Black Box ET0010A User Manual

Page of 352
Security within EncrypTight
EncrypTight User Guide
23
Figure 6
Layer 2 Point-to-Point Deployment 
Use the Policy Manager (ETPM) and Key Management System (ETKMS) to create a Layer 3 point-to-
point distributed key policy as one of several policies in a larger, more complex EncrypTight deployment.
The ETEP’s variable speed feature is controlled by the installation of a license. Note that you cannot 
install a license on the ETEP until you first enter a license for EncrypTight. For more information about 
licensing, see 
.
Related topics:
Security within EncrypTight
Because EncrypTight generates keys that provide security throughout a network, it is critical that the 
EncrypTight components also be secured.
Security in the EncrypTight system has two general areas: