Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Defining Traffic Types for Data Protection in NSM

 

You can use the following traffic types for data protection:

  • Use a policy-based VPN to encrypt and authenticate certain types of traffic between two network nodes.

  • Use a route-based VPNs to encrypt and authenticate all traffic between two network nodes.

  • Use a mixed-mode VPN to encrypt and authenticate traffic between policy-based and route-based VPNs nodes.