Which Rule is responsible? You review this Security Policy because Rule 4 is inhibited. Which Rule is responsible? You review this Security Policy because Rule 4 is inhibited. Which Rule is responsible? A.Rule 1 B.Rule 2 C.Rule 3 D.No rule inhibits Rule 4. Explanation: Show Hint ← Previous question Next question →
shaaa With User Auth, the user does not connect directly to the gateway, but initiates a connection to the target server. Rule 3 dropped those connections. The solution is to put user auth rules above stealth rules. Reply
C
Which is correct? Can anyone Explain?
With User Auth, the user does not connect directly to the gateway, but initiates a connection to the target server.
Rule 3 dropped those connections.
The solution is to put user auth rules above stealth rules.