Motorola WiNG 5.5 Reference Manual page 374

Table of Contents

Advertisement

5 - 288 WiNG 5.5 Access Point System Reference Guide
6. Click the
Add Peer
for the VPN Tunnel.
7. Click the
Next
8. Configure the following IPSec parameters:
Transform Set
Encryption
Authentication
button to add the Tunnel peer information into the Peer(s) table. This table lists all the peers configured
button to go to the next configuration screen. Use the
Figure 5-181 VPN Step-By-Step Wizard - Step 3
Transform set is a set of configurations exchanged for creating the VPN tunnel and impose a
security policy.The transform set is comprised of the following:
• Encryption – The encryption to use for creating the tunnel.
• Authentication – The authentication used to identify tunnel peers
• Mode – The mode of the tunnel. This is how the tunnel will operate.
From the drop-down, select any pre-configured Transform Set or click the Create New Policy
to create a new transform set.
This field is enabled when Create New Policy is selected in Transform Set field. This is the
encryption that is used on data traversing through the tunnel. Select from esp-null, des, 3des,
aes, aes-192 and aes-256 algorithms.
This field is enabled when Create New Policy is selected in Transform Set field. This is the
method peers authenticate as the source of the packet to other peers after a VPN Tunnel has
been created. Select from MD5 or SHA.
Back
button to go to the previous step.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents