A company wants you to deploy the Junos Pulse Access Control Service in an environment with
non-Juniper and Juniper firewalls. The customer also wants you to deploy firewall enforcement.
Which two steps are necessary to accomplish this goal? (Choose two.)
A.
Configure the IP address of the Junos Pulse Gateway, password, and incoming interface in the
Juniper firewalls.
B.
For the non-Juniper firewalls, type the name, password, and serial number of the device and
location group of 802.1X.
C.
For the Juniper firewalls, type the name, password, and serial number, and select the platform
on the Junos Pulse Access Control Service.
D.
In the firewalls, configure the incoming management interface to accept SSH, SSL, and ping
requests.