Table of Contents
EncrypTight User Guide 7
Editing PEPs ......................................................................................................................................151
Editing PEPs From ETEMS.........................................................................................................151
Editing Multiple PEPs ..................................................................................................................152
Editing PEPs From ETPM ...........................................................................................................152
Changing the IP Address of a PEP .............................................................................................153
Changing the PEP from Layer 3 to Layer 2 Encryption...............................................................153
Deleting PEPs ....................................................................................................................................153

Chapter 11: Managing Key Management Systems .............................................................. 155

Adding ETKMSs.................................................................................................................................156
Editing ETKMSs .................................................................................................................................157
Deleting ETKMSs...............................................................................................................................157

Chapter 12: Managing IP Networks....................................................................................... 159

Adding Networks ................................................................................................................................ 159
Advanced Uses for Networks in Policies............................................................................................161
Grouping Networks into Supernets..............................................................................................161
Using Non-contiguous Network Masks........................................................................................162
Editing Networks ................................................................................................................................164
Deleting Networks ..............................................................................................................................164

Chapter 13: Managing Network Sets..................................................................................... 167

Types of Network Sets .......................................................................................................................168
Adding a Network Set ........................................................................................................................170
Importing Networks and Network Sets...............................................................................................172
Editing a Network Set.........................................................................................................................174
Deleting a Network Set ...................................................................................................................... 174

Chapter 14: Creating VLAN ID Ranges for Layer 2 Networks............................................. 177

Adding a VLAN ID Range ..................................................................................................................177
Editing a VLAN ID Range...................................................................................................................179
Deleting a VLAN ID Range ................................................................................................................179

Chapter 15: Creating Distributed Key Policies .................................................................... 181

Policy Concepts .................................................................................................................................181
Policy Priority...............................................................................................................................182
Schedule for Renewing Keys and Refreshing Policy Lifetime.....................................................182
Policy Types and Encryption Methods ........................................................................................183
Encapsulation........................................................................................................................183
Encryption and Authentication Algorithms ............................................................................184
Key Generation and ETKMSs .....................................................................................................185
Addressing Mode......................................................................................................................... 185
Using Encrypt All Policies with Exceptions ..................................................................................185
Policy Size and ETEP Operational Limits....................................................................................186
Minimizing Policy Size .................................................................................................................187
Adding Layer 2 Ethernet Policies .......................................................................................................188
Adding Layer 3 IP Policies .................................................................................................................191
Adding a Hub and Spoke Policy ..................................................................................................191
Adding a Mesh Policy ..................................................................................................................195