Motorola WiNG 5 System Reference Manual page 163

Table of Contents

Advertisement

Mode
19. Select
OK
to save the changes made within the Transform Set screen. Select
configuration
20. Select the
Crypto Map
tab.
Use crypto maps (as applied to IPSec VPN) to combine the elements used to create IPSec SAs (including transform
sets).
21. Review the following Crypto Map configuration parameters to assess their relevance:
Name
Use the drop-down menu to select either Tunnel or Transport as the IPSec
tunnel type used with the transform set. Tunnel is used for site-to-site VPN
and Transport should be used for remote VPN deployments.
Figure 5-54 Profile Security - VPN Crypto Map screen
Lists the 32 character maximum name assigned for each crypto map upon
creation. This name cannot be modified as part of the edit process.
Device Configuration 5 - 103
Reset
to revert to the last saved

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents