Software Secure Access
Activity Manage

Configure Secure Firewall VTI, PBR, and Per Tunnel Identity

At a high level, the Secure Firewall configuration process consists of the following steps.

  1. Configure Site-to-Site VPN
  2. Configure Policy-based Routing
  3. Configure Access Policy

To start the configuration, log in to your Cisco Secure Firewall Management Center web interface at its IP address or FQDN; for example, https://FMC_IP_OR_FQDN.