Refer to the exhibit.
Using a stateful packet firewall and given an inside ACL entry of permit ip 192.16.1.0 0.0.0.255 any, what would be the resulting dynamically configured ACL for the return traffic on the outside ACL?
A.
permit tcp host 172.16.16.10 eq 80 host 192.168.1.11 eq 2300
B.
permit ip 172.16.16.10 eq 80 192.168.1.0 0.0.0.255 eq 2300
C.
permit tcp any eq 80 host 192.168.1.11 eq 2300
D.
permit ip host 172.16.16.10 eq 80 host 192.168.1.0 0.0.0.255 eq 2300
Explanation:
a
I would like to know: at the ASIC level…is it
A. ACTUALLY CREATING these rules the same way an engineer would type them in and then remove them
OR
B. Is the process that the Stateful inspection and Xlate table are doing COMPLETELY different?
is this the system generating a CBAC on the back end…or adding code to running config on the fly?