Black Box Appliance Trim Kit ET1000A 用户手册
Working with Policies
EncrypTight User Guide
335
Related topics:
●
●
Using EncrypTight Distributed Key Policies
After you have configured the ETEPs for network operation, use the Policy Manager (ETPM) to create
and deploy distributed key policies.
and deploy distributed key policies.
ETPM can create Layer 2 mesh policies and the following types of Layer 3 policies:
●
Mesh
●
Hub and spoke
●
Multicast
●
Point-to-point
To launch ETPM from ETEMS:
1 Do one of the following from any EncrypTight perspective:
1 Do one of the following from any EncrypTight perspective:
●
In the Window menu, click Open. Click Other. In the Open Perspective window, select ETPM
and click OK.
and click OK.
●
On the Perspective tab in the upper right corner of the screen, click the Open Perspective button
. Click Other. In the Open Perspective window, select ETPM and click OK.
Related topics:
●
●
●
Creating Layer 2 Point-to-Point Policies
Layer 2 point-to-point policies are created using the policy editor in the ETEMS Policy tab. The
following settings are prerequisites for using this feature:
following settings are prerequisites for using this feature:
1 On the Features tab, set the Encryption Policy Setting to Layer 2:Ethernet.
2 On the Features tab, clear the Enable EncrypTight checkbox.
2 On the Features tab, clear the Enable EncrypTight checkbox.
On the Policy tab, just a few settings are needed to configure the ETEP to encrypt traffic. The policies on
the two ETEPs must use the identical preshared key and group ID, and be assigned. opposite roles
(primary and secondary). As with any other appliance configuration setting, you have to push the policy
to the ETEPs for it to take effect.
the two ETEPs must use the identical preshared key and group ID, and be assigned. opposite roles
(primary and secondary). As with any other appliance configuration setting, you have to push the policy
to the ETEPs for it to take effect.