An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
A. Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
B. Configure pNAT to ensure Voice over IP packets are properly translated.
Configure IOS firewall to permit RTP port numbers through the firewall via VP
D. Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.