Black Box ET1000A Manual Do Utilizador
![Black Box](https://files.manualsbrain.com/attachments/93f582e81b91156050f0dfb0bd85a42bc8635e07/common/fit/150/50/2f54d4d876583e31f45c92e398ef3997c2dece9a115125c2fd1224ff9c81/brand_logo.png)
Security within EncrypTight
EncrypTight User Guide
23
Figure 6
Layer 2 Point-to-Point Deployment
Use the Policy Manager (ETPM) and Key Management System (ETKMS) to create a Layer 3 point-to-
point distributed key policy as one of several policies in a larger, more complex EncrypTight deployment.
point distributed key policy as one of several policies in a larger, more complex EncrypTight deployment.
The ETEP’s variable speed feature is controlled by the installation of a license. Note that you cannot
install a license on the ETEP until you first enter a license for EncrypTight. For more information about
licensing, see
install a license on the ETEP until you first enter a license for EncrypTight. For more information about
licensing, see
.
Related topics:
●
●
●
●
●
●
Security within EncrypTight
Because EncrypTight generates keys that provide security throughout a network, it is critical that the
EncrypTight components also be secured.
EncrypTight components also be secured.
Security in the EncrypTight system has two general areas:
●
●