Download Print this page

Extreme Networks Summit WM3000 Series Reference Manual page 391

Summit wm3000 series controller system software version 4.0

Advertisement

a Define the Seq #. The sequence number determines priority among Crypto Maps. The lower the
number, the higher the priority.
b Provide a unique Name for this Crypto Map to differentiate it from others with similar
configurations.
c Enter the name of the IKE Peer used to build an IPSec security association.
d Use the ACL ID drop-down menu to permit a Crypto Map data flow using the unique
permissions within the selected ACL.
e Select either the AH or ESP radio button to define whether the Crypto Map's manual security
association is an AH Transform Authentication scheme or an ESP Encryption Transform scheme. The
AH SPI or ESP SPI fields become enabled depending on the radio button selected.
f
Define the In AH SPI and Auth Keys or In Esp and Cipher Keys depending on which option has
been selected.
g Use the Transform Set drop-down menu to select the transform set representing a combination of
security protocols and algorithms. During the IPSec security association negotiation, peers agree
to use the transform set for protecting the data flow. A new manual security association cannot be
generated without the selection of a transform set. A default transform set is available (if none are
defined).
7 Click OK when completed to save the configuration of the Crypto Map security association.
Summit WM3000 Series Controller System Reference Guide
391

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Summit wm3600Summit wm3700