Motorola WiNG 5 System Reference Manual page 164

Table of Contents

Advertisement

5 - 104 WiNG 5 Access Point System Reference Guide
Type
IP Firewall Rules
IPSec Transform Set
22. If requiring a new crypto map configuration, select the
crypto map, select it from amongst those available and select the
23. If adding a new crypto map, assign it a name up to 32 characters in length as a unique identifier. Select the
Continue
Displays the site-to-site-manual, site-to-site-auto or remote VPN
configuration defined for each listed cyrpto map configuration. With
site-to-site deployments, an IPSEC Tunnel is deployed between two
gateways, each at the edge of two different remote networks. With remote
VPN, an access point located at remote branch defines a tunnel with a
security gateway. This facilitates the endpoints in the branch office to
communicate with the destination endpoints (behind the security gateway)
in a secure manner.
Lists the IP firewall rules defined for each displayed crypto map
configuration. Each firewall policy contains a unique set of access/deny
permissions applied to the VPN tunnel and its peer connection.
Displays the transform set (encryption and has algorithms) applied to each
listed crypto map configuration. Thus, each crypto map can be customized
with its own data protection and peer authentication schemes.
button to proceed to the
VPN Crypto Map
Add
button. If updating the configuration of an existing
Edit
button.
screen.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents