Refer to the exhibit. The network administrator for this small site has chosen to authenticate HTTP
cut-through proxy traffic via a local database on the Cisco ASA. Which set of command strings
should the administrator enter to accomplish this?
A.
asa1(config)# static (dmz,outside) 192.168.16.6 172.16.16.6
asa1(config)# access-list 150 permit tcp any host 192.168.16.6 eq www
asa1(config)# aaa authentication match 150 outside LOCAL
B.
asa1(config)# static (dmz,outside) 192.168.16.6 172.16.16.6
asa1(config)# access-list 150 permit tcp any host 192.168.16.6 eq www
asa1(config)# aaa authentication match 150 outside asa1
C.
asa1(config)# static (dmz,outside) 192.168.16.6 172.16.16.6
asa1(config)# access-list 150 permit tcp any host 172.16.16.6 eq www
asa1(config)# aaa authentication match 150 outside LOCAL
D.
asa1(config)# static (dmz,outside) 192.168.16.6 172.16.16.6
asa1(config)# access-list 150 permit tcp any host 172.16.16.6 eq www
asa1(config)# aaa authentication match 150 outside asa1