- To encrypt data in transit
- To manage network access control lists
- To monitor API calls
- To capture information about IP traffic going into interfaces