You are installing a new deployment of the Junos Pulse Access Control Service. You have an
existing RADIUS server that has a populated user file. You are considering using the RADIUS
proxy feature.
Which consideration must you take into account?
A.
Your RADIUS server database must be replicated onto another device for redundancy.
B.
Inner proxy creates a tunnel between the supplicant and the external server.
C.
RADIUS proxy causes the role assignment process to be skipped.
D.
Outer proxy configuration passes authentication data to the external RADIUS server in clear
text.
Explanation: