Which FortiGate in a Security I auric sends togs to FortiAnalyzer?
Which FortiGate in a Security I auric sends togs to FortiAnalyzer?A . Only the root FortiGate.B . Each FortiGate in the Security fabric.C . The FortiGate devices performing network address translation (NAT) or unified threat management (UTM). if configured.D . Only the last FortiGate that handled a session in the...
Which configuration can be used to reduce the number of BGP sessions in on IBGP network?
Which configuration can be used to reduce the number of BGP sessions in on IBGP network?A . Route-reflector-peer enableB . Route-reflector-client enableC . Route-reflector enableD . Route-reflector-server enableView AnswerAnswer: B Explanation: To reduce the number of BGP sessions in an IBGP network, you can use a route reflector, which acts...
Which two parameters must you configure on the corresponding single hub?
Exhibit. Refer to the exhibit, which contains the partial ADVPN configuration of a spoke. Which two parameters must you configure on the corresponding single hub? (Choose two.)A . Set auto-discovery-sender enableB . Set ike-version 2C . Set auto-discovery-forwarder enableD . Set auto-discovery-receiver enableView AnswerAnswer: A, C Explanation: For an ADVPN...
What can the administrator do to fix this problem?
An administrator has configured two fortiGate devices for an HA cluster. While testing HA failover, the administrator notices that some of the switches in the network continue to send traffic to the former primary device What can the administrator do to fix this problem?A . Verify that the speed and...
What is the destination MAC address or addresses when packets are forwarded from the primary FortiGate to the secondary FortiGate?
Exhibit. Refer to the exhibit, which contains an active-active toad balancing scenario. During the traffic flow the primary FortiGate forwards the SYN packet to the secondary FortiGate. What is the destination MAC address or addresses when packets are forwarded from the primary FortiGate to the secondary FortiGate?A . Secondary physical...
What two options can you configure in OSPF to block the advertisement of the 10.1.10.0 prefix?
Refer to the exhibit, which shows a routing table. What two options can you configure in OSPF to block the advertisement of the 10.1.10.0 prefix? (Choose two.)A . Remove the 16.1.10.C prefix from the OSPF networkB . Configure a distribute-list-outC . Configure a route-map outD . Disable Redistribute ConnectedView AnswerAnswer:...
Which two parameters must you set in the BGP configuration?
Refer to the exhibit, which contains a partial BGP combination. You want to configure a loopback as the OGP source. Which two parameters must you set in the BGP configuration? (Choose two)A . ebgp-enforce-multihopB . recursive-next-hopC . ibgp-enfoce-multihopD . update-sourceView AnswerAnswer: A, D Explanation: To configure a loopback as the...
What can you conclude from this output?
Refer to the exhibit. which contains a partial configuration of the global system. What can you conclude from this output?A . NPs and CPs are enabledB . Only CPs arc disabledC . Only NPs are disabledD . NPs and CPs arc disabledView AnswerAnswer: A Explanation: The configuration does not show...
Which ADVPN configuration must be configured using a script on fortiManager, when using VPN Manager to manage fortiGate VPN tunnels?
Which ADVPN configuration must be configured using a script on fortiManager, when using VPN Manager to manage fortiGate VPN tunnels?A . Enable AD-VPN in IPsec phase 1B . Disable add-route on hubC . Configure IP addresses on IPsec virtual interlacesD . Set protected network to allView AnswerAnswer: A Explanation: To...
What can you cone udo from this configuration about access to www.facebook, com, which is categorized as Social Networking?
Exhibit. Refer to the exhibit, which shows a partial web filter profile conjuration What can you cone udo from this configuration about access to www.facebook, com, which is categorized as Social Networking?A . The access is blocked based on the Content Filter configurationB . The access is allowed based on...