Black Box EncrypTight Enforcement Point (ETEP) Installation Guide Entering a Throughput License

Models: EncrypTight Enforcement Point (ETEP) Installation Guide

1 74
Download 74 pages 54.76 Kb
Page 51
Image 51

Initial Setup

the local time relative to UTC, add or subtract the offset hours from UTC for the local time zone (UTC ± n). The following examples give the local time at various locations at 12:00 UTC when daylight saving time is not in effect:

New York City, United States: UTC-5; 07:00

New Delhi, India: UTC+5:30; 17:30

To set the date and time:

1At the command prompt, type configure to enter configuration mode.

2At the config> prompt, type date <year> <month> <day> <hour> <minutes> <seconds>

year

2008-2037

month

01-12

day

01-31

hour

00-23

minutes

00-59

seconds

00-59

3Type exit to return to the command prompt. Example

admin> configure

config> date 2008 10 11 15 30 00 config> exit

Entering a Throughput License

The method for entering licenses on the ETEP depends on your management software:

For ETEPs that are managed exclusively through the command line, follow the procedure in this section.

For EncrypTight deployments, throughput licenses must be managed with the EncrypTight software. Licenses entered from the CLI are not recognized as valid in an EncrypTight deployment. See the EncrypTight User Guide for more information.

Each ETEP is capable of transmitting traffic at a range of speeds that varies by model. When you install the license you purchased, ETEPs transmit traffic at the speed specified by the license.Table 20 lists the available speeds for each ETEP model.

Table 20

ETEP Throughput Speeds

 

 

 

Model

 

Available Throughput

ET0010A

 

3, 6, 10, 25, 50 Mbps

ET0100A

 

100, 155, 250 Mbps

ET1000A

 

500, 650 Mbps, 1 Gbps

 

 

 

52

ETEP Installation Guide

Page 51
Image 51
Black Box EncrypTight Enforcement Point (ETEP) Installation Guide Entering a Throughput License, To set the date and time

EncrypTight Enforcement Point (ETEP) Installation Guide specifications

The Black Box EncrypTight Enforcement Point (ETEP) is a robust solution designed to enhance data security by ensuring that sensitive information is securely transmitted and stored. This article provides a comprehensive installation guide that highlights the main features, technologies, and characteristics of ETEP.

The EncrypTight ETEP operates by providing a secure gateway between different networks. It employs advanced encryption algorithms to safeguard data from potential threats, ensuring that unauthorized access is thwarted. A core feature of the ETEP is its ability to support a range of encryption standards, including AES, RSA, and ECC, thus allowing organizations to choose the most suitable protocols for their specific needs.

One of the standout technologies integrated within the ETEP is its end-to-end encryption capability. This ensures that data remains encrypted during transmission from the sender to the receiver, making it virtually impossible for any third-party entities to decipher the information even if they manage to intercept it.

The ETEP also boasts a user-friendly interface that simplifies installation and configuration processes. Administrators can easily set up the system without requiring extensive technical knowledge. Furthermore, the system is designed to integrate seamlessly with existing IT infrastructure, ensuring minimal disruption during deployment.

Another critical characteristic of the ETEP is its scalability. As businesses grow and evolve, the ETEP can be easily adjusted to accommodate increased data traffic and changing security requirements. This flexibility makes it an ideal solution for organizations of all sizes, from small businesses to large enterprises.

Moreover, the ETEP employs state-of-the-art threat detection and response mechanisms. It continuously monitors network activity, identifying anomalies that may indicate potential security breaches. This proactive approach ensures that organizations can respond swiftly to threats, thereby minimizing potential damage.

The installation of the Black Box EncrypTight ETEP typically involves the following steps: first, assess the current network architecture; second, select the appropriate hardware and software components; third, configure encryption settings; and finally, conduct thorough testing to ensure the system is functioning as expected.

In conclusion, the Black Box EncrypTight Enforcement Point installation is a crucial step in bolstering an organization’s data security framework. With its advanced features, reliable technologies, and user-centric design, the ETEP stands out as an essential tool for businesses looking to safeguard their sensitive information against ever-evolving cybersecurity threats.