A company must integrate an iSCSI storage solution into its existing production environment. The new iSCSI network must be accessible from a limited set of network segments. The client devices follow a strict network security policy to access critical data from the storage array. Which design steps must be used to meet these requirements?
A. Option A
B. Option B
C. Option C
D. Option D