Drag and drop the NAT operations on the left into the correct sequential order on the right.

DRAG DROP
Drag and drop the NAT operations on the left into the correct sequential order on the right.

DRAG DROP
Drag and drop the NAT operations on the left into the correct sequential order on the right.

Answer:



Leave a Reply 1

Your email address will not be published. Required fields are marked *

seventeen + seventeen =


Vad

Vad

Inside-to-Outside
If IPSec then check input access list
decryption – for CET (Cisco Encryption Technology) or IPSec
check input access list
check input rate limits
input accounting
redirect to web cache
policy routing
routing
NAT inside to outside (local to global translation)
crypto (check map and mark for encryption)
check output access list
inspect (Context-based Access Control (CBAC))
TCP intercept
encryption
Queueing