This document discusses implementing virtual private networks (VPNs) using IPsec and describes how to configure a site-to-site IPsec VPN with pre-shared key authentication using the command line interface. It covers VPN concepts and benefits, the IPsec protocol components including IKE negotiation, and provides step-by-step instructions for configuring ISAKMP policies, IPsec policies, crypto maps, and verifying the VPN tunnel is operational. The objectives are to explain the purpose and operation of IPsec VPNs and to configure a site-to-site IPsec VPN using CLI.