Motorola WiNG 5.4.2 System Reference Manual page 159

Table of Contents

Advertisement

24. Review the following before determining whether to add or modify a crypto map configuration:
Sequence
Type
IP Firewall Rules
IPSec Transform Set
25. If requiring a new crypto map configuration, select the
select it from amongst those available and select the
Figure 5-55 Profile Security - VPN Crypto Map screen
Each crypto map configuration uses a list of entries based on a sequence number. Specifying
multiple sequence numbers within the same crypto map, provides the flexibility to connect
to multiple peers from the same interface, based on the sequence number (from 1 - 1,000).
Displays the site-to-site-manual, site-to-site-auto or remote VPN configuration defined for
each listed cyrpto map configuration.
Lists the IP firewall rules defined for each displayed crypto map configuration. Each firewall
policy contains a unique set of access/deny permissions applied to the VPN tunnel and its
peer connection.
Displays the transform set (encryption and hash algorithms) applied to each listed crypto map
configuration. Thus, each crypto map can be customized with its own data protection and
peer authentication schemes.
Add
Edit
button. If updating the configuration of an existing crypto map,
button.
5 - 93

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents