Black Box ET1000A Manual de usuario

Busca en linea o descarga Manual de usuario para Software Black Box ET1000A. Black Box ET1000A User's Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 352
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
BL A C K B OX
®
EncrypTight acts as a transparent overlay that
integrates easily into any existing network
architecture, providing encryption rules and keys
to EncrypTight Enforcement Points.
EncrypTight consists of a suite of tools that performs various tasks of
appliance and policy management, including Policy Manager (PM),
Key Management System (KMS), and EncrypTight Enforcement Points
(ETEPs).
EncrypTight User Guide
ET0010A
ET0100A
ET1000A
Order toll-free in the U.S.: Call 877-877-BBOX (outside U.S. call 724-746-5500)
FREE technical support 24 hours a day, 7 days a week: Call 724-746-5500 or fax 724-746-0746
Mailing address: Black Box Corporation, 1000 Park Drive, Lawrence, PA 15055-1018
Web site: www.blackbox.com • E-mail: info@blackbox.com
Customer
Support
Information
Vista de pagina 0
1 2 3 4 5 6 ... 351 352

Indice de contenidos

Pagina 1 - BL A C K B OX

BL A C K B OX®EncrypTight acts as a transparent overlay that integrates easily into any existing network architecture, providing encryption rules a

Pagina 2

Table of ContentsEncrypTight User Guide 11Interface Configuration...

Pagina 3 - 4 EncrypTight User Guide

Provisioning BasicsEncrypTight User Guide 101Figure 28 Compare the ETEMS and appliance configurationsTo compare and update configurations:1 In the App

Pagina 4 - EncrypTight User Guide 5

Provisioning Appliances102 EncrypTight User Guide.3 To restore all appliances in the Appliances view, enter a single asterisk in the Filter Appliances

Pagina 5 - 6 EncrypTight User Guide

Appliance User ManagementEncrypTight User Guide 103appliance that is available to that role. The ETEP can track appliance events based on user name, s

Pagina 6 - EncrypTight User Guide 7

Provisioning Appliances104 EncrypTight User GuideUser Name ConventionsFollow the guidelines below when creating user names. These conventions apply re

Pagina 7 - Part IV: Troubleshooting

Appliance User ManagementEncrypTight User Guide 105● Do not use dictionary words. ETEMS does prevent the use of dictionary words, but a password conta

Pagina 8 - Part V: Reference

Provisioning Appliances106 EncrypTight User GuideManaging Appliance UsersYou can add, modify, and delete appliance users directly from ETEMS. You can

Pagina 9 - 10 EncrypTight User Guide

Appliance User ManagementEncrypTight User Guide 1077 On appliances that are enforcing strong passwords, configure the password expiration settings as

Pagina 10 - EncrypTight User Guide 11

Provisioning Appliances108 EncrypTight User GuideRelated topics: ● “ETEP User Roles” on page 102● “User Name Conventions” on page 104● “Default Passwo

Pagina 11 - 12 EncrypTight User Guide

Appliance User ManagementEncrypTight User Guide 109To delete a user from the ETEP:1 In the Appliance Manager, select the target appliances in the Appl

Pagina 12 - About This Document

Provisioning Appliances110 EncrypTight User GuideWorking with Default ConfigurationsEach appliance requires a unique name and management port IP addre

Pagina 13 - Web site www.blackbox.com

12 EncrypTight User GuideTable of ContentsFactory Defaults ...

Pagina 14 - Maintenance

Provisioning Large Numbers of AppliancesEncrypTight User Guide 1114Click OK.NOTEETEMS will not save a default configuration that contains an error or

Pagina 15 - 16 EncrypTight User Guide

Provisioning Appliances112 EncrypTight User GuideRelated topics:● “Creating a Configuration Template” on page 112● “Importing Configurations from a CS

Pagina 16 - 1 EncrypTight Overview

Provisioning Large Numbers of AppliancesEncrypTight User Guide 113specifies the document type, which ETEMS needs to successfully import the file. The

Pagina 17 - 18 EncrypTight User Guide

Provisioning Appliances114 EncrypTight User GuideFigure 34 Put configurations and reboot appliances Related topics:● “Importing Remote and Local Inter

Pagina 18 - EncrypTight Elements

Provisioning Large Numbers of AppliancesEncrypTight User Guide 115Figure 35 CSV import examples with remote and local interface attributes When import

Pagina 19 - Key Management System

Provisioning Appliances116 EncrypTight User GuideFigure 36 Set the preference for importing configurationsChecking the Time on New AppliancesAfter imp

Pagina 20 - Policy Enforcement Point

EncrypTight User Guide 1178 Managing AppliancesThis section includes the following topics:● Editing Configurations● Deleting Appliances● Connecting Di

Pagina 21 - 22 EncrypTight User Guide

Managing Appliances118 EncrypTight User GuideChanging the Management IP AddressETEMS uses the appliance’s 10/100 Ethernet management port to communica

Pagina 22 - Security within EncrypTight

Editing ConfigurationsEncrypTight User Guide 119Figure 37 Change Management IP window Related topics:● “Changing the Address in ETEMS” on page 119● “M

Pagina 23 - 24 EncrypTight User Guide

Managing Appliances120 EncrypTight User GuideFigure 38 Operation failed message in response to management IP change Changing the Date and TimeETEMS ca

Pagina 24 - EncrypTight User Guide 25

EncrypTight User Guide 13PrefaceAbout This DocumentPurposeThe EncrypTight User Guide provides detailed information on how to install, configure, and t

Pagina 25 - ETPM to ETKMS Connections

Editing ConfigurationsEncrypTight User Guide 121NOTEThe SNTP client must be disabled on an appliance in order to change its date or time manually. If

Pagina 26 - EncrypTight User Guide 27

Managing Appliances122 EncrypTight User Guide● SNTP client● Software version● Syslog serversOther settings that can be edited on multiple appliances a

Pagina 27 - 28 EncrypTight User Guide

Connecting Directly to an ApplianceEncrypTight User Guide 123To delete appliances:1 In the Appliance Manager, select the appliances to delete in the A

Pagina 28 - Connections for Backup ETKMSs

Managing Appliances124 EncrypTight User GuideThe amount of time it takes to complete a software upgrade depends on the appliance model and speed of th

Pagina 29 - 30 EncrypTight User Guide

Upgrading Appliance SoftwareEncrypTight User Guide 125Figure 41 Upgrade software on multiple appliances from a central locationCAUTIONAppliances must

Pagina 30 - ETKMS to PEP Connections

Managing Appliances126 EncrypTight User Guide6Click Upgrade. ETEMS confirms that the FTP site is reachable before it begins the upgrade operation. Upg

Pagina 31 - 32 EncrypTight User Guide

Restoring the Backup File SystemEncrypTight User Guide 127Canceling an UpgradeTo cancel a software upgrade that is underway for a series of appliances

Pagina 32 - IPv6 Address Support

Managing Appliances128 EncrypTight User GuideReview the following recommendations and cautions prior to restoring the file system:● Make sure that you

Pagina 33 - Certificate Support

Part III Using ETPM to Create Distributed Key Policies

Pagina 34 - EncrypTight User Guide 35

130 EncrypTight User Guide

Pagina 35 - 36 EncrypTight User Guide

Preface14 EncrypTight User GuideContacting Black Box Technical SupportContact our FREE technical support, 24 hours a day, 7 days a week: Phone 724-746

Pagina 36 - Before You Start

EncrypTight User Guide 1319 Getting Started with ETPMThe Policy Manager (ETPM) is the security policy management component of the EncrypTight. You use

Pagina 37 - Software Requirements

Getting Started with ETPM132 EncrypTight User Guide● Editors are used to add and modify EncrypTight components and policies.● Policy view is used to v

Pagina 38 - Firewall Ports

About the ETPM User InterfaceEncrypTight User Guide 133EncrypTight Components ViewThe EncrypTight Components view lets you configure the network compo

Pagina 39 - Starting EncrypTight

Getting Started with ETPM134 EncrypTight User GuideEditors Editors allow you to add or change EncrypTight components and policies. When you first star

Pagina 40 - Exiting EncrypTight

About the ETPM User InterfaceEncrypTight User Guide 135Policy ViewThe Policy view allows you to view, add, and edit policies. Figure 45 Policy viewThe

Pagina 41 - 42 EncrypTight User Guide

Getting Started with ETPM136 EncrypTight User GuideNOTEThe status indicators displayed in the ETPM Policy view change only after you click Deploy poli

