Download Print this page

Extreme Networks Summit WM3000 Series Reference Manual page 388

Summit wm3000 series controller system software version 4.0

Advertisement

Controller Security
3 Refer to the read-only information displayed within the Peers tab to determine whether a peer
configuration (among those listed) requires modification or a new peer requires creation.
Priority / Seq #
Crypto Map Name
IKE Peer
4 If a Crypto Map Seq # or IKE peer requires revision, select it from amongst those displayed and click
the Edit button.
5 Select an existing Crypto Map and click the Delete button to remove it from the list of those
available to the controller.
6 If a new peer requires creation, click the Add button.
388
Displays each peer's Seq # (sequence number) to distinguish one from
the other.
Displays the name assigned to the peer to differentiate it from others with
similar configurations.
Displays the IKE peer used with the Crypto Map to build an IPSec
security association.
Summit WM3000 Series Controller System Reference Guide

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Summit wm3600Summit wm3700