ETEP CLI User Guide
57
4
Creating Policies
This section includes the following topics:
Creating Layer 2 Point-to-Point Policies
Securing Management Port Traffic with IPsec
This chapter explains how to create standalone policies on the data path and on the management port
using the CLI commands. Standalone policies are typically point-to-point policies. They are configured,
managed, and keyed independently from the EncrypTight distributed key policies.
Policy configuration commands are available to the Admin user.
NOTE
We recommend setting the time on the ETEPs before setting up your policies. Changing the clocks after
the policy is established may cause traffic to be dropped.
Creating Layer 2 Point-to-Point Policies
It takes only a few minutes to configure the ETEP for Layer 2 point-to-point operation. After completing
the initial setup as described in
, perform the following tasks for each appliance:
1 Configure a Layer 2 point-to-point policy.
2 Define the policy mode, which configures the ETEP for Layer 2 and sets its keying method.
To learn about the keying method and algorithms that the ETEP uses to secure traffic in Layer 2 point-to-
point policies, see
“How the ETEP Encrypts and Authenticates Layer 2 Traffic” on page 63
Related topics:
●
“Defining a Layer 2 Point-to-Point Policy” on page 58
●
“Configuring the Policy Mode” on page 59
●
“Layer 2 Policy Example” on page 60
●
Summary of Contents for ET0010A
Page 7: ...8 ETEP CLI User Guide Contents...
Page 15: ...Getting Started 16 ETEP CLI User Guide...
Page 33: ...User Administration 34 ETEP CLI User Guide...
Page 55: ...Configuring the ETEP 56 ETEP CLI User Guide...
Page 97: ...Creating Policies 98 ETEP CLI User Guide...
Page 101: ...Maintenance 102 ETEP CLI User Guide...
Page 119: ...Troubleshooting 120 ETEP CLI User Guide...
Page 123: ...FIPS 140 2 Level 2 Operation 124 ETEP CLI User Guide...
Page 205: ...Command Reference 206 ETEP CLI User Guide...
Page 211: ...Index 212 ETEP CLI User Guide...