Configure Tunnel Policies

About this task

A tunnel policy sets parameters for Layer 3 roaming or identity-based tunnels. Extreme Networks devices use dynamic tunnels to support client roaming between subnets and identity-based tunnels to transport user traffic from one part of the network to another. You can add new tunnel policies and view, modify, and remove previously defined policies.

The Tunnel Policies table displays the following information for the configured tunnel policies in your network:
  • Name: The name of the tunnel policy.
  • Description: An optional description of the policy.
  • Used by: The number of network policies to which the tunnel policy is applied. Hover over a number in this column to see the names of the network policies.

Use the following steps to add a new tunnel policy to support Layer 3 roaming or for a static identify-based tunnel from here (Common Objects) or from inside the network policy configuration workflow.

Procedure

  1. Select the plus sign.
  2. Enter a name for this policy.
  3. Enter an optional description for the policy.
    Although optional, descriptions can be helpful when you are troubleshooting your network.
  4. Select one of the available options.
    Select Layer 3 Roaming to adjust Layer 3 roaming thresholds. Make adjustments in the fields that are displayed.
    Select Identity-based Traffic Tunneling to configure the tunnel source and destination, and to create a password or tunnel authentication.
    Select Standard GRE Tunneling to configure non-Extreme Networks tunnel endpoints.
  5. Select Save.