Because of pre-existing design constraints, you set up manual NAT rules for your HTTP server. However,
your FTP server and SMTP server are both using automatic NAT rules. All traffic from your FTP and SMTP
servers are passing through the Security Gateway without a problem, but traffic from the Web server is
dropped on rule 0 because of anti-spoofing settings. What is causing this?
You enable Hide NAT on the network object, 10.1.1.0 behind the Security Gateway's external interface. You
browse to from host, 10.1.1.10 successfully. You enable a log on the rule that allows 10.1.1.0 to exit the
network. How many log entries do you see for that connection in SmartView Tracker?
Which Check Point address translation method allows an administrator to use fewer ISP-assigned IP
addresses than the number of internal hosts requiring Internet connectivity?
Which Check Point address translation method is necessary if you want to connect from a host on the
Internet via HTTP to a server with a reserved (RFC 1918) IP address on your DMZ?
You want to implement Static Destination NAT in order to provide external, Internet users access to an
internal Web Server that has a reserved (RFC 1918) IP address. You have an unused valid IP address on
the network between your Security Gateway and ISP router. You control the router that sits between the
firewall external interface and the Internet.
What is an alternative configuration if proxy ARP cannot be used on your Security Gateway?
After implementing Static Address Translation to allow Internet traffic to an internal Web Server on your
DMZ, you notice that any NATed connections to that machine are being dropped by anti- spoofing
protections. Which of the following is the MOST LIKELY cause?