Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


IPsec VPN Main Page Fields

Use IPsec VPNs to secure your network traffic with encryption and authentication. The VPN tunnels are central components of networks which secure the data between different sites and remote users.

Table 1: IPsec VPN Main Page Fields




The name of the IPsec VPN.


The description of the IPsec VPN.

VPN Topology

The types of deployment topologies for IPsec VPN, such as site-to-site, hub-and-spoke, and remote access VPNs.

Profile Type

The type of VPN profile, such as Inline Profile or Shared Profile.

Profile Name

The name of the VPN profile.

The security parameters are defined in this profile to establish the VPN connection between two sites.

Tunnel Mode

The tunnel mode, such as Route Based or Policy Based.

Configuration State

The configuration state of the IPsec VPN.


Displays the publish state of the VPN configuration.

You can verify your VPN configurations before updating the configuration to the device.

  • Deploy pending—The VPN is created but not deployed.
  • Deploy scheduled—The deployment of the VPN is scheduled.
  • Deploy in-progress— The deployment of the VPN is in progress.
  • Deploy successful—The configuration is deployed to all the devices involved in the VPN.
  • Redeploy required—Modifications are made to the VPN configuration after it is deployed.
  • Deploy failed—The deployment of the VPN failed.

Created by

The email address of the user who created the IPsec VPN.