A tunnel policy sets parameters for Layer 3 roaming, identity-based tunnels, standard GRE tunnels, or Layer 2 roaming using Tunnel Concentrator. Extreme Networks devices use dynamic tunnels to support client roaming between subnets and identity-based tunnels to transport user traffic from one part of the network to another. You can add new tunnel policies and view, modify, and remove previously defined policies.
You can enable the following types of GRE traffic tunneling:
Use the following steps to add a new tunnel policy.
The Tunnel Policies table displays the following information for the configured tunnel policies in your network: