beautypg.com

Brocade Mobility Access Point System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual

Page 172

background image

162

Brocade Mobility Access Point System Reference Guide

53-1003100-01

5

15. Select the Transform Set tab.

Create or modify Transform Set configurations to specify how traffic is protected within crypto ACL
defining the traffic that needs to be protected.

FIGURE 64

Profile Security - VPN Transform Set tab

16. Review the following attributes of an existing Transform Set configurations:

17. Select Add to define a new transform set configuration, Edit to modify an existing configuration

or Delete to remove an existing transform set.

Transform Set

Lists the 32 character maximum name assigned to each listed transform set upon creation.
Again, a transform set is a combination of security protocols, algorithms and other settings
applied to IPSec protected traffic.

Authentication Algorithm

Lists each transform sets’s authentication scheme used to validate identity credentials. The
authentication scheme is either HMAC-SHA or HMAC-MD5.

Encryption Algorithm

Displays each transform set’s encryption method for protecting transmitted traffic.

Mode

Displays either Tunnel or Transport as the IPSec tunnel type used with the transform set. Tunnel
is used for site-to-site VPN and Transport should be used for remote VPN deployments.