Configuring firewall access policies for the VPN is
-
step 6 in configuring an IPsec VPN with IKE
-
step 4 in configuring an IPsec VPN with manual keying
-
step 8 in configuring an L2TP over IPsec VPN

To see all of the steps to configure a client-to-site L2TP over IPsec VPN, including an explanation of the figure below, click here.

Go to the section that applies to your VPN by clicking the corresponding icon:
-
IPsec site-to-site VPN established with IKE 
-
IPsec site-to-site VPN established with manual keying 
-
IPsec client-to-site VPN with IKE 
-
L2TP over IPsec client-to-site VPN 
-
GRE tunnel 
-
GRE over IPsec tunnel 

|