Black Box ET0010A User Manual

Page of 352
EncrypTight User Guide
211
16
Policy Design Examples
This section provides two examples of creating policies with EncrypTight:
Basic Layer 2 Point-to-Point Policy Example
In this example, we secure a single point-to-point Layer 2 Ethernet link using only the ETEMS software 
and two encryption appliances. This example focuses on the required settings and does not discuss 
advanced and optional settings. 
Figure 82
Point-to-point Layer 2 Ethernet link 
The requirement for this policy is to encrypt all traffic between the two points.