Huawei Related Exams
H12-721 Exam
Because the policy in the traffic limiting policy does not restrict the deny rule, you do not need to use the deny rule.
Which of the following is incorrect about IKE V1 and IKE V2?
When an attack occurs, the result of packet capture on the attacked host (1.1.1.1) is as shown in the figure. What kind of attack is this attack?
