How does the WSA policy trace tool make a request to th…

How does the WSA policy trace tool make a request to the Proxy to emulate a client
request?

How does the WSA policy trace tool make a request to the Proxy to emulate a client
request?

A.
explicitly

B.
transparently

C.
via WCCP

D.
via policy-based routing



Leave a Reply 6

Your email address will not be published. Required fields are marked *


MeMyselfAndI

MeMyselfAndI

Does anyone have an explanation why the WSA should use WCCP in order to use the internal trace tool to “test” a connection (policy flow)? For me it does not sound like it would make any sense at all. Can’t find any related information on Cisco.

akbar

akbar

WCCP is optional
Policy Based Routing is done on Routing/Switching/Firewalls.
Transparently is optional
You can run Policy trace without the optional items.
So by process of elimanation.
I think its Explicitly

Packet

Packet

I think that they are asking: is the request crafted by the Tracetool an explicit request or a transparent request.

With the trace tool, we are typing in the URL manually, and the WSA itself performs the nslookup . When the WSA performs the nslookup itself, instead of the client doing the nslookup, it means that the HTTP request was done explicitely. With a transparent proxy, a client doesn’t know of the presence of the proxy and therefore the client does the nslookup. With explicit proxy, the client knows about the presence of the proxy and leave the DNS job to the proxy. So, A is the right answer, and therefore, answers B, C, D are automatically eliminated also since they are all related to transparent proxying.

Béla Fazekas

Béla Fazekas

Cleared the 300-210 exam recently with a good score!

I had many Hotspot Questions and Lab Simulation.

Lab Simulation FYI: Gig 0/0 and Gig 0/1, HIGHRISK-MEDIUMRISK.
Hotspot Questions FYI: Cisco C100V and Cisco Email Security Appliance

I learned all questions from the newest PassLeader 300-210 dumps (337q New Dumps).

By the way, here you can get part of PassLeader 300-210 dumps (337q New Dumps):

http://www.ciscobraindump.com/category/ccnp-security-dumps/300-210-exam-dumps

Good Luck!!!

aa

aa

Answer: C. via WCCP

jm2c: The trick of the question lies within the words “…request to the Proxy…”, so in order to emulate a client request to the proxy, the trace tool needs to use a proxy port in the Advanced settings. By using the proxy port field, the WSA emulates a WCCP request; hence, the answer is “C. via WCCP”