Which debug option will gather information regarding the accept or drop action performed on traffic?
Which debug option will gather information regarding the accept or drop action performed on
traffic?
What variable is used to extend the interval of the Timeout in a NAT to prevent a hidden UDP connection from l
What variable is used to extend the interval of the Timeout in a NAT to prevent a hidden UDP
connection from losing its port?
Which of the following files is held on a management module and cotains the whole rulebase?
Which of the following files is held on a management module and cotains the whole rulebase?
What is the correct procedure to migrate the configuration?
You plan to migrate a VPN-1 NG with Application Intelligence (Al) R55 SmartCenter Server to
VPN-1 NGX. You also plan to upgrade four VPN-1 Pro Gateways at remote offices, and one local
VPN-1 Pro Gateway at your company’s headquarters. The SmartCenter Server configuration must
be migrated. What is the correct procedure to migrate the configuration?
To hide data filed in the log viewer:
To hide data filed in the log viewer:
Which status implies that a secondary module has a later version of the database than the primary?
In the peer status area of the high availability management module screen of the active server,
there are defined status levels that can apply to a peer module. Which status implies that a
secondary module has a later version of the database than the primary?
Which Security Server can perform content-security tasks, but CANNOT perform authentication tasks?
Which Security Server can perform content-security tasks, but CANNOT perform authentication
tasks?
After you defined the user on the Firewall and use VPN-1/FireWall-1 Authentication, you would:
You are following the procedure to setup user authentication for TELNET to prompt for a distinct
destination. This allows the firewall to simulate a TELNET Proxy. After you defined the user on the
Firewall and use VPN-1/FireWall-1 Authentication, you would:
you need to configure?
To configure a fully overlapping encryption domain, what type of group(s) do you need to
configure?
Which VoIP Domain object type can you use?
You are configuring the VoIP Domain object for an H.323 environment, protected by VPN-1 NGX.
Which VoIP Domain object type can you use?