EasyManua.ls Logo

Extreme Networks Summit WM3000 Series - Page 388

Extreme Networks Summit WM3000 Series
513 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Controller Security
Summit WM3000 Series Controller System Reference Guide388
3 Refer to the read-only information displayed within the Peers tab to determine whether a peer
configuration (among those listed) requires modification or a new peer requires creation.
4 If a Crypto Map Seq # or IKE peer requires revision, select it from amongst those displayed and click
the Edit button.
5 Select an existing Crypto Map and click the Delete button to remove it from the list of those
available to the controller.
6 If a new peer requires creation, click the Add button.
Priority / Seq #
Displays each peer’s Seq # (sequence number) to distinguish one from
the other.
Crypto Map Name
Displays the name assigned to the peer to differentiate it from others with
similar configurations.
IKE Peer
Displays the IKE peer used with the Crypto Map to build an IPSec
security association.