You have been asked to configure traffic to flow between two virtual routers (VRs) residing on two unique
logical systems (LSYSs) on the same SRX5800.
How would you accomplish this task?
A.
Configure a security policy that contains the context from VR1 to VR2 to permit the relevant traffic.
B.
Configure a security policy that contains the context from LSYS1 to LSYS2 and relevant match conditions in
the rule set to allow traffic between the IP networks in VR1 and VR2.
C.
Configure logical tunnel interfaces between VR1 and VR2 and security policies that allow relevant traffic
between VR1 and VR2 over that link.
D.
Configure an interconnect LSYS to facilitate a connection between LSYS1 and LSYS2 and relevant policies
to allow the traffic.
Explanation:
: http://kb.juniper.net/InfoCenter/index?page=content&id=KB21260