Assume that traffic matches a Security policy rule but the attached Security Profiles is configured to block matching traffic. Which statement accurately describes how the firewall will apply an action to matching traffic?
A.
If it is a block rule, then Security Profile action is applied last.
B.
If it is an allow rule, then the Security policy rule is applied last.
C.
If it is a block rule, then the Security policy rule action is applied last.
D.
If it is an allowed rule, then the Security Profile action is applied last.
That is true, Security profiles are applied only after a Security policy allow match; if the traffic is for example dropped they will not match Security profiles.
upvoted 4 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
H3kerman
Highly Voted 1 year, 8 months agodrogadotcom
3 months, 1 week ago