Expect a simulation on the exam. Be able to securely connect a router or a PIX or a VPN concentrator to another device from this list. VPNs require IKE configuration and IPSec configuration.
IKE configuration. Set the isakmp policy with any changes from defaults (preshared key, DH group , hash, or encryption). Set the peer.
IPSec configuration. Set the transform set with encryption and hash. Add the ACL to define encrypted traffic. Apply to the correct interface. Save.