EasyManua.ls Logo

Motorola WiNG 5.6 - Page 221

Motorola WiNG 5.6
1048 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Device Configuration 5 - 135
Figure 5-86 Profile Security - VPN Crypto Map tab
21. Review the following Crypto Map configuration parameters to assess their relevance:
22. If requiring a new crypto map configuration, select the Add button. If updating the configuration of an existing crypto map,
select it from amongst those available and select the Edit button.
23. If adding a new crypto map, assign it a name up to 32 characters as a unique identifier. Select the Continue button to
proceed to the VPN Crypto Map screen.
Name Lists the 32 character maximum name assigned for each crypto map upon creation. This
name cannot be modified as part of the edit process.
IP Firewall Rules Lists the IP firewall rules defined for each displayed crypto map configuration. Each firewall
policy contains a unique set of access/deny permissions applied to the VPN tunnel and its
peer connection.
IPSec Transform Set Displays the transform set (encryption and has algorithms) applied to each listed crypto map
configuration. Thus, each crypto map can be customized with its own data protection and
peer authentication schemes.

Table of Contents

Related product manuals