option
Questions
ayuda
daypo
search.php

sdwan 6.4

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
sdwan 6.4

Description:
sdwan 6.4

Creation Date: 2023/07/21

Category: Others

Number of questions: 81

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

Multiple IPsec VPNs are formed between two hub-and-spokes groups, and site-to-site between Hub 1 and Hub 2. The administrator configured ADVPN on the dual regions topology. Which two statements are correct if a user in Toronto sends traffic to London? (Choose two.). Toronto needs to establish a site-to-site tunnel with Hub 2 to bypass Hub 1. The first packets from Toronto to London are routed through Hub 1 then to Hub 2. London generates an IKE information message that contains the Toronto public IP address. Traffic from Toronto to London triggers the dynamic negotiation of a direct site-to-site VPN.

Exhibit A shows the traffic shaping policy and exhibit B shows the firewall policy. FortiGate is not performing traffic shaping as expected, based on the policies shown in the exhibits. To correct this traffic shaping issue on FortiGate, what configuration change must be made on which policy?. The URL category must be specified on the traffic shaping policy. The shaper mode must be applied per-IP shaper on the traffic shaping policy. The web filter profile must be enabled on the firewall policy. The application control profile must be enabled on the firewall policy.

Which statement defines how a per-IP traffic shaper of 10 Mbps is applied to the entire network?. The 10 Mbps bandwidth is shared equally among the IP addresses. Each IP is guaranteed a minimum 10 Mbps of bandwidth. FortiGate allocates each IP address a maximum 10 Mbps of bandwidth. A single user uses the allocated bandwidth divided by total number of users.

Which three parameters are available to configure SD-WAN rules? (Choose three.). Application signatures. URL categories. Internet service database (ISDB) address object. Source and destination IP address. Type of physical link connection.

Which diagnostic command you can use to show interface-specific SLA logs for the last 10 minutes?. diagnose sys virtual-wan-link health-check. diagnose sys virtual-wan-link log. diagnose sys virtual-wan-link sla-log. diagnose sys virtual-wan-link intf-sla-log.

Which diagnostic command can you use to show the SD-WAN rules interface information and state?. diagnose sys virtual-wan-link route-tag-list. diagnose sys virtual-wan-link service. diagnose sys virtual-wan-link member. diagnose sys virtual-wan-link neighbor.

Exhibit A shows the performance SLA exhibit B shows the SD-WAN diagnostics output. Based on the exhibits, which statement is correct?. Port1 became dead because no traffic was offload through the egress of port1. SD-WAN member interfaces are affected by the SLA state of the inactive interface. Both SD-WAN member interfaces have used separate SLA targets. The SLA state of port1 is dead after five unanswered requests by the SLA servers.

Which statement is correct about the SD-WAN and ADVPN?. Spoke support dynamic VPN as a static interface. Dynamic VPN is not supported as an SD-WAN interface. ADVPN interface can be a member of SD-WAN interface. Hub FortiGate is limited to use ADVPN as SD-WAN member interface.

Which two reasons make forward error correction (FEC) ideal to enable in a phase one VPN interface? (Choose two.). FEC is useful to increase speed at which traffic is routed through IPsec tunnels. FEC transmits the original payload in full to recover the error in transmission. FEC transmits additional packets as redundant data to the remote device. FEC improves reliability, which overcomes adverse WAN conditions such as noisy links. FEC reduces the stress on the remote device jitter buffer to reconstruct packet loss.

Exhibit A shows the source NAT global setting and exhibit B shows the routing table on FortiGate. Based on the exhibits, which two statements about increasing the port2 interface priority to 20 are true? (Choose two.). All the existing sessions that do not use SNAT will be flushed and routed through port1. All the existing sessions will continue to use port2, and new sessions will use port1. All the existing sessions using SNAT will be flushed and routed through port1. All the existing sessions will be blocked from using port1 and port2.

Which components make up the secure SD-WAN solution?. FortiGate, FortiManager, FortiAnalyzer, and FortiDeploy. Application, antivirus, and URL, and SSL inspection. Datacenter, branch offices, and public cloud. Telephone, ISDN, and telecom network.

