Configure the spokes
In this example, all spokes have nearly identical configuration, requiring the following:
• Phase 1 authentication parameters to initiate a connection with the hub.
• Phase 2 tunnel creation parameters to establish a VPN tunnel with the hub.
• A source address that represents the network behind the spoke. This is the only part of the configuration that is different for each spoke.
• A destination address that represents the aggregate protected network.
• A security policy to ena.ble communications between the spoke and the aggregate protected network