Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus?