Controller Security
Summit WM3000 Series Controller System Reference Guide
390
3
Refer to the read-only information displayed within the
Manual SAs
tab to determine whether a
Crypto Map (with a manually defined security association) requires modification or if a new one
requires creation.
4
If a Crypto Map with a manual security association requires revision, select it from amongst those
displayed and click the
Edit
button to revise its Seq #, IKE Peer, ACL ID and security protocol.
5
Select an existing table entry and click the
Delete
button to remove it from the list of those available
to the controller.
6
If a new Crypto Map manual security association requires creation, click the
Add
button
Priority / Seq #
Displays the Seq # (sequence number) used to determine priority. the
lower the number the higher the priority.
Name
Displays the name assigned to the security association.
IKE Peer
Displays the IKE peer used with the Crypto Map to build an IPSec
security association.
ACL ID
Displays the ACL ID the Crypto Map’s data flow uses to establish access
permissions.
Transform Set
Displays the transform set representing a combination of security
protocols and algorithms. During the security association negotiation,
peers agree to use a particular transform set for protecting the data flow.
Summary of Contents for Summit WM3000 Series
Page 139: ...Summit WM3000 Series Controller System Reference Guide 139 ...
Page 478: ...Diagnostics Summit WM3000 Series Controller System Reference Guide 478 ...
Page 480: ...Customer Support Summit WM3000 Series Controller System Reference Guide 480 ...
Page 498: ...AP Management from Controller Summit WM3000 Series Controller System Reference Guide 498 ...
Page 512: ...Troubleshooting Information Summit WM3000 Series Controller System Reference Guide 512 ...
Page 513: ......