Defining VPN Traffic Using Security Protocols in NSM

You can use the following keys to protect the VPN traffic:

You must also decide if you want to use certificates to authenticate communication between the VPN members.

Related Documentation