What commands should the administrator enter to accomplish this?

At a small site in the above network diagram, network administrator chose to authenticate WWW
cut-through proxy traffic via a local database on the PIX Firewall. What commands should the
administrator enter to accomplish this?

At a small site in the above network diagram, network administrator chose to authenticate WWW
cut-through proxy traffic via a local database on the PIX Firewall. What commands should the
administrator enter to accomplish this?

A.
pix1(config)# static (dmz,outside) 192.168.16.6 172.16.16.6
pix1(config)# access-list 150 permit tcp any host 192.168.16.6 eq www
pix1(config)# aaa authentication match 150 outside pix1

B.
pix1(config)# static (dmz,outside) 192.168.16.6 172.16.16.6
pix1(config)# access-list 150 permit tcp any host 192.168.16.6 eq www
pix1(config)# aaa authentication match 150 outside LOCAL

C.
pix1(config)# static (dmz,outside) 192.168.16.6 172.16.16.6
pix1(config)# access-list 150 permit tcp any host 172.16.16.6 eq www
pix1(config)# aaa authentication match 150 outside LOCAL

D.
pix1(config)# static (dmz,outside) 192.168.16.6 172.16.16.6
pix1(config)# access-list 150 permit tcp any host 172.16.16.6 eq www
pix1(config)# aaa authentication match 150 outside pix1



Leave a Reply 0

Your email address will not be published. Required fields are marked *