Pagina 42 - Configuring ETKMSs

About the ETPM User InterfaceEncrypTight User Guide 137ETPM Toolbar The ETPM toolbar provides shortcuts to frequently performed tasks. ETPM Status Ref

Pagina 43 - Adding a Local ETKMS

Getting Started with ETPM138 EncrypTight User GuideAbout ETPM PoliciesA policy specifies what traffic to protect and how to protect it. Each packet or

Pagina 44 - EncrypTight User Guide 45

Policy Generation and DistributionEncrypTight User Guide 139● ETKMSs distribute the keys and policies to the PEPs● VLAN ID ranges enable filtering bas

Pagina 45 - Configuring External ETKMSs

Getting Started with ETPM140 EncrypTight User GuideFigure 48 Key generation with one ETKMS In this scenario, you could use either a local ETKMS or an

Pagina 46 - Changing the Admin Password

Part I EncrypTight Installation and Maintenance

Pagina 47 - Changing the Root Password

Creating a Policy: An OverviewEncrypTight User Guide 141Figure 49 Key generation with multiple ETKMSs The ETKMS generating the key for a PEP’s outboun

Pagina 48 - EncrypTight User Guide 49

Getting Started with ETPM142 EncrypTight User GuideFigure 50 Sample point-to-point IP policy Figure 50 illustrates an EncrypTight deployment with two

Pagina 49 - ETKMS1backup.mycompany.com

Creating a Policy: An OverviewEncrypTight User Guide 143To create a policy:1 In the ETEMS Appliance Manager, add PEP A and PEP B (File > New Applia

Pagina 50 - EncrypTight User Guide 51

Getting Started with ETPM144 EncrypTight User Guide3 In the Appliance Manager, add and configure ETKMS 1 (File > New Appliance). In the sample illu

Pagina 51 - 52 EncrypTight User Guide

Creating a Policy: An OverviewEncrypTight User Guide 1457 Click the Network Sets tab and in the editor, add Network Set A and Network Set B.In the sam

Pagina 52 - EncrypTight User Guide 53

Getting Started with ETPM146 EncrypTight User Guide9 Click the New Point-to-Point Policy editor and configure a point-to-point IPSec policy using the

Pagina 53 - 54 EncrypTight User Guide

EncrypTight User Guide 14710 Managing Policy Enforcement PointsPolicy Enforcement Points (PEPs) enforce the policies created in ETPM and distributed b

Pagina 54 - EncrypTight User Guide 55

Managing Policy Enforcement Points148 EncrypTight User Guidenetwork sets in Layer 3 IP policies. L2 PEPs can be used in Layer 2 Ethernet policies. You

Pagina 55 - Managing Licenses

Provisioning PEPsEncrypTight User Guide 149NOTE● For more information about PEP configuration options, see the chapter for the PEP model that you are

Pagina 56 - Installing Licenses

Managing Policy Enforcement Points150 EncrypTight User GuideAdding a New PEP Using ETPMNormally, you should add PEPs using the ETEMS Appliance Manager

Pagina 57 - Next Steps

16 EncrypTight User Guide

Pagina 58 - EncrypTight User Guide 59

Editing PEPsEncrypTight User Guide 151Pushing the ConfigurationAfter you define the PEP configurations, push the configurations from ETEMS to the targ

Pagina 59 - 60 EncrypTight User Guide

Managing Policy Enforcement Points152 EncrypTight User GuideIf you changed the PEP’s Appliance name in ETEMS, redeploy your policies. If you don’t red

Pagina 60 - 4 Managing EncrypTight Users

Deleting PEPsEncrypTight User Guide 153Changing the IP Address of a PEPOccasionally, you might need to change the IP address on a PEP. For example, yo

Pagina 61 - 62 EncrypTight User Guide

Managing Policy Enforcement Points154 EncrypTight User GuideTo delete PEPs:1 In the Appliances view in ETEMS, select the PEPs to delete.2On the Edit m

Pagina 62 - EncrypTight User Guide 63

EncrypTight User Guide 15511 Managing Key Management SystemsBased on the policies received from the ETPM, the Key Management Systems (ETKMSs) generate

Pagina 63 - 64 EncrypTight User Guide

Managing Key Management Systems156 EncrypTight User GuideIn order to ensure network resiliency, some EncrypTight configurations may have external ETKM

Pagina 64 - Managing EncrypTight Accounts

Editing ETKMSsEncrypTight User Guide 1574Click Save when complete. Editing ETKMSsIf you change the name or the IP address of a local ETKMS, stop the l

Pagina 65 - 66 EncrypTight User Guide

Managing Key Management Systems158 EncrypTight User GuideCAUTIONDo not delete any ETKMSs currently used by any network sets or policies. Before you de

Pagina 66 - EncrypTight User Guide 67

EncrypTight User Guide 15912 Managing IP NetworksIn EncrypTight, networks are the IP networks that you want to protect. One or more of these networks

Pagina 67 - 68 EncrypTight User Guide

Managing IP Networks160 EncrypTight User GuideTo add a network:1 From the EncrypTight Components view, click the Networks tab.The Networks tab lists a

Pagina 68 - 5 Maintenance Tasks

EncrypTight User Guide 171 EncrypTight OverviewEncrypTight™ Policy and Key Manager is an innovative approach to network-wide encryption. EncrypTight a

Pagina 69 - 70 EncrypTight User Guide

Advanced Uses for Networks in PoliciesEncrypTight User Guide 161clear. ETPM accepts non-contiguous network masks, which allow you to create policies b

Pagina 70 - Loading an Existing Workspace

Managing IP Networks162 EncrypTight User GuideFigure 56 Two networks with contiguous addressing defined as a supernet If you group the two networks in

Pagina 71 - Deleting a Workspace

Advanced Uses for Networks in PoliciesEncrypTight User Guide 163Figure 57 Networks with non-contiguous network masks are used in a bypass policy that

Pagina 72 - Installing Software Updates

Managing IP Networks164 EncrypTight User GuideEditing NetworksTo edit an existing network:1 In the EncrypTight Components view, click the Networks tab

Pagina 73 - EncrypTight.exe

Deleting NetworksEncrypTight User Guide 165To delete a network:1 In the EncrypTight Components view, click the Networks tab.2 Right-click the desired

Pagina 74 - Step 5: Upgrade PEP Software

Managing IP Networks166 EncrypTight User Guide

Pagina 75 - 76 EncrypTight User Guide

EncrypTight User Guide 16713 Managing Network SetsA network set is a collection of IP networks, the associated PEPs, and a default ETKMS. A network se

Pagina 76 - EncrypTight User Guide 77

Managing Network Sets168 EncrypTight User GuideTypes of Network SetsThe following examples illustrate the different types of network sets:● Subnet● Lo

Pagina 77 - Upgrading External ETKMSs

Types of Network SetsEncrypTight User Guide 169Figure 61 Network set for a collection of networks Figure 61 illustrates a network set comprised of two

Pagina 78 - EncrypTight User Guide 79

Managing Network Sets170 EncrypTight User GuideAdding a Network SetTo add a Network Set:1 In the EncrypTight Components view, click the Network Sets t

Pagina 79 - 80 EncrypTight User Guide

EncrypTight Overview18 EncrypTight User Guidemultiple Policy Enforcement Points (PEPs) can use common keys, while a centralized platform assumes the f

Pagina 80

Adding a Network SetEncrypTight User Guide 171Key Management SystemSelect the desired Key Management System from the Default ETKMS list. You must sele

Pagina 81 - 82 EncrypTight User Guide

Managing Network Sets172 EncrypTight User GuideFigure 63 Network Set editorImporting Networks and Network SetsIf you need to work with a large number

Pagina 82 - 6 Getting Started with ETEMS

Importing Networks and Network SetsEncrypTight User Guide 173line and is ignored by ETPM during the import operation. In the CSV file, commas are used

Pagina 83 - 84 EncrypTight User Guide

Managing Network Sets174 EncrypTight User GuideTo import networks and network sets into ETPM:1 Create a CSV file that identifies the networks and netw

Pagina 84 - Comparing Configurations

Deleting a Network SetEncrypTight User Guide 175CAUTIONPrior to deleting a network set, modify any policies using that network set to use another netw

Pagina 85 - 86 EncrypTight User Guide

Managing Network Sets176 EncrypTight User Guide

Pagina 86 - EncrypTight User Guide 87

EncrypTight User Guide 17714 Creating VLAN ID Ranges for Layer 2 NetworksIf the network uses VLAN ID tags, you have the option of creating policies th

Pagina 87 - 88 EncrypTight User Guide

Creating VLAN ID Ranges for Layer 2 Networks178 EncrypTight User Guide2 Right-click anywhere in the VLAN Ranges view and then click Add new Element.3

Pagina 88 - Toolbars

Editing a VLAN ID RangeEncrypTight User Guide 179Editing a VLAN ID RangeTo edit a VLAN ID range:1 In the EncrypTight Components view, click the VLAN R

Pagina 89

Creating VLAN ID Ranges for Layer 2 Networks180 EncrypTight User Guide3Click OK.

