If the auth ftp command is used in a proxy configured environment, the appliance will _____
A.
ignore ACLs for FTP over HTTP
B.
allow FTP requests and execute the remaining FTP ACLs
C.
authenticate all FTP requests
D.
allow FTP requests and bypass the remaining FTP ACLs enable/disable FTP over
HTTPS