a. Define the Seq #/Name. The lower the number, the higher the priority among Crypto Maps. b. Enter the name of the Transform set used with the Crypto Map.
7.Click OK when completed to save the configuration of the Crypto Map transform set.
6.8.4.5Crypto Map Interfaces
To review the interfaces currently available to the Crypto Maps or assign an interface: NOTE: A Crypto Map cannot get applied to more than one interface at a time.
1.Select Security > IPSec VPN from the main menu tree.
2.Click the Crypto Maps tab and select Interfaces.
3. Refer to the following
Name | Displays the name of the Crypto Maps available for interface. |
Interface Name | Displays the name of the interface through which IPSec traffic will flow. Applying the Crypto |
| Map set to an interface instructs the switch to evaluate all the interface's traffic against the |
| Crypto Map set and to use the specified policy during connection or security association |
| negotiation on behalf of traffic to be protected by crypto (either CET or IPSec). |
4.Click the Assign Interface button to assign a Crypto Map to each interface through which IPSec traffic flows.
The security appliance supports IPSec on all interfaces. Assigning the Crypto Map set to an interface instructs the security appliance to evaluate all the traffic against the Crypto Map set and to use the specified policy during connection or SA negotiation. Assigning a Crypto Map to an interface also initializes