多项选择题
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
A. access profile
B. IKE parameters
C. tunneled interface
D. redirect policy
相关考题
-
单项选择题
You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()
A. Delete the default auth table mapping policy
B. Create auth table mapping policies that route users to specific resources
C. Create Resource Access policies that permit access to specific resources
D. Create Source Interface policies that route users to specific resources -
单项选择题
Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()
A. uac-policy
B. ic-policy
C. inyranet-auth
D. uac-auth -
多项选择题
What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
A. Configure an authentication policy as part of the user role definitions.
B. Configure a Sign-in Policy.
C. Configure authentication agents as part of the user role definitions
D. Configure an authentication policy as part of the authentication realm definition.
