Security configuration steps¶
Specify each VPN. The VPNs must reference an existing pre-defined or custom template.
For each VPN, define the required IPsec rules.
Specify each IPsec rule, including the IPsec policy selection (AH, ESP, AH and ESP, discard, clear).
There should be at least one security association per static VPN for outgoing traffic and another for incoming traffic.
Apply the configuration to make it the running configuration.
If the current configuration behaves correctly, make it active at next boot time.
See IPsec and IKE configuration examples for more step by step configuration examples.