ETEP CLI User Guide
57
4
Creating Policies
This section includes the following topics:
Creating Layer 2 Point-to-Point Policies
Securing Management Port Traffic with IPsec
This chapter explains how to create standalone policies on the data path and on the management port
using the CLI commands. Standalone policies are typically point-to-point policies. They are configured,
managed, and keyed independently from the EncrypTight distributed key policies.
Policy configuration commands are available to the Admin user.
NOTE
We recommend setting the time on the ETEPs before setting up your policies. Changing the clocks after
the policy is established may cause traffic to be dropped.
Creating Layer 2 Point-to-Point Policies
It takes only a few minutes to configure the ETEP for Layer 2 point-to-point operation. After completing
the initial setup as described in
, perform the following tasks for each appliance:
1 Configure a Layer 2 point-to-point policy.
2 Define the policy mode, which configures the ETEP for Layer 2 and sets its keying method.
To learn about the keying method and algorithms that the ETEP uses to secure traffic in Layer 2 point-to-
point policies, see
“How the ETEP Encrypts and Authenticates Layer 2 Traffic” on page 63
Related topics:
●
“Defining a Layer 2 Point-to-Point Policy” on page 58
●
“Configuring the Policy Mode” on page 59
●
“Layer 2 Policy Example” on page 60
●
Содержание ET0010A
Страница 7: ...8 ETEP CLI User Guide Contents...
Страница 15: ...Getting Started 16 ETEP CLI User Guide...
Страница 33: ...User Administration 34 ETEP CLI User Guide...
Страница 55: ...Configuring the ETEP 56 ETEP CLI User Guide...
Страница 97: ...Creating Policies 98 ETEP CLI User Guide...
Страница 101: ...Maintenance 102 ETEP CLI User Guide...
Страница 119: ...Troubleshooting 120 ETEP CLI User Guide...
Страница 123: ...FIPS 140 2 Level 2 Operation 124 ETEP CLI User Guide...
Страница 205: ...Command Reference 206 ETEP CLI User Guide...
Страница 211: ...Index 212 ETEP CLI User Guide...