During configuration, the router also converts numeric values to more user-friendly values. This is an example where you type the ICMP message type number, and it causes the router to convert the number to a name. access-list 102 permit icmp host 10.1.1.1 host 172.16.1.1 14.
3CX firewall and router configuration guide.
This article describes that this configuration example is a basic VPN setup between a FortiGate unit and a Cisco router, using a Virtual Tunnel Interface (VTI) on the Cisco router. The IPsec configuration is only using a Pre-Shared Key for security.

Connecting to the Router. Almost all MikroTik routers come with a default configuration applied and you can use this section to connect to them. Only CCR series professional devices could be configured differently, for those, follow the next section instead.
Basically, any router can act as a firewall; if the access rules are configured on it. Instead of using the term Router, we will use the term Firewall. NOTE: Do follow the below points: You only need to configure Firewall 1 (Router 1) and Firewall 3 (Router 2).

Moving forward, it's essential to keep these visual contexts in mind when discussing Cisco Router Firewall Configuration Best Practices.
This tutorial explains how to configure, verify, and manage Dynamic NAT on routers through an example on Packet Tracer.The following link provides this with the above configuration. Practice LAB with Dynamic NAT configuration. Viewing NAT translation on Routers.