A tunnel policy sets parameters for Layer 3 roaming, identity-based tunnels, standard GRE tunnels, or Layer 2 roaming using Tunnel Concentrator. Extreme Networks devices use dynamic tunnels to support client roaming between subnets and identity-based tunnels to transport user traffic from one part of the network to another. You can add new tunnel policies and view, modify, and remove previously defined policies.
You can enable the following types of GRE traffic tunneling:
Configure the following options based on your tunnel policy requirements. These options are mutually exclusive.
The Tunnel Policies table displays the following information for the configured tunnel policies in your network: