What happens when Eric tries to connect to a server on the Internet?

In the Rule Base displayed, user authentication in Rule 4 is configured as fully automatic.

Eric is a member of the LDAP group, MSD_Group. What happens when Eric tries to connect to a
server on the Internet?

In the Rule Base displayed, user authentication in Rule 4 is configured as fully automatic.

Eric is a member of the LDAP group, MSD_Group. What happens when Eric tries to connect to a
server on the Internet?

A.
Eric will be blocked because LDAP is not allowed in the Rule Base.

B.
Eric will be authenticated and get access to the requested server.

C.
Eric will be dropped by the Stealth Rule.

D.
None of these things will happen.

Explanation:



Leave a Reply 7

Your email address will not be published. Required fields are marked *


imran

imran

can anyone explain please

imran

imran

Authentication rules should be placed above stealth rule

MB

MB

The authentication rule is above the stealth rule. The picture and the question doesnt make sense… so why is the answer “C”??

Brad

Brad

i think this picture is not related to our question.
The answer is C.
Love Brad

jones

jones

l think is just an imagination , what it means, is that, imagen if user authentication is this applied to the stealth rule

Sumit

Sumit

Answer is C

Explanation:
Fully Automatic Sign On
Fully Automatic Sign On is available for any service only if the required service is specified in the client authentication rule. If the user attempts to connect to a remote host using an authenticated service (Telnet, FTP, HTTP, and RLOGIN), they must authenticate with User Authentication. If the user attempts to connect to a remote host using any other service, they must authenticate through a properly installed Session Authentication agent. When using Fully Automatic Client Authentication, ensure that port 80 is accessible on the gateway machine.

As per rule 4, any traffic to gateway is drop, so it is not fulfilling Fully Automatic Sign On i.e port 80 is accessible on the gateway machine.

Refer link :
https://sc1.checkpoint.com/documents/R76/CP_R76_SGW_WebAdmin/6721.htm