You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. ISA Server 2006 is installed on a computer, and three network adapters are included by the computer. The three network adapters are respectively connected to the Internet, the Internal network, and a perimeter network.
The perimeter network adapter and the internal network adapter connect the Private address networks. You apply the 3-Leg Perimeter network template to configure ISA Server. The 3-Leg Perimeter Network Template wizard is run by you. The following changes can be made to the firewall policy.
First, an access rule can be created to permit all traffic between the Internal network and the Internet. Second, an access rule can be created to permit all traffic between the Internal network and the perimeter network.
Third, an access rule can be created to permit SMTP traffic from an SMTP server on the perimeter network to a Microsoft Exchange Server computer on the Internal network.
Fourth, a server publishing rule can be created to permit SMTP traffic from the External network to the SMTP server on the perimeter network. It is reported by the uses that the e-mail messages from users outside of the Internal network can not be received.
You should make sure the users can receive e-mail messages from other users on the Internet.
And a server publishing rule will not be created.
Which action should you perform?
A.
You should modify the network rule, and the network controls the route relationship between the perimeter network and the External network to NAT.
B.
You should modify all network rules, and the network rules control the route relationships between the Internal network, perimeter network, and External network to NAT.
C.
You should modify the network rule, and the network rule controls the route relationship between the perimeter network and the Internal network to Route.
D.
You should modify all network rules, and the network rules control the route relationships between the Internal network, perimeter network, and External network to Route.