Your customer has implemented an IPS-8 for iSCSI connectivity to workgroup servers. How can this customer prevent unauthorized hosts from connecting to the Cisco MDS 9000 fabric through the iSCSI interfaces?
A.
Configure RADIUS authentication
B.
Configure IPSec encryption on the IPS-8
C.
Configure IP ACLs on the IPS-8
D.
Configure fabric binding on the IPS-8