Motorola WiNG 5 System Reference Manual page 161

Table of Contents

Advertisement

Remote Identity
IKE Policy Name
14. Select
OK
to save the changes made within the Peer Configuration screen. Select
configuration.
15. Select the
Transform Set
Create or modify Transform Set configurations to specify how traffic is protected within crypto ACL defining the traffic
that needs to be protected.
16. Review the following attributes of existing
Name
Select the access point's remote identifier used with this peer configuration
for an IKE exchange with the target VPN IPSec peer. Options include IP
Address, Distinguished Name, FQDN, email and string. The default setting is
string.
Select the IKEv1 or IKE v2 policy name (and settings) to apply to this peer
configuration. If a policy requires creation, select the Create icon.
tab.
Figure 5-52 Profile Security - VPN Transform Set screen
Transform Set
Lists the 32 character maximum name assigned to each listed transform set
upon creation. Again, a transform set is a combination of security protocols,
algorithms and other settings applied to IPSec protected traffic.
Device Configuration 5 - 101
Reset
configurations:
to revert to the last saved

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents