Preface
About This Document
Purpose
The EncrypTight Manager Installation Guide provides detailed information on how to install and configure EncrypTight Manager software.
Intended Audience
This document is intended for network managers and security administrators who are familiar with setting up and maintaining network equipment. Some knowledge of network security issues and encryption technologies is assumed.
Assumptions
This document assumes that its readers have an understanding of the following:
•
•
•
•
•
Black Box encryption appliance features, installation and operation Basic principles of network security issues
Basic principles of encryption technologies and terminology
Basic principles of TCP/IP networking, including IP addressing, switching and routing
Personal computer (PC) operation, common PC terminology, use of terminal emulation software and FTP operations
•Basic knowledge of the Linux operating system
Conventions used in this document
Bold | Indicates one of the following: |
| • a menu item or button |
| • the name of a command or parameter |
Italics | Indicates a new term |
Monospaced | Indicates machine text, such as terminal output and filenames |
Monospaced | bold Indicates a command to be issued by the user |
How to comment
Customer comments on Black Box documents are welcome. Send your comments to:
EncrypTight Manager Installation Guide | 5 |