Motorola WS5100 Series Reference Manual page 331

Hide thumbs Also See for WS5100 Series:
Table of Contents

Advertisement

a. Define the
b. Enter the name of the
7. Click
OK
to save the configuration of the new Crypto Map peer.
6.8.4.3 Crypto Map Manual SAs
To review, revise or add a Crypto Map using a manually defined security association:
1. Select
Security
2. Click the
Crypto Maps
3. Refer to the read-only information displayed within the
Map (with a manually defined security association) requires modification or if a new one requires
creation.
Priority / Seq #
Name
IKE Peer
ACL ID
Transform Set
4. If a Crypto Map with a manual security association requires revision, select it from amongst those
displayed and click the
Seq # /Name
for the new peer.
IKE Peer
used with the Crypto Map to build an IPSec security association.
>
IPSec VPN
from the main menu tree.
tab and select
Manual
Displays the Seq # (sequence number) used to determine priority. the lower the
number the higher the priority.
Displays the name assigned to the security association.
Displays the IKE peer used with the Crypto Map to build an IPSec security
association.
Displays the ACL ID the Crypto Map's data flow uses to establish access
permissions.
Displays the transform set representing a combination of security protocols and
algorithms. During the security association negotiation, peers agree to use a
particular transform set for protecting the data flow.
Edit
button to revise its Seq #, IKE Peer, ACL ID and security protocol.
SAs.
Manual SAs
tab to determine whether a Crypto
6-61
Switch Security

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents