The USG series firewall is deployed on an enterprise network. You need to log in to the USG through telnet or ssh. Each command entered by the user must be authorized by the server to continue. Which of the following authentication methods can meet the requirements of the enterprise?
Submit