Defining The Ipsec Configuration - Motorola RFS Series Reference Manual

Wireless lan switches wing system
Hide thumbs Also See for RFS Series:
Table of Contents

Advertisement

6-50 Motorola RF Switch System Reference Guide
• Create Crypto Map entries
When IKE is used to establish security associations, the IPSec peers can negotiate the settings they use
for the new security associations. Therefore, specify lists (such as lists of acceptable transforms) within
the Crypto Map entry.
• Apply Crypto Map sets to Interfaces
Assign a Crypto Map set to each interface through which IPSec traffic flows. The security appliance
supports IPSec on all interfaces. Assigning the Crypto Map set to an interface instructs the security
appliance to evaluate all the traffic against the Crypto Map set and use the specified policy during
connection or SA negotiation. Assigning a Crypto Map to an interface also initializes run-time data
structures (such as the SA database and the security policy database). Reassigning a modified Crypto
Map to the interface resynchronizes the run-time data structures with the Crypto Map configuration.
With the switch, a Crypto Map cannot get applied to more than one interface at a time.
• Monitor and maintain IPSec tunnels
New configuration changes only take effect when negotiating subsequent security associations. If you
want the new settings to take immediate effect, clear the existing security associations so they will be
re-established with the changed configuration.
For manually established security associations, clear and reinitialize the security associations or the
changes will not take effect.
For more information on configuring IPSec VPN, refer to the following:

Defining the IPSec Configuration

Defining the IPSec VPN Remote Configuration
Configuring IPSEC VPN Authentication
Configuring Crypto Maps
Viewing IPSec Security Associations
6.8.1 Defining the IPSec Configuration
Use the IPSec VPN
association lifetime and keep alive intervals used to maintain the sessions between VPN peers. From the
Configuration tab, transform sets can be created as existing sets, modified or deleted.
1. Select
Security
Configuration
tab to view the attributes of existing VPN tunnels and modify the security
>
IPSec VPN
from the main menu tree.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ws5100 3.3Rfs6000 3.3Rfs7000 1.3

Table of Contents