Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?()
A. B. C. D.
Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?()
Given the configuration shown in the exhibit, what is the function of the protect-loopback filter?()
A. to protect the Routing Engine B. to protect all interfaces on the device C. to protect the Packet Forwarding Engine D. to protect the management interface