In the Rule Base displayed, user authentication in Rule 4 is configured as fully automatic.
Eric is a member of the LDAP group, MSD_Group. What happens when Eric tries to connect to a
server on the Internet?
A.
Eric will be blocked because LDAP is not allowed in the Rule Base.
B.
Eric will be authenticated and get access to the requested server.
C.
Eric will be dropped by the Stealth Rule.
D.
None of these things will happen.
Explanation:
can anyone explain please
Authentication rules should be placed above stealth rule
Ans. C
The authentication rule is above the stealth rule. The picture and the question doesnt make sense… so why is the answer “C”??
i think this picture is not related to our question.
The answer is C.
Love Brad
l think is just an imagination , what it means, is that, imagen if user authentication is this applied to the stealth rule
Answer is C
Explanation:
Fully Automatic Sign On
Fully Automatic Sign On is available for any service only if the required service is specified in the client authentication rule. If the user attempts to connect to a remote host using an authenticated service (Telnet, FTP, HTTP, and RLOGIN), they must authenticate with User Authentication. If the user attempts to connect to a remote host using any other service, they must authenticate through a properly installed Session Authentication agent. When using Fully Automatic Client Authentication, ensure that port 80 is accessible on the gateway machine.
As per rule 4, any traffic to gateway is drop, so it is not fulfilling Fully Automatic Sign On i.e port 80 is accessible on the gateway machine.
Refer link :
https://sc1.checkpoint.com/documents/R76/CP_R76_SGW_WebAdmin/6721.htm