Black Box Appliance Trim Kit ET1000A Manual De Usuario
Distributed Key Topologies
EncrypTight User Guide
19
Regardless of topology, PEPs are typically located at the point in the network where traffic is being sent
to an untrusted network or coming from an untrusted network. As an example,
to an untrusted network or coming from an untrusted network. As an example,
shows a hub and
spoke network secured with EncrypTight.
Figure 2
PEPs in a Hub and Spoke network
PEP A encrypts data traffic from Network A that goes to Networks B or C. PEP A also decrypts data that
originates from Networks B and C. PEP B encrypts data from Network B that goes to Network A and
decrypts data that comes from Network A. PEP C encrypts data from Network C that goes to Network A
and decrypts data that comes from Network A.
originates from Networks B and C. PEP B encrypts data from Network B that goes to Network A and
decrypts data that comes from Network A. PEP C encrypts data from Network C that goes to Network A
and decrypts data that comes from Network A.
Related topics:
●
●
●
●
EncrypTight
Elements
EncrypTight consists of a suite of tools that perform various tasks of appliance and policy management:
●
is the element management component of the EncrypTight
software
●
is the policy generation and management tool
●
is the key generation and distribution tool
●
s are the encryption appliances that enforce the security policies
The number of ETEPs that you can manage and the speed at which they run is controlled by licenses.
You must enter a license for EncrypTight before you can install licenses on the ETEPs.
You must enter a license for EncrypTight before you can install licenses on the ETEPs.