To set up the suggested infrastructure, each firewall that participates in the GRETAP/IPsec tunnel must be configured in five steps: