A transform set is a combination of security protocols, algorithms and other settings applied to IPSec protected traffic.
To define a profile's VPN transform set:
Select the Transform Set tab.
Create or modify Transform Set configurations to specify how traffic is protected for profile utilizing devices.
Review the following attributes of existing Transform Set configurations:
Name |
Lists the 32 character maximum name assigned to each listed transform set upon creation. Again, a transform set is a combination of security protocols, algorithms and other settings applied to IPSec protected traffic. |
Authentication Algorithm |
Lists each transform sets's authentication scheme used to validate identity credentials. The authentication scheme options arer HMAC-SHA,SHA256, AES-XCBC-MAC or HMAC-MD5. |
Encryption Algorithm |
Displays each transform set's encryption method for protecting transmitted traffic. |
Mode |
Displays either Tunnel or Transport as the IPSec tunnel type used with the transform set. Tunnel is used for site-to-site VPN and Transport should be used for remote VPN deployments. |
Select Add to define a new transform set configuration, Edit to modify an existing configuration or Delete to remove an existing transform set.