A. source port B. output interface C. next-hop IP address D. source MAC address E. destination IP address F. next-hop MAC address
A. intrusion protection B. identity C. secure connectivity D. security management
A. Easy VPN B. IPsec GRE tunneling C. Virtual Tunnel Interfaces D. Dynamic Multipoint VPN