Cisco Cisco Packet Data Interworking Function (PDIF) Prospecto
Transform Set Configuration
▀ Process Overview
▄ Cisco StarOS IP Security (IPSec) Reference
60
Process Overview
The basic sequence of actions required to configure an IPSec transform set is outlined below.
Step 1
Step 2
Step 3
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
Configuring a Transform Set
Use the following example to create the crypto transform set:
configure
context <ctxt_name>
crypto ipsec transform-set <transform_name> ah hmac { md5-96 | none |sha1-
96 } esp hmac { { md5-96 | none | sha1-96 } { cipher {des-cbc | 3des-cbc | aes-
cbc } | none }
96 } esp hmac { { md5-96 | none | sha1-96 } { cipher {des-cbc | 3des-cbc | aes-
cbc } | none }
mode { transport | tunnel }
end
Notes:
<ctxt_name>
is the system context in which you wish to create and configure the crypto transform set(s).
<transform_name>
is the name of the crypto transform set in the current context that you want to configure for
IPSec configuration.
For more information on parameters, refer to the IPSec Transform Configuration Mode Commands chapter in
the Command Line Interface Reference.