Which two statements about the status of the VPN tunnel are true? (Choose two.). There are separate virtual interfaces for each dial-up client. VPN static routes are prevented from populating the FortiGate routing table. FortiGate created a single IPsec virtual interface that is shared by all clients. 100.64.3.1 is one of the remote IP address that comes through index interface 1.

Exhibit A shows the SD-WAN rules and exhibit B shows the traffic logs. The SD-WAN traffic logs reflect how FortiGate processed traffic. Which two statements about how the configured SD-WAN rules are processing traffic are true? (Choose two.). The implicit rule overrides all other rules because parameters widely cover sources and destinations. SD-WAN rules are evaluated in the same way as firewall policies: from top to bottom. The All_Access_Rules rule load balances Vimeo application traffic among SD-WAN member interfaces. The initial session of an application goes through a learning phase in order to apply the correct rule.

What are the two minimum configuration requirements for an outgoing interface to be selected once the SD-WAN logical interface is enabled? (Choose two.). Specify outgoing interface routing cost. Configure SD-WAN rules interface preference. Select SD-WAN balancing strategy. Specify incoming interfaces in SD-WAN rules.

Based on the exhibit, which statement about FortiGate re-evaluating traffic is true?. The type of traffic defined and allowed on firewall policy ID 1 is UDP. Changes have been made on firewall policy ID 1 on FortiGate. Firewall policy ID 1 has source NAT disabled. FortiGate has terminated the session after a change on policy ID 1.

What are two reasons why FortiGate would be unable to complete the zero-touch provisioning process? (Choose two.). The FortiGate cloud key has not been added to the FortiGate cloud portal. FortiDeploy has connected with FortiGate and provided the initial configuration to contact FortiManager. FortiGate has obtained a configuration from the platform template in FortiGate cloud. A factory reset performed on FortiGate. The zero-touch provisioning process has completed internally, behind FortiGate.

Which two statements reflect the benefits of implementing the ADVPN solution to replace conventional VPN topologies? (Choose two.). It creates redundant tunnels between hub-and-spokes, in case failure takes place on the primary links. It dynamically assigns cost and weight between the hub and the spokes, based on the physical distance. It ensures that spoke-to-spoke traffic no longer needs to flow through the tunnels through the hub. It provides direct connectivity between all sites by creating on-demand tunnels between spokes.

Based on the output shown in the exhibit, which two criteria on the SD-WAN member configuration can be used to select an outgoing interface in an SD-WAN rule? (Choose two.). set cost 15. set source 100.64.1.1. set priority 10. set load-balance-mode source-ip-based.

Which two statements about the debug output are correct? (Choose two.). The debug output shows per-IP shaper values and real-time readings. This traffic shaper drops traffic that exceeds the set limits. Traffic being controlled by the traffic shaper is under 1 Kbps. FortiGate provides statistics and reading based on historical traffic logs.

In the default SD-WAN minimum configuration, which two statements are correct when traffic matches the default implicit SD-WAN rule? (Choose two.). Traffic has matched none of the FortiGate policy routes. Matched traffic failed RPF and was caught by the rule. The FIB lookup resolved interface was the SD-WAN interface. An absolute SD-WAN rule was defined and matched traffic.

Which statement about the trace evaluation by FortiGate is true?. Packets exceeding the configured maximum concurrent connection limit are denied by the per-IP shaper. The packet exceeded the configured bandwidth and was dropped based on the priority configuration. The packet exceeded the configured maximum bandwidth and was dropped by the shared shaper. Packets exceeding the configured concurrent connection limit are dropped based on the priority configuration.

FortiGate has multiple dial-up VPN interfaces incoming on port1 that match only FIRST_VPN. Which two configuration changes must be made to both IPsec VPN interfaces to allow incoming connections to match all possible IPsec dial-up interfaces? (Choose two.). Specify a unique peer ID for each dial-up VPN interface. Use different proposals are used between the interfaces. Configure the IKE mode to be aggressive mode. Use unique Diffie Hellman groups on each VPN interface.

