You must restrict which storage arrays can connect to your Gen 5 fabric.
Which security policy satisfies this requirement?
A. FCS
B. DCC
C. SCC
D. IPFILTER
You must restrict which storage arrays can connect to your Gen 5 fabric.
Which security policy satisfies this requirement?
A. FCS
B. DCC
C. SCC
D. IPFILTER