Which of the following steps are not required when configuring a transparently deployed
ProxySG to intercept HTTPS traffic?
A.
Create a SSL intercept layer in the VPM.
B.
Enable a SSL service on port 443.
C.
Assign a key ring to the SSL proxy.
D.
Create a SSL access layer in the VPM.
B
B