Black Box ET0100A Manual De Usuario

Descargar
Página de 352
Getting Started with ETPM
142
EncrypTight User Guide
Figure 50
Sample point-to-point IP policy 
 illustrates an EncrypTight deployment with two networks. This example demonstrates how to 
create a point-to-point policy to encrypt the traffic sent between the two networks over the untrusted 
network. 
To create a policy, the general steps are:
1 In the ETEMS Appliance Manager, 
Add and configure the PEPs you want to use.
Push the configurations to the PEPs.
Add and configure the ETKMSs you want to use.
2 In  ETPM, 
Add the networks you need.
Create the network sets.
Create the policies.
Deploy the policies.
Elements of 
:
1)
ETKMS 1, IP address 192.168.1.33
A, B)
PEP A, IP address 192.168.11.69
PEP B, IP address 192.168.11.224
Network A
IP address 192.168.144.0
Network B
IP address 192.168.154.0
Network Set A
Includes Network A and PEP A, using ETKMS 1
Network Set B
Includes Network B and PEP B, using ETKMS 1