Which two additional configurations would accomplish your goal?

Scenario:
Set security policies from-zone USERS to-zone PCI policy Tunnel-Employees match sourceaddress any set security policies from-zone USERS to-zone PCI policy Tunnel-Employees match
destination-address any set security policies from-zone USERS to-zone PCI policy TunnelEmployees match application any
You work for a financial institution and are asked to secure traffic from authorized users that
access PCI secure data over an IPsec tunnel using the Junos Pulse Access Control Service. You
have completed the configuration shown in the exhibit.
Which two additional configurations would accomplish your goal? (Choose two.)

Scenario:
Set security policies from-zone USERS to-zone PCI policy Tunnel-Employees match sourceaddress any set security policies from-zone USERS to-zone PCI policy Tunnel-Employees match
destination-address any set security policies from-zone USERS to-zone PCI policy TunnelEmployees match application any
You work for a financial institution and are asked to secure traffic from authorized users that
access PCI secure data over an IPsec tunnel using the Junos Pulse Access Control Service. You
have completed the configuration shown in the exhibit.
Which two additional configurations would accomplish your goal? (Choose two.)

A.
set security policies from-zone USERS to-zone PCI policy Tunnel-Employees then permit
tunnel PCI-VPN

B.
set security policies from-zone USERS to-zone PCI policy Tunnel-Employees then permit
tunnel ipsec-vpn PCI-VPN

C.
set security policies from-zone USERS to-zone PCI policy Tunnel-Employees then permit uacpolicy

D.
set security policies from-zone USERS to-zone PCI policy Tunnel-Employees then permit
application-services uac-policy

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *