A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.