Motorola WS5100 Series Reference Manual page 332

Hide thumbs Also See for WS5100 Series:
Table of Contents

Advertisement

6-62 WS5100 Series Switch System Reference Guide
5. Select an existing table entry and click the
the switch.
6. If a new Crypto Map manual security association requires creation, click the
a. Define the
number, the higher the priority.
b. Provide a unique
configurations.
c. Enter the name of the
d. Use the
within the selected ACL.
e. Select either the
association is an AH Transform Authentication scheme or an ESP Encryption Transform scheme. The
AH SPI or ESP SPI fields become enabled depending on the radio button selected.
f. Define the
been selected.
g. Use the
security protocols and algorithms. During the IPSec security association negotiation, peers agree to
use the transform set for protecting the data flow. A new manual security association cannot be
generated without the selection of a transform set. A default transform set is available (if none are
defined).
7. Click
OK
when completed to save the configuration of the Crypto Map security association.
Seq
#. The sequence number determines priority among Crypto Maps. The lower the
Name
for this Crypto Map to differentiate it from others with similar
IKE Peer
used to build an IPSec security association.
ACL ID
drop-down menu to permit a Crypto Map data flow using the unique permissions
AH
or
ESP
radio button to define whether the Crypto Map's manual security
In AH SPI
and
Auth Keys
Transform Set
drop-down menu to select the transform set representing a combination of
Delete
button to remove it from the list of those available to
or
In Esp
and
Cipher Keys
Add
button.
depending on which option has

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents