The encryption and encapsulation of data takes place at the remote sensor. Once this has occurred, the tunneled packet will be sent back to the sensor that protects the director's home network.

Upon reaching this sensor, the packet will be de-encapsulated, decrypted, and passed on to the director for analysis.