Which network virtualization technology provides logical isolation of network traffic at Layer 3?
A network engineer is implementing virtualization into the enterprise network. Which system should be used to address policy enforcement at the distribution layer?
A. Cisco IOS based firewall
B. multilayer switches
C. integrated firewall services
D. identity services engine
E. intrusion protection systems