What do you use to group interfaces with similar security requirements?

What do you use to group interfaces with similar security requirements?

What do you use to group interfaces with similar security requirements?

A.
zones

B.
policies

C.
address book

D.
NAT configuration



Leave a Reply to rpgghost Cancel reply1

Your email address will not be published. Required fields are marked *

15 − thirteen =