This chapter discusses about some common site-to-site VPN deployments. In a
real-time scenario, deployments can have challenges where different sites use different
protocols to route the traffic. In the examples, we provide the step-by-step procedure
on how to configure the Layer 3 interface on each firewall, create a tunnel interface
and attach it to a virtual router and security zone, configure crypto profiles (IKE
Crypto profile for phase 1 and IPSec Crypto profile for phase 2), configure IKE gateway,
configure IPSec tunnel, and create policy rules to allow traffic between the sites.