Black Box ET0010A User Manual

Page of 352
EncrypTight User Guide
13
Preface
About This Document
Purpose
The EncrypTight User Guide provides detailed information on how to install, configure, and troubleshoot 
EncrypTight components: ETEMS, Policy Manager (ETPM), and Key Management System (ETKMS). It 
also contains information about configuring EncrypTight Enforcement Points (ETEPs) using ETEMS.
Intended Audience
This document is intended for network managers and security administrators who are familiar with setting 
up and maintaining network equipment. Some knowledge of network security issues and encryption 
technologies is assumed.
Assumptions
This document assumes that its readers have an understanding of the following:
EncrypTight encryption appliance features, installation and operation
Basic principles of network security issues
Basic principles of encryption technologies and terminology
Basic principles of TCP/IP networking, including IP addressing, switching and routing
Personal computer (PC) operation, common PC terminology, use of terminal emulation software and 
FTP operations
Basic knowledge of the Linux operating system
Conventions used in this document
Bold 
Indicates one of the following:
• a menu item or button
• the name of a command or parameter
Italics
Indicates a new term
Monospaced 
Indicates machine text, such as terminal output and filenames
Monospaced bold
Indicates a command to be issued by the user