Black Box EncrypTight Manuale Utente
EncrypTight User Guide
13
Preface
About This Document
Purpose
The EncrypTight User Guide provides detailed information on how to install, configure, and troubleshoot
EncrypTight components: ETEMS, Policy Manager (ETPM), and Key Management System (ETKMS). It
also contains information about configuring EncrypTight Enforcement Points (ETEPs) using ETEMS.
EncrypTight components: ETEMS, Policy Manager (ETPM), and Key Management System (ETKMS). It
also contains information about configuring EncrypTight Enforcement Points (ETEPs) using ETEMS.
Intended Audience
This document is intended for network managers and security administrators who are familiar with setting
up and maintaining network equipment. Some knowledge of network security issues and encryption
technologies is assumed.
This document is intended for network managers and security administrators who are familiar with setting
up and maintaining network equipment. Some knowledge of network security issues and encryption
technologies is assumed.
Assumptions
This document assumes that its readers have an understanding of the following:
This document assumes that its readers have an understanding of the following:
●
EncrypTight encryption appliance features, installation and operation
●
Basic principles of network security issues
●
Basic principles of encryption technologies and terminology
●
Basic principles of TCP/IP networking, including IP addressing, switching and routing
●
Personal computer (PC) operation, common PC terminology, use of terminal emulation software and
FTP operations
FTP operations
●
Basic knowledge of the Linux operating system
Conventions used in this document
Bold
Indicates one of the following:
• a menu item or button
• the name of a command or parameter
• a menu item or button
• the name of a command or parameter
Italics
Indicates a new term
Monospaced
Indicates machine text, such as terminal output and filenames
Monospaced bold
Indicates a command to be issued by the user