Perermit, deny, and taboo (blocked list) lists and application-centric allowed list policy model for securing virtual applications
● EPG policy filtering (source EPG, destination EPG, and Layer 4 ports) at the physical fabric
BDPU filter and Guard, SPAN, ERSAPN, and port security