Scenario: A Citrix Architect is designing a new Citrix Virtual Apps and Desktops environment. The environment will run on 2 Citrix Hypervisor platforms, each consisting of 3 NICs. The company maintains strict security standards for all business data traffic, so the architect is designing and configuring hypervisor network traffic to limit infrastructure vulnerabilities.
How should the architect configure the hypervisor network traffic to provide the best security for the environment?