Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Security Reviews

Setup

Due to its server-oriented nature, testing PGP Universal required a unique test set up. I configured two networks: Arpstorm and Foobar. The Arpstorm network was the network that the product was deployed on, while the Foobar network was the external network that messages would be sent to.

Both networks ran Windows Server 2003 Enterprise Edition, which managed their mail and DNS servers, and hosts on both networks ran Windows XP Professional. In order to eliminate any unforeseen variables such as hardware or network difficulties, and since my goal was a functional review of the product and not any performance benchmarking, I set up both of these networks on a machine running VMWare Workstation.

It is important to note that the above Windows clients and servers were chosen because they are supported by PGP Corp. While my experience with the product leads me to believe that Open Source applications would be able to manage an installation of PGP Universal, with the exception of the Thunderbird mail client, there are no Open Source applications that are supported at this time.

Initial setup screen for PGP Universal

Figure 5: Initial setup screen for PGP Universal
(Click image for more detail)

As previously noted, PGP Universal is installed on a dedicated host on an organization's network. The product can be set up in one of two configurations - gateway placement, or internal placement.

In gateway placement, the host sits logically outside of the mail server (and outside the network's firewall) and encrypts outbound mail after it is sent from the server.

In internal placement, the host sits logically behind a company firewall and between clients and the mail server. In this configuration, Universal encrypts outbound email before it hits the server, where it sits queued in encrypted form before being sent on its way.

Since MX records and DNS names must be updated differently for each of these configurations, the placement decision must be made before starting installation. Something else that needs to be considered when choosing the installation configuration is the protocols that will be used for email. POP or IMAP may only be utilized with the internal server placement, while SMTP may be used with both placement methods.

Linux packages being unpacked onto the system

Figure 6: Linux packages being unpacked onto the system
(Click image for more detail.)

I chose an internal placement and started to set up the server. Booting the dedicated (virtual) machine - since Universal will wipe the hard drive of whatever you put it on - with install CD in place briefly displayed a loading screen followed by a prompt where we could enter any options for installation. Since I was ok with the default network IP addressing used (Universal assigns itself an IP of 192.168.1.100), I didn't need to use the customnet argument and simply hit Enter.

The program then pretty much installed itself, unpacking and installing all of the necessary Linux packages such as Java and Tomcat, and then restarted.

The PGP Universal setup page welcomes you in seven different languages

Figure 7: The PGP Universal setup page welcomes you in seven different languages

When the dust had cleared from the restart, I was able to log into the PGP Universal Server via a web browser from another machine on the network and configure it. This was an easy enough process, and after entering information about my test network such as DNS and mail servers and assigning the Universal box its own name, the system restarted once more. (Note that I had to to update our DNS server's host records to allow other machines on the network to access it via name.)

In the next and final part of this review I'll dive deeper into PGP Universal to see if it lives up to its claim of effectively implementing automatic email encryption for an entire organization.

More Stuff

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

Asuswrt-Merlin 384.19 beta is now available (except for the RT-AX56U which won't be available for this release, due to outdated GPL code).The main cha...
Hello, this is my first post. Looking for a new six-bay NAS. I have own both brands before older smaller models. I would like to have two more drive b...
Ver 384.18RT-AC3100I run amtm and tried to update "u"I got an error in ep update checkCode: ep manage Entware packages upd err ! Entware: bin.e...
Ver 384.18 through 384.19 so farI don't know how long it has been a bug but at least for the last 2 versI have 2 issues:I am not able to save anything...
Which one is better?I need to enable VPN in my router and the VPN that I use which is hide.me told me that I cannot do it on my TP-Link Archer C5400X ...

Don't Miss These

  • 1
  • 2
  • 3