An administrator enables a user-based firewall and then, using one of the company’s computers,
verifies that the firewall is working as expected. The next day, an employee calls to say that
content that was accessible before the administrator made the changes can no longer be
accessed.
What are two steps the administrator should take to resolve this problem? (Choose two.)
A.
Enable Kerberos between the Junos Pulse Gateway and the Active Directory server.
B.
Verify Active Directory group membership for the user.
C.
Configure captive portal for unauthenticated users.
D.
Load the Active Directory server certificate into the SRX Series device.