https://test.abc.com/rpc/rpcproxy.dll?

Scenario: A Citrix Engineer observes that when going through NetScaler, user connections fail and users are unable to access Exchange server.

However, users can connect directly to the Exchange server. After checking the logs, the engineer finds that the POST request is blocked through the NetScaler.

The log in/ var/log/ns.log is as follows:

Jul 20 11:00: 38 <local0.info>x.x.x. 1 07/20/2017:11:00:38 GMT ns 0-PPE-0:APPFW AF_400_RESP 29362 0: x.x.x.1 439800-PPEO- urlwdummy

https://test.abc.com/rpc/rpcproxy.dll?mail.sfmta.com:6004 Bad request headers. Content-length exceeds post body limit <blocked>

Which parameter can the engineer modify to resolve the issue while maintaining security?
A . Increase the Maximum Header Length under nshttp_default_profile.
B . Increase the POST body limit using the HTTP profile.
C . Add an Application Firewall policy with the expression “HTT
D . RE
E . METHO
F . EQ( “POST”)” with APPFW_BYPASS profile bound.
G . Increase the POST body limit under common settings in Application Firewall profile settings.

Answer: D

Latest 1Y0-340 Dumps Valid Version with 106 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments