Creating a VPN topology involves specifying the devices and the networks that make up the site-to-site VPN. You define the devices and their roles (such as hub, spoke, peer), the VPN interfaces that are the source and destination endpoints of the VPN tunnel, and the protected networks that will be secured by the tunnel. You can create hub-and-spoke, point-to-point, or full mesh topologies. When you create a VPN topology, you assign to it the IPsec technology with which a predefined set of policies is associated.