FIGS. 6A and 6B are a flow diagram and data flow diagram, respectively, which illustrate a method of restoring a packet transformed according to the process of FIGS. 4A and 4B by a customer edge device to permit secure communication in a scalable VPN;