Configure the PIX Security Appliance as an Easy VPN Server
Task 4 – create a transform set

Specify which transform sets are allowed for the crypto map entry using the crypto ipsec transform-set command . When using this command, be sure to list multiple transform sets in order of priority, with the highest priority first. Note that this is the only configuration statement required in dynamic crypto map entries.