Configuring a Transform Set

Configuring a Transform Set
A transform set defines the combination of encryption algorithms and message integrity
algorithms to be used for the IPSec tunnel. Transforms are combined to make transform sets.
Both peers agree on the transform set during the IPSec negotiation. You can define multiple
transform sets because both peers search for a common transform set during the IKE
negotiation. If a common transform set is found, it is selected and applied to the protected
traffic. Table 13-4 shows the transform sets supported on the Cisco PIX Firewall.