Administrator Guide
• sha1 — Use Secure Hash Algorithm 1 (SHA-1) authentication.
• null — Causes an encryption policy configured for the area to not be inherited on the
interface.
esp-
authentication
Enter the keywords esp-authentication then the transform type of operation to
apply to traffic. The transform type represents the encryption or authentication applied to
traffic.
• md5 — Use Message Digest 5 (MD5) authentication.
• sha1 — Use Secure Hash Algorithm 1 (SHA-1) authentication.
• null — Causes an encryption policy configured for the area to not be inherited on the
interface.
esp-encryption Enter the keywords esp-encryption then the transform type of operation to apply to
traffic. The transform type represents the encryption or authentication applied to traffic.
• 3des — Use 3DES encryption.
• cbc — Use CDC encryption.
• des — Use DES encryption.
• null — Causes an encryption policy configured for the area to not be inherited on the
interface.
Defaults None
Command Modes CONFIGURATION
Command History
This guide is platform-specific. For command information about other platforms, see the relevant Dell EMC
Networking OS Command Line Reference Guide.
Version Description
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.2(0.2) Introduced on the Z9000, S4810, and S4820T.
9.2(1.0) Introduced on the Z9500.
Usage Information
• Both sides of the link must specify the same transform set.
• You can create up to 64 transform sets.
Example
Dell(conf)# do show crypto ipsec transform-set
Transform-Set Name : ts1
Transform-Set refCnt : 0
AH Transform : md5
ESP Auth Transform :
ESP Encry Transform :
Dell(conf)#
crypto ipsec policy
Create a crypto policy used by ipsec.
Syntax
crypto ipsec policy name seq-num ipsec-manual
To delete a crypto policy entry, use the no crypto ipsec policy name seq-num ipsec-manual
command.
Parameters
name
Enter the name for the crypto policy set.
Internet Protocol Security (IPSec) 675