Which of the following objects is a valid source in an authentication rule?

Which of the following objects is a valid source in an authentication rule?

Which of the following objects is a valid source in an authentication rule?

A.
User@Network

B.
User@Any

C.
Host@Any

D.
User_group@Network



Leave a Reply 2

Your email address will not be published. Required fields are marked *


mr_tienvu

mr_tienvu

I have the same idea. D

some_network_engineer

some_network_engineer

can you explain your answer? I feel all of them are correct