Which of the following objects is a valid source in an authentication rule?

Which of the following objects is a valid source in an authentication rule?

Which of the following objects is a valid source in an authentication rule?

A.
Host@Any
B. User@Network

C.
User_group@Network

D.
User@Any



Leave a Reply 2

Your email address will not be published. Required fields are marked *