Controller Security
Summit WM3000 Series Controller System Reference Guide378
4 Revise the following information as required to render the existing transform set useful.
Name
The name is read-only and cannot be modified unless a new transform
set is created.
AH Authentication
Scheme
Select the
Use AH
checkbox (if necessary) to modify the AH Transform
Authentication scheme. Options include:
•
None
- No AH authentication is used.
•
AH-MD5-HMAC
- AH with the MD5 (HMAC variant) authentication
algorithm.
•
AH-SHA-HMAC
- AH with the SHA (HMAC variant) authentication
algorithm.
ESP Encryption
Scheme
Select the
Use ESP
checkbox (if necessary) to modify the ESP Encryption
Scheme. Options include:
•
None
- No ESP encryption is used with the transform set.
•
ESP-DES
- ESP with the 56-bit DES encryption algorithm.
•
ESP-3DES
- ESP with 3DES, ESP with AES.
•
ESP-AES
- ESP with 3DES, ESP with AES (128 bit key).
•
ESP-AES 192
- ESP with 3DES, ESP with AES (192 bit key).
•
ESP-AES 256
- ESP with 3DES, ESP with AES (256 bit key).
ESP Authentication
Scheme
Select the
Use ESP
checkbox (if necessary) to modify the ESP
Authentication Scheme. Options include:
•
None
- No ESP authentication is used with the transform set.
•
MD5-HMAC
- AH with the MD5 (HMAC variant) authentication
algorithm.
•
SHA-HMAC
- AH with the SHA (HMAC variant) authentication
algorithm.