A. User/Device Name
B. Encrypted traffic
C. DHCP
D. NetFlow
E. CDP
A. IPv6
B. SNMP
C. Syslog
D. ARP caching
E. FNF
F. BUM traffic
A. Egress interface
B. Per vEdge
C. Ingress interface
D. Per VPN
A. Monitoring
B. Security Incident and Event Management
C. Assurance
D. Access Control
E. BYOD
F. Segmentation