Example 1 – Site-to-site IPsec configuration