Which type of rule should be placed above the Stealth Rule?
A.
User Authentication
B.
Client Authentication
C.
Network Address Translation
D.
Cleanup
E.
Session Authentication
Which type of rule should be placed above the Stealth Rule?
Which type of rule should be placed above the Stealth Rule?
A.
User Authentication
B.
Client Authentication
C.
Network Address Translation
D.
Cleanup
E.
Session Authentication