You are asked to design a security solution for your client’s new two-tier data center. The client has a need for some flows to bypass firewall inspection entirely.
Where should the firewall be deployed in this data center?
A. inline, between the core switches and the access switches
B. inline, between the core switches and the edge routers
C. one-arm configuration, connected to the core switches
D. one-arm configuration, connected to each access switch