Installation

connector type required for the other end of the cable. Some cables are supplied by Black Box and others are user-supplied.

Table 14 ET0100A Standard Cables

ET0100A Port

Cabling

Supplied by...

Power receptacle

Power supply cable certified

Black Box

 

and approved for use in the

 

 

country of interest

 

RS-232 Port

Shielded copper null modem

Black Box

 

cable, RS-232 DB9 connector

 

 

(female to male)

 

10/100 Ethernet Management

Shielded Category 5 straight

Black Box

Port

through cable (STP), RJ-45

 

 

connectora

 

Remote and Local ports

Shielded Category 5 straight

User

 

through cables (STP), RJ-45

 

 

connectora

 

a.The local, remote, and Ethernet management ports are auto-sensing for polarity. You can use shielded Category 5 straight through cables or crossover cables when connecting to these ports.

NOTE

To meet the requirements of FCC Part 15 and the EU EMC Directive 2004/108/EC, use only shielded cables with the ET0100A (DB-9 null modem cables and Category 5 STP cables).

Unpacking the Shipping Carton: ET0100A

Remove all product components from the shipping carton and compare the contents to the packing list. Keep all packaging in case it is necessary to return the unit.

The ET0100A is packaged with the standard items listed below. Additional cables, country-specific power cords, and other accessories can be ordered separately.

1ET0100A chassis

Firmware and software is factory-installed on the unit.

2Accessory Kit

Rack mount kit containing two mounting brackets and 10 screws

(1) Power cable (US)

(1) Shielded DB-9 null modem cable (female to male)

(1) Shielded Category 5 straight through cable (STP) with RJ-45 connector

CD containing user documentation and a backup copy of the ETEP software

Rack-Mount Installation: ET0100A

The ET0100A can be mounted in a standard 19-inch rack using the mounting kit, or simply placed on a rack shelf or solid surface. Before installing the ET0100A in a 19-inch rack, review the rack-mounting guidelines listed in “ETEP Site Preparation” on page 25.

36

ETEP Installation Guide

Page 35
Image 35
Black Box EncrypTight Enforcement Point (ETEP) Installation Guide manual Unpacking the Shipping Carton ET0100A

EncrypTight Enforcement Point (ETEP) Installation Guide specifications

The Black Box EncrypTight Enforcement Point (ETEP) is a robust solution designed to enhance data security by ensuring that sensitive information is securely transmitted and stored. This article provides a comprehensive installation guide that highlights the main features, technologies, and characteristics of ETEP.

The EncrypTight ETEP operates by providing a secure gateway between different networks. It employs advanced encryption algorithms to safeguard data from potential threats, ensuring that unauthorized access is thwarted. A core feature of the ETEP is its ability to support a range of encryption standards, including AES, RSA, and ECC, thus allowing organizations to choose the most suitable protocols for their specific needs.

One of the standout technologies integrated within the ETEP is its end-to-end encryption capability. This ensures that data remains encrypted during transmission from the sender to the receiver, making it virtually impossible for any third-party entities to decipher the information even if they manage to intercept it.

The ETEP also boasts a user-friendly interface that simplifies installation and configuration processes. Administrators can easily set up the system without requiring extensive technical knowledge. Furthermore, the system is designed to integrate seamlessly with existing IT infrastructure, ensuring minimal disruption during deployment.

Another critical characteristic of the ETEP is its scalability. As businesses grow and evolve, the ETEP can be easily adjusted to accommodate increased data traffic and changing security requirements. This flexibility makes it an ideal solution for organizations of all sizes, from small businesses to large enterprises.

Moreover, the ETEP employs state-of-the-art threat detection and response mechanisms. It continuously monitors network activity, identifying anomalies that may indicate potential security breaches. This proactive approach ensures that organizations can respond swiftly to threats, thereby minimizing potential damage.

The installation of the Black Box EncrypTight ETEP typically involves the following steps: first, assess the current network architecture; second, select the appropriate hardware and software components; third, configure encryption settings; and finally, conduct thorough testing to ensure the system is functioning as expected.

In conclusion, the Black Box EncrypTight Enforcement Point installation is a crucial step in bolstering an organization’s data security framework. With its advanced features, reliable technologies, and user-centric design, the ETEP stands out as an essential tool for businesses looking to safeguard their sensitive information against ever-evolving cybersecurity threats.