Installation guide
Switch Security
6-65
3. Refer to the read-only information displayed within the Manual SAs tab to determine whether a
Crypto Map with a manually defined security association requires modification or a new one requires
creation.
4. If a Crypto Map with a manual security association requires revision, select it from amongst those
displayed and click the Edit button to revise its Seq #, IKE Peer, ACL ID and security protocol.
5. Select an existing table entry and click the Delete button to remove it from the list of those available
to the switch.
6. If a new Crypto Map manual security association requires creation, click the Add button.
a. Define the Seq #. The sequence number determines priority among Crypto Maps. The lower
the number, the higher the priority.
b. Provide a unique Name for this Crypto Map to differentiate it from others with similar
configurations.
c. Enter the name of the IKE Peer used to build an IPSec security association.
Priority / Seq # Displays the Seq # (sequence number) used to determine priority. The lower
the number, the higher the priority.
Name Displays the name assigned to the security association.
IKE Peer Displays the IKE peer used with the Crypto Map to build an IPSec security
association.
ACL ID Displays the ACL ID the Crypto Map’s data flow is using to establish access
permissions.
Transform Set Displays the transform set representing a combination of security protocols
and algorithms. During the IPSec security association negotiation, peers agree
to use a particular transform set for protecting the data flow.