Motorola WS5100 manual Priority / Seq #, higher the priority, Name, Transform Set

Models: WS5100

1 364
Download 364 pages 29.43 Kb
Page 283
Image 283
protecting the data flow.

Switch Security 6-59

1.Select Security > IPSec VPN from the main menu tree.

2.Click the Crypto Maps tab and select Transform Sets.

3.Refer to the read-only information displayed within the Transform Sets tab to determine whether a Crypto Map transform set requires modification or a new one requires creation.

Priority / Seq #

Displays the Seq # (sequence number) used to determine priority. The lower the number, the

 

higher the priority.

Name

Displays the name assigned Crypto Map using the transform set.

Transform Set

Displays the transform set representing a combination of security protocols and algorithms.

 

During the IPSec security association negotiation, peers agree to use the transform set for

 

protecting the data flow.

4.Select an existing Crypto Map and click the Edit button to revise its Seq #, Name and Transform Set.

5.Select an existing entry from the table and click the Delete button to remove from list.

6.If a new Crypto Map transform set requires creation, click the Add button.

Page 283
Image 283
Motorola WS5100 manual Priority / Seq #, higher the priority, Name, Transform Set, protecting the data flow