Which of the following objects is a valid source in an authentication rule?

Which of the following objects is a valid source in an authentication rule?

Which of the following objects is a valid source in an authentication rule?

A.
User@Network

B.
User@Any

C.
Host@Any

D.
User_group@Network



Leave a Reply 0

Your email address will not be published. Required fields are marked *