Справочник Пользователя для Black Box EncrypTight
EncrypTight User Guide
37
3
Installation and Configuration
This section describes how to install and configure EncrypTight for the first time, including:
●
Before You Start
EncrypTight is a system that uses dedicated encryption devices referred to as Policy Enforcement Points
(PEPs), a central server for distributing encryption keys (the Key Management System, or ETKMS), and
a workstation running the management software.
(PEPs), a central server for distributing encryption keys (the Key Management System, or ETKMS), and
a workstation running the management software.
●
Install the EncrypTight software on a secure workstation.
●
Install the ETKMS in a physically secure location and connect it to the network so that it can
communicate with the management workstation and the PEPs.
communicate with the management workstation and the PEPs.
●
Install and configure the PEPs, usually at the point in your network where traffic is being sent to or
from an untrusted network.
from an untrusted network.
The EncrypTight software (version 1.9 and later) and the throughput speed of ETEPs with software
version 1.6 and later are controlled by licenses. You must install a license for the EncrypTight software,
and a license on each ETEP in your deployment. For more information, see
version 1.6 and later are controlled by licenses. You must install a license for the EncrypTight software,
and a license on each ETEP in your deployment. For more information, see
.
This chapter provides instructions for these tasks. If you plan on using enhanced security options such as
certificates, please refer to
certificates, please refer to
for additional configuration
instructions.
Before you install EncrypTight, review the following topics:
●