Which Cisco ASA feature is implemented by the ip verify reverse-path interface interface_name command?
A. uRPF
B. TCP intercept
C. botnet traffic filter
D. scanning threat detection
E. IPS (IP audit)
Which Cisco ASA feature is implemented by the ip verify reverse-path interface interface_name command?
A. uRPF
B. TCP intercept
C. botnet traffic filter
D. scanning threat detection
E. IPS (IP audit)
what is the solution for
Refer to the exhibit. You have a business partner who has a host IP address of 209.165.202.130. You have a host object that has an IP address of 172.16.0.100.
You need to create a NAT rule that allows 209.165.202.130 to connect over the Internet to 172.16.0.100 by using an object that has a public IP address of
209.165.200.228. The partner IP address must be translated to an internal IP address of 172.16.0.50 for security reasons. Drag and drop the NAT criteria options
from the left onto the correct host objects on the right.
What is the solution for
Drag and Drop Question
Refer to the exhibit. You have a business partner who has a host IP address of 209.165.202.130. You have a host object that has an IP address of 172.16.0.100.
You need to create a NAT rule that allows 209.165.202.130 to connect over the Internet to 172.16.0.100 by using an object that has a public IP address of
209.165.200.228. The partner IP address must be translated to an internal IP address of 172.16.0.50 for security reasons. Drag and drop the NAT criteria options
from the left onto the correct host objects on the right.
If you take the exam, please come back here and mark those that appeared on your exam and what month
I think:
209.165.202.130 – source address in the original packet area
209.165.200.228 – destination address in the translated packet area
172.16.0.50 – source address in the translated packet area
172.16.0.100 – destination address in the original packet area
I don’t think so. as long as the source .130 should communicate with a public IP which should be .228
I see it as below:
209.165.202.130 – source address in the original packet area
209.165.200.228 – destination address in the original packet area
172.16.0.50 – source address in the translated packet area
172.16.0.100 – destination address in the translated packet area
This is the correct answer.