Motorola RFS Series Reference Manual page 376

Wireless lan switches wing system
Hide thumbs Also See for RFS Series:
Table of Contents

Advertisement

6-62 Motorola RF Switch System Reference Guide
m. Refer to the
Crypto Map. Again, a transform set represents a combination of security protocols and algorithms.
During the IPSec security association negotiation, peers agree to use a particular transform set for
protecting data flow.
7. Click
OK
to save the new Crypto Map and display it within the Crypto Map tab.
6.8.4.2 Crypto Map Peers
To review, revise or add Crypto Map peers:
1. Select
Security
2. Click the
Crypto Maps
3. Refer to the read-only information displayed within the
configuration (among those listed) requires modification or a new peer requires creation.
Priority / Seq #
Crypto Map Name
IKE Peer
4. If a Crypto Map Seq # or IKE peer requires revision, select it from amongst those displayed and click the
Edit
button.
5. Select an existing Crypto Map and click the Delete button to remove it from the list of those available to
the switch.
Transform Sets (select one)
>
IPSec VPN
from the main menu tree.
tab and select Peers.
Displays each peer's Seq # (sequence number) to distinguish one from the other.
Displays the name assigned to the peer to differentiate it from others with similar
configurations.
Displays the IKE peer used with the Crypto Map to build an IPSec security
association.
field to select and assign a transform set for v with
Peers
tab to determine whether a peer

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ws5100 3.3Rfs6000 3.3Rfs7000 1.3

Table of Contents