crypto ipsec transform-set
Create a transform set, or combination of security algorithms and protocols, of cryptos.
C9000 Series
Syntax
crypto ipsec transform-set
name
{ah-authentication {md5|sha1|null}
| esp-authentication {md5|sha1|null} | esp-encryption {3des|cbc|
des|null}}
To delete a transform set, use the
no crypto ipsec transform-set
name
{ah-
authentication {md5|sha1|null} | esp-authentication {md5|sha1|
null} | esp-encryption {3des|cbc|des|null}}
command.
Parameters
name
Enter the name for the transform set.
ah-authentication
Enter the keywords
ah-authentication
then the transform
type of operation to apply to traffic. The transform type
represents the encryption or authentication applied to traffic.
• md5 — Use Message Digest 5 (MD5) authentication.
• sha1 — Use Secure Hash Algorithm 1 (SHA-1)
authentication.
• null — Causes an encryption policy configured for the area
to not be inherited on the interface.
esp-
authentication
Enter the keywords
esp-authentication
then the transform
type of operation to apply to traffic. The transform type
represents the encryption or authentication applied to traffic.
• md5 — Use Message Digest 5 (MD5) authentication.
• sha1 — Use Secure Hash Algorithm 1 (SHA-1)
authentication.
• null — Causes an encryption policy configured for the area
to not be inherited on the interface.
esp-encryption
Enter the keywords
esp-encryption
then the transform type
of operation to apply to traffic. The transform type represents
the encryption or authentication applied to traffic.
• 3des — Use 3DES encryption.
• cbc — Use CDC encryption.
• des — Use DES encryption.
Internet Protocol Security (IPSec)
1156
Summary of Contents for C9000 series
Page 1: ...Dell Networking Command Line Reference Guide for the C9000 Series Version 9 10 0 0 ...
Page 394: ...deny 14551 666 Dell Access Control Lists ACL 394 ...
Page 877: ...algorithm FIPS Cryptography 877 ...
Page 1297: ...Total 5 0 Total 5 active route s using 952 bytes IPv6 Basics 1297 ...