I think the key here is understanding how Cisco ACI handles traffic and security policies. Based on that, I'd say option C is probably the right answer - using contracts between EPGs to send traffic to the firewall. That seems like the most logical way to integrate the two systems.
I'm a bit confused by this question. I'm not super familiar with how Palo Alto firewalls work, so I'm not sure which of these options would be the right approach. I guess I'd have to do some research on that integration to figure it out.
Okay, I'm pretty confident I know the answer to this one. The traffic would be directed to the Palo Alto firewall through a policy-based redirect, which is option B. That's how you integrate external security devices with Cisco ACI.
Hmm, I'm a little unsure about this one. I know Cisco ACI uses contracts and EPGs to manage traffic, so option C seems like it could be a good possibility. But I'm not totally sure how that would integrate with a Palo Alto firewall.
I think I'd start by looking at the options and trying to eliminate the ones that don't seem relevant. A virtual machine monitor domain doesn't seem like it would be the right approach here.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Louvenia
4 days agoMelissia
9 days agoJosefa
14 days agoNancey
19 days agoBarb
24 days agoElizabeth
29 days agoViola
1 month agoCordelia
1 month agoFiliberto
1 month agoAlberta
2 months agoEliseo
2 months agoJuan
2 months ago