Configure Firewall Access Policies for the VPN

Configuring firewall access policies for the VPN is

  • step 6 in configuring an IPsec VPN with IKE

  • step 4 in configuring an IPsec VPN with manual keying

  • step 8 in configuring an L2TP Layer 2 Tunneling Protocol over IPsec VPN

 

To see all of the steps to configure a client-to-site L2TP over IPsec VPN, including an explanation of the figure below, click here.

 

 

Go to the section that applies to your VPN by clicking the corresponding  icon:

  • IPsec site-to-site VPN established with IKE

  • IPsec site-to-site VPN established with manual keying

  • IPsec client-to-site VPN with IKE

  • L2TP over IPsec client-to-site VPN

  • GRE Generic Routing Encapsulation tunnel

  • GRE over IPsec tunnel