| Tunnel Name | 
									Provide a name for the tunnel. The
										name should identify the tunnel uniquely. | 
								
								
									| Tunnel Type | 
									Configure the tunnel type as one
										of the following:
											- Site-to-Site – The tunnel provides a
												secured connection between two sites. This is the
												default setting.
 
											-  Remote Access – The tunnel
												provides access to a network to remote devices.
 
										  | 
								
								
									| Select Interface | 
									Configure the interface to use for
										creating the tunnel. The following options are available:
											- VLAN – Configure the tunnel over
												a Virtual LAN interface. Use the spinner to
												configure the VLAN number.
 
											- WWAN – Configure the tunnel over
												the WAN interface.
 
											- PPPoE – Configure the tunnel
												over the PPPoE interface.
 
										  | 
								
								
									| Traffic Selector (ACL) | 
									Configure ACLs that manage the
										traffic passing through the VPN tunnel. The following
										options are available:
											- Source – Provide the source
												network along with its mask.
 
											- Destination – Provide the
												destination network along with its mask.
 
										  | 
								
								
									| Peer | 
									Configure the peer for this
										tunnel. The peer device can be specified either by its
										hostname or by its IP address. | 
								
								
									| Authentication | 
									Set the authentication used to
										identify the peers on opposite ends of the VPN tunnel
										connection. The following can be configured:
											- Certificate – Use a certificate to
												authenticate. This is the default setting.
 
											- Pre-Shared Key – Use a pre-shared key
												to authenticate. Enter the secret key in the space
												provided.
 
										  | 
								
								
									| Local Identity | 
									Configure the local identity used
										with this peer configuration for an IKE exchange with the
										target VPN IPSec peer. Options include IP
										Address, Distinguished
											Name, FQDN,
											email, and string.
										The default setting is string. | 
								
								
									| Remote Identity | 
									Configure the access point remote
										identifier used with this peer configuration for an IKE
										exchange with the target VPN IPSec peer. Options include
											IP
											Address, Distinguished
											Name, FQDN,
											email, and string.
										The default setting is string. | 
								
								
									| IKE Policy | 
									Configure the Internet Key Exchange (IKE)
										policy to use. IKE is used to exchange authentication keys.
										Select from one of the following:
											- All – Use any IKE policy. This is the
												default setting.
 
											- IKE1 – Use IKE 1 only.
 
											- IKE2 – Use IKE 2 only.
 
										  | 
								
								
									| Transform Set | 
									Configure the transform set used
										to specify how traffic is protected within the crypto ACL
										defining the traffic that needs to be protected. Select the
										appropriate traffic set from the drop-down list. |