Brocade Mobility RFS Controller System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual
Page 496

484
Brocade Mobility RFS Controller System Reference Guide
53-1003099-01
8
Select OK to save the changes made within the peer configuration screen. Select Reset to revert to
the last saved configuration.
Select the Transform Set tab.
Create or modify Transform Set configurations to specify how traffic is protected.
FIGURE 64
Profile Security - VPN Transform Set screen
Review the following attributes of existing Transform Set configurations:
Select Add to define a new transform set configuration, Edit to modify an existing configuration or
Delete to remove an existing transform set.
Name
Lists the 32 character maximum name assigned to each listed transform set upon creation.
Again, a transform set is a combination of security protocols, algorithms and other settings
applied to IPSec protected traffic.
Authentication Algorithm
Lists each transform sets’s authentication scheme used to validate identity credentials. The
authentication scheme is either HMAC-SHA or HMAC-MD5.
Encryption Algorithm
Displays each transform set’s encryption method for protecting transmitted traffic.
Mode
Displays either Tunnel or Transport as the IPSec tunnel type used with the transform set.
Tunnel is used for site-to-site VPN and Transport should be used for remote VPN
deployments.