Configure Routing and AC Policies for VTI
After you configure VTI interfaces and the VTI tunnel on both the devices, you must configure:
-
A routing policy to route VTI traffic between the devices over the VTI tunnel.
-
An access control rule to allow encrypted traffic.
Routing Configuration for VTI
For the VTI interfaces, you can configure static route or routing protocols such as BGP, EIGRP, OSPF/OSPFv3.
-
Choose Devices > Device Management, and edit the threat defense device.
-
Click Routing.
-
Configure static route, or BGP, EIGRP, OSPF/OSPFv3.
Routing |
Parameters |
More Information |
---|---|---|
Static Route |
|
|
BGP |
|
Configure BGP |
EIGRP |
|
|
OSPF |
|
Configure OSPFv2 |
OSPFv3 |
|
Configure OSPFv3 |
AC Policy Rule
Add an access control rule to the access control policy on the device to allow encrypted traffic between the VTI tunnels with the following settings:
-
Create the rule with the Allow action.
-
Select the VTI security zone of the local device as the source zone and the VTI security zone of the remote peer as the destination zone.
-
Select the VTI security zone of the remote peer as the source zone and the VTI security zone of the local device as the destination zone.
For more information about configuring an access control rule, see Create and Edit Access Control Rules.