Motorola WiNG 5.5 Reference Manual page 199

Table of Contents

Advertisement

21. Review the following
Crypto Map
Name
Type
IP Firewall Rules
IPSec Transform Set
22. If requiring a new crypto map configuration, select the
select it from amongst those available and select the
23. If adding a new crypto map, assign it a name up to 32 characters as a unique identifier. Select the
proceed to the
VPN Crypto Map
Figure 5-66 Profile Security - VPN Crypto Map tab
configuration parameters to assess their relevance:
Lists the 32 character maximum name assigned for each crypto map upon creation. This
name cannot be modified as part of the edit process.
Displays the site-to-site-manual, site-to-site-auto or remote VPN configuration defined for
each listed crypto map configuration. With site-to-site deployments, an IPSEC Tunnel is
deployed between two gateways, each at the edge of two different remote networks. With
remote VPN, an access point located at remote branch defines a tunnel with a security
gateway. This facilitates the endpoints in the branch office to communicate with the
destination endpoints (behind the security gateway) in a secure manner.
Lists the IP firewall rules defined for each displayed crypto map configuration. Each firewall
policy contains a unique set of access/deny permissions applied to the VPN tunnel and its
peer connection.
Displays the transform set (encryption and has algorithms) applied to each listed crypto map
configuration. Thus, each crypto map can be customized with its own data protection and
peer authentication schemes.
Add
Edit
screen.
button. If updating the configuration of an existing crypto map,
button.
Device Configuration 5 - 113
Continue
button to

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents