Which Rule is responsible?

You review this Security Policy because Rule 4 is inhibited.

Which Rule is responsible?

You review this Security Policy because Rule 4 is inhibited.

Which Rule is responsible?

A.
Rule 1

B.
Rule 2

C.
Rule 3

D.
No rule inhibits Rule 4.

Explanation:



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Eddye

Eddye

Which is correct? Can anyone Explain?

shaaa

shaaa

With User Auth, the user does not connect directly to the gateway, but initiates a connection to the target server.
Rule 3 dropped those connections.
The solution is to put user auth rules above stealth rules.