You are asked to design a security solution for your client’s new two-tier data center. The client has a need for some flows to bypass firewall inspection entirely.
Where should the firewall be deployed in this data center?
A . inline, between the core switches and the access switches
B . inline, between the core switches and the edge routers
C . one-arm configuration, connected to the core switches
D . one-arm configuration, connected to each access switch
Answer: C
Explanation:
Reference: https://www.juniper.net/us/en/local/pdf/implementation-guides/8010046-en.pdf