Brocade Mobility RFS Controller System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual

Page 496

Advertising
background image

484

Brocade Mobility RFS Controller System Reference Guide

53-1003099-01

8

Select OK to save the changes made within the peer configuration screen. Select Reset to revert to
the last saved configuration.

Select the Transform Set tab.

Create or modify Transform Set configurations to specify how traffic is protected.

FIGURE 64

Profile Security - VPN Transform Set screen

Review the following attributes of existing Transform Set configurations:

Select Add to define a new transform set configuration, Edit to modify an existing configuration or
Delete to remove an existing transform set.

Name

Lists the 32 character maximum name assigned to each listed transform set upon creation.
Again, a transform set is a combination of security protocols, algorithms and other settings
applied to IPSec protected traffic.

Authentication Algorithm

Lists each transform sets’s authentication scheme used to validate identity credentials. The
authentication scheme is either HMAC-SHA or HMAC-MD5.

Encryption Algorithm

Displays each transform set’s encryption method for protecting transmitted traffic.

Mode

Displays either Tunnel or Transport as the IPSec tunnel type used with the transform set.
Tunnel is used for site-to-site VPN and Transport should be used for remote VPN
deployments.

Advertising