Crypto Map Transform Sets - Motorola RFS7000 Series System Reference Manual

Rf switch
Hide thumbs Also See for RFS7000 Series:
Table of Contents

Advertisement

6-66
Switch Security
d. Use the
ACL ID
the selected ACL.
e. Select either the
association is an AH Transform Authentication scheme or an ESP Encryption Transform scheme.
The AH SPI or ESP SPI fields and key fields become enabled depending on which radio button is
selected.
f. Define the
In AH SPI
been selected.
g. Use the
Transform Set
of security protocols and algorithms. During the IPSec security association negotiation, peers
agree to use the transform set for protecting the data flow. A new manual security association
cannot be generated without the selection of a transform set. A default transform set is available
if none are defined.
7. Click
OK
when completed to save the configuration of the Crypto Map security association.

6.8.4.4 Crypto Map Transform Sets

A transform set is a combination of security protocols and algorithms that define how the switch protects data.
To review, revise or add a Crypto Map transform set:
1. Select
Security
>
2. Click the
Crypto Maps
drop-down menu to permit a Crypto Map data flow using the permissions within
AH
or
ESP
radio button to define whether the Crypto Map's manual security
and
Auth Keys
or
In Esp
drop-down menu to select the transform set representing a combination
IPSec VPN
from the main menu tree.
tab and select
Transform
and
Cipher Keys
depending on which option has
Sets.

Advertisement

Table of Contents
loading

Table of Contents