Exhibit A shows the firewall policy and exhibit B shows the traffic shaping policy. The traffic shaping policy is being applied to all outbound traffic; however, inbound traffic is not being evaluated by the shaping policy. Based on the exhibits, what configuration change must be made in which policy so that traffic shaping can be applied to inbound traffic?. The guaranteed-10mbps option must be selected as the per-IP shaper option. The guaranteed-10mbps option must be selected as the reverse shaper option. A new firewall policy must be created and SD-WAN must be selected as the incoming interface. The reverse shaper option must be enabled and a traffic shaper must be selected.

What must you configure to enable ADVPN?. ADVPN should only be enabled on unmanaged FortiGate devices. Each VPN device has a unique pre-shared key configured separately on phase one. The protected subnets should be set to address object to all (0.0.0.0/0). On the hub VPN, only the device needs additional phase one settings.

Which two statements describe how IPsec phase 1 main mode id different from aggressive mode when performing IKE negotiation? (Choose two.). A peer ID is included in the first packet from the initiator, along with suggested security policies. XAuth is enabled as an additional level of authentication, which requires a username and password. A total of six packets are exchanged between an initiator and a responder instead of three packets. The use of Diffie Hellman keys is limited by the responder and needs initiator acceptance.

What are two benefits of using FortiManager to organize and manage the network for a group of FortiGate devices? (Choose two.). It simplifies the deployment and administration of SD-WAN on managed FortiGate devices. It improves SD-WAN performance on the managed FortiGate devices. It sends probe signals as health checks to the beacon servers on behalf of FortiGate. It acts as a policy compliance entity to review all managed FortiGate devices. It reduces WAN usage on FortiGate devices by acting as a local FortiGuard server.

What would best describe the SD-WAN traffic shaping mode that bases itself on a percentage of available bandwidth?. Per-IP shaping mode. Shared policy shaping mode. Interface-based shaping mode. Reverse policy shaping mode.

Exhibit A, which shows the SD-WAN performance SLA and exhibit B shows the health of the participating SD-WAN members. Based on the exhibits, which statement is correct?. The dead member interface stays unavailable until an administrator manually brings the interface back. Port2 needs to wait 500 milliseconds to change the status from alive to dead. The SLA state of port2 has exceeded three consecutive unanswered requests from the SLA server. Check interval is the time to wait before a packet sent by a member interface considered as lost.

What is the lnkmtd process responsible for?. Flushing route tags addresses. Monitoring links for any bandwidth saturation. Logging interface quality information. Processing performance SLA probes.

Which statement reflects how BGP tags work with SD-WAN rules?. VPN topologies are formed using only BGP dynamic routing with SD-WAN. Route tags are used for a BGP community and the SD-WAN rules are assigned the same tag. BGP tags require that the adding of static routes be enabled on all ADVPN interfaces. BGP tags match the SD-WAN rule based on the order that these rules were installed.

Which statement about using BGP routes in SD-WAN is true?. Adding static routes must be enabled on all ADVPN interfaces. VPN topologies must be form using only BGP dynamic routing with SD-WAN. Learned routes can be used as dynamic destinations in SD-WAN rules. Dynamic routing protocols can be used only with non-encrypted traffic.

An administrator is troubleshooting VoIP quality issues that occur when calling external phone numbers. The SD-WAN interface on the edge FortiGate is configured with the default settings, and is using two upstream links. One link has random jitter and latency issues, and is based on a wireless connection. Which two actions must the administrator apply simultaneously on the edge FortiGate to improve VoIP quality using SD-WAN rules? (Choose two.). Select the corresponding SD-WAN balancing strategy in the SD-WAN rule. Choose the suitable interface based on the interface cost and weight. Use the performance SLA targets to detect latency and jitter instantly. Place the troublesome link at the top of the interface preference list. Configure an SD-WAN rule to load balance all traffic without VoIP.

Exhibit A shows the SD-WAN performance SLA and exhibit B shows the SD-WAN interface and the static routes configuration. Port1 and port2 are member interfaces of the SD-WAN, and port2 becomes a dead member after reaching the failure thresholds. Which statement about the dead member is correct?. Port2 might become alive when a single response is received from an SLA server. Dead members require manual administrator access to bring them back alive. Subnets 100.64.1.0/24 and 172.20.0.0/16 are reachable only through port1. SD-WAN interface becomes disabled and port1 becomes the WAN interface.

