EasyManua.ls Logo

Avaya G430 - Page 482

Avaya G430
696 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
4. Crypto Map
5. Crypto List
6. Interface
Overview of IPSec VPN components
The basic IPSec VPN building blocks define how to secure packets, as follows:
ISAKMP policies: Define parameters for IKE phase 1 negotiation
Transform-sets: Define parameters for IKE phase 2 negotiation
Once the building blocks are defined, IPSec VPN is implemented using a crypto list. The crypto
list defines, for the interface to which it applies, which packets should be secured and how, as
follows:
Each rule in the crypto list points to a crypto-map. A crypto-map points to a transform-set, and
to a peer or peer-group. The peer or peer-group, in turn, point to an ISAKMP policy.
IPSec VPN components
The following figure describes the relationships among the various VPN components.
IPSec VPN
482 Administering Avaya G430 Branch Gateway October 2013
Comments? infodev@avaya.com

Table of Contents

Other manuals for Avaya G430

Related product manuals