What is the correct order of processing when configuring NAT rules and security policies?
A) destination NAT > policy lookup > source NAT > static NAT
B) policy lookup > source NAT > static NAT > destination NAT
C) source NAT > static NAT > destination NAT > policy lookup
D) static NAT > destination NAT > policy lookup > source NAT
Correct Answer:
Verified
Q9: You want to deploy, manage, and configure
Q10: Click the Exhibit button. Q11: Click the Exhibit button. Q12: Which type of security policy protects restricted Q13: Which method do VPNs use to prevent Q15: By default, revenue interfaces are placed into Q16: Users in your network are downloading files Q17: Which statement is correct about address books Q18: Which two statements are correct about using Q19: Which statement is correct about Junos security![]()
![]()
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents