Motorola RFS Series System Reference Manual page 439

Wireless lan switches wing system
Hide thumbs Also See for RFS Series:
Table of Contents

Advertisement

6. Click the
Add
button to define the attributes of a new Crypto Map.
a. Assign a
Seq #
(sequence number) to distinguish one Crypto Map from the another.
b. Assign the Crypto Map a
c. Use the
None, Domain Name
domain name (FQDN) or host name of the host exchanging identity information.
d. Define a
SA Lifetime (secs)
association negotiation.
e. Define a
SA Lifetime (Kb)
has passed through the IPSec tunnel using the security association.
f. Use the
ACL ID
drop-down menu to permit a Crypto Map data flow using the permissions within the
selected ACL.
g. Use the
PFS
drop-down menu to specify a group to require perfect forward secrecy (PFS) in requests
received from the peer.
h. Use the
Remote Type
i. Optionally select the
for each source/destination host pair.
j. Refer to the
Peers (add choices)
or remove existing peers. For information on adding or modifying peers, see
Crypto Map Peers on page
k. Refer to the
Transform Sets (select one)
Map. Again, a transform set represents a combination of security protocols and algorithms. During
the IPSec security association negotiation, peers agree to use a particular transform set for
protecting data flow.
Name
to differentiate from others with similar configurations.
or
Host Name
to define an interval (in seconds) that (when expired) forces a new
to time out the security association after the specified traffic (in kilobytes)
drop-down menu to specify a remote type (either
SA Per Host
checkbox to specify that separate IPSec SAs should be requested
field and use the Add and Delete functions as necessary to add
6-86.
field to select and assign a transform set for v with Crypto
radio buttons to select and enter the fully qualified
XAuth
6-85
Switch Security
or L2TP).

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rfs4000 4.3Rfs6000 4.3Rfs7000 4.3

Table of Contents