This document provides steps to configure a site-to-site VPN tunnel between an F5 LTM and a Cisco ASA. It outlines 4 steps: 1) define IKE Phase 1 parameters, 2) define IKE Phase 2 security policy, 3) define crypto ACLs for tunnel traffic, and 4) configure a layer 3 forwarding virtual server. It also provides configuration details and commands to monitor and troubleshoot the VPN tunnel.