Administrator Guide

crypto ipsec transform-set
Create a transform set, or combination of security algorithms and protocols, of cryptos.
Syntax
crypto ipsec transform-set name {ah-authentication {md5|sha1|null} | esp-
authentication {md5|sha1|null} | esp-encryption {3des|cbc|des|null}}
To delete a transform set, use the no crypto ipsec transform-set name {ah-authentication
{md5|sha1|null} | esp-authentication {md5|sha1|null} | esp-encryption {3des|
cbc|des|null}} command.
Parameters
name Enter the name for the transform set.
ah-authentication Enter the keywords ah-authentication then the transform type of operation to
apply to trac. The transform type represents the encryption or authentication applied to
trac.
md5 — Use Message Digest 5 (MD5) authentication.
sha1 — Use Secure Hash Algorithm 1 (SHA-1) authentication.
null — Causes an encryption policy congured for the area to not be inherited on the
interface.
esp-authentication Enter the keywords esp-authentication then the transform type of operation to
apply to trac. The transform type represents the encryption or authentication applied to
trac.
md5 — Use Message Digest 5 (MD5) authentication.
sha1 — Use Secure Hash Algorithm 1 (SHA-1) authentication.
null — Causes an encryption policy congured for the area to not be inherited on the
interface.
esp-encryption Enter the keywords esp-encryption then the transform type of operation to apply to
trac. The transform type represents the encryption or authentication applied to trac.
3des — Use 3DES encryption.
cbc — Use CDC encryption.
des — Use DES encryption.
null — Causes an encryption policy congured for the area to not be inherited on the
interface.
Defaults None
Command Modes CONFIGURATION
Command History
This guide is platform-specic. For command information about other platforms, see the relevant Dell Networking
OS Command Line Reference Guide.
Internet Protocol Security (IPSec) 723