header bg

Scan QR code or get instant email to install app

Question:

On the external edge of the main corporate office, a UTM is installed. The company connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator discovers that a worm that was undetected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port utilized by the worm.
Of the following steps listed, which one would MOST likely resolve this problem?

A Enable stateful inspection on the UTM
explanation

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*