Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Fortinet FCSS_SDW_AR-7.4 - FCSS - SD-WAN 7.4 Architect

Page: 1 / 2
Total 38 questions

Refer to the exhibits.

You use FortiManager to configure SD-WAN on three branch devices.

When you install the device settings. FortiManager prompts you with the error "Copy Failed" for the device branch1_fat When you click the log button. FortiManager displays the message shown in the exhibit.

A.

Based on the exhibits, which statement best describes the issue and how you can resolve it?

B.

Remove the installation target for the SD-WAN member port4. You cannot combine metadata variable and installation targets.

C.

Gateways forall members in a zone must be defined the same way. Specify the gateway of the SD-WAN member port! without metadata variables.

D.

Check the metadata variable definitions, and review the per-device mapping configuration.

E.

Check the connection between branch1_fgt and FortiManager

The SD-WAN overlay template helps to prepare SD-WAN deployments. To complete the tasks performed by the SD-WAN overlay template, the administrator must perform some post-run tasks. What are two mandatory post-run tasks that must be performed? (Choose two.)

A.

Configure routing through the overlay tunnels created by the SD-WAN overlay template.

B.

Create policy packages andassign them to the branch devices.

C.

Assign a hub id metadata variable to each hub device.

D.

Configure SD-WAN rules

E.

Assign ansdwan_id metadata variable to each device (branch and hub)

Exhibit.

The administrator configured the IPsec tunnel VPN1 on a FortiGate device with the parameters shown in exhibit.

Based on the configuration, which three conclusions can you draw about the characteristics and requirements of the VPN tunnel? (Choose three.)

A.

The tunnel interface IP address on the spoke side is provided by the hub.

B.

The remote end can be a third-party IPsec device.

C.

The administrator must manually assign the tunnel interface IP address on the hub side

D.

The remote end must support IKEv2.

E.

This configuration allows user-defined overlay IP addresses.

When a customer delegate the installation and management of its SD-WAN infrastructure to an MSSP, the MSSP usually keeps the hub within its infrastructure for ease of management and to share costly resources.

In which two situations will the MSSP install the hub in customer premises? (Choose two.)

A.

The customer requires SIA with centralized breakout.

B.

The administrator expects a large volume of traffic between the branches.

C.

The customer expects a large amount of VoIP traffic.

D.

The majority of the branch traffic is directed to a corporate data center.

Refer to the exhibit.

An administrator is troubleshooting SD-WAN on FortiGate. A device behind branch1_fgt generates traffic to the 10.0.0.0/8 network.

The administrator expects the traffic to match SD-WAN rule ID 1 and be routed over HUB1-VPN1. However, the traffic is routed over HUB1-VPN3.

Based on the output shown in the exhibit, which two reasons, individually or together, could explain the observed behavior? (Choose two.)

A.

HUB1-VPN3 has a higher member configuration priority than HUB1-VPN1.

B.

The traffic matches a regular policy route configured with HUB1-VPN3 as the outgoing device

C.

HUB1-VPN1 does not have a valid route to the destination

D.

HUB1-VPN3 has a lower route priority value (higher priority) than HUB1-VPN1.

Refer to the exhibit.

An administrator configures SD-WAN rules for a DIA setup using the FortiGate GUI. The page to configure the source and destination part of the rule looks as shown in the exhibit. The GUI page shows no option to configure an application as the destination of the SD-WAN rule Why?

A.

You cannot use applications as the destination when FortiGate is used for a DIA setup.

B.

FortiGate allows the configuration of applications as the destination of SD-WAN rules only on the CLI.

C.

You must enable the feature on the CLI.

D.

You must enable the feature first using the GUI menu System > Feature Visibility.

Refer to the exhibits.

An administrator is testing application steering in SD-WAN. Before generating test traffic, the administrator collected the information shown in the first exhibit. After generating GoToMeeting test traffic, the administrator examined the corresponding traffic log on FortiAnalyzer, which is shown in the second exhibit.

The administrator noticed that the traffic matched the implicit SD-WAN rule, but they expected the traffic to match rule ID 1.

Which two reasons explain why some log messages show that the traffic matched the implicit SD-WAN rule? (Choose two.)

A.

Full SSL inspection is not enabled on the matching firewall policy.

B.

The session 3-tuple did not match any of the existing entries in the ISDB application cache.

C.

FortiGate could not refresh the routing information on the session after the application was detected.

D.

No configured SD-WAN rule matches the traffic related to the collaboration application GoToMeeting

Refer to the exhibit.

The administrator used the SD-WAN overlay template to prepare an IPsec tunnels configuration for a hub-and-spoke SD-WAN topology. The exhibit shows the FortiManager installation preview for one FortiGate device.

Based on the exhibit, which statement best describes the configuration applied to the FortiGate device?

A.

It is a spoke device that establishes dynamic IPsec tunnels to the hub. The local subnet range is 10.10.128.0/23.

B.

It is a hub device. It can send ADVPN shortcut offers.

C.

It is a hub device. It will automatically discover the spoke devices and add them to the SD-WAN topology.

D.

It is a spoke device that establishes dynamic IPsec tunnels to the hub It can send ADVPN shortcut requests.

Within the context of SD-WAN, what does SIA correspond to?

A.

Remote Breakout

B.

Local Breakout

C.

Software Internet Access

D.

Secure Internet Authorization

You are tasked with configuring ADVPN 2.0 on an SD-WAN topology already configured for ADVPN. What should you do to implement ADVPN 2.0 in this scenario?

A.

Update the IPsec tunnel configurations on the hub.

B.

Update the SD-WAN configuration on the branches.

C.

Update the IPsec tunnel configuration on the branches.

D.

Delete the existing ADVPN configuration and configure ADVPN 2.0.