The security of the datacenters is another important milestone. There are two scenarios of data encryption. Here they are:
In the first case we cannot perform data inspection because the packets are encrypted and no key is used to decrypt the data and run the checkups. The second alternative allows to decrypt the data in the end of each stage and inspect the traffic.
Here is how it works in practice: