When these tasks are complete, the tunnel is ready for use. Traffic
destined for the zones/addresses defined in policy is automatically
routed properly based on the destination route in the routing table,
and handled as VPN traffic. For a few examples on site-to-site VPN,
see
Site-to-Site
VPN Quick Configs.