Pagina 90 - Understanding Roles

Distributed Key TopologiesEncrypTight User Guide 19Regardless of topology, PEPs are typically located at the point in the network where traffic is bei

Pagina 91 - ETEMS access Yes No

EncrypTight User Guide 18115 Creating Distributed Key PoliciesFrom the Policy view, you can add, modify, and delete policies for Layer 3/Layer 4 IP ne

Pagina 92 - EncrypTight User Guide 93

Creating Distributed Key Policies182 EncrypTight User Guide● “Key Generation and ETKMSs” on page 185● “Addressing Mode” on page 185● “Using Encrypt Al

Pagina 93 - 94 EncrypTight User Guide

Policy ConceptsEncrypTight User Guide 183TIPNetwork connectivity problems can prevent new keys from being distributed to the PEPs before the old keys

Pagina 94 - 7 Provisioning Appliances

Creating Distributed Key Policies184 EncrypTight User GuideFigure 69 Data payload encryption Encryption and Authentication AlgorithmsFor Layer 3 IP po

Pagina 95 - Adding a New Appliance

Policy ConceptsEncrypTight User Guide 185Key Generation and ETKMSsWith multicast IP policies and Layer 2 Ethernet policies, you choose a single ETKMS

Pagina 96 - EncrypTight User Guide 97

Creating Distributed Key Policies186 EncrypTight User Guide1 Create a policy to encrypt all data to and from all networks. Assign this policy a relati

Pagina 97 - Viewing Appliance Status

Policy ConceptsEncrypTight User Guide 187Minimizing Policy Size Using EncrypTight with large, complex networks with multiple subnets protected by sepa

Pagina 98 - EncrypTight User Guide 99

Creating Distributed Key Policies188 EncrypTight User GuideAdding Layer 2 Ethernet PoliciesFor Layer 2 Ethernet networks, policies can be created for

Pagina 99

Adding Layer 2 Ethernet PoliciesEncrypTight User Guide 1894Click Save when complete. Table 47 Layer 2 Mesh policy entries Field DescriptionName Enter

Pagina 100 - EncrypTight User Guide 101

Creating Distributed Key Policies190 EncrypTight User GuideFigure 71 Layer 2 Mesh policy editorNOTEIf you need to encrypt or pass in the clear specifi

Pagina 101 - Appliance User Management

EncrypTight Overview20 EncrypTight User GuideEncrypTight Element Management SystemThe EncrypTight Element Management System (ETEMS) is the device mana

Pagina 102 - EncrypTight User Guide 103

Adding Layer 3 IP PoliciesEncrypTight User Guide 191Adding Layer 3 IP PoliciesAn IP policy can be created for hub and spoke, mesh, multicast, and poin

Pagina 103 - User Name Conventions

Creating Distributed Key Policies192 EncrypTight User GuideTo add a new hub and spoke policy:1 In the Policy view, right-click anywhere in the view an

Pagina 104 - EncrypTight User Guide 105

Adding Layer 3 IP PoliciesEncrypTight User Guide 193IPSec Specifies the encryption and authentication algorithms used in an IPSec policy.Select the en

Pagina 105 - Managing Appliance Users

Creating Distributed Key Policies194 EncrypTight User GuideFigure 73 Hub and spoke policy editor

Pagina 106 - EncrypTight User Guide 107

Adding Layer 3 IP PoliciesEncrypTight User Guide 195Adding a Mesh PolicyIn a mesh network, any network or network set can send or receive data from an

Pagina 107 - Deleting ETEP Users

Creating Distributed Key Policies196 EncrypTight User GuideTable 49 Mesh policy entries Field DescriptionName Enter a unique name to identify the pol

Pagina 108 - Viewing ETEP Users

Adding Layer 3 IP PoliciesEncrypTight User Guide 197Addressing Mode OverrideOverrides the Network addressing setting for the network sets. • Preserve

Pagina 109 - 110 EncrypTight User Guide

Creating Distributed Key Policies198 EncrypTight User GuideFigure 75 Mesh policy editor

Pagina 110 - EncrypTight User Guide 111

Adding Layer 3 IP PoliciesEncrypTight User Guide 199Adding a Multicast PolicyIn a multicast network, one or more networks send unidirectional streams

Pagina 111 - 112 EncrypTight User Guide

Creating Distributed Key Policies200 EncrypTight User GuideTo add a multicast policy:1 In the Policy view, right-click anywhere in the view and click

Pagina 112 - EncrypTight User Guide 113

EncrypTight User Guide 3Table of ContentsPreface...

Pagina 113 - 114 EncrypTight User Guide

Distributed Key TopologiesEncrypTight User Guide 21Figure 3 Single ETKMS for multiple sites Figure 4 illustrates an EncrypTight deployment using multi

Pagina 114 - EncrypTight User Guide 115

Adding Layer 3 IP PoliciesEncrypTight User Guide 201IPSec Specifies the encryption and authentication algorithms used in an IPSec policy.Select the en

Pagina 115 - Shutting Down Appliances

Creating Distributed Key Policies202 EncrypTight User GuideFigure 77 Multicast policy editor

Pagina 116 - 8 Managing Appliances

Adding Layer 3 IP PoliciesEncrypTight User Guide 203Adding a Point-to-point PolicyIn a point-to-point network, one network or network set sends and re

Pagina 117 - 118 EncrypTight User Guide

Creating Distributed Key Policies204 EncrypTight User Guide4Click Save when complete. Table 51 Point-to-point policy entries Field DescriptionName En

Pagina 118 - Changing the Address in ETEMS

Adding Layer 3 IP PoliciesEncrypTight User Guide 205Addressing Mode OverrideOverrides the Network addressing setting for the network sets. • Preserve

Pagina 119 - Changing the Date and Time

Creating Distributed Key Policies206 EncrypTight User GuideFigure 79 Point-to-point policy editorAdding Layer 4 PoliciesLayer 4 policies encrypt only

Pagina 120 - EncrypTight User Guide 121

Policy DeploymentEncrypTight User Guide 207You create Layer 4 policies using ETEPs that are configured to operate as Layer 3 PEPs. Create the networks

Pagina 121 - Deleting Appliances

Creating Distributed Key Policies208 EncrypTight User GuideTo verify policies:1Click Tools > Verify policies. ETPM displays a confirmation message

Pagina 122 - Upgrading Appliance Software

Editing a PolicyEncrypTight User Guide 209Figure 81 ETPM Preferences3 Select or clear the Ask for confirmation before deploying a metapolicy checkbox.

