You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.
Which two elements must exist so the user can access the resource? (Choose two.)
Resource access policy on the MAG Series device
IPsec routing policy on the MAG Series device
General traffic policy blocking access through the firewall enforcer
Auth table entry on the firewall enforcer