Effectiveness of security tools to anomalies on tunneled traffic.