. Look inside the VPN tunnel as was done in step 14. What layer 2, 3, and 4 protocols are used inside the encrypted packet?