You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.
Which type of policies provide this level of protection?
A.
resource access policies
B.
Host Enforcer policies
C.
source IP enforcement policies
D.
IPsec enforcement policies