What is blocking hosts from accessing the Internet?

— Exhibit —
security {
policies {
from-zone TRUST to-zone UNTRUST {
policy allow-all {
match {
source-address any;
destination-address any;
application any;
}
then {
deny;
}
}
policy allow-hosts {
match {
source-address hosts;
destination-address any;
application junos-http;
}
then {
permit;
}
scheduler-name block-hosts;
}
policy deny {
match {

source-address any;
destination-address any;
application any;
}
then {
deny;
}
}
}
}
}
schedulers {
scheduler block-hosts {
daily {
start-time 10:00:00 stop-time 18:00:00;
}
}
}
— Exhibit —
Click the Exhibit button.
Referring to the exhibit, you have configured a scheduler to allow hosts access to the Internet during specific
times. You notice that hosts are unable to access the Internet.
What is blocking hosts from accessing the Internet?

— Exhibit —
security {
policies {
from-zone TRUST to-zone UNTRUST {
policy allow-all {
match {
source-address any;
destination-address any;
application any;
}
then {
deny;
}
}
policy allow-hosts {
match {
source-address hosts;
destination-address any;
application junos-http;
}
then {
permit;
}
scheduler-name block-hosts;
}
policy deny {
match {

source-address any;
destination-address any;
application any;
}
then {
deny;
}
}
}
}
}
schedulers {
scheduler block-hosts {
daily {
start-time 10:00:00 stop-time 18:00:00;
}
}
}
— Exhibit —
Click the Exhibit button.
Referring to the exhibit, you have configured a scheduler to allow hosts access to the Internet during specific
times. You notice that hosts are unable to access the Internet.
What is blocking hosts from accessing the Internet?

A.
The policy allow-all should have the scheduler applied.

B.
The policy allow-hosts should match on source-address any.

C.
The policy allow-hosts should have an application of any.

D.
The policy allow-all should have a then statement of permit.



Leave a Reply 4

Your email address will not be published. Required fields are marked *


3abdontha3if

3abdontha3if

If D is correct then all hosts would be allowed all the time and not during a laps of time.
The good answer should be remove the policy allow-all

networkengineer

networkengineer

I agree with you 100% @3abdontha3if.
A, B, and C don’t make any sense as they do not fix the issue as well.