DRAG DROP Drag and drop the NAT operations on the left into the correct sequential order on the right.
Answer:
One Comment on “Drag and drop the NAT operations on the left into the correct sequential order on the right.”
Vadsays:
Inside-to-Outside
If IPSec then check input access list
decryption – for CET (Cisco Encryption Technology) or IPSec
check input access list
check input rate limits
input accounting
redirect to web cache
policy routing
routing
NAT inside to outside (local to global translation)
crypto (check map and mark for encryption)
check output access list
inspect (Context-based Access Control (CBAC))
TCP intercept
encryption
Queueing
Inside-to-Outside
If IPSec then check input access list
decryption – for CET (Cisco Encryption Technology) or IPSec
check input access list
check input rate limits
input accounting
redirect to web cache
policy routing
routing
NAT inside to outside (local to global translation)
crypto (check map and mark for encryption)
check output access list
inspect (Context-based Access Control (CBAC))
TCP intercept
encryption
Queueing
0
0