Traffic Protection Using Tunneling Protocol in NSM Overview

To protect traffic as it passes over the Internet, you can create a secure tunnel between devices using a tunneling protocol. Each device in the VPN uses the tunneling protocol to establish a secure data path, enabling traffic between the devices to flow securely from source to destination. NSM provides two tunneling protocols such as IPsec and L2TP.

Related Documentation