Cisco Cisco Packet Data Interworking Function (PDIF)
Transform Set Configuration
▀ Process Overview
▄ IPSec Reference, StarOS Release 18
60
Process Overview
The basic sequence of actions required to configure an IPSec transform set is outlined below.
Step 1
Step 2
Step 3
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
Configuring a Transform Set
Use the following example to create the crypto transform set:
configure
context ctxt_name
crypto ipsec transform-set transform_name ah hmac { md5-96 | none |sha1-96
} esp hmac { { md5-96 | none | sha1-96 } { cipher {des-cbc | 3des-cbc | aes-cbc }
| none }
} esp hmac { { md5-96 | none | sha1-96 } { cipher {des-cbc | 3des-cbc | aes-cbc }
| none }
mode { transport | tunnel }
end
Notes:
ctxt_name is the system context in which you wish to create and configure the crypto transform set(s).
transform_name is the name of the crypto transform set in the current context that you want to configure for
IPSec configuration.
For more information on parameters, refer to the IPSec Transform Configuration Mode Commands chapter in
the Command Line Interface Reference.