Motorola WS5100 用户手册

下载
页码 364
Switch Security   
6-57
 
a. Define the 
Seq # /Name
 for the new peer. The lower the number, the higher the priority among 
Crypto Maps.
b. Enter the name of the 
IKE Peer 
used with the Crypto Map to build an IPSec security association.
7. Click 
OK
 when completed to save the configuration of the new Crypto Map peer.
6.8.4.3 Crypto Map Manual SAs
To review, revise or add a Crypto Map using a manually defined security association:
1. Select 
Security
 > 
IPSec VPN
 from the main menu tree.
2. Click the
 Crypto Maps
 tab and select 
Manual SAs
. 
3. Refer to the read-only information displayed within the 
Manual SAs
 tab to determine whether a Crypto 
Map with a manually defined security association requires modification or a new one requires creation.
4. If a Crypto Map with a manual security association requires revision, select it from amongst those 
displayed and click the 
Edit
 button to revise its Seq #, IKE Peer, ACL ID and security protocol.
5. Select an existing table entry and click the 
Delete
 button to remove from the list of those available to 
the switch.
Priority / Seq #
Displays the Seq # (sequence number) used to determine priority. The lower the number, the 
higher the priority.
Name 
Displays the name assigned to the security association.
IKE Peer
Displays the IKE peer used with the Crypto Map to build an IPSec security association.
ACL ID
Displays the ACL ID the Crypto Map’s data flow is using to establish access permissions.
Transform Set
Displays the transform set representing a combination of security protocols and algorithms. 
During the IPSec security association negotiation, peers agree to use a particular transform 
set for protecting the data flow.