Installation guide

Switch Security
6-67
3. Refer to the read-only information displayed within the Transform Sets tab to determine whether a
Crypto Map transform set requires modification or a new one requires creation.
4. Select an existing Crypto Map and click the Edit button to revise its Seq #, Name and Transform Set.
5. Select an existing entry from the table and click the Delete button to remove from list.
6. If a new Crypto Map transform set requires creation, click the Add button.
a. Define the Seq #/Name. The lower the number, the higher the priority among Crypto Maps.
b. Enter the name of the Transform set used with the Crypto Map.
7. Click OK when completed to save the configuration of the Crypto Map transform set.
6.8.4.5 Crypto Map Interfaces
To review the interfaces currently available to the Crypto Maps or assign an interface:
1. Select Security > IPSec VPN from the main menu tree.
Priority / Seq # Displays the Seq # (sequence number) used to determine priority.
Name Displays the name assigned to the Crypto Map that’s using the transform set.
Transform Set Displays the transform set representing a combination of security protocols
and algorithms. During the IPSec security association negotiation, peers agree
to use the transform set for protecting the data flow.
NOTE: A Crypto Map cannot get applied to more than one interface at a time. To apply
the same Crypto Map settings to multiple interfaces, create a unique Crypto Map for each
interface.