What are two roles that SD-WAN orchestrator plays when it works with FortiManager? (Choose two.). It configures and monitors SD-WAN networks on FortiGate devices that are managed by FortiManager. It acts as a standalone device to assist FortiManager to manage SD-WAN interfaces on the managed FortiGate devices. It acts as a hub FortiGate with an SD-WAN interface enabled and managed along with other FortiGate devices by FortiManager. It acts as an application that is released and signed by Fortinet to run as a part of management extensions on FortiManager.

Which statement about the command route-tag in the SD-WAN rule is true?. It ensures route tags match the SD-WAN rule based on the rule order. It tags each route and references the tag in the routing table. It enables the SD-WAN rule to load balance and assign traffic with a route tag. It uses route tags for a BGP community and assigns the SD-WAN rules with same tag.

Which two configuration tasks are required to use SD-WAN? (Choose two.). Add one or more members to an SD-WAN zone. Configure at least one firewall policy for SD-WAN traffic. Specify the outgoing interface routing cost. Specify the incoming interfaces in SD-WAN rules.

Which statement about the ADVPN device role in handling traffic is true?. This is a spoke that has received a query from a remote hub and has forwarded the response to its hub. Two hubs, 10.1.1.254 and 10.1.2.254, are receiving and forwarding queries between each other. Two spokes, 100.64.3.1 and 10.1.2.254, forward their queries to their hubs. This is a hub that has received a query from a spoke and has forwarded it to another spoke.

Which two statements describe how IPsec phase 1 main mode id different from aggressive mode when performing IKE negotiation? (Choose two.). A peer ID is included in the first packet from the initiator, along with suggested security policies. XAuth is enabled as an additional level of authentication, which requires a username and password. Three packets are exchanged between an initiator and a responder instead of six packets. The use of Diffie Hellman keys is limited by the responder and needs initiator acceptance.

Based on the output, which two conclusions are true? (Choose two.). The all_rules rule represents the implicit SD-WAN rule. There is more than one SD-WAN rule configured. Entry 1 (id=1) is a regular policy route. The SD-WAN rules takes precedence over regular policy routes.

Which diagnostic command can you use to show the SD-WAN rules interface information and state?. diagnose sys sdwan route-tag-list. diagnose sys sdwan service. diagnose sys sdwan member. diagnose sys sdwan neighbor.

Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two.). Internet Key Exchange (IKE). Secure Shell (SSH). Security Association (SA). Encapsulating Security Payload (ESP).

What are two reasons for using FortiManager to organize and manage the network for a group of FortiGate devices? (Choose two.). To improve SD-WAN performance on the managed FortiGate devices. To send probe packets as health checks to the beacon servers on behalf of FortiGate. To simplify the deployment and administration of SD-WAN on managed FortiGate devices. To reduce WAN usage on FortiGate devices by acting as a local FortiGuard server.

In which two ways does FortiGate learn the FortiManager IP address or FQDN for zero-touch provisioning? (Choose two.). From a FortiGuard definitions update. From the central management configuration configured in FortiDeploy. From a DHCP server configured with options 240 or 241. From another FortiGate device in the same local network.

Exhibit A, which shows the SD-WAN performance SLA and exhibit B shows the health of the participating SD-WAN members. Based on the exhibits, which statement is correct?. The dead member interface stays unavailable until an administrator manually brings the interface back. Port2 needs to wait 500 milliseconds to change the status from alive to dead. Static routes using port2 are active in the routing table. FortiGate has not received three consecutive requests from the SLA server configured for port2.

Which two conclusions for traffic that matches the traffic shaper are true? (Choose two.). The traffic shaper drops packets if the bandwidth exceeds 6250 KBps. The traffic shaper limits the bandwidth of each source IP to a maximum of 6250 KBps. The traffic shaper drops packets if the bandwidth is less than 2500 KBps. The measured bandwidth is less than 100 KBps.

