Process Overview
The basic sequence of actions required to configure an IPSec transform set is outlined below.
Procedure
Step 1 |
Configure a crypto transform set by applying the example configuration in Configuring a Transform Set. |
Step 2 |
Verify your Crypto Transform Set configuration by following the steps in Verifying the Crypto Transform Set Configuration. |
Step 3 |
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode command save configuration. For additional information on how to verify and save configuration files, refer to the System Administration Guide and the Command Line Interface Reference. |