EncrypTight Component Connections

External ETKMS to ETKMS Connections

ETKMSs must be able to communicate with each other in two situations:

Backup ETKMSs are used for redundancy

Multiple ETKMSs share policy information and keys to distribute to the PEPs that they control

This section addresses the connections between two or more external ETKMSs. If you also use a local ETKMS, the basic principles discussed here still apply.

If the ETKMSs are on the same subnetwork, the ETKMS to ETKMS interconnection is straightforward. ETKMSs communicate with each other using the Ethernet ports on each ETKMS. For large, dispersed networks, multiple ETKMSs must be able to share keys with each other. The connections between ETKMSs depend on the network type: IP network or Ethernet network.

This section includes the following topics:

“Connections for Backup ETKMSs” on page 29

“Connecting Multiple ETKMSs in an IP Network” on page 30

“ETKMS to ETKMS Connections in Ethernet Networks” on page 30

Connections for Backup ETKMSs

In some EncrypTight configurations a pair of ETKMSs, a primary ETKMS and a secondary ETKMS, are used to provide network redundancy. The ETPM distributes the policies to both the primary ETKMS and backup ETKMS. Only the primary ETKMS distributes the keys and policies to the PEPs. If the backup ETKMS detects a communication failure with the primary ETKMS due to a ETKMS failure or network failure, the backup ETKMS assumes the generation and distribution of the keys and policies to the PEPs. Once communication with the primary ETKMS is reestablished, the primary resumes the distribution of the keys and policies to the PEPs.

Backup ETKMSs should be external ETKMSs. Using a local ETKMS as a backup ETKMS is not recommended. If you use backup ETKMSs, the backup ETKMS must be able to check the status of the primary ETKMS so that it can take over operations in the event of a communication failure. It is recommended that you locate the backup ETKMS and the primary ETKMS together. The primary and backup ETKMSs communicate using the Ethernet ports on each ETKMS.

Also keep in mind the following:

Both the primary ETKMS and the backup ETKMS must be able to communicate with the same PEPs.

Each ETKMS can only use one backup ETKMS. Similarly, each backup ETKMS can only serve as a backup to one ETKMS.

Backup ETKMSs must use the same type of IP address as the primary ETKMS. For example, if the primary uses an IPv6 address, the backup ETKMS must use an IPv6 address.

You do not explicitly add backup ETKMSs to the Appliance Manager in ETEMS and they are not listed in that window. Instead, you specify a backup ETKMS when you add a primary ETKMS in ETEMS, and only the primary ETKMS is listed in the Appliance Manager.

EncrypTight User Guide

29

Page 28
Image 28
Black Box ET1000A, ET0010A, EncrypTight, ET0100A manual External Etkms to Etkms Connections, Connections for Backup ETKMSs

EncrypTight, ET0100A, ET0010A, ET1000A specifications

The Black Box ET1000A, ET0010A, EncrypTight, and ET0100A are advanced solutions designed for secure data transmission and network management, catering to modern enterprise needs. These tools integrate cutting-edge technologies to enhance connectivity, security, and efficiency within various environments.

The Black Box ET1000A is primarily a high-performance Ethernet over Twisted Pair (EoTP) solution. It enables users to extend Ethernet signals over long distances using existing twisted-pair cabling without sacrificing speed or reliability. With support for speeds up to 100 Mbps, this device is ideal for organizations looking to upgrade their existing infrastructure without extensive rewiring. Key features include plug-and-play installation, which simplifies deployment, and versatile compatibility with both legacy and modern ethernet networks.

The ET0010A model takes connectivity a step further by providing seamless integration with fiber optics. This device supports transmission distances that far exceed traditional copper solutions, making it a perfect fit for larger facilities or multi-building campuses. Its built-in Ethernet switch enhances network efficiency by providing multiple ports for device connectivity, thus facilitating greater data flow.

EncrypTight technology is a notable feature across these Black Box models, offering advanced encryption capabilities to safeguard sensitive data during transmission. With military-grade encryption protocols, EncrypTight ensures that corporate information remains secure from potential eavesdroppers. This technology is essential for businesses operating in regulated industries or that handle confidential customer information.

The ET0100A model combines intelligence with monitoring features to provide users with comprehensive network insights. It boasts built-in diagnostic tools that enable IT professionals to troubleshoot issues quickly and efficiently. Additionally, it features real-time performance monitoring, allowing users to analyze bandwidth usage and optimize network performance accordingly.

In conclusion, the Black Box ET1000A, ET0010A, EncrypTight, and ET0100A are powerful tools that embody the latest in data transmission and network management technologies. With their unique features—including extended connectivity capabilities, robust encryption technologies, and real-time monitoring solutions—these devices cater to the growing demands of businesses seeking to enhance their network infrastructure while ensuring robust security and efficiency. Integrating these tools into any organization’s operations can fundamentally improve both performance and data protection, making them indispensable in today’s digital landscape.