Index

NTP, 149

O

OCSP about, 289

communication preferences, 94 enabling in EncrypTight, 290 enabling in ETEPs, 291 enabling on ETKMSs, 291

open perspective, 131 out-of-band management

ETKMS to ETKMS connections, 30 ETKMS to PEP connections, 32 ETPM to ETKMS connections, 28

P

passing TLS traffic in the clear, 149 password

changing the ETKMS admin password, 47 changing the ETKMS root password, 48 configuring the ETEP password strength

policy, 327

default password conventions on the ETEP, 104

default passwords for EncrypTight components, 56

setting on ETEPs, 106

setting the EncrypTight password, 62 strong password conventions on the ETEP,

104

payload only encryption, 185

PEP adding, 148

adding new PEPs and using strict authentication, 264

configuring for EncrypTight, 55 customized default configurations, 150 deleting, 153

editing, 151

enabling the SNTP client, 149 overview, 21

pushing configurations, 151 renaming, 152 troubleshooting tools, 243–?? viewing encryption statistics, 244

working with large numbers of PEPs, 150 performance data, viewing, 230

ping

pinging the management port, 227 setting a ping tool preference, 228

PMTU configuration ETEP, 326

point-to-point policy distributed key, adding, 203 Layer 2 example, 211 negotiated, 335

policies

See also policy management with ETPM EncrypTight distributed key policies

overview, 17 starting ETPM, 131

ETEP

clearing policies on the ETEP, 334 negotiated Layer 2 point-to-point policies,

335

setting L2 or L3 encryption, 334 starting ETPM, 334

traffic handling, 338 reloading, 226

policy and key information ETEP PEPs, 244

policy constraint extension, 271 policy editor

starting ETPM, 335

Policy Enforcement Point, see PEP policy management with ETPM

allowing local site exETEPtions, 247 conETEPts, 181

deleting a policy, 209 deploying policies, 207 editing policies, 209 encapsulation method, 183

encrypt all policy with exETEPtions, creating, 185

encryption algorithms, 184 encryption methods, 183 Ethernet policies, adding, 188 hub and spoke policy, adding, 191 Layer 2 Ethernet policies, overview, 138 Layer 3 IP policies, overview, 138 Layer 4 payload encryption, 185 Layer 4 policy, creating, 206

lifetime, defining, 182 mesh policy, adding, 195 minimizing policy size, 187 multicast policy, adding, 199 point to point policy, adding, 203 policy design examples, 214

policy generation and distribution, 139 policy view, 135

priority, setting, 182

rekey interval, defining, 182

scheduling rekey interval and policy lifetime refresh, 182

troubleshooting, 239, 245–248 Policy Manager

EncrypTight User Guide

349

Page 348
Image 348
Black Box ET1000A, ET0010A, ET0100A manual EncrypTight User Guide 349

EncrypTight, ET0100A, ET0010A, ET1000A specifications

The Black Box ET1000A, ET0010A, EncrypTight, and ET0100A are advanced solutions designed for secure data transmission and network management, catering to modern enterprise needs. These tools integrate cutting-edge technologies to enhance connectivity, security, and efficiency within various environments.

The Black Box ET1000A is primarily a high-performance Ethernet over Twisted Pair (EoTP) solution. It enables users to extend Ethernet signals over long distances using existing twisted-pair cabling without sacrificing speed or reliability. With support for speeds up to 100 Mbps, this device is ideal for organizations looking to upgrade their existing infrastructure without extensive rewiring. Key features include plug-and-play installation, which simplifies deployment, and versatile compatibility with both legacy and modern ethernet networks.

The ET0010A model takes connectivity a step further by providing seamless integration with fiber optics. This device supports transmission distances that far exceed traditional copper solutions, making it a perfect fit for larger facilities or multi-building campuses. Its built-in Ethernet switch enhances network efficiency by providing multiple ports for device connectivity, thus facilitating greater data flow.

EncrypTight technology is a notable feature across these Black Box models, offering advanced encryption capabilities to safeguard sensitive data during transmission. With military-grade encryption protocols, EncrypTight ensures that corporate information remains secure from potential eavesdroppers. This technology is essential for businesses operating in regulated industries or that handle confidential customer information.

The ET0100A model combines intelligence with monitoring features to provide users with comprehensive network insights. It boasts built-in diagnostic tools that enable IT professionals to troubleshoot issues quickly and efficiently. Additionally, it features real-time performance monitoring, allowing users to analyze bandwidth usage and optimize network performance accordingly.

In conclusion, the Black Box ET1000A, ET0010A, EncrypTight, and ET0100A are powerful tools that embody the latest in data transmission and network management technologies. With their unique features—including extended connectivity capabilities, robust encryption technologies, and real-time monitoring solutions—these devices cater to the growing demands of businesses seeking to enhance their network infrastructure while ensuring robust security and efficiency. Integrating these tools into any organization’s operations can fundamentally improve both performance and data protection, making them indispensable in today’s digital landscape.