Pagina 123 - 124 EncrypTight User Guide

Creating Distributed Key Policies210 EncrypTight User GuideTo delete an existing policy:1 From the Policy view, right-click the desired policy name an

Pagina 124 - EncrypTight User Guide 125

EncrypTight Overview22 EncrypTight User GuideTo securely transfer data between two PEPs over an untrusted network, both PEPs must share a key. One PEP

Pagina 125 - 126 EncrypTight User Guide

EncrypTight User Guide 21116 Policy Design ExamplesThis section provides two examples of creating policies with EncrypTight:● Basic Layer 2 Point-to-P

Pagina 126 - Checking Upgrade Status

Policy Design Examples212 EncrypTight User GuideIn ETEMS, configure the interfaces for both PEPs, then click the Features tab and do the following:1 S

Pagina 127 - 128 EncrypTight User Guide

Layer 2 Ethernet Policy Using VLAN IDsEncrypTight User Guide 213Figure 83 Using VLAN IDs Policy DetailsPolicy 1: Headquarters and BranchesName: HQ/Bra

Pagina 128 - Key Policies

Policy Design Examples214 EncrypTight User GuideTo create the policies:1 In ETEMS, add and configure the ETEPs to operate as Layer 2 PEPs.2 Add the ET

Pagina 129 - 130 EncrypTight User Guide

Complex Layer 3 Policy ExampleEncrypTight User Guide 215The network sets required for this policy are:Using the four network sets, create the mesh pol

Pagina 130 - 9 Getting Started with ETPM

Policy Design Examples216 EncrypTight User GuideThese hub and spoke policies require the four network sets created in “Encrypt Traffic Between Regiona

Pagina 131 - 132 EncrypTight User Guide

Complex Layer 3 Policy ExampleEncrypTight User Guide 217Using Network Sets B, B1, B2, and B3, create a hub and spoke policy for region B as shown in t

Pagina 132 - EncrypTight Components View

Policy Design Examples218 EncrypTight User GuidePassing Routing ProtocolsWith Layer 3 routed networks, you might need to pass routing protocols in the

Pagina 133 - Editors

Complex Layer 3 Policy ExampleEncrypTight User Guide 219This policy must be set to a higher priority than the mesh policy created in “Encrypt Traffic

Pagina 134 - ETPM Status Indicators

Policy Design Examples220 EncrypTight User Guide

Pagina 135 - 136 EncrypTight User Guide

Security within EncrypTightEncrypTight User Guide 23Figure 6 Layer 2 Point-to-Point Deployment Use the Policy Manager (ETPM) and Key Management System

Pagina 137 - About ETPM Policies

222 EncrypTight User Guide

Pagina 138 - EncrypTight User Guide 139

EncrypTight User Guide 22317 ETEMS TroubleshootingThis section includes the following topics:● Possible Problems and Solutions● Pinging the Management

Pagina 139 - 140 EncrypTight User Guide

ETEMS Troubleshooting224 EncrypTight User GuideAppliance Unreachable Symptom Explanation and possible solutionsSymptoms of ETEMS’s inability to commun

Pagina 140 - EncrypTight User Guide 141

Possible Problems and SolutionsEncrypTight User Guide 225Appliance ConfigurationThe ETEP cannot ping the management workstation. The request times out

Pagina 141 - 142 EncrypTight User Guide

ETEMS Troubleshooting226 EncrypTight User GuidePushing ConfigurationsStatus IndicatorsSymptom Explanation and possible solutionsNew configuration isn’

Pagina 142 - EncrypTight User Guide 143

Pinging the Management PortEncrypTight User Guide 227Software UpgradesPinging the Management PortIf ETEMS is having trouble communicating with an appl

Pagina 143 - 144 EncrypTight User Guide

ETEMS Troubleshooting228 EncrypTight User GuideFigure 88 Tools preferencesTo change the default ping tool:1 In the Edit menu, click Preferences.2Click

Pagina 144 - EncrypTight User Guide 145

Retrieving Appliance Log FilesEncrypTight User Guide 229To retrieve log files from an appliance:1 Verify that an FTP server is running on the ETEMS wo

Pagina 145 - 146 EncrypTight User Guide

ETEMS Troubleshooting230 EncrypTight User GuideViewing Diagnostic DataETEMS retrieves the following performance and diagnostic data from an appliance:

Pagina 146 - Provisioning PEPs

EncrypTight Overview24 EncrypTight User GuideSecure Communications Between DevicesEach node in the distributed key system, the EncrypTight management

Pagina 147 - Adding a New PEP in ETEMS

Viewing Diagnostic DataEncrypTight User Guide 231Figure 89 Encryption statistics and packet counters displayed for two ETEPs To display statistics:1 I

Pagina 148 - EncrypTight User Guide 149

ETEMS Troubleshooting232 EncrypTight User GuideViewing Port and Discard StatusThe Status view displays information about local and remote port status,

Pagina 149 - Adding Large Numbers of PEPs

Viewing Diagnostic DataEncrypTight User Guide 233Figure 91 Export the SAD or SPD to a CSV file To export the SAD or SPD from the ETEP:1 In the Applian

Pagina 150 - Editing PEPs

ETEMS Troubleshooting234 EncrypTight User GuideWorking with the Application LogThe application log provides information about significant events and f

Pagina 151 - Editing PEPs From ETPM

Working with the Application LogEncrypTight User Guide 235a On the application log tool bar, click .b In the application log menu, click Activate on

Pagina 152 - Deleting PEPs

ETEMS Troubleshooting236 EncrypTight User GuideFigure 94 Application log filters NOTEIncreasing the visible event limit to a large number (more than 2

Pagina 153 - 4 From ETPM, click Deploy

EncrypTight User Guide 23718 ETPM and ETKMS TroubleshootingThis section provides information to help you with ETPM and ETKMS problem resolution, inclu

Pagina 154 - EncrypTight User Guide 155

ETPM and ETKMS Troubleshooting238 EncrypTight User GuideTable 65 ETPM status problems and solutions TIPAfter you deploy policies, if the indicators a

Pagina 155 - Adding ETKMSs

Learning About ProblemsEncrypTight User Guide 239NOTEAlways check the status of the PEPs in the Policy View after deploying policies, refreshing statu

Pagina 156 - Deleting ETKMSs

ETPM and ETKMS Troubleshooting240 EncrypTight User GuideStatus ErrorsRenew Key ErrorsSymptom Explanation and possible solutionsETEMS cannot verify tha

Pagina 157 - 158 EncrypTight User Guide

EncrypTight User Guide 252 EncrypTight Deployment PlanningWhen deploying EncrypTight, you must plan the following:● EncrypTight Component Connections●

Pagina 158 - 12 Managing IP Networks

Learning About ProblemsEncrypTight User Guide 241Viewing Log FilesEach component in the EncrypTight system creates and maintains log files that you ca

Pagina 159 - 160 EncrypTight User Guide

ETPM and ETKMS Troubleshooting242 EncrypTight User GuidePEP Log FilesYou can retrieve and view log files from any PEP using ETEMS. When a PEP receives

Pagina 160 - EncrypTight User Guide 161

PEP Troubleshooting ToolsEncrypTight User Guide 243Optimizing Time SynchronizationWith NTP, time synchronization does not always happen instantaneousl

Pagina 161 - 162 EncrypTight User Guide

ETPM and ETKMS Troubleshooting244 EncrypTight User GuideStatisticsFor ETEP PEPs, you can use the Statistics view in the ETEMS Appliance Manager to dis

Pagina 162 - EncrypTight User Guide 163

Troubleshooting PoliciesEncrypTight User Guide 245deployed to the PEP, including the destination and source IP addresses, priority, and the policy typ

Pagina 163 - Deleting Networks

ETPM and ETKMS Troubleshooting246 EncrypTight User Guide3 In the MAC Statistics section (for ETEP PEPs), note the values in the Transmit and Receive p

Pagina 164 - To delete a network:

Troubleshooting PoliciesEncrypTight User Guide 247Do one of the following:● In the Appliance Manager view, select the ETEP and choose Tools > Clear

Pagina 165 - 166 EncrypTight User Guide

ETPM and ETKMS Troubleshooting248 EncrypTight User GuideTo fix these issues, redeploy your policies from ETPM to make sure that your PEPs have current

Pagina 166 - 13 Managing Network Sets

Modifying EncrypTight Timing ParametersEncrypTight User Guide 249● For ETPM to ETKMS communications errors, check the ETEMS or ETPM application log fo

Pagina 167 - Types of Network Sets

ETPM and ETKMS Troubleshooting250 EncrypTight User GuideTo add a new PEP in a system configured to use strict authentication:1 In the ETEMS preference

Pagina 168 - EncrypTight User Guide 169

EncrypTight Deployment Planning26 EncrypTight User Guide● “Management Station Connections” on page 26The EncrypTight software includes ETEMS for appli

Pagina 169 - Adding a Network Set

Certificate Implementation ErrorsEncrypTight User Guide 251To disable strict authentication on ETEPs:1 Connect to the serial port of the appliance and

Pagina 170 - EncrypTight User Guide 171

ETPM and ETKMS Troubleshooting252 EncrypTight User Guide

Pagina 173 - Deleting a Network Set

EncrypTight User Guide 25519 Modifying the ETKMS Properties FileThis section provides information about settings in the ETKMS properties file that you

Pagina 174 - EncrypTight User Guide 175

Modifying the ETKMS Properties File256 EncrypTight User GuideHardware Security Module ConfigurationThe following entries control whether the encryptio

