Switch Security 6-55

b. Assign the Crypto Map a Name to differentiate from others with similar configurations.

c. Use the None, Domain Name or Host Name radio buttons to select and enter the fully qualified domain or host name of the host exchanging identity information.

d. Define a SA Lifetime (secs) to define an interval (in seconds) that (when expired) forces a new association negotiation.

e. Define a SA Lifetime (Kb) to time out the security association after the specified amount of traffic (in kilobytes) has passed through the IPSec tunnel using the security association.

f. Use the ACL ID drop-down menu to permit a Crypto Map data flow using the permissions within the selected ACL.

g. Use the PFS drop-down menu to specify a group to require perfect forward secrecy (PFS) in requests received from the peer.

h. Use the Remote Type drop-down menu to specify a remote type of either XAuth or L2TP.

i. Use the Mode drop-down menu to specify a mode of Main or Aggressive. Aggressive mode enables you to configure pre-shared keys as Radius tunnel attributes for IP Security (IPSec) peers.

j. Optionally select the SA Per Host checkbox to specify that separate IPSec SAs should be requested for each source/destination host pair.

k. Optionally select the Mode Config checkbox to allow the new Crypto Map to be implemented using the aggressive mode if selected from the Mode drop-down menu.

l. Refer to the Peers (add choices) field to select and use the Add and Delete buttons as necessary to add or remove existing peers to the Crypto Map. For information on adding or modifying peers, see Crypto Map Peers on page 6-55.

m. Refer to the Transform Sets (select one) field to select and assign a transform set for use with the Crypto Map. Again, a transform set represents a combination of security protocols and algorithms. During the IPSec security association negotiation, peers agree to use a particular transform set for protecting data flow.

7.Click OK to save the new Crypto Map and display it within the Crypto Map tab.

6.8.4.2Crypto Map Peers

To review, revise or add Crypto Map peers:

1.Select Security > IPSec VPN from the main menu tree.

Page 279
Image 279
Motorola WS5100 manual Crypto Map Peers