Download Print this page

Extreme Networks Summit WM3000 Series Reference Manual page 390

Summit wm3000 series controller system software version 4.0

Advertisement

Controller Security
3 Refer to the read-only information displayed within the Manual SAs tab to determine whether a
Crypto Map (with a manually defined security association) requires modification or if a new one
requires creation.
Priority / Seq #
Name
IKE Peer
ACL ID
Transform Set
4 If a Crypto Map with a manual security association requires revision, select it from amongst those
displayed and click the Edit button to revise its Seq #, IKE Peer, ACL ID and security protocol.
5 Select an existing table entry and click the Delete button to remove it from the list of those available
to the controller.
6 If a new Crypto Map manual security association requires creation, click the Add button
390
Displays the Seq # (sequence number) used to determine priority. the
lower the number the higher the priority.
Displays the name assigned to the security association.
Displays the IKE peer used with the Crypto Map to build an IPSec
security association.
Displays the ACL ID the Crypto Map's data flow uses to establish access
permissions.
Displays the transform set representing a combination of security
protocols and algorithms. During the security association negotiation,
peers agree to use a particular transform set for protecting the data flow.
Summit WM3000 Series Controller System Reference Guide

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Summit wm3600Summit wm3700