Chapter 10 IPsec VPN : Hub-and-spoke configurations : Dynamic spokes configuration example : Configure the spokes
  
Configure the spokes
In this example, all spokes have nearly identical configuration, requiring the following:
Phase 1 authentication parameters to initiate a connection with the hub.
Phase 2 tunnel creation parameters to establish a VPN tunnel with the hub.
A source address that represents the network behind the spoke. This is the only part of the configuration that is different for each spoke.
A destination address that represents the aggregate protected network.
A security policy to ena.ble communications between the spoke and the aggregate protected network