Security Policies enforced by Virtual Systems are applied to ___________ connected to the Virtual IP Stack.
Which of the following virtual devise will NOT fail over, if its interface fails in a VSX High Availability configuration?