ETEP Configuration

Inbound host protocols (HTTPS, ICMP, and SNMP) are enabled and disabled in the Edit Trusted Host window. Inbound protocols are enabled by default for each host. Use caution when disabling these protocols as it can affect the management station’s ability to communicate with the ETEP.

Table 91 Inbound trusted host protocols used by EncrypTight

Protocol

HTTPS

ICMP

SNMP

Description

Used for secure communication between the management station and the ETEP.

Used for pings and other diagnostic and routing messages.

Used to get SNMP data from the ETEP (name, location, and contact).

You cannot add, modify or delete an outbound host directly from the trusted host list. You must make changes in the Appliance editor tab for that feature (Table 92). When you add an outbound host such as a syslog server, NTP server or SNMP trap host to the appliance configuration, the host’s IP address is automatically added to the trusted host list. For example, if you add a syslog server in the Appliance editor Logging tab, the syslog server is automatically added to the trusted host list as shown in Figure 107.

The process is similar when deleting an outbound host. Using the syslog server as an example, delete the syslog server from the Logging tab. One of two outcomes occur:

If no other ports are enabled for that IP address, the trusted host entry is automatically deleted.

If other ports are enabled for that IP address the change is automatically reflected in the trusted host list, which displays a status of “no” in the Syslog column for that IP address. You can then either leave the modified entry as is, or you can select the trusted host entry and click Delete to remove it from the trusted host list.

Table 92 Modify outbound trusted hosts on their respective Appliance editor tabs

Outbound host

Appliance Editor Tab

Syslog server

Logging

NTP

Advanced

SNMP traps

SNMP

 

 

To add a trusted host:

1On the Trusted Hosts tab, click Enable Trusted Hosts.

2Click Add.

3In the Edit Trusted Hosts window, enter the IP address of the trusted host.

With ETEP software version 1.6 and later, you can use either IPv4 or IPv6 addresses.

4Restrict any of the inbound protocols for the host by clearing the checkbox for the protocol (see Table 91). At least one trusted host in the list must have HTTPS enabled.

5Click OK. The trusted host and associated protocols appear in the trusted host list.

6Repeat steps 2-5 for each additional trusted host that you want to define.

312

EncrypTight User Guide

Page 311
Image 311
Black Box ET0100A, ET1000A, ET0010A Inbound trusted host protocols used by EncrypTight, To add a trusted host, Protocol

EncrypTight, ET0100A, ET0010A, ET1000A specifications

The Black Box ET1000A, ET0010A, EncrypTight, and ET0100A are advanced solutions designed for secure data transmission and network management, catering to modern enterprise needs. These tools integrate cutting-edge technologies to enhance connectivity, security, and efficiency within various environments.

The Black Box ET1000A is primarily a high-performance Ethernet over Twisted Pair (EoTP) solution. It enables users to extend Ethernet signals over long distances using existing twisted-pair cabling without sacrificing speed or reliability. With support for speeds up to 100 Mbps, this device is ideal for organizations looking to upgrade their existing infrastructure without extensive rewiring. Key features include plug-and-play installation, which simplifies deployment, and versatile compatibility with both legacy and modern ethernet networks.

The ET0010A model takes connectivity a step further by providing seamless integration with fiber optics. This device supports transmission distances that far exceed traditional copper solutions, making it a perfect fit for larger facilities or multi-building campuses. Its built-in Ethernet switch enhances network efficiency by providing multiple ports for device connectivity, thus facilitating greater data flow.

EncrypTight technology is a notable feature across these Black Box models, offering advanced encryption capabilities to safeguard sensitive data during transmission. With military-grade encryption protocols, EncrypTight ensures that corporate information remains secure from potential eavesdroppers. This technology is essential for businesses operating in regulated industries or that handle confidential customer information.

The ET0100A model combines intelligence with monitoring features to provide users with comprehensive network insights. It boasts built-in diagnostic tools that enable IT professionals to troubleshoot issues quickly and efficiently. Additionally, it features real-time performance monitoring, allowing users to analyze bandwidth usage and optimize network performance accordingly.

In conclusion, the Black Box ET1000A, ET0010A, EncrypTight, and ET0100A are powerful tools that embody the latest in data transmission and network management technologies. With their unique features—including extended connectivity capabilities, robust encryption technologies, and real-time monitoring solutions—these devices cater to the growing demands of businesses seeking to enhance their network infrastructure while ensuring robust security and efficiency. Integrating these tools into any organization’s operations can fundamentally improve both performance and data protection, making them indispensable in today’s digital landscape.