Yeah, network hardware is already a bottleneck most of the time, it’s much more effective to keep encryption out of the critical path there.
Besides, I wonder what the threat model is; you will still want end-to-end encryption on top of it, so why bother with encrypting the traffic below as well?