Motorola WS5100 manual 6.8.4.3Crypto Map Manual SAs

Models: WS5100

1 364
Download 364 pages 29.43 Kb
Page 281
Image 281
6.8.4.3Crypto Map Manual SAs

Switch Security 6-57

a. Define the Seq # /Name for the new peer. The lower the number, the higher the priority among Crypto Maps.

b. Enter the name of the IKE Peer used with the Crypto Map to build an IPSec security association.

7.Click OK when completed to save the configuration of the new Crypto Map peer.

6.8.4.3Crypto Map Manual SAs

To review, revise or add a Crypto Map using a manually defined security association:

1.Select Security > IPSec VPN from the main menu tree.

2.Click the Crypto Maps tab and select Manual SAs.

3.Refer to the read-only information displayed within the Manual SAs tab to determine whether a Crypto Map with a manually defined security association requires modification or a new one requires creation.

Priority / Seq #

Displays the Seq # (sequence number) used to determine priority. The lower the number, the

 

higher the priority.

Name

Displays the name assigned to the security association.

IKE Peer

Displays the IKE peer used with the Crypto Map to build an IPSec security association.

ACL ID

Displays the ACL ID the Crypto Map’s data flow is using to establish access permissions.

Transform Set

Displays the transform set representing a combination of security protocols and algorithms.

 

During the IPSec security association negotiation, peers agree to use a particular transform

 

set for protecting the data flow.

4.If a Crypto Map with a manual security association requires revision, select it from amongst those displayed and click the Edit button to revise its Seq #, IKE Peer, ACL ID and security protocol.

5.Select an existing table entry and click the Delete button to remove from the list of those available to the switch.

Page 281
Image 281
Motorola WS5100 manual 6.8.4.3Crypto Map Manual SAs