TMS zl Management and Configuration Guide ST.1.1.100430
7-188
Virtual Private Networks
Configure a GRE Tunnel
Configure a GRE Tunnel
To configure a GRE tunnel, complete the following tasks:
1. Optionally, create named objects, which you can use in firewall access
policies related to the GRE tunnel.
Using named objects is best practice; however, you can specify IP
addresses manually. See “Create Named Objects (Optional)” on page
7-188.
2. Create the GRE tunnel.
See “Create a GRE Tunnel” on page 7-189.
3. Verify that there is a route to the remote tunnel gateway.
See “Verify that a Route to the Remote Tunnel Gateway Exists” on page
7-193.
4. Configure routes that use the GRE tunnel interface.
You can configure routes manually or set up dynamic routing on the GRE
tunnel interface. See “Configure Routes that Use the GRE Tunnel Inter-
face” on page 7-194.
5. Create firewall access policies to permit traffic associated with the GRE
tunnel.
See “Create Access Policies for a GRE Tunnel” on page 7-201.
6. Configure the remote tunnel gateway with compatible settings.
See you gateway device’s configuration guide for instructions.
Create Named Objects (Optional)
You might want to configure the named objects indicated in Table 7-21.
For your reference, this table includes the location where you would specify
these named objects. However, configuration instructions will indicate when
you actually need to specify each object. The table also includes a reference
to numbers in Figure 7-154, which illustrates an example implementation of
GRE tunneling. The number indicates the IP address for that named object in
the example network.