Scenario 1: distribution of IPsec tunnels