Switch Security 6-53

access, specify a fewer number of Crypto Maps (referring to large identity sections) instead of specifying a large number of Crypto Maps (referring to small identity sections).

To define the Crypto Map configuration:

1.Select Security > IPSec VPN from the main menu tree.

2.Click the Crypto Maps tab.

The Crypto Maps screen is divided into 5 tabs, each serving a different function in the overall Crypto Map configuration. Refer to the following:

Crypto Map Entries

Crypto Map Peers

Crypto Map Manual SAs

Crypto Map Transform Sets

Crypto Map Interfaces

6.8.4.1Crypto Map Entries

To review, revise or add Crypto Map entries:

1.Select Security > IPSec VPN from the main menu tree.

2.Click the Crypto Maps tab and select Crypto Map Entries.

3.Review the following Crypto Map attributes to determine if an existing Crypto Map requires revision, deletion or if a new Crypto Map needs to be created.

Priority / Seq

Displays the numerical priority assigned to each Crypto Map.

Name

Displays the user-assigned name for this specific Crypto Map. This name can be modified

 

using the Edit function or a new Crypto Map can be created by clicking the Add button.

Page 277
Image 277
Motorola WS5100 manual Click the Crypto Maps tab and select Crypto Map Entries, Priority / Seq