Yes you can run them as you require as long as there is IP connectivity between them. The config of the devices being protected will need to be changed to enable this to work.
Learn, share, save
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.