
Step 3—Configuring Encryption
Cisco 7100 Series VPN Configuration Guide
3-22
Defining Transform Sets
A transform set represents a certain combination of security protocols and algorithms.
During the IPSec SA negotiation, the peers agree to use a particular transform set for
protecting a particular data flow.
You can specify multiple transform sets, and then specify one or more of these transform
sets in a crypto map entry. The transform set defined in the crypto map entry will be used
in the IPSec SA negotiation to protect the data flows specified by that crypto map entry’s
access list.
DuringIPSec SA negotiations withIKE, the peers search for a transform set that is thesame
at both peers. When such a transform set is found, it is selected and is applied to the
protected traffic as part of both peers’ IPSec SAs.
With manually established SAs, there is no negotiation with the peer, so both sides must
specify the same transform set.
If you change a transform set definition, the change is only applied to crypto map entries
that reference the transform set. The change will not be applied to existing SAs, but will be
used in subsequent negotiations to establish new SAs.
To define a transform set, complete the following steps starting in global configuration
mode:
Step Command Purpose
1
hq-sanjose(config)# crypto ipsec
transform-set proposal1 ah-sha-hmac
esp-des esp-sha-hmac
Define a transform set and enter crypto-transform
configuration mode. This example combines AH
1
transform ah-sha-hmac, ESP
2
encryption transform
esp-des, and ESP
2
authentication transform
esp-sha-hmac in the transform set proposal1.
There are complex rules defining which entries you
can use for the transform arguments. These rules are
explained in the command description for the crypto
ipsec transform-set command. You can also use the
crypto ipsec transform-set? command, in global
configuration mode, to view the available transform
arguments.
Kommentare zu diesen Handbüchern