What is the correct order of processing when configuring NAT rules and security policies?
A) destination NAT > policy lookup > source NAT > static NAT
B) policy lookup > source NAT > static NAT > destination NAT
C) source NAT > static NAT > destination NAT > policy lookup
D) static NAT > destination NAT > policy lookup > source NAT
Correct Answer:
Verified
Q9: You want to deploy, manage, and configure
Q10: Click the Exhibit button. Q11: Click the Exhibit button. Q12: Which type of security policy protects restricted Q13: Which method do VPNs use to prevent Q15: By default, revenue interfaces are placed into Q16: Users in your network are downloading files Q17: Which statement is correct about address books Q18: Which two statements are correct about using Q19: Which statement is correct about Junos security
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents