Motorola RFS7000 Series System Reference Manual page 349

Rf switch
Hide thumbs Also See for RFS7000 Series:
Table of Contents

Advertisement

3. Refer to the read-only information displayed within the
Crypto Map with a manually defined security association requires modification or a new one requires
creation.
Priority / Seq #
Name
IKE Peer
ACL ID
Transform Set
4. If a Crypto Map with a manual security association requires revision, select it from amongst those
displayed and click the
5. Select an existing table entry and click the
to the switch.
6. If a new Crypto Map manual security association requires creation, click the
a. Define the
Seq
the number, the higher the priority.
b. Provide a unique
configurations.
c. Enter the name of the
Displays the Seq # (sequence number) used to determine priority. The lower
the number, the higher the priority.
Displays the name assigned to the security association.
Displays the IKE peer used with the Crypto Map to build an IPSec security
association.
Displays the ACL ID the Crypto Map's data flow is using to establish access
permissions.
Displays the transform set representing a combination of security protocols
and algorithms. During the IPSec security association negotiation, peers agree
to use a particular transform set for protecting the data flow.
Edit
button to revise its Seq #, IKE Peer, ACL ID and security protocol.
Delete
#. The sequence number determines priority among Crypto Maps. The lower
Name
for this Crypto Map to differentiate it from others with similar
IKE Peer
used to build an IPSec security association.
Manual SAs
tab to determine whether a
button to remove it from the list of those available
6-65
Switch Security
Add
button.

Advertisement

Table of Contents
loading

Table of Contents