When using Contra! networking, security policies are distributed as access control list to which component?
A. vSwith
B. vSRX
C. vMX
D. vRouter
When using Contra! networking, security policies are distributed as access control list to which component?
A. vSwith
B. vSRX
C. vMX
D. vRouter