Part I EncrypTight Installation and Maintenance EncrypTight User Guide EncrypTight Overview Distributed Key TopologiesNetwork topologies Topology DescriptionLayer 3 IP topologies Layer 2 Ethernet topologiesEncrypTight Elements Related topicsPolicy Manager EncrypTight Element Management SystemKey Management System Policy Enforcement Point Single Etkms for multiple sitesPoint-to-Point Negotiated Topology Shared keysSecurity within EncrypTight Layer 2 Point-to-Point DeploymentSecure Communications Between Devices Secure Key Storage within the EtkmsEncrypTight Deployment Planning EncrypTight Component ConnectionsManagement Station Connections Etpm to Etkms ConnectionsEtpm and Etkms on Different Subnetworks Etpm and Etkms on the Same SubnetworkEtpm and Etkms in Layer 3 IP Policies Out-of-band Etkms management in an Ethernet network Connections for Backup ETKMSs External Etkms to Etkms ConnectionsConnecting Multiple ETKMSs in an IP Network Etkms to Etkms Connections in Ethernet NetworksEtkms to PEP Connections Etkms to PEP Connections in IP NetworksEtkms to PEP Connections in Ethernet Networks In-line Etkms to PEP communications in IP networksNetwork Clock Synchronization IPv6 Address SupportIPv6 address representations Certificate SupportAddress Format Address Representation Network Addressing Options Network Addressing for IP NetworksAddressing Method Description Related topics Installation and Configuration Before You StartHardware Requirements Software RequirementsEncrypTight management station requirements Third party management station softwareEncrypTight Software Installation Installing EncrypTight Software for the First TimeTo install the EncrypTight software Firewall PortsUninstalling EncrypTight Software To uninstall EncrypTightUpgrading to a New Version of EncrypTight Starting EncrypTightManagement Station Configuration Exiting EncrypTightTo start Etems Related topicTo enable the Microsoft FTP Server service Securing the Management InterfaceEnabling the Microsoft FTP Server Etems communications optionsInstalling ETKMSs Configuring ETKMSsConfiguring the Syslog Server Etkms server connectionsAbout Local ETKMSs Basic Configuration for Local ETKMSsAdding a Local Etkms Launching and Stopping a Local Etkms Starting the Local Etkms AutomaticallyTo add a local Etkms To launch a local EtkmsConfiguring External ETKMSs Prior to configuring the batch file do the followingTo configure the batch file Maintaining the start.bat fileChanging the Admin Password To change the admin passwordLogging Into the Etkms To log into the EtkmsChanging the Root Password To change the root passwordConfigure the Network Connection To configure the network connection and hostnameStatic IP Netmask Default Gateway IP address IPv4To configure the network interface To set the hostname and IPv6 default gateway addressTo set the default DNS server and configure the hosts file IPv6To set up time synchronization Configure Time and Date PropertiesTo set the time zone Ntpq -p command output To restart the NTP daemonTo check the time source connection status Field DescriptionStarting and Stopping the Etkms Service Check the Status of the Hardware Security ModuleConfiguring Syslog Reporting on the ETKMSs To check the status of the Etkms serviceTo configure syslog reporting on a Etkms Checking the Status of the EtkmsPolicy Enforcement Point Configuration Default User Accounts and Passwords Passwords to changeManaging Licenses Etep Throughput SpeedsInstalling Licenses To install a license on the EtepTo enter EncrypTight licenses Choose Tools Put LicenseNext Steps Upgrading LicensesUpgrading the EncrypTight License Upgrading Etep LicensesNext Steps Installation and Configuration EncrypTight User Guide Managing EncrypTight Users Working with EncrypTight User AccountsTask Administrator User Configuring EncrypTight User AuthenticationEncrypTight account types and privileges Login Session Inactivity Timer Password Authentication and ExpirationCommon Access Card Authentication DoD Login Banner Login preferences default settings EncrypTight user name and password conventionsPreference Setting Parameter User Name PasswordChanging an EncrypTight User Password To change a passwordTo add an EncrypTight user account To modify an EncrypTight user accountExample 1 Default EncrypTight user and default Etep user Example 2 Setting up new EncrypTight and Etep usersHow EncrypTight Users Work with Etep Users Relationship between EncrypTight users and Etep usersExample 3 Adding a new Etep user to EncrypTight Working with the EncrypTight Workspace Maintenance TasksAbout the EncrypTight Workspace To save a workspace to a new location Saving a Workspace to a New LocationOn the File menu, click Save Workspace To Loading an Existing Workspace To load an existing workspaceMoving a Workspace to a New PC Deleting a WorkspaceTo move a workspace to a new PC To delete a workspaceInstalling Software Updates Schedule the UpgradePrepare Etpm Status and Renew Keys Upgrade the EncrypTight SoftwareVerify Etkms Status and Deploy Policies Upgrade PEP Software To deploy policiesOn the Tools menu, click Upgrade Software To upgrade software on the PEPsFTP server site information for appliance software upgrades Click Edit Multiple Configurations Software Version Change the PEP Software Version and Check StatusTo change the software version of the PEPs To check the status of the PEPsUpgrading External ETKMSs Return Status Refresh and Key Renewal to Original SettingsTo stop and remove the current Etkms software To install the new Etkms software To configure the new Etkms softwareTo mount the Cdrom drive To start the Etkms softwareMaintenance Tasks EncrypTight User Guide Part II Working with Appliances using EtemsEncrypTight User Guide Getting Started with Etems Defining Appliance ConfigurationsEtems Quick Tour Pushing Configurations to Appliances Interface configuration for a new ET1000A applianceComparing Configurations Upgrading Appliance SoftwareMaintenance and Troubleshooting Understanding the Etems Workbench Policy and Certificate SupportAppliance Manager perspective Views EditorsToolbars PerspectivesTo open a perspective Etems toolbarAppliance Manager toolbar Status IndicatorsCertificate Manager toolbar Appliance status indicators Status Indicator DescriptionUnderstanding Roles EncrypTight User TypesFunction Administrator Ops Modifying Communication PreferencesAppliance roles for ETEPs To change communication preferencesGeneral communication preferences Strict authentication communication preferencesPreference Description Ignore CRL access Enable CertificateCRL File Location Policy ExtensionsProvisioning Appliances Provisioning BasicsAdding a New Appliance New Appliance editor for the ET1000A To add a new applianceSaving an Appliance Configuration Saving appliance configurationsTo push Etems configurations to appliances On the Tools menu, click Put ConfigurationsViewing Appliance Status Put configuration statusResult Description To configure automatic status checking Appliances viewEtems Filtering Appliances Based on Address To apply a filter to the appliances in the Appliances viewRebooting Appliances To reboot appliancesAppliance User Management Etep User RolesConfiguring the Password Enforcement Policy Default user names and passwords on the EtepRole Default user name Default password Appliance roles for ETEPs v 1.4 and laterStrong Password Policy Conventions Default Password Policy ConventionsUser Name Conventions Removing ETEPs From Service Upgrading SoftwareManaging Appliance Users Adding Etep UsersTo add a user to the Etep On the Tools menu, click Appliance User Add UserPassword policy values Default password Strong password Parameter PolicyModifying Etep User Credentials Deleting Etep UsersTo modify Etep user credentials On the Tools menu, click Appliance User Modify UserTo delete a user from the Etep Viewing Etep UsersOn the Tools menu, click Appliance User Delete User Working with Default Configurations Customizing the Default ConfigurationTo customize the default configuration On the Edit menu, click Default ConfigurationRestoring the Etems Default Configurations To return the default values to factory settingsOn the Edit menu, click Default Configurations Provisioning Large Numbers of AppliancesCreating a Configuration Template Importing Configurations from a CSV FileTo import appliance configurations to Etems Attribute DescriptionImporting Remote and Local Interface Addresses Remote and local keywords and attributesChanging Configuration Import Preferences Shutting Down Appliances Checking the Time on New AppliancesShutdown operational codes To shut down the EtepEditing Configurations Managing AppliancesChanging the Address on the Appliance Changing the Management IP AddressTo change the management IP address on the appliance Changing the Address in Etems Change Management IP window Related topicsChanging the Date and Time Operation failed message in response to management IP changeChanging Settings on a Single Appliance Changing Settings on Multiple AppliancesTo edit the configuration of a single appliance To change the date and timeTo update an appliance setting on multiple appliances Deleting AppliancesConnecting Directly to an Appliance Connecting to the Command Line InterfaceUpgrading Appliance Software