Motorola WS5100 manual 6.8.1.2Adding a New Transform Set

Models: WS5100

1 364
Download 364 pages 29.43 Kb
Page 271
Image 271

Switch Security 6-47

4. Revise the following information as required to render the existing transform set useful.

Name

The name is read-only and cannot be modified unless a new transform set is created.

AH Authentication

Select the Use AH checkbox (if necessary) to modify the AH Transform Authentication

Scheme

scheme. Options include:

 

None - No AH authentication is used.

 

AH-MD5-HMAC - AH with the MD5 (HMAC variant) authentication algorithm.

 

AH-SHA-HMAC - AH with the SHA (HMAC variant) authentication algorithm.

ESP Encryption

Select the Use ESP checkbox (if necessary) to modify the ESP Encryption Scheme. Options

Scheme

include:

 

None - No ESP encryption is used with the transform set.

 

ESP-DES - ESP with the 56-bit DES encryption algorithm.

 

ESP-3DES - ESP with 3DES, ESP with AES.

 

ESP-AES - ESP with 3DES, ESP with AES (128 bit key).

 

ESP-AES 192 - ESP with 3DES, ESP with AES (192 bit key).

 

ESP-AES 256- ESP with 3DES, ESP with AES (256 bit key).

ESP Authentication

Select the Use ESP checkbox (if necessary) to modify the ESP Authentication Scheme.

Scheme

Options include:

 

None - No ESP authentication is used with the transform set.

 

MD5-HMAC - AH with the MD5 (HMAC variant) authentication algorithm.

 

SHA-HMAC - AH with the SHA (HMAC variant) authentication algorithm.

Mode

Modify (if necessary) the current mode used with the transform set. The mode is either

 

Tunnel or Transport.

5.Refer to the Status field for the current state of the requests made from applet. This field displays error messages if something goes wrong in the transaction between the applet and the switch.

6.Click OK to use the changes to the running configuration and close the dialog.

7.Click Cancel to close the dialog without committing updates to the running configuration.

6.8.1.2Adding a New Transform Set

A transform set represents a combination of security protocols and algorithms. During the IPSec security association negotiation, peers agree to use a particular transform set for protecting data flow. If the attributes of an existing transform set no longer lend themselves as useful, and an existing transform set is not required, create a new transform set to meet the needs of your network.

To edit the attributes of an existing transform set:

1.Select Security > IPSec VPN from the main menu tree.

2.Click the Configuration tab.

Page 271
Image 271
Motorola WS5100 manual 6.8.1.2Adding a New Transform Set