Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Traffic Protection Using Tunneling Protocol in NSM Overview

 

To protect traffic as it passes over the Internet, you can create a secure tunnel between devices using a tunneling protocol. Each device in the VPN uses the tunneling protocol to establish a secure data path, enabling traffic between the devices to flow securely from source to destination. NSM provides two tunneling protocols such as IPsec and L2TP.