I would like to understand the reason why the below commands are given.
1. crypto ipsec transform-set Name esp-aes esp-sha-hmac
Here we see that this particular transform set is followed by mulitple options of encryption/authentication protocols.
first what is the purpose of the transform-set command.
second, are the protocols mentioned here for encryption / authentication / hashing ?
three, i happened to find a document which stated that this is used to identify "interesting traffic" , if so, then how does it work
2.tunnel-group 126.96.36.199 type ipsec-l2l
tunnel-group 188.8.131.52 ipsec-attributes
what do these two commands do ?