EasyManua.ls Logo

Extreme Networks Summit WM3000 Series - Page 378

Extreme Networks Summit WM3000 Series
513 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Controller Security
Summit WM3000 Series Controller System Reference Guide378
4 Revise the following information as required to render the existing transform set useful.
Name
The name is read-only and cannot be modified unless a new transform
set is created.
AH Authentication
Scheme
Select the
Use AH
checkbox (if necessary) to modify the AH Transform
Authentication scheme. Options include:
None
- No AH authentication is used.
AH-MD5-HMAC
- AH with the MD5 (HMAC variant) authentication
algorithm.
AH-SHA-HMAC
- AH with the SHA (HMAC variant) authentication
algorithm.
ESP Encryption
Scheme
Select the
Use ESP
checkbox (if necessary) to modify the ESP Encryption
Scheme. Options include:
None
- No ESP encryption is used with the transform set.
ESP-DES
- ESP with the 56-bit DES encryption algorithm.
ESP-3DES
- ESP with 3DES, ESP with AES.
ESP-AES
- ESP with 3DES, ESP with AES (128 bit key).
ESP-AES 192
- ESP with 3DES, ESP with AES (192 bit key).
ESP-AES 256
- ESP with 3DES, ESP with AES (256 bit key).
ESP Authentication
Scheme
Select the
Use ESP
checkbox (if necessary) to modify the ESP
Authentication Scheme. Options include:
None
- No ESP authentication is used with the transform set.
MD5-HMAC
- AH with the MD5 (HMAC variant) authentication
algorithm.
SHA-HMAC
- AH with the SHA (HMAC variant) authentication
algorithm.