When these tasks are complete, the tunnel is ready for use. Traffic destined for the
zones/addresses defined in a policy rule is automatically routed properly based on the
destination route in the routing table, and handled as VPN traffic. For a few examples
on site-to-site VPN, see
Site-to-Site VPN
.