Which two statements are correct when traffic matches the default implicit SD-WAN rule? (Choose two.). The sdwan_service_id flag in the session information is 0. Traffic has matched none of the FortiGate policy routes. Matched traffic failed RPF and was caught by the rule. An absolute SD-WAN rule was defined and matched traffic.

Which configuration setting is correct if the responder FortiGate is using a dynamic routing protocol over the IPsec VPN interface?. add-route must be disabled to prevent FortiGate from installing static routes for remote protected networks. peertype must be set to accept a unique peer ID per IPsec VPN. type must be set to static. Dial-up clients must have XAuth enabled.

Which conclusion about the packet debug flow output is correct?. The original traffic exceeded the maximum bandwidth of the outgoing interface, and the packet was dropped. The reply traffic exceeded the maximum bandwidth configured in the traffic shaper, and the packet was dropped. The original traffic exceeded the maximum packets per second of the outgoing interface, and the packet was dropped. The original traffic exceeded the maximum bandwidth configured in the traffic shaper, and the packet was dropped.

Which feature enables SD-WAN to combine IPsec VPN dynamic shortcut tunnels between spokes and a static tunnel to the hub?. ADVPN. GRE. SSLVPN. OCVPN.

Which action FortiGate performs on traffic that is subject to a per-IP traffic shaper of 10 Mbps?. FortiGate shares 10 Mbps of bandwidth equally among all source IP addresses. FortiGate applies traffic shaping to the original traffic direction only. FortiGate limits each source IP address to a maximum bandwidth of 10 Mbps. FortiGate guarantees a minimum of 10 Mbps of bandwidth to each source IP address.

Which behavior reflects how BGP tags work with SD-WAN rules?. SD-WAN rules that use BGP tags have precedence over regular policy routes. Routes tags are mapped to the local preference attribute. Route tags can be used to specify the destination subnets in SD-WAN rules. If the destination network learned using BGP tag changes, you must re-configure the BGP tag so the information on the SD-WAN rule is updated.

Based on the exhibit, which two actions does FortiGate perform on traffic passing through the SD-WAN member port2? (Choose two.). FortiGate performs routing lookups for new sessions only after a route change. FortiGate marks the routing information on existing sessions as persistent. FortiGate flushes all routing information from the session table after a route change. FortiGate always blocks all traffic after a route change.

Exhibit A shows the firewall policy and exhibit B shows the traffic shaping policy. The traffic shaping policy is being applied to all outbound traffic; however, inbound traffic is not being evaluated by the shaping policy. Based on the exhibits, what configuration change must be made in which policy so that traffic shaping can be applied to inbound traffic?. Create a new firewall policy, and the select the SD-WAN zone as Incoming Interface. In the traffic shaping policy, select Assign Shaping Class ID as Action. In the firewall policy, select Proxy-based as Inspection Mode. In the traffic shaping policy, enable Reverse shaper, and then select the traffic shaper to use.

What are two reasons why it is effective to implement the internet service database (ISDB) in an SD-WAN rule? (Choose two.). The ISDB is dynamically updated and reduces administrative overhead. The ISDB applies rules to traffic from specific sources, based on application type. The ISDB requires application control to maintain signatures and perform load-balancing. The ISDB contains the IP addresses and port ranges of well-known destinations.

Based on the exhibit, which status description is correct?. Port1 is dead because it does not meet the SLA target. Port2 is alive because its packet loss is lower than 10%. The SD-WAN members are monitored by different performance SLAs. Traffic matching the SD-WAN rule is steered through port2.

Which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules?. All traffic from a source IP to a destination IP is sent to the least used interface. All traffic from a source IP is sent to the most used interface. All traffic from a source IP to a destination IP is sent to the same interface. All traffic from a source IP is sent to the same interface.

Which three performance SLA protocols are available on the FortiGate CLI only? (Choose three.). tcp-echo. icmp. twamp. udp-echo. smtp.

Why is it effective to use SD-WAN rules when configuring application control?. Because you must use certificate full inspection on the firewall policy. Because the application database is manually maintained by administrators. Because traffic can be steered based on application type. Because SD-WAN rules are independent from firewall policies to avoid controlling applications.

