A recent security audit indicates that peer-to-peer applications are allowed on the guest VLAN and employee may have been using the guest VLAN for this purpose. You deploy the configuration shown in the exhibit., but it does not stop the peer-to-peer traffic.
In this scenario, what must you do to implement the security policy?
Currently there are no comments in this discussion, be the first to comment!