EasyManua.ls Logo

Extreme Networks Summit WM3000 Series - Page 392

Extreme Networks Summit WM3000 Series
513 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Controller Security
Summit WM3000 Series Controller System Reference Guide392
Crypto Map Transform Sets
A transform set is a combination of security protocols and algorithms defining how the controller
protects data.
To review, revise or add a Crypto Map transform set:
1 Select Security > IPSec VPN from the main menu tree.
2 Click the Crypto Maps tab and select Transform Sets.
3 Refer to the read-only information displayed within the Transform Sets tab to determine whether a
Crypto Map transform set requires modification or a new one requires creation.
4 Select an existing Crypto Map and click the Edit button to revise its Seq #, Name and Transform Set.
5 Select an existing entry from the table and click the Delete button to remove it from the list.
6 If a new Crypto Map transform set requires creation, click the Add button.
Priority / Seq #
Displays the Seq # (sequence number) used to determine priority.
Name
Displays the name assigned to the Crypto Map that’s using the transform
set.
Transform Set
Displays the transform set representing a combination of security
protocols and algorithms. During the IPSec security association
negotiation, peers agree to use the transform set for protecting the data
flow.