Black Box Network Hardware EncrypTight Enforcement Point (ETEP) Manual De Usuario

Descargar
Página de 74
Configuration Example
ETEP Installation Guide
53
You need to install a license on each ETEP that you use. Licenses are linked to the serial number of the 
ETEP on which they are installed. You cannot install a license intended for one ETEP on a different 
ETEP. 
If you upgrade from a command line-only installation to a full EncrypTight deployment, you can no 
longer use the command line-only license and must acquire an EncrypTight license.
To add a license from the command line:
1 At the command prompt, type 
configure
 to enter configuration mode.
2 At  the 
config>
 prompt, type
 license <string>
, where string is the license provided by 
Customer Support. The license is case sensitive. Enter the license exactly as provided. It will look 
something like this: 1:0:0508C482:10:258482fab2
To view the ETEP throughput speed:
1 At the command prompt, type 
show throughput-speed
Configuration Example
The following example illustrates the commands used for initial setup of the ETEP to configure the 
following parameters: management IP address, subnet mask, and default gateway, auto-negotiation, date 
and time. The autoneg command needs to be configured only if you want to disable auto-negotiation and 
configure the link speed and flow control manually. 
pep login: admin
Password:  *****
admin> 
configure 
config> 
management-interface 
man-if> 
ip 192.168.10.10 255.255.255.0 192.168.10.1
man-if>  autoneg disable 100m-full on
man-if>
 exit
config> 
date 2008 10 15 12 30 00
config>  exit
admin> 
Managing the ETEP
The ETEP can be managed in two ways, depending on the size and complexity of your deployment:
Command Line Interface (CLI)
You can configure the ETEPs for operation and create Layer 2 point-to-point policies using the CLI 
commands.
To manage the ETEP using the CLI, you can attached a PC directly to the serial port or use any SSH 
client for a secure remote connection through the Ethernet management port. 
EncrypTight Policy and Key Manager™
EncrypTight can distribute keys to a large number of ETEPs. It works for complex mesh, hub and 
spoke, and multicast networks, as well as in straightforward point-to-point topologies. EncrypTight