Which of the following are correct about hardware SACG authentication deployment scenario? (Multiple choices)
A . SACG authentication is generally used in stable network scenarios where wired admission control is performed.
B . SACG authentication is generally used in scenarios where new networks are set up for wireless admission control.
C . SACG is generally deployed in bypass mode without changing the original network topology.
D . SACG essentially controls access to users through 802.1X technology.