Brocade Web Tools Administrator's Guide v6.2.0 (53-1001194-01, April 2009)

254 Web Tools Administrator’s Guide
53-1001194-01
IPSec over management ports
17
The Add Transform dialog box is displayed (Figure 128).
FIGURE 128 Add Transform dialog box
3. Type a name in the Transform Name field.
4. Choose the IPSec Mode. The choices are Transport or Tunnel.
5. Select the SA Proposal name.
6. Select the IPSec Protection Type. The choices are discard, bypass, and protect.
- Discard causes data packets to be rejected if there is an invalid pair of source and
destination addresses or invalid port addresses.
- Bypass allows a data packet to be transmitted or received without IPsec protection.
- Process indicates a data packet is processed using IPsec encryption, IKE authentication,
or both, using encapsulation security protocol (ESP) processing, or authentication header
(AH) protocol processing.
7. Select the IKE Policy Name.
IKE policies need to be created before adding a transform policy. If there are no names to
choose from, you must create an IKE policy.
8. Optionally, enter a local and peer IP address.
9. Click OK.