A. source port B. output interface C. next-hop IP address D. source MAC address E. destination IP address F. next-hop MAC address
A. intrusion protection B. identity C. secure connectivity D. security management
A.1 B.2 C.3 D.4