This section describes how to configure a tunneled node, also known as a wired tunneled node. Tunneled nodes provide access and security using an overlay architecture.
This section describes the following topics: