Fortinet FCSS_SDW_AR-7.4 SD-WAN Architect Exam Dumps and Practice Test Questions Set 8 Q 141-160

Visit here for our full Fortinet FCSS_SDW_AR-7.4 exam dumps and practice test questions.

Question 141

What is the primary purpose of SD-WAN traffic shaping profiles?

A) Encrypt traffic based on application type

B) Control bandwidth allocation and prioritization

C) Monitor network performance metrics only

D) Configure firewall policies automatically

Answer: B

Explanation:

Traffic management is essential in SD-WAN deployments to ensure fair resource allocation, prevent congestion, and guarantee adequate performance for critical applications. Traffic shaping profiles provide the mechanism for controlling how bandwidth is allocated and prioritized across different traffic types. The primary purpose of SD-WAN traffic shaping profiles is to control bandwidth allocation and prioritization, ensuring that critical applications receive necessary resources while preventing less important traffic from consuming excessive bandwidth. Traffic shaping profiles define parameters including guaranteed bandwidth which sets the minimum bandwidth reserved for specific traffic ensuring baseline performance even during congestion, maximum bandwidth which caps the total bandwidth traffic can consume preventing resource monopolization, and priority levels which determine queuing precedence when multiple traffic types compete for limited resources. These profiles use token bucket algorithms and weighted fair queuing to enforce bandwidth policies while allowing bursts above guaranteed rates when capacity is available. Traffic shaping can be applied at multiple levels including per interface, per firewall policy, and per SD-WAN rule, providing granular control over bandwidth usage. In SD-WAN contexts, shaping profiles are particularly important for mixed traffic environments where voice, video, business applications, and internet browsing share WAN connections. For example, VoIP might receive guaranteed 2 Mbps with highest priority, business applications get guaranteed 10 Mbps with medium priority, and general internet receives only best-effort service with lower priority. Traffic shaping ensures predictable application performance and efficient WAN utilization. Option A is incorrect because encryption is configured through VPN settings and IPsec policies, not through traffic shaping profiles which focus on bandwidth management rather than security. Option C is incorrect because while traffic shaping systems do monitor traffic for enforcement purposes, the primary purpose is active bandwidth control and prioritization, not passive monitoring. Option D is incorrect because firewall policies are configured separately through security policy configuration; traffic shaping profiles don’t automatically configure firewall policies but rather work in conjunction with them.

Question 142

Which SD-WAN rule matching criterion takes precedence when multiple criteria are configured?

A) Destination address

B) Application signature

C) Rules are evaluated top-down in order

D) Source address always wins

Answer: C

Explanation:

Understanding SD-WAN rule processing logic is essential for designing effective traffic steering policies and troubleshooting unexpected routing behavior. When multiple rules could potentially match the same traffic, knowing how FortiGate determines which rule applies ensures predictable network behavior. SD-WAN rules are evaluated top-down in order, with the first matching rule being applied to the traffic. This sequential processing model means rule order is critical for proper traffic steering. FortiGate evaluates each rule starting from the top of the rule list, checking whether the traffic matches all configured criteria including source address, destination address, service/port, application, user, and any other match conditions. When a rule matches all its configured criteria, FortiGate applies that rule’s action and strategy to the traffic and stops further rule evaluation. Subsequent rules are not processed for that traffic flow even if they might also match. This behavior requires careful rule ordering with more specific rules placed higher in the list than general rules. For example, a rule matching specific application traffic to a particular destination should appear before a broader rule matching all traffic from the same source network. Rule ordering mistakes are common troubleshooting issues where traffic matches an earlier general rule instead of the intended specific rule lower in the list. Administrators can reorder rules through the GUI or CLI to adjust processing priority. Understanding top-down evaluation helps in designing efficient rule sets where common traffic matches early rules reducing processing overhead. Option A is incorrect because destination address isn’t given automatic precedence; it’s simply one criterion evaluated within the top-down rule structure. Option B is incorrect because application signature doesn’t automatically take precedence over other criteria; it’s evaluated as part of the complete rule match in sequential order. Option D is incorrect because source address doesn’t automatically win; all criteria within a rule must match, and rules are processed sequentially rather than by criterion precedence.

Question 143

What is the function of SD-WAN service groups in FortiManager?

A) Group physical interfaces together

B) Organize SD-WAN rules for template-based deployment

C) Create VLAN segmentation

D) Configure user authentication groups

Answer: B

Explanation:

FortiManager provides centralized management capabilities for large-scale SD-WAN deployments, enabling consistent policy deployment across numerous FortiGate devices. Service groups are a key organizational construct within FortiManager’s SD-WAN orchestration. The function of SD-WAN service groups in FortiManager is to organize SD-WAN rules for template-based deployment across multiple devices, simplifying configuration management and ensuring consistency. Service groups allow administrators to define collections of SD-WAN rules that can be applied as a unit to device groups or individual devices. This approach supports scalable SD-WAN deployments where similar rules need to be deployed to many branches without manually configuring each device. Service groups can represent different policy sets for different branch types, for example, a retail store template, corporate office template, and manufacturing site template, each containing appropriate SD-WAN rules for that location type. Using service groups, administrators define rules once in FortiManager and deploy them to appropriate devices, reducing configuration errors and deployment time. When rules need updates, changes made to the service group automatically propagate to all devices using that template during the next policy installation. This centralized management approach is essential for maintaining consistent policies across distributed environments. Service groups integrate with other FortiManager features like device groups, policy packages, and SD-WAN templates to provide comprehensive orchestration capabilities. The template-based approach accelerates new site deployment through zero-touch provisioning where devices automatically receive appropriate configurations upon connection. Option A is incorrect because grouping physical interfaces is done through SD-WAN zones on individual FortiGate devices, not through FortiManager service groups which organize rules. Option C is incorrect because VLAN segmentation is configured through switch configuration or FortiGate interface settings, not through SD-WAN service groups. Option D is incorrect because user authentication groups are configured in user and device management sections, separate from SD-WAN service groups which organize traffic steering rules.

Question 144

Which protocol provides secure communication between FortiGate and FortiManager?

A) HTTP

B) Telnet

C) FGFM (FortiGate-FortiManager protocol)

D) FTP

Answer: C

Explanation:

Centralized management communication must be secure to prevent unauthorized access to network devices and protect configuration data during transmission. Understanding the protocols used between FortiGate and FortiManager ensures proper security implementation and troubleshooting connectivity issues. FGFM (FortiGate-FortiManager protocol) provides secure communication between FortiGate devices and FortiManager for centralized management. FGFM is a Fortinet proprietary protocol that establishes encrypted tunnels for exchanging configuration data, logs, and management commands. The protocol uses certificate-based authentication to verify device identity and prevent unauthorized devices from connecting to FortiManager. FGFM operates over TCP port 541, and communication is encrypted to protect sensitive configuration information and credentials during transmission. When a FortiGate registers with FortiManager, it establishes an FGFM connection that remains active for ongoing management operations. FortiManager pushes configuration changes to FortiGate through this connection, and FortiGate can send logs and alerts to FortiManager over the same encrypted channel. The protocol supports various management operations including configuration installation, policy deployment, firmware upgrades, and real-time device monitoring. FGFM is designed for reliable operation over WAN connections with built-in keepalives and reconnection mechanisms ensuring management connectivity remains stable even with network disruptions. For security, firewalls between FortiGate and FortiManager must permit TCP 541, and proper certificate validation should be enabled. The encrypted nature of FGFM ensures that even if management traffic traverses untrusted networks, configuration data and credentials remain protected. Option A is incorrect because HTTP transmits data in clear text without encryption, making it completely unsuitable for secure device management where credentials and configurations must be protected. Option B is incorrect because Telnet also transmits in clear text including passwords and is obsolete for secure management; SSH would be the secure alternative though FGFM is the specific protocol used with FortiManager. Option D is incorrect because FTP is a file transfer protocol that transmits in clear text and isn’t used for FortiGate-FortiManager communication or device management.

Question 145

What is the maximum number of Performance SLA health checks that can be configured per FortiGate?

A) 10

B) 50

C) 100

D) 256

Answer: D

Explanation:

Performance monitoring capabilities must scale to support complex SD-WAN deployments with numerous WAN connections and diverse application requirements. Understanding system limits helps architects design monitoring strategies that provide comprehensive visibility without exceeding platform capabilities. FortiGate supports up to 256 Performance SLA health checks per device, providing extensive monitoring capacity for even large and complex SD-WAN deployments. This limit allows organizations to implement granular monitoring with different health checks for different application types, destinations, or connection purposes. Multiple health checks might be necessary when different applications have different performance requirements, when monitoring multiple destinations per WAN connection to ensure comprehensive path assessment, when implementing redundant health checks for critical connections, or when different branch types require different monitoring strategies. For example, an organization might configure separate health checks for voice applications with strict latency and jitter thresholds, video conferencing with moderate thresholds, and data applications with relaxed thresholds. Each WAN connection might have multiple health checks monitoring different internet destinations or application servers. The 256 limit provides significant flexibility though practical deployments typically use fewer health checks to maintain operational simplicity. Each health check consumes device resources for probe generation and response processing, so monitoring strategies should balance comprehensive visibility against resource efficiency. Health checks should be designed to provide actionable information that influences SD-WAN routing decisions rather than generating excessive unused data. Option A is incorrect because 10 health checks would be extremely limiting for enterprise SD-WAN deployments requiring monitoring of multiple connections with different application requirements. Option B is incorrect because 50 health checks, while more substantial, still doesn’t represent FortiGate’s actual capability and could limit design flexibility. Option C is incorrect because 100 health checks is not the maximum; FortiGate actually supports up to 256 Performance SLA health checks per device.

Question 146

Which feature ensures session persistence when SD-WAN members change during active connections?

A) Session table synchronization

B) Stateful failover

C) Connection persistence

D) All of the above

Answer: D

Explanation:

Maintaining active connections during network path changes is critical for user experience and application functionality. Various mechanisms work together to preserve sessions when SD-WAN routing decisions change due to link failures or performance degradation. Session table synchronization, stateful failover, and connection persistence features all work together to ensure session persistence when SD-WAN members change during active connections. Session table synchronization maintains information about active connections including source and destination addresses, ports, protocol state, and associated SD-WAN member. When a path change occurs, this synchronized information allows the firewall to maintain connection tracking and properly handle return traffic. Stateful failover specifically addresses high availability scenarios where FortiGate devices operate in active-passive or active-active clusters. When failover occurs between cluster members, stateful information is synchronized ensuring the backup device can seamlessly continue processing existing sessions without interruption. Connection persistence mechanisms attempt to maintain existing TCP connections even when the underlying network path changes, leveraging TCP’s built-in recovery capabilities where brief disruptions trigger retransmission and the connection continues over the new path. These features work in conjunction with SD-WAN’s ability to detect path failures quickly through Performance SLA monitoring and migrate sessions to healthy members. The effectiveness of session persistence depends on factors including application protocol tolerance for path changes, NAT configuration, and whether connections can survive IP address changes. While these mechanisms significantly improve session continuity, some application protocols particularly those requiring persistent connections to specific endpoints may still experience disruption during path changes. Option A alone is incorrect because while session table synchronization is important, it’s not the only mechanism involved in session persistence. Option B alone is incorrect because stateful failover specifically addresses HA scenarios but doesn’t cover all path change situations in SD-WAN. Option C alone is incorrect because connection persistence is one aspect but works in conjunction with other mechanisms for comprehensive session preservation.

Question 147

What is the recommended placement for FortiGate in SD-WAN hub deployments?

A) Behind existing firewalls as an appliance

B) As the perimeter security and SD-WAN device

C) Outside the network without security policies

D) Only for internal routing without internet access

Answer: B

Explanation:

Network architecture decisions significantly impact security, performance, and operational complexity in SD-WAN deployments. Proper FortiGate placement ensures optimal traffic flow while maintaining comprehensive security. The recommended placement for FortiGate in SD-WAN hub deployments is as the perimeter security and SD-WAN device, consolidating multiple functions in a single platform. This converged approach leverages FortiGate’s integrated security features including next-generation firewall capabilities, intrusion prevention, antivirus, web filtering, application control, and SSL inspection alongside SD-WAN functionality. Deploying FortiGate at the perimeter allows it to inspect all traffic entering and leaving the organization, applying security policies before routing decisions. This placement eliminates the complexity and latency of traffic tromboning where packets must traverse multiple devices for security inspection and routing. FortiGate’s unified threat management capabilities combined with SD-WAN provide Secure SD-WAN, protecting against threats while optimizing application performance. The perimeter placement enables consistent security policy enforcement across all WAN connections whether MPLS, internet, or LTE. FortiGate can perform security inspection on traffic before forwarding to branch sites over SD-WAN tunnels, ensuring that only clean traffic enters the corporate network. This architecture simplifies management by consolidating security and routing functions in a single platform with unified policies. The converged approach also reduces hardware costs, power consumption, and rack space compared to deploying separate security and routing devices. Option A is incorrect because placing FortiGate behind existing firewalls creates unnecessary complexity with traffic passing through multiple inspection points, increasing latency and requiring complex policy coordination. Option C is incorrect because deploying without security policies would expose the network to threats and doesn’t leverage FortiGate’s integrated security capabilities that are core to Secure SD-WAN. Option D is incorrect because limiting FortiGate to internal routing without internet access fails to utilize its perimeter security capabilities and doesn’t align with typical SD-WAN use cases.

Question 148

Which command displays real-time SD-WAN routing decisions for active traffic flows?

A) diagnose sys sdwan service

B) get router info routing-table all

C) diagnose firewall proute list

D) diagnose sys session list

Answer: D

Explanation:

Troubleshooting SD-WAN requires visibility into how traffic is actually being routed in real-time, not just what the configuration specifies. Understanding which commands provide operational visibility helps diagnose routing issues and verify proper SD-WAN behavior. The command “diagnose sys session list” displays real-time session information for active traffic flows including which SD-WAN member is being used for each session. This command shows detailed information about active connections including source and destination IP addresses and ports, protocol, NAT translation if applicable, the outgoing interface which reveals the SD-WAN member selection, policy ID that matched the traffic, and various session state information. By examining the output, administrators can verify that traffic is routing through expected SD-WAN members based on configured rules and strategies. The session list is particularly valuable for troubleshooting because it shows actual runtime behavior rather than configuration intent. If traffic isn’t using the expected path, session information reveals what’s actually happening and which policies are matching. The command can be filtered to show specific traffic using parameters like source IP, destination IP, or protocol. For SD-WAN troubleshooting, administrators typically look for the outgoing interface in session entries to determine which WAN connection is carrying the traffic. This information combined with SD-WAN rule hit counts and member status provides comprehensive troubleshooting visibility. Option A is incorrect because while “diagnose sys sdwan service” shows SD-WAN rules and hit counts, it doesn’t display real-time active sessions and which specific flows are using which members. Option B is incorrect because the routing table shows route entries and next hops but doesn’t display active sessions or real-time traffic flow information specific to SD-WAN member selection. Option C is incorrect because “diagnose firewall proute list” shows policy routes which are different from SD-WAN rules, and while related to routing, it doesn’t display active session information.

Question 149

What is the purpose of Internet Service Database (ISDB) in SD-WAN rules?

A) Provide dynamic IP address lists for cloud services

B) Configure DNS servers for name resolution

C) Set up DHCP services for clients

D) Manage user authentication services

Answer: A

Explanation:

Cloud and SaaS applications have become dominant in enterprise networks, and these services frequently change their IP addresses and infrastructure. Traditional static IP-based routing cannot keep pace with these changes, requiring dynamic approaches. The purpose of Internet Service Database (ISDB) in SD-WAN rules is to provide dynamic, automatically updated IP address lists for cloud services and popular internet destinations. The ISDB is maintained by FortiGuard Labs and contains constantly updated information about thousands of internet services including major cloud providers like AWS, Azure, and Google Cloud, SaaS applications like Office 365, Salesforce, and Zoom, content delivery networks, social media platforms, and other popular internet services. FortiGate automatically downloads ISDB updates ensuring that IP address information remains current as service providers modify their infrastructure. In SD-WAN rules, administrators can reference ISDB entries instead of manually maintaining IP address lists. For example, a rule can match “Office365” from the ISDB rather than listing hundreds of Microsoft IP ranges that change regularly. This approach eliminates maintenance overhead and ensures rules remain effective as services evolve. ISDB integration is particularly important for implementing recommended cloud connectivity architectures like Microsoft’s Office 365 guidance which requires identifying and routing specific traffic categories appropriately. SD-WAN rules using ISDB can implement local internet breakout for cloud services while keeping other traffic on private circuits. The ISDB also includes geographic information enabling region-specific routing policies. Option B is incorrect because DNS server configuration is handled separately in system network settings and isn’t the purpose of ISDB which provides IP address categorization. Option C is incorrect because DHCP service configuration for clients is a separate system function unrelated to ISDB which focuses on identifying internet service traffic. Option D is incorrect because user authentication services are configured through user and device management features, separate from ISDB which categorizes internet destination addresses.

Question 150

Which high availability mode is recommended for SD-WAN hub deployments?

A) Active-passive only

B) Active-active with session synchronization

C) Standalone without redundancy

D) Clustering without state sync

Answer: B

Explanation:

High availability is critical for hub sites that serve as aggregation points for branch connectivity, as hub failures impact multiple remote sites simultaneously. Selecting appropriate HA modes balances redundancy, performance, and operational complexity. Active-active HA mode with session synchronization is recommended for SD-WAN hub deployments to provide maximum availability and performance. Active-active HA allows both FortiGate units to actively process traffic simultaneously, effectively doubling the throughput capacity compared to active-passive where one unit remains idle. In SD-WAN hub contexts where numerous branch tunnels converge and aggregate traffic volumes are substantial, utilizing both units’ processing capacity optimizes resource utilization. Session synchronization ensures that active connection state is replicated between HA members so that if one unit fails, the surviving unit can seamlessly continue processing existing sessions without interruption. This stateful failover is critical for maintaining branch connectivity and preventing session disruption during failures. Active-active mode with proper configuration distributes traffic across both units while maintaining synchronized state. Link monitoring ensures that failures trigger automatic traffic redirection to the surviving unit. For SD-WAN specifically, both units can terminate branch tunnels with proper configuration, and ADVPN shortcuts can establish to either hub unit. The configuration should include HA override settings, appropriate monitoring, and proper synchronization settings to ensure reliable operation. Option A is incorrect because while active-passive provides redundancy, it wastes the standby unit’s processing capacity which is significant in hub deployments with high traffic volumes. Option C is incorrect because standalone deployment without redundancy creates a single point of failure unacceptable for hub sites serving multiple branches. Option D is incorrect because clustering without state synchronization would cause session disruption during failover, impacting user experience and application functionality.

Question 151

What is the impact of enabling duplicate session synchronization in HA clusters on SD-WAN?

A) Increases memory usage but improves failover

B) Decreases performance significantly

C) Disables SD-WAN functionality completely

D) Has no effect on SD-WAN operation

Answer: A

Explanation:

High availability configuration includes various options that affect failover behavior, resource utilization, and system performance. Understanding these tradeoffs helps optimize HA deployments for specific requirements. Enabling duplicate session synchronization in HA clusters increases memory usage but improves failover capabilities for SD-WAN deployments. Duplicate session synchronization maintains copies of active connection state on both HA members, ensuring that if failover occurs, the standby unit has complete information about all active sessions and can continue processing them without interruption. This feature is particularly valuable in SD-WAN contexts where maintaining branch connectivity during hub failures is critical. Without session synchronization, failover would cause all active sessions to reset, disrupting branch office operations and requiring session re-establishment. With synchronization enabled, branch tunnels and user sessions continue transparently through failover events. The tradeoff is increased memory consumption because both units maintain session tables, effectively doubling the memory required for session tracking. In large SD-WAN deployments with thousands of concurrent sessions from numerous branches, this memory impact can be significant. However, modern FortiGate platforms typically have sufficient memory capacity, and the improved failover experience justifies the resource usage. Session synchronization should be enabled for most production SD-WAN hub deployments where availability is prioritized. The synchronization overhead is acceptable given the business impact of session interruption. Option B is incorrect because while synchronization does consume resources, modern implementations are optimized and don’t significantly degrade performance in properly sized deployments. Option C is incorrect because session synchronization doesn’t disable SD-WAN functionality; it actually enhances SD-WAN reliability during failover events. Option D is incorrect because session synchronization definitely affects SD-WAN operation by improving failover behavior and maintaining session continuity during HA events.

Question 152

Which SD-WAN member status indicates the link is functional but not meeting Performance SLA requirements?

A) Alive (SLA Met)

B) Alive (SLA Not Met)

C) Dead

D) Disabled

Answer: B

Explanation:

SD-WAN member status indicates both basic connectivity and Performance SLA compliance, enabling intelligent routing decisions based on measured performance. Understanding different status states helps interpret monitoring information and troubleshoot routing issues. The status “Alive (SLA Not Met)” indicates that the SD-WAN member link is functional with basic connectivity working but the link is not meeting configured Performance SLA requirements. This status means health check probes are receiving responses so the path is reachable, but measured performance characteristics like latency, jitter, or packet loss exceed the defined thresholds. For example, if SLA requires latency under 100ms but current measurements show 150ms, the member would show this status. Links in this state remain technically operational and can carry traffic, but SD-WAN rules configured to require SLA compliance won’t select these members for new sessions. The behavior when all members show SLA Not Met depends on configuration, but typically FortiGate continues using the best available member despite SLA violation to maintain connectivity. This status is valuable for identifying degraded links that may need provider attention or capacity upgrades. Administrators should monitor for persistent SLA violations indicating chronic underperformance versus brief violations during transient congestion. The distinction between Alive with SLA Met versus Not Met enables intelligent path selection where performance-sensitive applications route only over compliant links while other traffic uses any available path. Option A is incorrect because “Alive (SLA Met)” indicates the link is both functional and meeting all Performance SLA thresholds, representing optimal status. Option C is incorrect because “Dead” status indicates the link has failed health checks completely with no response received, suggesting connectivity loss. Option D is incorrect because “Disabled” status indicates the administrator has manually disabled the member, removing it from SD-WAN consideration regardless of actual link status.

Question 153

What is the recommended method for implementing application-based routing in SD-WAN?

A) Use only port-based classification

B) Combine DPI with SD-WAN rules

C) Rely solely on destination IP addresses

D) Use VLAN tags for all routing

Answer: B

Explanation:

Application-based routing is a fundamental SD-WAN capability that enables intelligent traffic steering aligned with application requirements. Implementing this effectively requires proper application identification methods and rule configuration. The recommended method for implementing application-based routing in SD-WAN is combining deep packet inspection (DPI) with SD-WAN rules for accurate application identification and flexible routing policies. DPI examines packet payloads to identify applications regardless of the ports they use, overcoming limitations of port-based classification where applications use non-standard ports or multiple applications share common ports. FortiGate’s DPI engine powered by FortiGuard signatures identifies thousands of applications including encrypted traffic through techniques like SNI inspection. Once applications are identified, SD-WAN rules can match specific applications or application categories and apply appropriate routing strategies. For example, rules can identify Office 365 traffic through DPI and route it via the lowest latency path with local internet breakout, identify backup applications and route them over high-bandwidth connections using volume-based strategy, or identify video conferencing and apply best quality strategy with guaranteed bandwidth. The combination provides both accurate identification and flexible routing control. SD-WAN rules can match applications along with other criteria like source user, destination, or time of day for comprehensive policy control. This approach enables true intent-based networking where business requirements expressed as application priorities drive routing behavior. Regular application signature updates ensure identification remains effective as applications evolve. Option A is incorrect because port-based classification alone is insufficient for modern applications using dynamic ports or standard ports, resulting in misclassification and suboptimal routing. Option C is incorrect because destination IP addressing doesn’t identify the application and is inadequate for cloud services with shared infrastructure or applications using CDNs with distributed endpoints. Option D is incorrect because VLAN tags provide network segmentation but don’t identify applications and aren’t appropriate for WAN routing decisions across different sites.

Question 154

Which feature allows SD-WAN to automatically adjust to changing network conditions?

A) Static routing tables

B) Performance SLA monitoring with dynamic path selection

C) Manual failover processes

D) Fixed bandwidth allocation

Answer: B

Explanation:

The intelligence and adaptability of SD-WAN differentiates it from traditional static routing approaches. Understanding the mechanisms that enable this adaptive behavior is fundamental to SD-WAN architecture. Performance SLA monitoring with dynamic path selection is the feature that allows SD-WAN to automatically adjust to changing network conditions without manual intervention. Performance SLA monitoring continuously measures network characteristics including latency, jitter, packet loss, and availability through active probing at configured intervals, providing real-time visibility into path quality. This continuous monitoring detects degradation immediately when performance falls below thresholds rather than waiting for complete link failure. Dynamic path selection uses these measurements to make intelligent routing decisions, automatically steering traffic to members meeting SLA requirements and avoiding paths with degraded performance. When conditions change such as congestion developing on a previously optimal path or a failed link recovering, SD-WAN automatically adjusts routing to reflect current reality. This adaptation happens transparently without administrator intervention and typically within seconds of detecting changes. The combination of continuous monitoring and dynamic selection enables SD-WAN to optimize application experience even as network conditions fluctuate due to congestion, failures, or performance degradation. Different applications can have different SLA requirements with performance-sensitive traffic routing only over high-quality paths while other traffic uses any available capacity. This intelligent adaptation is impossible with traditional static routing where paths remain fixed regardless of performance. Option A is incorrect because static routing tables provide fixed paths that don’t adjust to changing conditions, requiring manual intervention to change routes regardless of performance. Option C is incorrect because manual failover processes require administrator action to detect issues and change routing, introducing delays and preventing automatic optimization. Option D is incorrect because fixed bandwidth allocation doesn’t adjust routing based on conditions and doesn’t provide the dynamic path selection that characterizes SD-WAN.

Question 155

What is the purpose of the SD-WAN implicit rule?

A) Block all unmatched traffic automatically

B) Provide default routing for traffic not matching explicit rules

C) Encrypt all traffic by default

D) Generate alerts for suspicious traffic

Answer: B

Explanation:

SD-WAN rule processing follows a sequential evaluation model, and understanding how traffic is handled when it doesn’t match any explicit rule is important for predictable behavior. The purpose of the SD-WAN implicit rule is to provide default routing for traffic not matching any explicit rules, ensuring all traffic can be forwarded even without specific rule configuration. The implicit rule acts as a catch-all at the bottom of the rule list, handling traffic that doesn’t match any configured SD-WAN rules. This ensures connectivity is maintained for unexpected traffic types or during configuration errors where rules might not cover all scenarios. The implicit rule uses all available SD-WAN members that meet Performance SLA requirements and typically applies source-destination IP hash load balancing to distribute traffic. While the implicit rule provides functional default behavior, best practice for production environments involves creating explicit rules for all important traffic types to ensure predictable routing aligned with business intent. The implicit rule should be considered a safety net for minor traffic or edge cases rather than the primary routing mechanism. Relying heavily on the implicit rule reduces visibility and control compared to explicit rules that define specific match criteria and strategies. Administrators can influence implicit rule behavior through member priorities and SLA configurations but cannot directly configure the implicit rule itself. The implicit rule cannot be deleted or disabled as it’s a fundamental part of SD-WAN rule processing. Option A is incorrect because FortiGate doesn’t block unmatched traffic by default; this would cause widespread connectivity issues and doesn’t align with SD-WAN design principles of maintaining connectivity. Option C is incorrect because the implicit rule doesn’t automatically encrypt traffic; encryption is configured through VPN settings and applied to specific SD-WAN members. Option D is incorrect because alert generation is configured through logging and security policies, not through the SD-WAN implicit rule which handles routing for unmatched traffic.

Question 156

Which protocol does FortiGate use for dynamic routing over ADVPN tunnels in large deployments?

A) RIP version 2

B) EIGRP

C) BGP with route reflection

D) Static routes only

Answer: C

Explanation:

Large-scale ADVPN deployments require scalable routing protocols that can handle hundreds or thousands of sites without creating excessive overhead or complexity. Protocol selection significantly impacts manageability and performance. BGP with route reflection is the recommended protocol for dynamic routing over ADVPN tunnels in large deployments due to its superior scalability characteristics. BGP scales efficiently through route reflection architecture where hub sites act as route reflectors and spoke sites connect as route reflector clients. This eliminates the need for full-mesh BGP peering between all sites which would be unmanageable in large deployments. Spokes peer only with hubs, and hubs propagate routes between spokes using route reflection. BGP provides policy-based routing control through extensive attribute manipulation enabling sophisticated traffic engineering. BGP’s loop prevention using AS_PATH works reliably in complex topologies including those with multiple hubs or redundant paths. BGP also integrates well with service provider networks and cloud environments which commonly use BGP. In ADVPN contexts, BGP runs over both permanent hub-spoke tunnels and dynamic spoke-spoke shortcuts, automatically adapting as shortcuts establish and tear down. BGP’s incremental updates minimize overhead compared to periodic full table exchanges. Route filtering and summarization capabilities help control routing table size. While BGP’s convergence is slower than some IGPs, this is less critical in SD-WAN where Performance SLA monitoring provides independent fast failover. Option A is incorrect because RIP version 2 is an obsolete protocol with severe scalability limitations including a 15-hop limit and periodic full table updates that create excessive overhead in large networks. Option B is incorrect because EIGRP is Cisco-proprietary and not available on FortiGate devices, making it unsuitable regardless of its technical merits. Option D is incorrect because static routes are completely unmanageable in large ADVPN deployments with dynamic topologies and would require manual configuration for every site-to-site relationship.

Question 157

What is the recommended minimum number of WAN connections for effective SD-WAN deployment?

A) 1

B) 2

C) 3

D) 4

Answer: B

Explanation:

SD-WAN provides value through intelligent path selection and automatic failover across multiple connections, but these capabilities require multiple paths to be effective. Understanding minimum requirements helps set proper expectations and deployment planning. The recommended minimum number of WAN connections for effective SD-WAN deployment is 2, providing the foundational redundancy necessary for automatic failover and basic load balancing. With two connections, SD-WAN can automatically detect failures or performance degradation on one path and redirect traffic to the other, maintaining business continuity. Two connections also enable basic load balancing strategies where different application types or traffic categories use different paths. Common dual-WAN configurations include primary MPLS with backup internet, dual internet connections from different providers for redundancy, or internet with LTE backup for basic failover. While two connections provide meaningful SD-WAN benefits, additional connections offer greater flexibility including more granular traffic steering with multiple path options, higher aggregate bandwidth through load distribution across more connections, and improved redundancy where multiple failures can be tolerated. Organizations with critical connectivity requirements often deploy three or more connections. However, even single-connection sites can participate in SD-WAN through overlay tunnels to hubs, benefiting from centralized security and policy management even without local path diversity. The cost-benefit analysis of additional connections depends on application requirements, site criticality, and budget constraints. Option A is incorrect because a single WAN connection doesn’t provide the path diversity necessary for SD-WAN’s core capabilities of intelligent path selection and automatic failover, though overlay participation is possible. Option C is incorrect because while three connections provide excellent flexibility and redundancy, they’re not the minimum requirement; two connections deliver fundamental SD-WAN benefits. Option D is incorrect because four connections offer even more options but significantly exceed the minimum requirement and may not be cost-effective for many deployments.

Question 158

Which CLI command enables SD-WAN functionality on a FortiGate device?

A) set status enable under config system sdwan

B) enable sdwan-mode

C) config sdwan enable

D) set sdwan status on

Answer: A

Explanation:

Enabling SD-WAN functionality on FortiGate requires proper CLI syntax to activate the feature and allow configuration of zones, members, and rules. Understanding the correct commands is essential for initial deployment and troubleshooting. The correct CLI command to enable SD-WAN functionality on FortiGate is “set status enable” executed within the “config system sdwan” context. The complete command sequence involves entering global configuration mode, then entering the SD-WAN configuration context with “config system sdwan”, and finally enabling SD-WAN with “set status enable”. Once enabled, SD-WAN mode changes how interfaces can be configured and how routing decisions are made. Interfaces added as SD-WAN members cannot have IP addresses directly assigned; instead, they’re grouped into zones that are referenced in routing and firewall policies. Enabling SD-WAN is typically one of the first steps in SD-WAN deployment, followed by creating zones, adding members to zones with appropriate gateway and interface configurations, defining Performance SLA health checks, and creating SD-WAN rules for traffic steering. Disabling SD-WAN requires removing all SD-WAN configurations first including rules, health checks, and member assignments before setting status to disable. The enable command is straightforward but has significant architectural implications for how the device handles WAN connectivity and routing. Option B is incorrect because “enable sdwan-mode” is not valid FortiOS CLI syntax; the proper format requires entering the config context and using set commands. Option C is incorrect because “config sdwan enable” isn’t valid syntax; enable is set as a parameter using “set status enable” rather than being part of the config command itself. Option D is incorrect because “set sdwan status on” uses incorrect syntax with “on” instead of “enable” and doesn’t properly specify the config context.

