"This allows a network device, such as a router or gateway, to act as an IPsec proxy and perform encryption on behalf of the hosts." . . . . .