PdfPrep.com

Which two security policy rules will accomplish this configuration?

Refer to the exhibit.

An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and HOST B (10.1.1.101) receives SSH traffic.)

Which two security policy rules will accomplish this configuration? (Choose two.)
A . Untrust (Any) to Untrust (10.1.1.1), web-browsing -Allow
B . Untrust (Any) to Untrust (10.1.1.1), ssh -Allow
C . Untrust (Any) to DMZ (10.1.1.1), web-browsing -Allow
D . Untrust (Any) to DMZ (10.1.1.1), ssh CAllow
E . Untrust (Any) to DMZ (10.1.1.100.10.1.1.101), ssh, web-browsing -Allow

Answer: CD

Exit mobile version