Which statement about using BGP routes in SD-WAN is true?. Learned routes can be used as dynamic destinations in SD-WAN rules. You must use BGP to route traffic for both overlay and underlay links. You must configure AS path prepending. You must use external BGP.

Based on the exhibit, which two actions FortiGate performs on sessions after a firewall policy change? (Choose two.). The old sessions terminate after a policy change. Existing sessions remain unchanged after a policy change. All sessions are flushed by FortiGate after a policy change. FortiGate re-evaluates new sessions after a policy change.

ExhibitA shows the system interface with the static routes and exhibit B shows the firewall policies on the managed FortiGate. Based on the FortiGate configuration shown in the exhibits, what issue might you encounter when creating an SD-WAN zone for port1 and port2?. port2 is referenced in a static route. port1 is assigned a manual IP address. port1 and port2 are not administratively down. port1 is referenced in a firewall policy.

Which CLI command do you use to perform real-time troubleshooting for ADVPN negotiation?. get ipsec tunnel list. get router info routing-table. diagnose debug application ike. diagnose sys virtual-wan-link service.

Two hub-and-spoke groups are connected through a site-to-site IPsec VPN between Hub 1 and Hub 2. The administrator configured ADVPN on both hub-and- spoke groups. If an ADVPN on-demand tunnel is established between Toronto and London, which two configuration settings are required for ADVPN to work? (Choose two.). On the hubs, auto-discovery-sender is enabled on the IPsec VPNs to spokes. auto-discovery-forwarder is enabled on all IPsec VPNs. On the hubs, tunnel-search is set selectors. On the spokes, auto-discovery-receiver is enabled on the IPsec VPN to the hub.

Which two interfaces are considered overlay links? (Choose two.). IPsec. Physical. LAG. GRE.

Which statement is correct about SD-WAN and ADVPN?. You must use OSPF. SD-WAN can steer traffic to ADVPN shortcuts established over IPsec overlays configured as SD-WAN members. Routes for ADVPN shortcuts must be manually configured. SD-WAN does not monitor the health and performance of ADVPN shortcuts.

Which two statements about SLA targets and SD-WAN rules are true? (Choose two.). Member metrics are measured only if an SLA target is configured. SLA targets are used only by SD-WAN rules that are configured with Lowest Cost (SLA) or Maximize Bandwidth (SLA) as strategy. When configuring an SD-WAN rule, you can select multiple SLA targets of the same performance SLA. SD-WAN rules use SLA targets to check if the preferred members meet the SLA requirements.

Which diagnostic command can you use to show interface-specific SLA logs for the last 10 minutes?. diagnose sys sdwan log. diagnose sys sdwan health-check. diagnose sys sdwan intf-sla-log. diagnose sys sdwan sla-log.

Which two statements about SD-WAN central management are true? (Choose two.). It does not allow you to monitor the status of SD-WAN members. It is enabled or disabled on a per-ADOM basis. It is enabled by default. It uses templates to configure SD-WAN on managed devices.

Which two statements about the IPsec VPN configuration and the status of the IPsec VPN tunnel are true? (Choose two.). FortiGate creates separate virtual interfaces for each dial-up client. FortiGate creates a single IPsec virtual interface that is shared by all clients. FortiGate maps the remote gateway 100.64.3.1 to tunnel index interface 1. FortiGate does not install IPsec static routes for remote protected networks in the routing table.

Which are two expected behaviors of the traffic that matches the traffic shaper? (Choose two.). The traffic shaper limits the bandwidth of each source IP address to a maximum of 625 KB/sec. The number of simultaneous connections among all source IP addresses can exceed 5 connections. The number of simultaneous connections allowed for each source IP address can exceed 5 connections. The traffic shaper limits the combined bandwidth of all connections to a maximum of 5 MB/sec.

Based on output shown in the exhibit, which two settings can be used by SD-WAN rules? (Choose two.). set source 100.64.1.1. set priority 10. set load-balance-mode source-ip-based. set cost 15.

