You review this Security Policy because Rule 4 is inhibited.
Which Rule is responsible?
A.
Rule 1
B.
Rule 2
C.
Rule 3
D.
No rule inhibits Rule 4.
Explanation:
You review this Security Policy because Rule 4 is inhibited.
Which Rule is responsible?
A.
Rule 1
B.
Rule 2
C.
Rule 3
D.
No rule inhibits Rule 4.
Explanation:
C
Which is correct? Can anyone Explain?
With User Auth, the user does not connect directly to the gateway, but initiates a connection to the target server.
Rule 3 dropped those connections.
The solution is to put user auth rules above stealth rules.