Installation

Firewall Ports

Table 10 lists the protocols that are used by the ETEPs and the EncrypTight system. Make sure that any firewalls in your system are configured to allow for the protocols that are required for your deployment: standalone ETEPs used for point-to-point encryption or ETEPs used in an EncrypTight system.

Table 10 Firewall ports

 

 

 

Standalone

Cipher-

Protocol

Port

Description

ETEPs

Engine

FTP

TCP 20,

Used for upgrading the software on the

Yes

Yes

 

21

ETEP and retrieving appliance log files.

 

 

ICMP/Ping

 

Used to check connectivity with a device.

Yes

Yes

IKE /

UDP 500

Used to establish security associations in

Yes

 

ISAKMP

 

IKE policies.

 

 

IPSec ESP

IP

Used in encryption policies.

Yes

Yes

 

protocol

 

 

 

 

50

 

 

 

SFTP

TCP 22

Used for secure FTP operations.

Yes

Yes

SNMP

UDP

Used to send SNMP traps from the ETEPs

 

Yes

 

161, 162

to a management workstation.

 

 

SNTP

UDP 123

Used for time synchronization among

 

Yes

 

 

EncrypTight components.

 

 

SSH

TCP 22

Used to securely access the CLI on ETEPs.

Yes

Yes

Syslog

UDP 514

Used to send syslog messages from the

 

Yes

 

 

ETEPs to a syslog server.

 

 

TLS

TCP 443

A secure method of communicating

 

Yes

(HTTPS)

 

management information between ETEMS

 

 

 

 

and the ETEPs.

 

 

XML-RPC

TCP 443

Used for communications between

 

Yes

 

 

EncrypTight components.

 

 

 

 

 

 

 

Installing the ET0010A

This section describes how to install ET0010A. To prepare the ET0010A for installation, review the installation steps in Table 11, unpack the shipping carton, and prepare a space for the installation of the appliance.

26

ETEP Installation Guide

Page 25
Image 25
Black Box EncrypTight Enforcement Point (ETEP) Installation Guide Installing the ET0010A, Firewall Ports, Firewall ports

EncrypTight Enforcement Point (ETEP) Installation Guide specifications

The Black Box EncrypTight Enforcement Point (ETEP) is a robust solution designed to enhance data security by ensuring that sensitive information is securely transmitted and stored. This article provides a comprehensive installation guide that highlights the main features, technologies, and characteristics of ETEP.

The EncrypTight ETEP operates by providing a secure gateway between different networks. It employs advanced encryption algorithms to safeguard data from potential threats, ensuring that unauthorized access is thwarted. A core feature of the ETEP is its ability to support a range of encryption standards, including AES, RSA, and ECC, thus allowing organizations to choose the most suitable protocols for their specific needs.

One of the standout technologies integrated within the ETEP is its end-to-end encryption capability. This ensures that data remains encrypted during transmission from the sender to the receiver, making it virtually impossible for any third-party entities to decipher the information even if they manage to intercept it.

The ETEP also boasts a user-friendly interface that simplifies installation and configuration processes. Administrators can easily set up the system without requiring extensive technical knowledge. Furthermore, the system is designed to integrate seamlessly with existing IT infrastructure, ensuring minimal disruption during deployment.

Another critical characteristic of the ETEP is its scalability. As businesses grow and evolve, the ETEP can be easily adjusted to accommodate increased data traffic and changing security requirements. This flexibility makes it an ideal solution for organizations of all sizes, from small businesses to large enterprises.

Moreover, the ETEP employs state-of-the-art threat detection and response mechanisms. It continuously monitors network activity, identifying anomalies that may indicate potential security breaches. This proactive approach ensures that organizations can respond swiftly to threats, thereby minimizing potential damage.

The installation of the Black Box EncrypTight ETEP typically involves the following steps: first, assess the current network architecture; second, select the appropriate hardware and software components; third, configure encryption settings; and finally, conduct thorough testing to ensure the system is functioning as expected.

In conclusion, the Black Box EncrypTight Enforcement Point installation is a crucial step in bolstering an organization’s data security framework. With its advanced features, reliable technologies, and user-centric design, the ETEP stands out as an essential tool for businesses looking to safeguard their sensitive information against ever-evolving cybersecurity threats.