A tunnel policy sets parameters for Layer 3 roaming or identity-based tunnels. Extreme Networks devices use dynamic tunnels to support client roaming between subnets and identity-based tunnels to transport user traffic from one part of the network to another. You can add new tunnel policies and view, modify, and remove previously defined policies.
Use the following steps to add a new tunnel policy to support Layer 3 roaming or for a static identify-based tunnel from here (Common Objects) or from inside the network policy configuration workflow.