This protection is two-fold, in that it provides an additional layer of encryption for traffic traversing your wireless network, and it can be deployed in such a way that it requires additional authentication before access to network resources is permitted.