I take it you mean an IPSec tunnel as distinguished from an L2TP/IPSec VPN.
The answer is, well.........sort of. You have to create an IPSec policy
with a configured end point. See:
Want to reply to this thread or ask your own question?
You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.