Which two statements about SD-WAN central management are true? (Choose two.)

Which two statements about SD-WAN central management are true? (Choose two.)A . The objects are saved in the ADOM common object database.B . It does not support meta fields.C . It uses templates to configure SD-WAN on managed devices.D . It supports normalized interfaces for SD-WAN member configuration.View AnswerAnswer: AC...

November 17, 2023 No Comments READ MORE +

Which two statements are correct when traffic matches the implicit SD-WAN rule? (Choose two.)

Which two statements are correct when traffic matches the implicit SD-WAN rule? (Choose two.)A . The sdwan_service_id flag in the session information is 0.B . All SD-WAN rules have the default setting enabled.C . Traffic does not match any of the entries in the policy route table.D . Traffic is...

November 17, 2023 No Comments READ MORE +

Which two conclusions for traffic that matches the traffic shaper are true?

Refer to the exhibits. Which two conclusions for traffic that matches the traffic shaper are true? (Choose two.)A . The traffic shaper drops packets if the bandwidth is less than 2500 KBps.B . The measured bandwidth is less than 100 KBps.C . The traffic shaper drops packets if the bandwidth...

November 17, 2023 No Comments READ MORE +

Based on the exhibit, which two actions does FortiGate perform on sessions after a firewall policy change?

Refer to the exhibit. Based on the exhibit, which two actions does FortiGate perform on sessions after a firewall policy change? (Choose two.)A . FortiGate flushes all sessions.B . FortiGate terminates the old sessions.C . FortiGate does not change existing sessions.D . FortiGate evaluates new sessions.View AnswerAnswer: C, D Explanation:...

November 14, 2023 No Comments READ MORE +

Based on the output shown in the exhibit, which two reasons can cause the observed behavior?

Refer to the exhibit. An administrator is troubleshooting SD-WAN on FortiGate. A device behind branch1_fgt generates traffic to the 10.0.0.0/8 network. The administrator expects the traffic to match SD-WAN rule ID 1 and be routed over T_INET_0_0. However, the traffic is routed over T_INET_1_0. Based on the output shown in...

November 14, 2023 No Comments READ MORE +

The administrator wants to understand the expected behavior for traffic matching the SD-WAN rule. Based on the exhibits, what can the administrator expect for traffic matching the SD-WAN rule?

Refer to the exhibits. Exhibit A Exhibit B - Exhibit A shows the configuration for an SD-WAN rule and exhibit B shows the respective rule status, the routing table, and the member status. The administrator wants to understand the expected behavior for traffic matching the SD-WAN rule. Based on the...

November 14, 2023 No Comments READ MORE +

Which two outcomes are expected if a user in Toronto sends traffic to London?

Refer to the exhibits. Two hub-and-spoke groups are connected through a site-to-site IPsec VPN between Hub 1 and Hub 2. The administrator configured ADVPN on both hub-and-spoke groups. Which two outcomes are expected if a user in Toronto sends traffic to London? (Choose two.)A . London generates an IKE information...

November 14, 2023 No Comments READ MORE +

Which CLI command do you use to perform real-time troubleshooting for ADVPN negotiation?

Which CLI command do you use to perform real-time troubleshooting for ADVPN negotiation?A . get router info routing-table allB . diagnose debug application ikeC . diagnose vpn tunnel listD . get ipsec tunnel listView AnswerAnswer: B Explanation: IKE real-time debug - useful when debugging ADVPN shortcut messages and spoke-to-spoke negotiations....

November 13, 2023 No Comments READ MORE +

Which conclusion about the packet debug flow output is correct?

Refer to the exhibits. Which conclusion about the packet debug flow output is correct?A . The total number of daily sessions for 10.1.10.1 exceeded the maximum number of concurrent sessions configured in the traffic shaper, and the packet was dropped.B . The packet size exceeded the outgoing interface MTU.C ....

November 11, 2023 No Comments READ MORE +

Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two.)

Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two.)A . Encapsulating Security Payload (ESP)B . Secure Shell (SSH)C . Internet Key Exchange (IKE)D . Security Association (SA)View AnswerAnswer: A, C

November 10, 2023 No Comments READ MORE +