You have been asked to configure traffic to flow between two virtual routers (VRs) residing on two
unique logical systems (LSYSs) on the same SRX5800.
How would you accomplish this task?
Configure a security policy that contains the context from VR1 to VR2 to permit the relevant
Configure a security policy that contains the context from LSYS1 to LSYS2 and relevant match
conditions in the rule set to allow traffic between the IP networks in VR1 and VR2.
Configure logical tunnel interfaces between VR1 and VR2 and security policies that allow
relevant traffic between VR1 and VR2 over that link.
Configure an interconnect LSYS to facilitate a connection between LSYS1 and LSYS2 and
relevant policies to allow the traffic.