An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
- AConfigure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
- BConfigure pNAT to ensure Voice over IP packets are properly translated.
- CConfigure IOS firewall to permit RTP port numbers through the firewall via VPN.
- DConfigure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.