Which is a method of identifying the traffic requiring authorization on the security appliance?
A.
independently interpreting authorization rules before authentication has occurred to decrease
overall AAA processing time
B.
specifying ACLs that authorization rules must match
C.
checking the authentication rules for a match thus allowing the traffic to be authorized
D.
implicitly enabling TACACS+ authorization rules in the response packet