Administrator Guide

sha1 — Use Secure Hash Algorithm 1 (SHA-1) authentication.
null — Causes an encryption policy configured for the area to not be inherited on the
interface.
esp-
authentication
Enter the keywords esp-authentication then the transform type of operation to
apply to traffic. The transform type represents the encryption or authentication applied to
traffic.
md5 — Use Message Digest 5 (MD5) authentication.
sha1 — Use Secure Hash Algorithm 1 (SHA-1) authentication.
null — Causes an encryption policy configured for the area to not be inherited on the
interface.
esp-encryption Enter the keywords esp-encryption then the transform type of operation to apply to
traffic. The transform type represents the encryption or authentication applied to traffic.
3des — Use 3DES encryption.
cbc — Use CDC encryption.
des — Use DES encryption.
null — Causes an encryption policy configured for the area to not be inherited on the
interface.
Defaults None
Command Modes CONFIGURATION
Command History
This guide is platform-specific. For command information about other platforms, see the relevant Dell EMC
Networking OS Command Line Reference Guide.
Version Description
9.10(0.0) Introduced on the S3148.
9.8(2.0) Introduced on the S3100 series.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.2(0.2) Introduced on the Z9000, S4810, and S4820T.
9.2(1.0) Introduced on the Z9500.
Usage Information
Both sides of the link must specify the same transform set.
You can create up to 64 transform sets.
Example
Dell(conf)# do show crypto ipsec transform-set
Transform-Set Name : ts1
Transform-Set refCnt : 0
AH Transform : md5
ESP Auth Transform :
ESP Encry Transform :
Dell(conf)#
crypto ipsec policy
Create a crypto policy used by ipsec.
Syntax
crypto ipsec policy name seq-num ipsec-manual
To delete a crypto policy entry, use the no crypto ipsec policy name seq-num ipsec-manual
command.
Internet Protocol Security (IPSec) 679