What is the first step for setting up traffic flows when enabling TLS Proxy in SD-WAN for security?
A.
The sender authenticates the devices and individual users, and the receiver verifies the signature by decrypting the message with the public key of the sender.
B.
Certificate authorities in TLS Proxy issue certificates for authentication to all entitles such as hosts, network devices, or users.
C.
When decryption policy is enabled for the flow, a client hello packet is received by Unified Threat Defense to define the decryption action.
D.
The TCP connection is established between the client and the proxy, and between the proxy and the server.
This is how traffic flows when TLS proxy is enabled:
1: A TCP connection is established between the client and the proxy, and the proxy and the server.
https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/ios-xe-17/security-book-xe/m-ssl-proxy.html
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.300-415 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
snakeyz
6 months, 2 weeks ago