Configuring a bandwidth policing policy is a two-step process: configuring, then applying the
policing policy. Where are the configured bandwidth policing policies applied on the VPN
Concentrator? Choose three.
A.
must be applied to a group
B.
optionally applied to a LAN-to-LAN tunnel
C.
optionally applied to a group
D.
must be applied to a LAN-to-LAN tunnel
E.
must be applied to an interface
F.
optionally applied to an interface