A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application
remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured?