Device Configuration 5 - 113
Figure 5-66
Profile Security - VPN Crypto Map tab
21. Review the following
Crypto Map
configuration parameters to assess their relevance:
22. If requiring a new crypto map configuration, select the
Add
button. If updating the configuration of an existing crypto map,
select it from amongst those available and select the
Edit
button.
23. If adding a new crypto map, assign it a name up to 32 characters as a unique identifier. Select the
Continue
button to
proceed to the
VPN Crypto Map
screen.
Name
Lists the 32 character maximum name assigned for each crypto map upon creation. This
name cannot be modified as part of the edit process.
Type
Displays the site-to-site-manual, site-to-site-auto or remote VPN configuration defined for
each listed crypto map configuration. With site-to-site deployments, an IPSEC Tunnel is
deployed between two gateways, each at the edge of two different remote networks. With
remote VPN, an access point located at remote branch defines a tunnel with a security
gateway. This facilitates the endpoints in the branch office to communicate with the
destination endpoints (behind the security gateway) in a secure manner.
IP Firewall Rules
Lists the IP firewall rules defined for each displayed crypto map configuration. Each firewall
policy contains a unique set of access/deny permissions applied to the VPN tunnel and its
peer connection.
IPSec Transform Set
Displays the transform set (encryption and has algorithms) applied to each listed crypto map
configuration. Thus, each crypto map can be customized with its own data protection and
peer authentication schemes.
Summary of Contents for AP-7131 Series
Page 1: ...Motorola Solutions WiNG 5 5 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 14: ...x WiNG 5 5 Access Point System Reference Guide ...
Page 22: ...8 WiNG 5 5 Access Point System Reference Guide ...
Page 26: ...1 4 WiNG 5 5 Access Point System Reference Guide ...
Page 74: ...3 36 WiNG 5 5 Access Point System Reference Guide ...
Page 428: ...6 2 WiNG 5 5 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 528: ...6 102 WiNG 5 5 Access Point System Reference Guide ...
Page 610: ...8 40 WiNG 5 5 Access Point System Reference Guide ...
Page 615: ...Services Configuration 9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Page 656: ...9 46 WiNG 5 5 Access Point System Reference Guide ...
Page 670: ...10 14 WiNG 5 5 Access Point System Reference Guide ...
Page 682: ...11 12 WiNG 5 5 Access Point System Reference Guide ...
Page 721: ...Operations 12 39 Figure 12 40 Certificate Management Import New Trustpoint screen ...
Page 738: ...12 56 WiNG 5 5 Access Point System Reference Guide ...
Page 890: ...A 2 WiNG 5 5 Access Point System Reference Guide ...
Page 952: ...B 62 WiNG 5 5 Access Point System Reference Guide ...
Page 953: ......