90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!
http://mobile.experts-exchange.com/Security/Software_Firewalls/Enterprise_Firewalls/Cisco_PIX_Firewall/A_4428-Simple-Site-to-Site-VPN-with-Cisco-PIX-or-ASA-Using-GUI-and-or-CLI.html
Between ASA and Router
http://www.cisco.com/en/US/products/ps9422/products_configuration_example09186a0080b4ae61.shtml
Between Routers
http://www.firewall.cx/general-topics-reviews/cisco-cracker/867-cisco-router-site-to-site-ipsec-vpn.html
The CISCO technote listing is useful repository of configuration examples
http://www.cisco.com/en/US/products/ps6120/prod_configuration_examples_list.html