Question 159

What is the primary benefit of using overlay tunnels in SD-WAN deployments?

A) Reduce hardware costs by eliminating routers

B) Provide transport-independent secure connectivity

C) Increase physical bandwidth automatically

D) Replace all firewall security functions

Answer: B

Explanation:

Overlay networks create logical connectivity independent of underlying physical transport, fundamentally changing how WAN architectures are designed and operated. Understanding overlay benefits is essential for modern SD-WAN implementations. The primary benefit of using overlay tunnels in SD-WAN deployments is providing transport-independent secure connectivity that abstracts applications from underlying network infrastructure. Overlay tunnels, typically implemented using IPsec, create encrypted logical connections between sites that can traverse any IP-reachable path including public internet, MPLS, broadband, LTE, or mixed transport types. This transport independence enables organizations to use diverse, cost-effective connectivity options without sacrificing security or requiring applications to understand underlying network differences. Overlays present a consistent network model to applications regardless of how packets physically traverse between sites. The encryption provided by IPsec overlays ensures data confidentiality and integrity even when traversing untrusted networks, enabling safe use of internet connectivity with economics far superior to private circuits. Overlays also simplify routing because sites exchange routes over tunnels using standard routing protocols, abstracting the complexity of underlying transport networks. SD-WAN intelligence can select among multiple overlay tunnels based on performance, automatically routing traffic over the best available path. The overlay model enables rapid deployment of new sites since any IP connectivity suffices for establishing tunnels without requiring provider circuits or complex coordination. Overlays also facilitate cloud connectivity by enabling direct encrypted tunnels from branches to cloud environments. Option A is incorrect because overlays don’t eliminate router need; FortiGate itself performs routing functions, and underlying transport still requires routing infrastructure. Option C is incorrect because overlays don’t increase physical bandwidth; they actually add overhead through encryption headers, slightly reducing available payload capacity. Option D is incorrect because overlays provide transport security through encryption but don’t replace comprehensive firewall security functions like application control, IPS, or web filtering.

Question 160

Which metric does FortiGate SD-WAN use to evaluate the “best quality” path?

A) Cost per megabit only

B) Latency, jitter, and packet loss

C) Interface bandwidth capacity

D) Number of routing hops

Answer: B

Explanation:

Intelligent path selection requires accurate measurement and evaluation of network performance characteristics relevant to application requirements. Understanding which metrics drive SD-WAN decisions helps configure appropriate strategies. FortiGate SD-WAN uses latency, jitter, and packet loss as the metrics to evaluate the “best quality” path when applying best quality or lowest latency strategies. These three metrics directly impact application performance especially for real-time and interactive applications. Latency measures round-trip delay which affects responsiveness and is critical for applications like VoIP, video conferencing, and remote desktop where delays create poor user experience. Jitter measures variation in latency which particularly impacts real-time voice and video by causing inconsistent packet arrival affecting media quality. Packet loss measures the percentage of packets not successfully delivered which forces retransmissions reducing throughput and creating delays especially for TCP-based applications. Performance SLA health checks continuously measure these metrics through active probing, and best quality strategy evaluates all available members to select the path currently exhibiting the lowest latency, minimal jitter, and lowest packet loss. When multiple paths meet SLA thresholds, the one with best overall performance characteristics is selected. This evaluation happens for each new session ensuring traffic always uses the optimal path based on current conditions. The metric-based approach enables objective path selection aligned with application needs rather than arbitrary preferences. Organizations configure SLA thresholds defining acceptable levels for each metric, and paths exceeding thresholds are excluded from best quality selection. Option A is incorrect because cost is a separate consideration used in lowest-cost strategy; best quality focuses on performance metrics regardless of economic factors. Option C is incorrect because while bandwidth capacity is important for throughput, best quality strategy evaluates delay and loss characteristics rather than raw capacity. Option D is incorrect because hop count isn’t measured or used in FortiGate SD-WAN path evaluation; overlay tunnels appear as single hops regardless of underlying path complexity.

 

Leave a Reply

How It Works

img
Step 1. Choose Exam
on ExamLabs
Download IT Exams Questions & Answers
img
Step 2. Open Exam with
Avanset Exam Simulator
Press here to download VCE Exam Simulator that simulates real exam environment
img
Step 3. Study
& Pass
IT Exams Anywhere, Anytime!