The transform command configures the security protocol in a security proposal.
The undo transform command restores the default security protocol.
By default, the Encapsulating Security Payload (ESP) protocol is used.
Usage Scenario
Based on protocol packet encryption and authentication at the IP layer, IPsec ensures the integrity, authenticity, and confidentiality of protocol packets transmitted on networks. IPsec uses two protocols, AH and ESP, for protocol packet authentication and encryption.
Follow-up Procedure
Configure the authentication algorithm for AH when AH is used.
Configure the authentication and encryption algorithms for ESP when ESP is used.Precautions
The security protocols on both IPsec peers must be identical.