To require users to authenticate before accessing the corporate DMZ servers, the network security administrator needs to configure cut-through proxy authentication via RADIUS. Which three tasks are required to accomplish this goal? (Choose three. )
A.
Specify a AAA server group.
B.
Designate an authentication server.
C.
Add users to the local user database
D.
Configure per-user overridE.
E.
Configure a rule that specifies which traffic flow to authenticatE.
F.
Assign ACLs to users or groups.