What is a critical piece of information that you should have when creating a VLAN-based implementation plan?
Promiscuous ports must be ______________ to primary and secondary VLANs, and host ports must be ________________.