This shouldn't be any different to any other interfaces, although I haven't tried it personally. I've built VPN's over many different types of interfaces.
I know that the VPN client won't work over a TR interface in the PC, but a L2L connection shouldn't have a problem. Just create the crypto map as normal, then apply the map to the TR interface, there shouldn't be anything specific you need to do.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
[toc:faq]Introduction:This document describes details on how NAT-T
works.Background:ESP encrypts all critical information, encapsulating
the entire inner TCP/UDP datagram within an ESP header. ESP is an IP
protocol in the same sense that TCP and UDP are I...