To delete appliances124 EncrypTight User Guide To upgrade software 126 EncrypTight User Guide Restoring the Backup File System Canceling an UpgradeWhat to do if an Upgrade is Interrupted Checking Upgrade StatusTo restore the appliance file system from a backup copy Part III Using Etpm to Create Distributed Key Policies 130 EncrypTight User Guide Getting Started with Etpm Opening EtpmAbout the Etpm User Interface To open EtpmEtpm perspective EncrypTight Components View Component ChapterEditors Etpm Status Indicators Status indicatorsPolicy View To edit an element from the policy viewSorting and Using Drag and Drop To enable or disable automatic status checking Etpm ToolbarEtpm Status Refresh Interval Etpm toolbarIP Policies About Etpm PoliciesEthernet Policies Policy Generation and Distribution Policy generation and distributionKey generation with one Etkms Creating a Policy An Overview Key generation with multiple ETKMSsNetwork a Network BNetwork Set a Network Set BTo create a policy 144 EncrypTight User Guide EncrypTight User Guide 145 146 EncrypTight User Guide Managing Policy Enforcement Points Provisioning PEPsConfiguration Description EncrypTight PEP configurationAdding a New PEP in Etems On the Features tab, select Enable passing TLS traffic On the Advanced tab, select Enable Sntp ClientTo add a new PEP using Etpm Adding a New PEP Using EtpmAdding Large Numbers of PEPs Pushing the Configuration To push Etems configurations to PEPsTo edit a PEP’s configuration Editing PEPsTo change the NTP settings for multiple PEPs Select Edit Multiple Configurations Sntp ClientEditing Multiple PEPs Editing PEPs From EtpmDeleting PEPs Changing the IP Address of a PEPChanging the PEP from Layer 3 to Layer 2 Encryption To change the IP address of a PEPTo delete PEPs Managing Key Management Systems Etkms connectionsAdding ETKMSs To add an EtkmsEditing ETKMSs Deleting ETKMSsEtkms entries To edit an existing EtkmsTo delete an existing Etkms Managing IP Networks Adding NetworksTo add a network Network entriesNetwork IP Address Network MaskAdvanced Uses for Networks in Policies Grouping Networks into SupernetsUsing Non-contiguous Network Masks Networks definitions IP Address Network MaskDeleting Networks Editing NetworksTo edit an existing network To delete a network Managing IP Networks 166 EncrypTight User Guide Managing Network Sets Network SetsIP address Mask 40.32.21.0 255.255.255.0 Types of Network SetsIP address Mask 40.55.11.0 255.255.255.0 Network set for a collection of networks IP address MaskTo add a Network Set Adding a Network SetNetwork Set fields Key Management SystemNetwork Addressing ModeImporting Networks and Network Sets Network Set editorNetworks and network sets import document format in Excel Editing a Network Set Deleting a Network SetTo import networks and network sets into Etpm To edit a Network SetTo delete an existing network set Managing Network Sets 176 EncrypTight User Guide Adding a Vlan ID Range Creating Vlan ID Ranges for Layer 2 NetworksTo add a new Vlan ID Range Lower Vlan ID Vlan ID range entriesUpper Vlan ID Editing a Vlan ID Range Deleting a Vlan ID RangeTo edit a Vlan ID range To delete an existing Vlan ID range180 EncrypTight User Guide Creating Distributed Key Policies Policy ConceptsPolicy Priority Schedule for Renewing Keys and Refreshing Policy LifetimeEncapsulation Policy Types and Encryption MethodsLayer 2 Ethernet payload encryption Aria Encryption Encryption and Authentication AlgorithmsTo use Aria in an encryption policy, do the following Using Encrypt All Policies with Exceptions Addressing ModeKey Generation and ETKMSs Encrypt all policy with exceptions Policy Size and Etep Operational LimitsPolicy Policy Type Priority Action Protocol Covered Minimizing Policy Size Adding Layer 2 Ethernet Policies To add a new Layer 2 mesh policyLayer 2 Mesh policy entries Layer 2 Mesh policy editor Adding Layer 3 IP Policies Adding a Hub and Spoke PolicyTo add a new hub and spoke policy Hub and spoke policy entriesIPSec AddressingMinimize Policy SizeHub and spoke policy editor Adding a Mesh Policy To add a new mesh policyMesh policy entries Specifies a method for reducing the policy size Mesh policy editor Adding a Multicast Policy Multicast network exampleTo add a multicast policy Multicast policy entriesMulticast NetworkMulticast policy editor Adding a Point-to-point Policy To add a point-to-point policyPoint-to-point policy entries Point a Network SetPoint a Ports Point BAdding Layer 4 Policies Point-to-point policy editorVerifying Policy Rules Before Deployment Policy DeploymentTo create a new Layer 4 policy Setting Deployment Confirmation Preferences To enable or disable the deployment warningDeploying Policies To verify policiesEditing a Policy Deleting PoliciesTo edit an existing policy Editing policiesTo delete all policies To delete an existing policySelect Tools Clear Policies Policy Design Examples Basic Layer 2 Point-to-Point Policy ExampleSetting PEP Layer 2 Ethernet Policy Using Vlan IDsPoint-to-point Layer 2 encryption policy Policy 2 Partner and Partner Portal Server Policy 3 Discard All OtherComplex Layer 3 Policy Example Encrypt Traffic Between Regional CentersNetwork sets for mesh policy Encrypt Traffic Between Regional Centers and BranchesEncrypt all mesh policy Network sets for the hub and spoke policies Region a hub and spoke policyRegion B hub and spoke policy Region C hub and spoke policyRegion D hub and spoke policy FieldPassing Routing Protocols Pass protocol 88 in the clear mesh policyEncrypTight User Guide 219 Policy Design Examples 220 EncrypTight User Guide Part IV Troubleshooting 222 EncrypTight User Guide Etems Troubleshooting Possible Problems and SolutionsSymptom Explanation and possible solutions Config to ApplianceAppliance Unreachable PreferencesAppliance Configuration Disable-trusted-hosts CLI commandAppliance Tools Reboot Pushing ConfigurationsCompare Config to Appliance . Do one of the following Software Upgrades About upgrades show system-log and show upgrade StatusPinging the Management Port To ping the management portTools preferences To change the default ping tool Retrieving Appliance Log FilesOn the Tools menu, click Retrieve Appliance Logs To retrieve log files from an applianceFTP server site information for log retrieval Viewing Diagnostic Data Viewing StatisticsEtep Statistics Statistic DescriptionViewing Port and Discard Status Exporting SAD and SPD FilesCLI Diagnostic Commands To access the appliance CLIViewing the Application Log from within EncrypTight Working with the Application LogTo view the log information Sending Application Log Events to a Syslog Server Setting Log FiltersExporting the Application Log Log File Actions Other Application Log ActionsIcon Description Learning About Problems Etpm and Etkms TroubleshootingMonitoring Status Symptoms and Solutions Etpm status problems and solutionsPolicy Errors Etep PEPs, see the EncrypTight User GuideStatus Errors Renew Key ErrorsEtpm Log Files Viewing Log FilesEtkms Log Files Etkms Troubleshooting Tools Linux CommandsCommand Description Etkms Server OperationPEP Troubleshooting Tools Resetting the Admin PasswordOptimizing Time Synchronization Shutting Down or Restarting an External EtkmsTo disable the Sntp client on multiple PEPs StatisticsEtep PEP Policy and Key Information To view statisticsTroubleshooting Policies Replacing Licensed ETEPsChecking Traffic and Encryption Statistics To export SAD or SPD files from Etep PEPsPlacing PEPs in Bypass Mode Solving Policy ProblemsViewing Policies on a PEP Allowing Local Site Exceptions to Distributed Key Policies Expired PoliciesSolving Network Connectivity Problems Cannot Add a Network Set to a PolicyModifying EncrypTight Timing Parameters Certificate Implementation ErrorsCannot Communicate with PEP Invalid Certificate Error Etkms Boot ErrorInvalid Parameter in Function Call To disable strict authentication on ETEPs Enter strict-client-authentication disableEtpm and Etkms Troubleshooting 252 EncrypTight User Guide Part V Reference 254 EncrypTight User Guide Modifying the Etkms Properties File About the Etkms Properties FileDigital Certificate Configuration Hardware Security Module ConfigurationLogging Setup Base Directory for Storing Operational State Data Peer Etkms and Etpm Communications TimingPolicy Refresh Timing PEP Communications TimingPEP Communications Timing Page Using Enhanced Security Features About Enhanced Security FeaturesAbout Strict Authentication Prerequisites for Using Certificates with EncrypTight How to ReferencePrerequisites Order of OperationsCertificate Information Setting DescriptionDistinguished name information Using Certificates in an EncrypTight System Usage, you type this string as followsChanging the Keystore Password Changing the EncrypTight Keystore PasswordChanging the Etkms Keystore Password To change the EncrypTight keystore passwordChanging the Keystore Password on a Etkms Changing the Keystore Password on a Etkms with an HSM Changing the Password Used in the Etkms Properties FileTo change the password listed in the Etkms properties file Restart the Etkms Service To start the Etkms serviceTo configure the certificate policies extension for ETEPs Configuring the Certificate Policies ExtensionClick Enable Policy Extensions To configure certificate policy extensions for ETKMSs Click Enable Certificate Policy ExtensionsEtkms Certificate Policies Entries Parameter DescriptionEncrypTight User Guide 271 Working with Certificates for EncrypTight and the ETKMSs Generating a Key PairKeytool genkeypair Command Requesting a CertificateTo generate a key pair To create the certificate requestTo install a CA certificate Importing a CA CertificateImporting a CA Certificate Reply Keytool Parameters for Importing a CA CertificateWorking with Certificates and an HSM Configuring the HSM for KeytoolExporting a Certificate Importing CA Certificates into the HSM Generating a Key Pair for use with the HSMGenerating a Certificate Signing Request for the HSM Working with Certificates for the ETEPsImporting Signed Certificates into the HSM Understanding the Certificate Manager Perspective To start the Certificate Manager do one of the followingWorking with External Certificates Certificate Manager WorkflowObtaining External Certificates To install an external certificate Installing an External CertificateTo obtain a CA certificate from a CA Working with Certificate Requests Requesting a Certificate282 EncrypTight User Guide Installing a Signed Certificate Viewing a Pending Certificate RequestCertificate usage To view a pending certificate signing requestCanceling a Pending Certificate Request Setting Certificate Request PreferencesTo cancel a pending certificate request To set certificate request preferencesManaging Installed Certificates Certificate request preference fieldsViewing a Certificate To export an installed certificateExporting a Certificate Validating Certificates Using CRLs Validating CertificatesDeleting a Certificate To delete an external certificateConfiguring CRL Usage in EncrypTight and the ETKMSs Configuring CRL Usage on ETEPsTo use CRLs with the EncrypTight software To use CRLs with the EtkmsValidating Certificates Using Ocsp To install a CRL on the EtepHandling Revocation Check Failures To view CRLsTo set up Ocsp in EncrypTight Click Enable Online Certificate Status Protocol OcspEncrypTight Ocsp Options Options DescriptionTo set up Ocsp in the Etkms To set up Ocsp on the ETEPsClick Enable Ocsp Ocsp SettingsEnabling and Disabling Strict Authentication To enable strict authentication in the EncrypTight softwareTo enable strict authentication on the Etkms To enable strict authentication on PEPsTo disable strict authentication Clear the Enable Strict Client Authentication boxTo disable strict authentication from the command line Removing CertificatesTo remove certificates Using a Common Access CardSelect Tools Clear Certificates Enabling Common Access Card Authentication Configuring User Accounts for Use With Common Access CardsTo add common names to the Etkms To enable CAC Authentication on the Etep Click XML-RPC Certificate AuthenticationTo enable CAC Authentication on the Etkms To enable CAC Authentication in EncrypTightTo specify how to handle common name failures Handling Common Name Lookup FailuresUsing Enhanced Security Features 298 EncrypTight User Guide Etep Configuration Product Family and Software Version Identifying an ApplianceAppliance Name To configure appliance interfaces Interface ConfigurationThroughput Speed ET0100A interfaces configuration Related topics Management Port AddressingIPv4 Addressing IPv4 management port addressingIPv6 Addressing IPv6 management port addressingAuto-negotiation All Ports Link speeds on the management portTransparent Mode Remote and Local Port SettingsLink speeds on the local and remote ports Policy Type Mode of operation When to use transparent modeLocal and Remote Port IP Addresses Default Gateway Transmitter EnableIP Address and Subnet Mask Transmitter Enable settings on the Etep Dhcp Relay IP AddressReassembly Mode Ignore DF Bit settingsReassembly mode settings Ignore DF BitTrusted Hosts Trusted host listInbound trusted host protocols used by EncrypTight To add a trusted hostProtocol Outbound host Appliance Editor TabSnmp Configuration System InformationCommunity Strings Snmp system informationTo define a community name Under Community Strings, click AddTraps reported on the Etep TrapsTrap Description SNMPv2 Trap Hosts To configure a trap hostSNMPv3 SNMPv3 Configuration Related topics Retrieving and Exporting Engine IDs Generating the Engine IDTo retrieve engine IDs Configuring the SNMPv3 Trap Host Users Viewing SNMPv3 Engine IDs Related topicsSNMPv3 Trap Host configuration To configure a trap host user SNMPv3 trap host usersLogging Configuration Etep Logging tabLog facilities Log Event SettingsFacility Description Defining Syslog Servers Log prioritiesTo define a syslog server Under Syslog Servers, click AddLog File Management Log file sizesLog name File size Internals logsAdvanced Configuration Log files extracted from the Etep Related topicsPath Maximum Transmission Unit Valid Pmtu ranges on Etep appliancesPmtu and fragmentation behavior on the Etep Packet Payload Size Layer 2 Etep Layer 3 EtepCLI Inactivity Timer Password Strength PolicyNon IP traffic handling configuration Non IP Traffic HandlingXML-RPC Certificate Authentication SSH Access to the Etep Sntp Client SettingsTo configure the NTP client IKE Vlan TagsFeatures Configuration Ocsp SettingsCertificate Policy Extensions IKE Vlan TagsFips Mode Enabling Fips ModeFips approved encryption and authentication algorithms Encryption algorithms Authentication algorithmsPolicy Type Action upon entering Fips mode Disabling FipsVerifying Fips Status on the Etep Operational NotesEncrypTight settings EncrypTight SettingsSetting Definition Encryption policy settings Encryption Policy SettingsWorking with Policies Creating Layer 2 Point-to-Point Policies Using EncrypTight Distributed Key PoliciesTo launch Etpm from Etems Etep Policy tab Using Group IDs Using Preshared Keys for IKE AuthenticationSelecting a Role Selecting the Traffic Handling Mode How the Etep Encrypts and Authenticates TrafficIKE Phase 2 Parameters Parameter ValueFactory Defaults Interfaces defaultsInterfaces Default Setting InterfacesSnmp defaults Trusted hosts defaultsTrusted Hosts Policy LoggingAdvanced Features Hard-coded SettingsFeatures defaults Features Default SettingIndex NumericsIndex EncrypTight User Guide 345 Etpm See also HSM Https TLS 348 EncrypTight User Guide EncrypTight User Guide 349 350 EncrypTight User Guide See also TLS trap configuration 352 EncrypTight User Guide Black Box Tech Support FREE! Live /7
Related manuals
Manual 48 pages 53.09 Kb Manual 88 pages 24.35 Kb

EncrypTight, ET0100A, ET0010A, ET1000A specifications

The Black Box ET1000A, ET0010A, EncrypTight, and ET0100A are advanced solutions designed for secure data transmission and network management, catering to modern enterprise needs. These tools integrate cutting-edge technologies to enhance connectivity, security, and efficiency within various environments.

The Black Box ET1000A is primarily a high-performance Ethernet over Twisted Pair (EoTP) solution. It enables users to extend Ethernet signals over long distances using existing twisted-pair cabling without sacrificing speed or reliability. With support for speeds up to 100 Mbps, this device is ideal for organizations looking to upgrade their existing infrastructure without extensive rewiring. Key features include plug-and-play installation, which simplifies deployment, and versatile compatibility with both legacy and modern ethernet networks.

The ET0010A model takes connectivity a step further by providing seamless integration with fiber optics. This device supports transmission distances that far exceed traditional copper solutions, making it a perfect fit for larger facilities or multi-building campuses. Its built-in Ethernet switch enhances network efficiency by providing multiple ports for device connectivity, thus facilitating greater data flow.

EncrypTight technology is a notable feature across these Black Box models, offering advanced encryption capabilities to safeguard sensitive data during transmission. With military-grade encryption protocols, EncrypTight ensures that corporate information remains secure from potential eavesdroppers. This technology is essential for businesses operating in regulated industries or that handle confidential customer information.

The ET0100A model combines intelligence with monitoring features to provide users with comprehensive network insights. It boasts built-in diagnostic tools that enable IT professionals to troubleshoot issues quickly and efficiently. Additionally, it features real-time performance monitoring, allowing users to analyze bandwidth usage and optimize network performance accordingly.

In conclusion, the Black Box ET1000A, ET0010A, EncrypTight, and ET0100A are powerful tools that embody the latest in data transmission and network management technologies. With their unique features—including extended connectivity capabilities, robust encryption technologies, and real-time monitoring solutions—these devices cater to the growing demands of businesses seeking to enhance their network infrastructure while ensuring robust security and efficiency. Integrating these tools into any organization’s operations can fundamentally improve both performance and data protection, making them indispensable in today’s digital landscape.