Which two benefits from using forward error correction (FEC) in IPsec VPNs are true? (Choose two.). FEC transmits the original payload in full to recover the error in transmission. FEC reduces the stress on the remote device buffer to reconstruct packet loss. FEC transmits additional packets as redundant data to the remote device. FEC improves reliability, which overcomes adverse WAN conditions such as noisy links.

Which two tasks about using central VPN management are true? (Choose two.). You can configure full mesh, star, and dial-up VPN topologies. FortiManager installs VPN settings on both managed and external gateways. You configure VPN communities to define common IPsec settings shared by all VPN gateways. You must enable VPN zones for SD-WAN deployments.

Exhibit A shows the SD-WAN performance SLA and exhibit B shows the SD-WAN member and the static routes configuration. If port2 is detected dead by FortiGate, which expected behavior is correct?. Port2 becomes alive after one successful probe is detected. The SD-WAN interface becomes disabled and port1 becomes the WAN interface. Dead members require manual administrator access to bring them back alive. Subnets 10.0.20.0/23 and 172.20.0.0/16 are reachable only through port1.

Exhibit A shows the SD-WAN rules and exhibit B shows the traffic logs. The SD-WAN traffic logs reflect how FortiGate distributes traffic. Based on the exhibits, what are two expected behaviors when FortiGate processes SD-WAN traffic? (Choose two.). The first Vimeo session may not match the Vimeo SD-WAN rule because the session is used for the application learning phase. The implicit rule overrides all other rules because parameters widely cover sources and destinations. The Vimeo SD-WAN rule steers Vimeo application traffic among all SD-WAN member interfaces. SD-WAN rules are evaluated in the same way as firewall policies: from top to bottom.

What must you configure to enable ADVPN?. Authentication should be set to Certificates. ADVPN should be enabled on unmanaged FortiGate devices only. The protected subnet of each gateway should be set all (0.0.0.0/0). The phase 1 proposal must match the phase 2 proposal.

Exhibit A shows the source NAT global setting and exhibit B shows the routing table on FortiGate. Based on the exhibits, which two actions does FortiGate perform on existing sessions if the administrator increases the priority on port2 to 20? (Choose two.). All the existing sessions using SNAT will start using port1 as the outgoing interface instead of port2. All the existing sessions will be blocked from using port1 and port2. All the existing sessions with no SNAT will start using port1 as the outgoing interface instead of port2. All the existing sessions will continue to use port2, and new sessions will use port1.

When attempting to establish an IPsec tunnel to FortiGate, all remote users match the FIRST_VPN IPsec VPN. This includes remote users that want to connect to the SECOND_VPN IPsec VPN. Which two configuration changes must you make on both IPsec VPNs so that remote users can connect to their intended IPsec VPN? (Choose two.). Configure different proposals. Configure a unique peer ID. Change the IKE mode to aggressive. Configure different Diffie Hellman groups.

Which conclusion about the packet debug flow output is correct?. The number of concurrent sessions for 10.1.10.1 exceeded the maximum number of concurrent sessions configured in the traffic shaper, and the packet was dropped. The number of concurrent sessions for 10.1.10.1 exceeded the maximum number of concurrent sessions configured in the firewall policy, and the packet was dropped. The packet size exceeded the outgoing interface MTU. The total number of daily sessions for 10.1.10.1 exceeded the maximum number of concurrent sessions configured in the traffic shaper, and the packet was dropped.

What does the route-tag setting in the SD-WAN rule define?. The priority of the SD-WAN rule. The tag that identifies destination subnets based on their BGP communities. The number of members to use for load balancing the traffic. The number of routes to use for the SD-WAN rule.

Two hub-and-spoke groups are connected through a site-to-site IPsec VPN between Hub 1 and Hub 2. The administrator configured ADVPN on both hub-and- spoke groups. Which two outcomes are expected if a user in Toronto sends traffic to London? (Choose two.). Toronto needs to establish a site-to-site tunnel with Hub 2 to bypass Hub 1. The first packets from Toronto to London are routed through Hub 1 then to Hub 2. Traffic from Toronto to London triggers the dynamic negotiation of a direct site-to-site VPN. London generates an IKE information message that contains the Toronto public IP address.

Report abuse