Black Box ET0010A ユーザーズマニュアル
EncrypTight User Guide
211
16
Policy Design Examples
This section provides two examples of creating policies with EncrypTight:
●
Basic Layer 2 Point-to-Point Policy Example
In this example, we secure a single point-to-point Layer 2 Ethernet link using only the ETEMS software
and two encryption appliances. This example focuses on the required settings and does not discuss
advanced and optional settings.
and two encryption appliances. This example focuses on the required settings and does not discuss
advanced and optional settings.
Figure 82
Point-to-point Layer 2 Ethernet link
The requirement for this policy is to encrypt all traffic between the two points.