Installation guide

Switch Security 6-79
f. Define the In AH SPI and Auth Keys or In Esp and Cipher Keys depending on which option has
been selected.
g. Use the Transform Set drop-down menu to select the transform set representing a combination of
security protocols and algorithms. During the IPSec security association negotiation, peers agree to
use the transform set for protecting the data flow. A new manual security association cannot be
generated without the selection of a transform set. A default transform set is available (if none are
defined).
7. Click OK when completed to save the configuration of the Crypto Map security association.
6.7.4.4 Crypto Map Transform Sets
A transform set is a combination of security protocols and algorithms defining how the switch protects data.
To review, revise or add a Crypto Map transform set:
1. Select Security > IPSec VPN from the main menu tree.
2. Click the Crypto Maps tab and select Transform Sets.
3. Refer to the read-only information displayed within the Transform Sets tab to determine whether a
Crypto Map transform set requires modification or a new one requires creation.
4. Select an existing Crypto Map and click the Edit button to revise its Seq #, Name and Transform Set.
5. Select an existing entry from the table and click the Delete button to remove it from the list.
6. If a new Crypto Map transform set requires creation, click the Add button.
Priority / Seq # Displays the Seq # (sequence number) used to determine priority.
Name Displays the name assigned to the Crypto Map that’s using the transform set.
Transform Set Displays the transform set representing a combination of security protocols and
algorithms. During the IPSec security association negotiation, peers agree to use
the transform set for protecting the data flow.