A Cleanup rule:A. logs connections that would otherwise be dropped without logging by default.
A Cleanup rule:A. logs connections that would otherwise be dropped without logging by default.
You manage a global network extending from your base in Chicago to Tokyo, Calcutta and Dallas. Management want
You manage a global network extending from your base in Chicago to Tokyo, Calcutta and Dallas. Management wants a report detailing the current software level of each Enterprise class Security Gateway. You plan to take the opportunity to create a proposal outline, listing the most cost-effective way to upgrade your Gateways. Which two SmartConsole applications will you use to create this report and outline?
Which of the below is the MOST correct process to reset SIC from SmartDashboard?
Which of the below is the MOST correct process to reset SIC from SmartDashboard?
Which of the following authentication methods can be configured in the Identity Awareness setup wizard?
Which of the following authentication methods can be configured in the Identity Awareness setup wizard?
An internal router is sending UDP keep-alive packets that are being encapsulated with GRE and sent through you
An internal router is sending UDP keep-alive packets that are being encapsulated with GRE and sent through your R77 Security Gateway to a partner site. A rule for GRE traffic is configured for ACCEPT/LOG. Although the keep-alive packets are being sent every minute, a search through the SmartView Tracker logs for GRE traffic only shows one entry for the whole day (early in the morning after a Policy install).
Choose the correct statement regarding Implicit Rules.
Choose the correct statement regarding Implicit Rules.
You find that Users are not prompted for authentication when they access their Web servers, even though you ha
You find that Users are not prompted for authentication when they access their Web servers, even though you have created an HTTP rule via User Authentication. Choose the BEST reason why.
You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for thi
You have two rules, ten users, and two user groups in a Security Policy. You create database version 1 for this configuration. You then delete two existing users and add a new user group. You modify one rule and add two new rules to the Rule Base. You save the Security Policy and create database version 2. After a while, you decide to roll back to version 1 to use the Rule Base, but you want to keep your user database. How can you do this?
Which of the following are available SmartConsole clients which can be installed from the R77 Windows CD? Read
Which of the following are available SmartConsole clients which can be installed from the R77 Windows CD? Read all answers and select the most complete and valid list.
You have configured SNX on the Security Gateway. The client connects to the Security Gateway and the user ente
You have configured SNX on the Security Gateway. The client connects to the Security Gateway and the user enters the authentication credentials. What must happen after authentication that allows the client to connect to the Security Gateways VPN domain?