Pagina 175 - 176 EncrypTight User Guide

Base Directory for Storing Operational State DataEncrypTight User Guide 257log4j.appender.R.layout=org.apache.log4j.PatternLayoutlog4j.appender.R.layo

Pagina 176 - Networks

Modifying the ETKMS Properties File258 EncrypTight User GuidePolicy Refresh TimingThe policy refresh timing controls the timing between the initiation

Pagina 177 - 178 EncrypTight User Guide

PEP Communications TimingEncrypTight User Guide 259Once the nth retry (defined by retryCount) is unsuccessful, the ETKMS waits a period of time define

Pagina 178 - Deleting a VLAN ID Range

Modifying the ETKMS Properties File260 EncrypTight User Guide

Pagina 179

EncrypTight Component ConnectionsEncrypTight User Guide 27This section describes the planning for the following connections: ● “ETPM and ETKMS on the

Pagina 180 - Policy Concepts

EncrypTight User Guide 26120 Using Enhanced Security FeaturesThis section includes the following topics:● About Enhanced Security Features● About Stri

Pagina 181 - Lifetime

Using Enhanced Security Features262 EncrypTight User Guide● Strong password enforcementETEPs with software version 1.6 or later can be configured to u

Pagina 182 - Encapsulation

About Strict AuthenticationEncrypTight User Guide 263Related topics:● “Prerequisites” on page 263● “Order of Operations” on page 263● “Certificate Inf

Pagina 183 - AriaSupport=true

Using Enhanced Security Features264 EncrypTight User Guide4 Temporarily enable strict authentication in ETEMS and make sure that you can still communi

Pagina 184 - Addressing Mode

Using Certificates in an EncrypTight SystemEncrypTight User Guide 265In usage, you type this string as follows:-dname “cn=<common name>, ou=<

Pagina 185 - 3 Mesh 300 Pass in Clear 17

Using Enhanced Security Features266 EncrypTight User GuideChanging the Keystore PasswordBefore you begin using certificates, you need to change the de

Pagina 186 - Minimizing Policy Size

Changing the Keystore PasswordEncrypTight User Guide 267Changing the Keystore Password on a ETKMSChanging the password on a ETKMS involves multiple st

Pagina 187 - 188 EncrypTight User Guide

Using Enhanced Security Features268 EncrypTight User GuideChanging the Password Used in the ETKMS Properties FileThe ETKMS properties file includes an

Pagina 188 - If no range is

Configuring the Certificate Policies ExtensionEncrypTight User Guide 269./HSMPwdChg.shThe script will print out the new value of the password. Make no

Pagina 189 - 190 EncrypTight User Guide

Using Enhanced Security Features270 EncrypTight User GuideTIPIf you are deploying numerous ETEPs, you can save time by modifying the default configura

Pagina 190 - Adding Layer 3 IP Policies

EncrypTight Deployment Planning28 EncrypTight User GuideFigure 8 In-line ETKMS management in an IP network ETPM and ETKMS in Layer 2 Ethernet Policies

Pagina 191 - 192 EncrypTight User Guide

Configuring the Certificate Policies ExtensionEncrypTight User Guide 271Figure 95 Communications PreferencesAbout the Policy Constraints ExtensionThe

Pagina 192 - EncrypTight User Guide 193

Using Enhanced Security Features272 EncrypTight User GuideWorking with Certificates for EncrypTight and the ETKMSsFor both the workstation running the

Pagina 193 - 194 EncrypTight User Guide

Working with Certificates for EncrypTight and the ETKMSsEncrypTight User Guide 273To generate a key pair:1 From the command line, use the following co

Pagina 194 - Adding a Mesh Policy

Using Enhanced Security Features274 EncrypTight User GuideImporting a CA Certificate Depending on the CA that you use, you could receive a single cert

Pagina 195 - 196 EncrypTight User Guide

Working with Certificates and an HSMEncrypTight User Guide 275Exporting a CertificateFor other devices to authenticate the identity of an entity, they

Pagina 196 - PEPs associated

Using Enhanced Security Features276 EncrypTight User GuideImporting CA Certificates into the HSMTo import CA certificates into the HSM:1 To import a C

Pagina 197 - Figure 75 Mesh policy editor

Working with Certificates for the ETEPsEncrypTight User Guide 277Generating a Certificate Signing Request for the HSMTo generate a certificate signing

Pagina 198 - Adding a Multicast Policy

Using Enhanced Security Features278 EncrypTight User GuideTo start the Certificate Manager do one of the following: ● In the Windows menu, click Open.

Pagina 199 - 200 EncrypTight User Guide

Working with Certificates for the ETEPsEncrypTight User Guide 279The Certificate Requests view displays pending certificate requests for selected appl

Pagina 200 - EncrypTight User Guide 201

Using Enhanced Security Features280 EncrypTight User GuideNOTEThe procedure for obtaining a CA certificate varies with each CA. These are the typical

Pagina 201 - 202 EncrypTight User Guide

EncrypTight Component ConnectionsEncrypTight User Guide 29External ETKMS to ETKMS ConnectionsETKMSs must be able to communicate with each other in two

Pagina 202 - EncrypTight User Guide 203

Working with Certificates for the ETEPsEncrypTight User Guide 281Figure 97 Certificates view shows installed certificates and their usageWorking with

Pagina 203

Using Enhanced Security Features282 EncrypTight User GuideFigure 98 Generate a certificate signing requestTo generate a certificate signing request:1

Pagina 204 - EncrypTight User Guide 205

Working with Certificates for the ETEPsEncrypTight User Guide 283Installing a Signed CertificateWhen a certificate authority accepts a certificate req

Pagina 205 - Adding Layer 4 Policies

Using Enhanced Security Features284 EncrypTight User GuideFigure 100 View pending certificate signing requestsCanceling a Pending Certificate RequestT

Pagina 206 - Policy Deployment

Working with Certificates for the ETEPsEncrypTight User Guide 285The Common Name (CN) defaults to the appliance name; it cannot be set as a preference

Pagina 207 - Deploying Policies

Using Enhanced Security Features286 EncrypTight User Guide● “Deleting a Certificate” on page 287Viewing a CertificateThe Certificate Details view of a

Pagina 208 - Deleting Policies

Validating CertificatesEncrypTight User Guide 287Deleting a CertificateDelete external certificates if they have expired or are no longer used. Extern

Pagina 209 - 210 EncrypTight User Guide

Using Enhanced Security Features288 EncrypTight User Guideyou must remember to periodically retrieve a copy of the CRL and install it on each of the E

Pagina 210 - 16 Policy Design Examples

Validating CertificatesEncrypTight User Guide 289To install a CRL on the ETEP:1 Switch to the Certificate Manager perspective.2 In the Appliances view

Pagina 211 - 212 EncrypTight User Guide

Using Enhanced Security Features290 EncrypTight User GuideIn order to use OCSP, you must enable it on each EncrypTight component. ETEPs can read the U

Pagina 212 - EncrypTight User Guide 213

EncrypTight Deployment Planning30 EncrypTight User GuideConnecting Multiple ETKMSs in an IP NetworkFigure 10 shows two external ETKMSs located on diff

Pagina 213 - 214 EncrypTight User Guide

Validating CertificatesEncrypTight User Guide 291NOTEFor enhanced security, if you want to validate certificates using OCSP only, disable the options

Pagina 214 - EncrypTight User Guide 215

Using Enhanced Security Features292 EncrypTight User GuideEnabling and Disabling Strict AuthenticationAfter you have installed certificates on each En

Pagina 215 - 216 EncrypTight User Guide

Removing CertificatesEncrypTight User Guide 2938Click Put to push the configurations.9Click Close to return to the Appliances view, and then refresh t

Pagina 216 - EncrypTight User Guide 217

Using Enhanced Security Features294 EncrypTight User GuideTo remove certificates:1 If necessary, switch to the Certificate Manager and select the ETEP

Pagina 217 - Passing Routing Protocols

Using a Common Access CardEncrypTight User Guide 2955 Add the authorized common names to the cnAuth.cfg file on the ETKMS. For instructions, see “Conf

Pagina 218 - EncrypTight User Guide 219

Using Enhanced Security Features296 EncrypTight User GuideTo enable CAC Authentication on the ETEP:1 Verify that strict authentication is enabled on t

Pagina 219 - 220 EncrypTight User Guide

Using a Common Access CardEncrypTight User Guide 297NOTEWhen Common Access Card Authentication is enabled, users of the EncrypTight software can log i

