H12-723 Exam Question 26
In Layer 2 authentication based on Portal authentication, the client is directly connected to the access device (or only the Layer 2 device exists). The device can learn MAC address of the user and use IP and MAC addresses to identify the user.
H12-723 Exam Question 27
Create CAPWAP between AP and AC, establish CAPWAP tunnel negotiates with AP and AC. In this process, CAPWAP tunnel use DTLS to encrypt and transmit UDP packets.
Which encryption methods are supported by DTLS?
Which encryption methods are supported by DTLS?
H12-723 Exam Question 28
Which of the following is correct about the authentication method and authentication type?
H12-723 Exam Question 29
Use hardware SACG access control, the result of viewing the session table on hardware SACG is as follows:
<FW>display firewall session table verbose:
tcpVPN: public-->public
Zone: untrust-->trust TTL: 00:10:00 Left: 00:05:27
Interface: GigabitEthernet0/0/1 NextHop:192.168.200.11 MAC:00-0c-29-d4-47-d2
<--packets: 316ytes:9516-->packets:33bytes:17277
192.168.0.119:1574-->192.168.200.11:15080
tcpVPN: public-->public
Zone: untrust-->trust TTL: 00:10:00 Left: 00:02:20
Interface: GigabitEthernet0/0/1 NextHop:192.168.100.1 MAC: 00-0c-29-a4-37-c2
<--packets:31bytes:9516-->packets:336ytes:17277
192.168.0.119:1671-->192.168.100.1:8443
Which of the following statements are correct? (Multiple choices)
<FW>display firewall session table verbose:
tcpVPN: public-->public
Zone: untrust-->trust TTL: 00:10:00 Left: 00:05:27
Interface: GigabitEthernet0/0/1 NextHop:192.168.200.11 MAC:00-0c-29-d4-47-d2
<--packets: 316ytes:9516-->packets:33bytes:17277
192.168.0.119:1574-->192.168.200.11:15080
tcpVPN: public-->public
Zone: untrust-->trust TTL: 00:10:00 Left: 00:02:20
Interface: GigabitEthernet0/0/1 NextHop:192.168.100.1 MAC: 00-0c-29-a4-37-c2
<--packets:31bytes:9516-->packets:336ytes:17277
192.168.0.119:1671-->192.168.100.1:8443
Which of the following statements are correct? (Multiple choices)
H12-723 Exam Question 30
Typical application scenarios of terminal security include desktop management, illegal outreach and computer peripheral management.