VMware 3V0-42.23 Question Answer
A customer has two sites and is looking to deploy NSX with stretched security. The customer wants to ensure that only authorized traffic can traverse the stretched security perimeter.
What is the VMware recommended approach for implementing micro-segmentation in this scenario?