An Internet service provider wants to control the traffic for security and performance isolation. They want to separate the data and management traffic.
Which two network separation topologies should be used according to Dell best practices? (Select 2)