Click the Exhibit button.
userehost# run show route
inet.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
+ = Active Route, – = Last Active, * = Both
0.0.0.0/0 *[Static/5] 00:05:06
> to 172.16.1.1 via ge-0/0/1.0
172.16.1.0/24 *[Direct/O] 00:05:06
> via ge-0/0/1.0
172.16.1.3/32 *[Local/0] 00:05:07
Local via ge-0/0/1.0
192.168.200.2/32 *[Local/0] 00:05:07
Rejectvr-a.inet.0: 2 destinations, 2 routes (2 active, 0 holddown, 0 hidden) + = Active Route, – = Last Active, * = Both
192.168.1.0/24 *[Direct/0] 00:01:05
> via ge-0/0/2.0
192.168.1.1/32 *[Local/0] 00:01:05
Local via ge-0/0/2.0
vr-b.inet.0: 2 destinations, 2 routes (2 active, 0 holddcwn, 0 hidden) + = Active Route, – = Last Active, * = Both
192.168.1.0/24 *[Direct/O] 00:01:05
> via go-0/0/3.0
192.168.1.1/32 *[Local/0] 00:01:05
Local via ge-0/0/3.0
User 1 will access Server 1 using IP address 10.2.1.1. You need to ensure that return traffic is able to reach
User 1 from Server 1.
Referring to the exhibit, which two configurations allow this communication (Choose two.)
A.
[edit security nat static]
user@host# show
rule-set server-nat {
from zone [ untrust ];
rule 1 {
match {
destination-address 10.2.1.1/32;
}
then {
static-nat {
prefix {
192.168.1.2/32;
}
}
}
}
}
B.
[edit security nat static]
user@host# show
rule-set server-nat {
from zone [ junos-host untrust ];
rule 1 {
match {
destination-address 10.2.1.1/32;
}
then {
static-nat {
prefix {
192.168.1.2/32;
routing-instance vr-b;
}
}
}
}
}
C.
[edit security nat static]
user@host# show
rule-set server-nat {
from zone untrust;rule 1 {
match {
destination-address 10.2.1.1/32;
}
then {
static-nat {
prefix {
192.168.1.2/32;
routing-instance vr-a;
}
}
}
}
}
D.
[edit security nat static]
user@host# show
rule-set in {
from zone untrust;
to zone cust-a;
rule overload {
match {
source-address 0.0.0.0/0;
}
then {
source-nat {
interface;
}
}
}
}