BGP
This section describes how to configure the threat defense to route data, perform authentication, and redistribute routing information using the Border Gateway Protocol (BGP).
This section describes how to configure the threat defense to route data, perform authentication, and redistribute routing information using the Border Gateway Protocol (BGP).