Which of the following protocols are GRE VPN technology in the world's most used Internet transport protocol?
A. GRE
B. IPX
C. IP
D. TCP
For inter-domain packet filtering, the following statements is correct? (Choose three)
A. policy 1 disable command to disable policy 1
B. By default,Policy to create higher the priority,the more the first match
C. By policy move command to adjust the position of the policy,policy id will change accordingly
D. Once matched to a Policy, in accordance with the Policy on the definition of processing packets no longer continue to match directly down
Which of the following techniques can be implemented to refuse illegal host or illegal data packets? (Choose three)
A. MAC and IP address binding
B. ACL
C. Blacklist
D. Static Routing
Proxy firewall to check request from the user, the user checks the security policy through the firewall on behalf of external users to establish a connection to the real server, forwarding an external user request, and returns a response back to the real server to the external user.
A. True
B. False
Outbound NAT configuration based on the direction, in the case of no-pat configuration commands, the following description of what is wrong? (Choose three)
A. Conducted only source IP address translation
B. Conducted only destination IP address translation
C. The source IP address and source port translation
D. Be the destination IP address and destination port translation
Description of the error based GRE encapsulation and de-encapsulation yes?
A. Packaging process: after the original packet routing to pass through to find the packet to start trigger GRE tunnel interface module encapsulation
B. Packaging process: After the GRE module package, this package will enter the IP module for further processing
C. Decapsulation process: After receipt of GRE packet destination,find the route to pass through the packet to the GRE tunnel interface module start trigger decapsulate
D. Decapsulation process: After the GRE module solution package, this package will enter the IP module for further processing
SVN3000 port forwarding is based on the way the port control access to network resources for what applications?
A. TCP
B. UDP
C. TCP or UDP
D. SPX
In the TCP three-way handshake, for packet SYN (seq = b, ack = a +1), the following statement is correct there?
A. Confirmation of the number of data packets is b
B. A +1 on the number of packets that are recognized
C. A desired number of the next data packet received is b
D. A desired number of the received packet is a +1
Which of the following security protocols IPSec NAT traversal (middle ipsec vpn tunnels circumstances nat device)?
A. AH
B. ESP
C. AH + ESP
D. AES
Huawei firewall nat outbound which supports the following scenario? (Choose three)
A. One address translation
B. -Many address translation
C. -Many address translation
D. Many-to- address translation