Download Print this page

Extreme Networks Summit WM3000 Series Reference Manual page 378

Summit wm3000 series controller system software version 4.0

Advertisement

Controller Security
4 Revise the following information as required to render the existing transform set useful.
Name
AH Authentication
Scheme
ESP Encryption
Scheme
ESP Authentication
Scheme
378
The name is read-only and cannot be modified unless a new transform
set is created.
Use AH
Select the
checkbox (if necessary) to modify the AH Transform
Authentication scheme. Options include:
None
- No AH authentication is used.
AH-MD5-HMAC
- AH with the MD5 (HMAC variant) authentication
algorithm.
AH-SHA-HMAC
- AH with the SHA (HMAC variant) authentication
algorithm.
Use ESP
Select the
checkbox (if necessary) to modify the ESP Encryption
Scheme. Options include:
None
- No ESP encryption is used with the transform set.
ESP-DES
- ESP with the 56-bit DES encryption algorithm.
ESP-3DES
- ESP with 3DES, ESP with AES.
ESP-AES
- ESP with 3DES, ESP with AES (128 bit key).
ESP-AES 192
- ESP with 3DES, ESP with AES (192 bit key).
ESP-AES 256
- ESP with 3DES, ESP with AES (256 bit key).
Select the
Use ESP
checkbox (if necessary) to modify the ESP
Authentication Scheme. Options include:
None
- No ESP authentication is used with the transform set.
MD5-HMAC
- AH with the MD5 (HMAC variant) authentication
algorithm.
SHA-HMAC
- AH with the SHA (HMAC variant) authentication
algorithm.
Summit WM3000 Series Controller System Reference Guide

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Summit wm3600Summit wm3700