Configuring Crypto Maps - Motorola WiNG 4.4 Reference Manual

Table of Contents

Advertisement

6 - 80 WiNG 4.4 Switch System Reference Guide
12.If necessary, select an existing user and click the
User Table.

6.7.4 Configuring Crypto Maps

Crypto Maps allow you to set restrictions preventing peers with specific certificates (especially certificates with particular
DNs) from accessing selected encrypted interfaces. If restricting access, specify a fewer number of Crypto Maps (referring
to large identity sections) instead of specifying a large number of Crypto Maps (referring to small identity sections).
To define the Crypto Map configuration:
1. Select
Security
2. Click the
Crypto Maps
The Crypto Maps screen is divided into 5 tabs, each serving a unique function in the overall Crypto Map configuration.
Refer to the following:
Crypto Map Entries
Crypto Map Peers
Crypto Map Manual SAs
Crypto Map Transform Sets
Crypto Map Interfaces
6.7.4.1 Crypto Map Entries
To review, revise or add Crypto Map entries:
1. Select
Security
>
IPSec VPN
from the main menu tree.
tab.
>
IPSec VPN
from the main menu tree.
Delete
button to remove that user from the list available within the

Advertisement

Table of Contents
loading

Table of Contents