Motorola WiNG 5.4.2 System Reference Manual page 252

Table of Contents

Advertisement

5 - 186 WiNG 5.4.2 Access Point System Reference Guide
17. Use the
IP Inbound Firewall Rules
Interface.
18. Use the
VPN Crypto Map
19. Select the
Dynamic Routing
Figure 5-114 Profile Overrides - Virtual Interfaces Security screen
drop-down menu to select the firewall rule configuration to apply to this Virtual
drop-down menu to define the cryptography map to use with this virtual interface.
tab.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents