Which Cisco ASA feature is implemented by the ip verify reverse-path interface interface_name command?

Which Cisco ASA feature is implemented by the ip verify reverse-path interface interface_name command?
A. uRPF
B. TCP intercept
C. botnet traffic filter
D. scanning threat detection
E. IPS (IP audit)

cisco-exams

6 thoughts on “Which Cisco ASA feature is implemented by the ip verify reverse-path interface interface_name command?

  1. what is the solution for

    Refer to the exhibit. You have a business partner who has a host IP address of 209.165.202.130. You have a host object that has an IP address of 172.16.0.100.
    You need to create a NAT rule that allows 209.165.202.130 to connect over the Internet to 172.16.0.100 by using an object that has a public IP address of
    209.165.200.228. The partner IP address must be translated to an internal IP address of 172.16.0.50 for security reasons. Drag and drop the NAT criteria options
    from the left onto the correct host objects on the right.

  2. What is the solution for
    Drag and Drop Question
    Refer to the exhibit. You have a business partner who has a host IP address of 209.165.202.130. You have a host object that has an IP address of 172.16.0.100.
    You need to create a NAT rule that allows 209.165.202.130 to connect over the Internet to 172.16.0.100 by using an object that has a public IP address of
    209.165.200.228. The partner IP address must be translated to an internal IP address of 172.16.0.50 for security reasons. Drag and drop the NAT criteria options
    from the left onto the correct host objects on the right.

  3. If you take the exam, please come back here and mark those that appeared on your exam and what month

    1. I think:
      209.165.202.130 – source address in the original packet area
      209.165.200.228 – destination address in the translated packet area
      172.16.0.50 – source address in the translated packet area
      172.16.0.100 – destination address in the original packet area

      1. I don’t think so. as long as the source .130 should communicate with a public IP which should be .228
        I see it as below:
        209.165.202.130 – source address in the original packet area
        209.165.200.228 – destination address in the original packet area
        172.16.0.50 – source address in the translated packet area
        172.16.0.100 – destination address in the translated packet area

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.