Black Box ET0010A User Manual

Page of 352
Working with Policies
EncrypTight User Guide
335
Related topics:
Using EncrypTight Distributed Key Policies
After you have configured the ETEPs for network operation, use the Policy Manager (ETPM) to create 
and deploy distributed key policies.
ETPM can create Layer 2 mesh policies and the following types of Layer 3 policies: 
Mesh
Hub and spoke
Multicast
Point-to-point 
To launch ETPM from ETEMS:
1 Do one of the following from any EncrypTight perspective:
In the Window menu, click Open. Click Other. In the Open Perspective window, select ETPM 
and click OK.
On the Perspective tab in the upper right corner of the screen, click the Open Perspective button 
. Click Other. In the Open Perspective window, select ETPM and click OK
Related topics:
Creating Layer 2 Point-to-Point Policies
Layer 2 point-to-point policies are created using the policy editor in the ETEMS Policy tab. The 
following settings are prerequisites for using this feature: 
1 On the Features tab, set the Encryption Policy Setting to Layer 2:Ethernet.
2 On the Features tab, clear the Enable EncrypTight checkbox.
On the Policy tab, just a few settings are needed to configure the ETEP to encrypt traffic. The policies on 
the two ETEPs must use the identical preshared key and group ID, and be assigned. opposite roles 
(primary and secondary). As with any other appliance configuration setting, you have to push the policy 
to the ETEPs for it to take effect.