Pagina 220 - Part IV Troubleshooting

Using Enhanced Security Features298 EncrypTight User Guide

Pagina 221 - 222 EncrypTight User Guide

EncrypTight User Guide 29921 ETEP ConfigurationThis chapter provides procedures and reference information for configuring ETEP appliances.To prepare t

Pagina 222 - 17 ETEMS Troubleshooting

ETEP Configuration300 EncrypTight User GuideThis section includes the following topics:● Identifying an Appliance● Interface Configuration● Trusted Ho

Pagina 223 - Appliance Unreachable

4 EncrypTight User GuideTable of ContentsUninstalling EncrypTight Software...

Pagina 224 - Appliance Configuration

EncrypTight Component ConnectionsEncrypTight User Guide 31Figure 11 Out-of-band management of ETKMSs located on different Ethernet networks ETKMS to P

Pagina 225 - Status Indicators

Interface ConfigurationEncrypTight User Guide 301● Alphanumeric characters are valid (upper and lower case alpha characters and numbers 0-9)● Spaces a

Pagina 226 - Pinging the Management Port

ETEP Configuration302 EncrypTight User GuideFigure 103 ET0100A interfaces configuration Related topics:● “Management Port Addressing” on page 302● “Au

Pagina 227 - 228 EncrypTight User Guide

Interface ConfigurationEncrypTight User Guide 303ETEPs running software version 1.6 and later include support for IPv4 and IPv6 addresses on the manag

Pagina 228 - EncrypTight User Guide 229

ETEP Configuration304 EncrypTight User GuideFigure 104 Management port default gateway on the ETEP IPv6 AddressingThe use of IPv6 addressing is option

Pagina 229 - Viewing Diagnostic Data

Interface ConfigurationEncrypTight User Guide 305IPv6 addresses often contain consecutive groups of zeros. To further simplify address entry, you can

Pagina 230 - EncrypTight User Guide 231

ETEP Configuration306 EncrypTight User GuideOn the local and remote ports, the ETEPs support the speeds shown in Table 86.NOTEIf you are using copper

Pagina 231 - Exporting SAD and SPD Files

Interface ConfigurationEncrypTight User Guide 307preserves the network addressing of the protected network by copying the original source IP and MAC a

Pagina 232 - CLI Diagnostic Commands

ETEP Configuration308 EncrypTight User GuideIP Address and Subnet MaskEnter the IP address and subnet mask that you want to assign to the port, in dot

Pagina 233 - 234 EncrypTight User Guide

Interface ConfigurationEncrypTight User Guide 309The transmitter behavior configuration should be the same on both the local and remote ports. DHCP Re

Pagina 234 - Setting Log Filters

ETEP Configuration310 EncrypTight User GuideIgnore DF BitWhen the ETEP is configured for use in Layer 3 IP encryption policies, its default behavior i

Pagina 235 - Other Application Log Actions

EncrypTight Deployment Planning32 EncrypTight User GuideFigure 12 In-line ETKMS to PEP communications in IP networks ETKMS to PEP Connections in Ether

Pagina 236 - Learning About Problems

Trusted HostsEncrypTight User Guide 311Related topic:● “Ignore DF Bit” on page 310● “Path Maximum Transmission Unit” on page 326● “Features Configurat

Pagina 237 - Symptoms and Solutions

ETEP Configuration312 EncrypTight User GuideInbound host protocols (HTTPS, ICMP, and SNMP) are enabled and disabled in the Edit Trusted Host window. I

Pagina 238 - Policy Errors

SNMP ConfigurationEncrypTight User Guide 313Figure 108 Trusted host editorRelated topics:● “Appliance Unreachable” on page 224● “IPv6 Addressing” on p

Pagina 239 - Renew Key Errors

ETEP Configuration314 EncrypTight User GuideFigure 109 SNMP configuration for system information, community strings, and trapsTake note of the followi

Pagina 240 - Viewing Log Files

SNMP ConfigurationEncrypTight User Guide 315TrapsTo configure SNMP traps, first select the trap types to be generated. All of the selected trap types

Pagina 241 - ETKMS Troubleshooting Tools

ETEP Configuration316 EncrypTight User GuideNOTEThe coldStart and notifyShutdown traps are always generated, even when Generic traps are disabled.Rela

Pagina 242 - PEP Troubleshooting Tools

SNMP ConfigurationEncrypTight User Guide 317● The engine ID identifies the ETEP as a unique SNMP entity. The ETEP’s engine ID must be configured on ev

Pagina 243 - Statistics

ETEP Configuration318 EncrypTight User Guide● “Configuring the SNMPv3 Trap Host Users” on page 319● “FIPS Mode” on page 331Generating the Engine IDThe

Pagina 244 - Troubleshooting Policies

SNMP ConfigurationEncrypTight User Guide 319Figure 111 Viewing SNMPv3 Engine IDs Related topics:● “Generating the Engine ID” on page 318Configuring th

Pagina 245 - Solving Policy Problems

ETEP Configuration320 EncrypTight User GuideFigure 112 SNMPv3 Trap Host configurationTo configure a trap host user:1 If you haven’t already done so, s

Pagina 246 - Expired Policies

Network Clock SynchronizationEncrypTight User Guide 33Network Clock Synchronization CAUTIONFailure to synchronize the time of all EncrypTight componen

Pagina 247 - . If the status shown in

Logging ConfigurationEncrypTight User Guide 321Related topics:● “FIPS Mode” on page 331● ETEP CLI User Guide, ‘Securing Management Port Traffic with I

Pagina 248 - Cannot Communicate with PEP

ETEP Configuration322 EncrypTight User GuideRelated topics:● “Log Event Settings” on page 322● “Defining Syslog Servers” on page 323● “Log File Manage

Pagina 249 - Invalid Certificate Error

Logging ConfigurationEncrypTight User Guide 323means “error + critical + alert + emergency.” The priorities shown in Table 97 are listed from lowest (

Pagina 250 - EncrypTight User Guide 251

ETEP Configuration324 EncrypTight User GuideRelated topics:● “IPv6 Addressing” on page 304● “Logging Configuration” on page 321● “Log Event Settings”

Pagina 251 - 252 EncrypTight User Guide

Advanced ConfigurationEncrypTight User Guide 325Figure 114 Log files extracted from the ETEPRelated topics:● “Retrieving Appliance Log Files” on page

Pagina 252 - Part V Reference

ETEP Configuration326 EncrypTight User GuidePath Maximum Transmission UnitThe PMTU specifies the maximum payload size of a packet that can be transmit

Pagina 253 - 254 EncrypTight User Guide

Advanced ConfigurationEncrypTight User Guide 327● “Reassembly Mode” on page 310● “Features Configuration” on page 330Non IP Traffic HandlingThe non IP

Pagina 254 - EncrypTight User Guide 255

ETEP Configuration328 EncrypTight User Guide● Maximum number of concurrent login sessions allowed per user● The number of login failures allowed befor

Pagina 255 - Logging Setup

Advanced ConfigurationEncrypTight User Guide 329SSH Access to the ETEPSSH is used for secure remote CLI management sessions through the Ethernet manag

Pagina 256 - EncrypTight User Guide 257

ETEP Configuration330 EncrypTight User Guide3 On the Advanced tab, select Enable IKE VLAN Tag. OCSP SettingsOnline Certificate Status Protocol (OCSP)

Pagina 257 - PEP Communications Timing

EncrypTight Deployment Planning34 EncrypTight User GuideIPv6 addresses are 128-bit addresses consisting of eight hexadecimal groups that are separated

Pagina 258 - FinalPEPRetryWaitTime

Features ConfigurationEncrypTight User Guide 331FIPS ModeWhen operating in FIPS mode, the ETEP must be configured to use FIPS-approved encryption and

Pagina 259 - 260 EncrypTight User Guide

ETEP Configuration332 EncrypTight User Guide● Performs a software integrity test ● Clears pre-existing polices and keys, as described in Table 104. ●

Pagina 260 - EncrypTight User Guide 261

Features ConfigurationEncrypTight User Guide 333● “EncrypTight Settings” on page 333● “Encryption Policy Settings” on page 334● “Creating Layer 2 Poin

Pagina 261 - About Strict Authentication

ETEP Configuration334 EncrypTight User Guide● “Encryption Policy Settings” on page 334● “Working with Policies” on page 334 Encryption Policy Settings

Pagina 262 - Order of Operations

Working with PoliciesEncrypTight User Guide 335Related topics:● “Using EncrypTight Distributed Key Policies” on page 335● “Creating Layer 2 Point-to-P

Pagina 263 - Certificate Information

ETEP Configuration336 EncrypTight User GuideFigure 115 ETEP Policy tabWhen ETEPs are first installed they pass all traffic in the clear until they rec

Pagina 264 - EncrypTight User Guide 265

Working with PoliciesEncrypTight User Guide 337deploy management port IPsec polices while in Layer 2 point-to-point mode, use manual key policies to e

Pagina 265 - 266 EncrypTight User Guide

ETEP Configuration338 EncrypTight User GuideSelecting the Traffic Handling ModeThe ETEP has three options for processing packets:● Encrypt all packets

Pagina 266 - EncrypTight User Guide 267

Factory DefaultsEncrypTight User Guide 339Factory DefaultsETEMS’s factory settings are listed by appliance model and software version for the followin

Pagina 267 - /HSMPwdChg.sh

ETEP Configuration340 EncrypTight User GuideTrusted HostsSNMPDefault gateway NoneFlow control NegotiatedLink speed NegotiatedTransmitter enable Follow

Pagina 268 - ./HSMPwdChg.sh

Network Addressing for IP NetworksEncrypTight User Guide 35Another factor to consider if you plan to use certificates is the size of your EncrypTight

Pagina 269 - 270 EncrypTight User Guide

Factory DefaultsEncrypTight User Guide 341LoggingPolicyAdvancedTable 112 Logging defaultsLogging Default SettingLocal 0 / System InformationalLocal 1

Pagina 270 - EncrypTight User Guide 271

ETEP Configuration342 EncrypTight User GuideFeaturesHard-coded SettingsThe following settings are hard-coded in the ETEP:● Management port PMTU is 140

Pagina 271 - Generating a Key Pair

EncrypTight User Guide 343IndexNumerics3DES, 184Aaddressing mode, 171, 185advanced configurationETEP, 325–329Advanced Encryption Standard, 184AES, 184

Pagina 272 - Requesting a Certificate

Index344 EncrypTight User Guidecertificate revocation lists (CRLs), see CRLs, 287certificatesSee also Certificate Managerabout, 262and common access c

Pagina 273 - Importing a CA Certificate

EncrypTight User Guide 345IndexDdatabaseSee workspacedate and timeabout clock synchronization, 33changing on an appliance, 121configuring on the ETKM

Pagina 274 - Exporting a Certificate

Index346 EncrypTight User Guidedefining appliance configurations, 83maintenance and troubleshooting, 86policy and certificate support, 87pushing confi

Pagina 275 - 276 EncrypTight User Guide

EncrypTight User Guide 347Indexfirewall ports, 39flow control configurationETEP, 305fragmentationETEPchoosing the reassembly mode, 310setting the PMTU

Pagina 276 - <csr filename>

Index348 EncrypTight User Guidehub and spoke policy addressing mode override, 193mesh policy addressing mode override, 197multicast policy addressing

Pagina 277 - 278 EncrypTight User Guide

EncrypTight User Guide 349IndexNTP, 149OOCSPabout, 289communication preferences, 94enabling in EncrypTight, 290enabling in ETEPs, 291enabling on ETKMS

Pagina 278 - Certificate Manager Workflow

Index350 EncrypTight User GuideSee also ETPMintroduction, 20log file, 241monitoring status, 237port configuration See interface configurationport stat

Pagina 279 - 280 EncrypTight User Guide

EncrypTight Deployment Planning36 EncrypTight User GuideFigure 14 Using remote IP and virtual IP addresses to obscure the source address of the origin

Pagina 280

EncrypTight User Guide 351Indexediting on multiple appliances, 152ETEP, 329ETKMS, 51for EncrypTight PEPs, 149software requirements, 38software updates

Pagina 281 - 282 EncrypTight User Guide

Index352 EncrypTight User GuideTriple Data Encryption Standard, 184troubleshootingSee also diagnostic toolsapplication log, 234certificate implementat

Pagina 282 - EncrypTight User Guide 283

724-746-5500 | blackbox.com About Black BoxBlack Box Network Services is your source for more than 118,000 networking and infrastructure products.

Pagina 283 - 284 EncrypTight User Guide

EncrypTight User Guide 373 Installation and ConfigurationThis section describes how to install and configure EncrypTight for the first time, including

Pagina 284 - EncrypTight User Guide 285

Installation and Configuration38 EncrypTight User Guide● “Software Requirements” on page 38● “Firewall Ports” on page 39Hardware RequirementsEncrypTig

Pagina 285 - Viewing a Certificate

EncrypTight Software InstallationEncrypTight User Guide 39Firewall PortsIn order for EncrypTight components to communicate, you need to make sure that

Pagina 286 - Validating Certificates

Installation and Configuration40 EncrypTight User GuideNOTEIt is strongly recommended that you synchronize the workstation hosting the EncrypTight sof

Pagina 287 - 288 EncrypTight User Guide

Table of ContentsEncrypTight User Guide 5Step 2: Prepare ETPM Status and Renew Keys ...

Pagina 288 - EncrypTight User Guide 289

Management Station ConfigurationEncrypTight User Guide 41To start ETEMS:1From the Start menu, select All Programs > EncrypTight.2 In the Login scre

Pagina 289 - 290 EncrypTight User Guide

Installation and Configuration42 EncrypTight User GuideSecuring the Management InterfaceEncrypTight provides the methods listed in Table 7 for encrypt

Pagina 290 - EncrypTight User Guide 291

Installing ETKMSsEncrypTight User Guide 43Configuring the Syslog ServerThe EncrypTight appliance can be configured to send log messages and events to

Pagina 291 - 292 EncrypTight User Guide

Installation and Configuration44 EncrypTight User GuideThis section includes the following topics:● “Basic Configuration for Local ETKMSs” on page 44●

Pagina 292 - Removing Certificates

Configuring ETKMSsEncrypTight User Guide 45To add a local ETKMS:1 In the Appliance Manager, click File > New.2 In the New Appliance editor, from th

Pagina 293 - Using a Common Access Card

Installation and Configuration46 EncrypTight User GuideChanges to the local ETKMS configuration or EncrypTight software may necessitate changes to the

Pagina 294 - Access Cards

Configuring ETKMSsEncrypTight User Guide 47This section includes the following topics:● “Logging Into the ETKMS” on page 47● “Changing the Admin Passw

Pagina 295 - 296 EncrypTight User Guide

Installation and Configuration48 EncrypTight User Guide6Type exit to log out from the admin account.For example:Localhost login: adminPassword:[admin@

Pagina 296 - EncrypTight User Guide 297

Configuring ETKMSsEncrypTight User Guide 49Configure the Network ConnectionThe eth0 connection is the network connection with a path to the management

Pagina 297 - 298 EncrypTight User Guide

Installation and Configuration50 EncrypTight User GuideIPv6Setting up the network connections to use IPv6 addresses requires modifying several files.T

Pagina 298 - 21 ETEP Configuration

6 EncrypTight User GuideTable of ContentsProvisioning Large Numbers of Appliances ...

Pagina 299 - Identifying an Appliance

Configuring ETKMSsEncrypTight User Guide 518 At the command line, restart the ETKMS service by typing service etkms restart and press Enter.Verify the

Pagina 300 - Interface Configuration

Installation and Configuration52 EncrypTight User Guide2 Replace the defaults with your preferred time server. You can specify multiple time servers a

Pagina 301 - Management Port Addressing

Configuring ETKMSsEncrypTight User Guide 53Related topics:● “Configure the Network Connection” on page 49● “Check the Status of the Hardware Security

Pagina 302 - IPv4 Addressing

Installation and Configuration54 EncrypTight User GuideChecking the Status of the ETKMSYou should check that the ETKMS service is running before you p

Pagina 303 - IPv6 Addressing

Policy Enforcement Point ConfigurationEncrypTight User Guide 55Replace x.x.x.x with the IP address or the hostname of the syslog server.7 Save and clo

Pagina 304 - Auto-negotiation - All Ports

Installation and Configuration56 EncrypTight User GuideDefault User Accounts and PasswordsChanging the default passwords for all of the EncrypTight co

Pagina 305 - 306 EncrypTight User Guide

Managing LicensesEncrypTight User Guide 57Before you begin adding PEPs and using the EncrypTight software, contact Customer Support to acquire your li

Pagina 306 - EncrypTight User Guide 307

Installation and Configuration58 EncrypTight User GuideUpgrading LicensesWhen your needs change, you can easily upgrade the number of ETEPs that Encry

Pagina 307 - Transmitter Enable

Next StepsEncrypTight User Guide 596 In ETPM, create your policies. 7 In ETPM, deploy the policies to the ETKMSs and PEPs.

Pagina 308 - DHCP Relay IP Address

Installation and Configuration60 EncrypTight User Guide

Pagina 309 - Reassembly Mode

Table of ContentsEncrypTight User Guide 7Editing PEPs ...

Pagina 310 - Trusted Hosts

EncrypTight User Guide 614 Managing EncrypTight UsersThis section includes the following topics:● Working with EncrypTight User Accounts● Configuring

Pagina 311 - 312 EncrypTight User Guide

Managing EncrypTight Users62 EncrypTight User GuideNOTEIf EncrypTight is managing ETEP 1.4 and later appliances, we recommend creating a user account

Pagina 312 - SNMP Configuration

Configuring EncrypTight User AuthenticationEncrypTight User Guide 63Figure 15 Login preferencesTo set login preferences:1 From the Edit menu, click Pr

Pagina 313 - Community Strings

Managing EncrypTight Users64 EncrypTight User Guide If your EncrypTight deployment includes ETEPs running software version 1.6 or later, entering a p

Pagina 314 - Fans are operating normally

Managing EncrypTight AccountsEncrypTight User Guide 65Although the Login preferences are not saved, user data is preserved through an upgrade (user ID

Pagina 315 - SNMPv2 Trap Hosts

Managing EncrypTight Users66 EncrypTight User GuideTo add an EncrypTight user account:1 From the Edit menu, click User Accounts.2 In the User Accounts

Pagina 316 - EncrypTight User Guide 317

How EncrypTight Users Work with ETEP UsersEncrypTight User Guide 67How EncrypTight Users Work with ETEP UsersEncrypTight manages ETEP user accounts. I

Pagina 317 - Generating the Engine ID

Managing EncrypTight Users68 EncrypTight User Guide3 In EncrypTight, add a new ETEP appliance and refresh its status. Because EncrypTight and the ETEP

Pagina 318 - EncrypTight User Guide 319

EncrypTight User Guide 695 Maintenance TasksThis section includes the following topics:● Working with the EncrypTight Workspace● Installing Software U

Pagina 319 - 320 EncrypTight User Guide

Maintenance Tasks70 EncrypTight User GuideCAUTIONAppliance configurations and policy files are stored as .xml files. These files are not encrypted or

Pagina 320 - Logging Configuration

8 EncrypTight User GuideTable of ContentsAdding a Multicast Policy...

Pagina 321 - Log Event Settings

Working with the EncrypTight WorkspaceEncrypTight User Guide 71Figure 18 Saving one workspace to anotherLoading an Existing WorkspaceReasons for loadi

Pagina 322 - Defining Syslog Servers

Maintenance Tasks72 EncrypTight User Guide4 Refresh the appliances’ status. From the Edit menu click Select All, then click .Related topic:“Moving a

Pagina 323 - Log File Management

Installing Software UpdatesEncrypTight User Guide 73Installing Software UpdatesSoftware updates for EncrypTight are available separately from the PEP

Pagina 324 - Advanced Configuration

Maintenance Tasks74 EncrypTight User GuideYou can schedule the upgrade for each PEP at different time, depending on the rekey settings and data traffi

Pagina 325 - 326 EncrypTight User Guide

Installing Software UpdatesEncrypTight User Guide 75To deploy policies:1Click Tools > Deploy to synchronize the EncrypTight components with the cur

Pagina 326 - Password Strength Policy

Maintenance Tasks76 EncrypTight User GuideCAUTIONSoftware upgrades require a reboot to take effect. Rebooting the PEP interrupts data traffic for appr

Pagina 327 - 328 EncrypTight User Guide

Installing Software UpdatesEncrypTight User Guide 77NOTE● You must reboot the ETEP PEPs after you upgrade. If you make any configuration changes to th

Pagina 328 - IKE VLAN Tags

Maintenance Tasks78 EncrypTight User GuideStep 7: Return Status Refresh and Key Renewal to Original SettingsTo return status refresh and key renewal t

Pagina 329 - Features Configuration

Upgrading External ETKMSsEncrypTight User Guide 79To mount the CDROM drive:1 Insert the disk in the drive and close it.2 If it doesn’t already exist,

Pagina 330 - FIPS Mode

Maintenance Tasks80 EncrypTight User Guide

Pagina 331 - Disabling FIPS

Table of ContentsEncrypTight User Guide 9ETKMS Log Files ...

Pagina 332 - EncrypTight Settings

Part II Working with Appliances using ETEMS

Pagina 333 - Working with Policies

82 EncrypTight User Guide

Pagina 334 - EncrypTight User Guide 335

EncrypTight User Guide 836 Getting Started with ETEMSThis section includes the following topics:● ETEMS Quick Tour● Understanding the ETEMS Workbench●

Pagina 335 - 336 EncrypTight User Guide

Getting Started with ETEMS84 EncrypTight User Guidethe factory default configurations or define your own template for these common values (Edit > D

Pagina 336 - Using Group IDs

ETEMS Quick TourEncrypTight User Guide 85Upgrading Appliance SoftwareNew revisions of appliance software can be loaded on the appliances from an FTP s

Pagina 337 - 338 EncrypTight User Guide

Getting Started with ETEMS86 EncrypTight User GuideFigure 23 Compare the ETEMS configuration to the appliance to discover discrepancies Maintenance an

Pagina 338 - Factory Defaults

Understanding the ETEMS WorkbenchEncrypTight User Guide 87Figure 24 Statistics view displays a snapshot of performance data on the ET0100A Policy and

Pagina 339

Getting Started with ETEMS88 EncrypTight User GuideFigure 25 Appliance Manager perspectiveViewsViews display information about items that ETEMS manage

Pagina 340 - Advanced

Understanding the ETEMS WorkbenchEncrypTight User Guide 89● You can open multiple appliance editors at the same time. The editors are stacked in a tab

Pagina 341 - Hard-coded Settings

Getting Started with ETEMS90 EncrypTight User GuideThe Appliance Manager has its own toolbar that lets you minimize and maximize the view, and filter

Pagina 342 - Numerics

10 EncrypTight User GuideTable of ContentsChanging the EncrypTight Keystore Password ...

Pagina 343 - 344 EncrypTight User Guide

Understanding RolesEncrypTight User Guide 91Understanding RolesEncrypTight and the EncrypTight appliances each have unique roles that control differen

Pagina 344 - EncrypTight User Guide 345

Getting Started with ETEMS92 EncrypTight User Guidedeploying policies. ETEMS uses the Administrator user to log in to the appliance. The Administrator

Pagina 345 - 346 EncrypTight User Guide

Modifying Communication PreferencesEncrypTight User Guide 933 In the Communications window, modify any of the communication preferences (see Table 24

Pagina 346 - EncrypTight User Guide 347

Getting Started with ETEMS94 EncrypTight User GuideIgnore CRL access failureWhen enabled, allows EncrypTight to set up communication with a component

Pagina 347 - 348 EncrypTight User Guide

EncrypTight User Guide 957 Provisioning AppliancesThis section includes the following topics:● Provisioning Basics● Appliance User Management● Working

Pagina 348 - EncrypTight User Guide 349

Provisioning Appliances96 EncrypTight User Guide● “Pushing Configurations to Appliances” on page 97● “Working with Default Configurations” on page 110

Pagina 349 - 350 EncrypTight User Guide

Provisioning BasicsEncrypTight User Guide 97● “Provisioning Large Numbers of Appliances” on page 111● “Provisioning PEPs” on page 147Saving an Applian

Pagina 350 - EncrypTight User Guide 351

Provisioning Appliances98 EncrypTight User Guide3 Optionally, for ETEP appliances with software version 1.6 and later, click Put Throughput License to

Pagina 351 - 352 EncrypTight User Guide

Provisioning BasicsEncrypTight User Guide 99Figure 27 Appliances viewBy default, automatic status refresh is disabled. You can refresh the status manu

Pagina 352 - BLACK BOX

Provisioning Appliances100 EncrypTight User GuideRelated topics:● “Comparing Configurations” on page 100● “Filtering Appliances Based on Address” on p

Comentarios a estos manuales

Sin comentarios