Step 1: Prepare for Deployment

Before the deployment can begin, it is important to gather all needed hardware, software, and parameters in advance.


  • Create a reference diagram that shows the logical topology.

  • Review the TNSR Zero-to-Ping documentation.

  • Whenever possible, get a static public IP address for the remote office TNSR.

  • If needed, set up DHCP pass-through (public IP) or set a DMZ host on the ISP Modem.

  • Management (web login, admin access) of the ISP modem.


  • IPsec tunnels work best on a static and public IP address.

  • NAT-T is not currently supported on TNSR.

  • Some dynamic ISP services may provide a relatively stable IP address but this will break the IPsec tunnel if the IP address changes.

Reference Diagram

Create and maintain a reference diagram to support the deployment, as shown in the example below:

TNSR remote office reference diagram

TNSR remote office reference diagram

Remote Office Deployment Parameters

Define and document the deployment parameters for the initial remote office setup, as shown in the example below:

Base Deployment Parameters



TNSR Hostname


TNSR Outside Interface IP

TNSR Outside Public IP

Guest LAN Name


Guest LAN IP

Guest DHCP Range


Guest DNS IP,

Corporate LAN Name


Corporate LAN IP

Corporate DHCP Range


Corporate DNS IP,

In this example, the Remote Office is deployed behind an ISP cable modem performing NAT.

  • TNSR Outside IP is different than the ISP Modem Public IP address

  • ISP cable modem provides NAT for inside devices, which includes the TNSR outside inteface

  • IPsec uses IP Protocol 50 (ESP) to transfer encrypted payload

    • ISP cable modem may need to be configured for DMZ host set to TNSR outside IP address or inbound ESP traffic may be dropped

IPsec VPN Tunnel Parameters

Define and document the parameters for the corporate IPsec tunnel and IP routing configuration, as shown in the example below:

IPsec VPN Tunnel Parameters



TNSR Outside IP

TNSR Public IP

IPsec Tunnel Peer IP

IPsec Tunnel ID


IPsec IKEv2 Crypto


IPsec IKEv2 Authen


IPsec Child SA Crypto


IPsec Tunnel IP

IPsec Tunnel Next-hop

Corporate IP Block