Black Box ET0010A User Manual

Page of 352
Complex Layer 3 Policy Example
EncrypTight User Guide
217
Using Network Sets B, B1, B2, and B3, create a hub and spoke policy for region B as shown in the 
following table: 
Using Network Sets C, C1, C2, and C3, create a hub and spoke policy for region C as shown in the 
following table: 
Using Network Sets D, D1, D2, and D3, create a hub and spoke policy for region D as shown in the 
following table: 
Table 58
 Region B hub and spoke policy
Field
Setting
Name
Region B Hub and Spoke
Priority
901
Renew Keys/Refresh Lifetime
4 hours
Type
IPSec
IPSec
Encryption Algorithms - AES 
Authentication Algorithms - HMAC-SHA-1 
Key Generation
By Network Set
Addressing Mode Override
Preserve internal network addresses 
Minimize Policy Size
Disable 
Hub
Network Set B
Spokes
Network Set B1
Network Set B2
Network Set B3
Protocol
Any
Table 59
 Region C hub and spoke policy
Field
Setting
Name
Region C Hub and Spoke
Priority
902
Renew Keys/Refresh Lifetime
4 hours
Type
IPSec
IPSec
Encryption Algorithms - AES 
Authentication Algorithms - HMAC-SHA-1 
Key Generation
By Network Set
Addressing Mode Override
Preserve internal network addresses 
Minimize Policy Size
Disable 
Hub
Network Set A
Spokes
Network Set A1
Network Set A2
Network Set A3
Protocol
Any
Table 60
 Region D hub and spoke policy
Field
Setting
Name
Region D Hub and Spoke.