Hi
I would suggest you to understand the basic config steps and the requirement/importance of those steps.
If you get a hold of that you will be able to configure the basic site to site vpn between the locations.
In a short note the 3 step config includes identifying and defining the interesting traffic using ACLs, determining and configuring the ISAKMP features (hash/group/key/encryption) and the final step is to configure the ipsec polciy (crypto map) with remote peer information / shared key information and the transform set (which you need to create prior to this) transform set take care of the encryption combination which you can use on both the devices for encryption/decryption.
Once you are done with the same you need to apply the crypto policy on the outside(wan) interface.
Other routing / basic configs remains the same.
http://www.cisco.com/en/US/tech/tk583/tk372/tech_configuration_examples_list.html
regds