What do you use to group interfaces with similar security requirements?
A.
zones
B.
policies
C.
address book
D.
NAT configuration
What do you use to group interfaces with similar security requirements?
What do you use to group interfaces with similar security requirements?
A.
zones
B.
policies
C.
address book
D.
NAT configuration