You can use tunnel content inspection to enforce Security, DoS
Protection, and QoS policies on traffic in these types of tunnels
and traffic nested within another cleartext tunnel (for example,
a Null Encrypted IPSec tunnel inside a GRE tunnel). You can view
tunnel inspection logs and tunnel activity in the ACC to verify
that tunneled traffic complies with your corporate security and
usage policies.