Download Print this page

Crypto Map Transform Sets - Extreme Networks Summit WM3000 Series Reference Manual

Summit wm3000 series controller system software version 4.0

Advertisement

Controller Security

Crypto Map Transform Sets

A transform set is a combination of security protocols and algorithms defining how the controller
protects data.
To review, revise or add a Crypto Map transform set:
1 Select Security > IPSec VPN from the main menu tree.
2 Click the Crypto Maps tab and select Transform Sets.
3 Refer to the read-only information displayed within the Transform Sets tab to determine whether a
Crypto Map transform set requires modification or a new one requires creation.
Priority / Seq #
Name
Transform Set
4 Select an existing Crypto Map and click the Edit button to revise its Seq #, Name and Transform Set.
5 Select an existing entry from the table and click the Delete button to remove it from the list.
6 If a new Crypto Map transform set requires creation, click the Add button.
392
Displays the Seq # (sequence number) used to determine priority.
Displays the name assigned to the Crypto Map that's using the transform
set.
Displays the transform set representing a combination of security
protocols and algorithms. During the IPSec security association
negotiation, peers agree to use the transform set for protecting the data
flow.
Summit WM3000 Series Controller System Reference Guide

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Summit wm3600Summit wm3700