Which method can accomplish this objective?
You administer an SRX5600 to which several customer networks are attached. Each customer network terminates in a virtual routing-instance. You have been asked to direct traffic sourced from a specific prefix in one routing-instance to another routing-instance. The affected traffic enters the SRX5600 on one physical interface.
Which method can accomplish this objective?
What is the second step?
When fragmented traffic is processed by the IPS engine, two steps are performed. First, the IPS engine identifies IP fragments.
What is the second step?
What is causing the problem?
Your network engineering department has decided another SRX cluster is needed for additional capacity and DMZ segments. After installing the new cluster on the same VLANs, network segment customers are reporting intermittent loss of service. Upon investigating the problem, you have confirmed that there are no IP address conflicts.
What is causing the problem?
What are two possible causes of the higher utilization?
You have set up a chassis cluster in an active-active state. While monitoring the fabric link during a failover scenario, you noticed the utilization is higher than expected.
What are two possible causes of the higher utilization? (Choose two)
Which statement is correct about how the SRX chassis cluster will handle all these packets?
Your company has decided to enable IPv6 in its corporate network. All core network elements are already enabled. You have completed the configuration of the SRX Series cluster. All tests are running well and no issues have been found. The IT department decides to increase the MTU on the access switches and the workstations to 9000, everything else will continue using the standard settings.
Which statement is correct about how the SRX chassis cluster will handle all these packets?
Which three actions can you perform to establish the IPSec SA between the hub and spoke sites?
You are configuring a hub-and-spoke VPN topology between an SRX Series device deployed at the hub site and several devices at spoke sites. You have configured all the settings to establish the tunnel, but the IPSec SA has not yet established all configured proposals and policies match on both sides
Which three actions can you perform to establish the IPSec SA between the hub and spoke sites? (Choose three.)
How long will the binding remain in the SRX Series device’s memory?
You have configured persistent NAT with the default inactivity timeout. All of the sessions of a persistent NAT binding have expired.
How long will the binding remain in the SRX Series device’s memory?
What is causing the problem?
A user residing in the trust zone of the SRX Series device cannot access a Web page hosted on a server in the DMZ zone. You verity that an active security policy exists on the SRX device that allows the user’s PC to access the Web server with the application HTTP. However, you do not see the security policy access counter increment, nor do you see any information in the log file associated with the security policy.
What is causing the problem?
Which command statement installs the attack database?
You loaded the attack database on your SRX device, but it must be installed. Which command statement installs the attack database?
Which component can you use to find an attack for traffic that uses a nonstandard service?
Which component can you use to find an attack for traffic that uses a nonstandard service?