I would like to understand the reason why the below commands are given.
1. crypto ipsec transform-set Name esp-aes esp-sha-hmac
Here we see that this particular transform set is followed by mulitple options of encryption/authentication protocols.
first what is the purpose of the transform-set command.
second, are the protocols mentioned here for encryption / authentication / hashing ?
three, i happened to find a document which stated that this is used to identify "interesting traffic" , if so, then how does it work
2.tunnel-group 220.127.116.11 type ipsec-l2l
tunnel-group 18.104.22.168 ipsec-attributes
what do these two commands do ?