A Cisco UCM-based solution uses URI-based calling for Cisco Jabber clients. The solution has several clusters in different locations. The solution being configured must have a secure method o* exchanging addresses between the clusters. Which action ensures that a configuration complies with the requirements?
Submit