6 - 80 WiNG 4.4 Switch System Reference Guide
12.If necessary, select an existing user and click the
User Table.
6.7.4 Configuring Crypto Maps
Crypto Maps allow you to set restrictions preventing peers with specific certificates (especially certificates with particular
DNs) from accessing selected encrypted interfaces. If restricting access, specify a fewer number of Crypto Maps (referring
to large identity sections) instead of specifying a large number of Crypto Maps (referring to small identity sections).
To define the Crypto Map configuration:
1. Select
Security
2. Click the
Crypto Maps
The Crypto Maps screen is divided into 5 tabs, each serving a unique function in the overall Crypto Map configuration.
Refer to the following:
•
Crypto Map Entries
•
Crypto Map Peers
•
Crypto Map Manual SAs
•
Crypto Map Transform Sets
•
Crypto Map Interfaces
6.7.4.1 Crypto Map Entries
To review, revise or add Crypto Map entries:
1. Select
Security
>
IPSec VPN
from the main menu tree.
tab.
>
IPSec VPN
from the main menu tree.
Delete
button to remove that user from the list available within the