Motorola WS5100 manual 6.8.4.5Crypto Map Interfaces

Models: WS5100

1 364
Download 364 pages 29.43 Kb
Page 284
Image 284
6.8.4.5Crypto Map Interfaces

6-60WS5100 Series Switch System Reference Guide

a. Define the Seq #/Name. The lower the number, the higher the priority among Crypto Maps. b. Enter the name of the Transform set used with the Crypto Map.

7.Click OK when completed to save the configuration of the Crypto Map transform set.

6.8.4.5Crypto Map Interfaces

To review the interfaces currently available to the Crypto Maps or assign an interface: NOTE: A Crypto Map cannot get applied to more than one interface at a time.

1.Select Security > IPSec VPN from the main menu tree.

2.Click the Crypto Maps tab and select Interfaces.

3. Refer to the following read-only information displayed within the Interfaces tab.

Name

Displays the name of the Crypto Maps available for interface.

Interface Name

Displays the name of the interface through which IPSec traffic will flow. Applying the Crypto

 

Map set to an interface instructs the switch to evaluate all the interface's traffic against the

 

Crypto Map set and to use the specified policy during connection or security association

 

negotiation on behalf of traffic to be protected by crypto (either CET or IPSec).

4.Click the Assign Interface button to assign a Crypto Map to each interface through which IPSec traffic flows.

The security appliance supports IPSec on all interfaces. Assigning the Crypto Map set to an interface instructs the security appliance to evaluate all the traffic against the Crypto Map set and to use the specified policy during connection or SA negotiation. Assigning a Crypto Map to an interface also initializes run-time data structures, such as the SA database and the security policy database. Reassigning a modified Crypto Map to the interface resynchronizes the run-time data structures with the

Page 284
Image 284
Motorola WS5100 manual 6.8.4.5Crypto Map Interfaces