FCSS_SDW_AR-7.6 Practice Test Questions

94 Questions


Refer to the exhibits.

An administrator is testing application steering in SD-WAN. Before generating test traffic, the administrator collected the information shown in the first exhibit. After generating GoToMeeting test traffic, the administrator examined the corresponding traffic log on FortiAnalyzer, which is shown in the second exhibit.
The administrator noticed that the traffic matched the implicit SD-WAN rule, but they expected the traffic to match rule ID 1.
Which two reasons explain why some log messages show that the traffic matched the implicit SD-WAN rule? (Choose two.)


A. Full SSL inspection is not enabled on the matching firewall policy.


B. The session 3-tuple did not match any of the existing entries in the ISDB application cache.


C. FortiGate could not refresh the routing information on the session after the application was detected.


D. No configured SD-WAN rule matches the traffic related to the collaboration application GoToMeeting





B.
  The session 3-tuple did not match any of the existing entries in the ISDB application cache.

D.
  No configured SD-WAN rule matches the traffic related to the collaboration application GoToMeeting

Explanation:

✅ B. The session 3-tuple did not match any of the existing entries in the ISDB application cache.
Before test traffic, GoToMeeting’s IP/port/protocol wasn’t cached in ISDB. FortiGate couldn’t instantly identify it as the target app, so initial packets didn’t match rule ID 1 and hit the implicit rule instead. Later packets populate the cache, allowing better matches on new sessions. This explains why some logs show implicit hits.

✅ D. No configured SD-WAN rule matches the traffic related to the collaboration application GoToMeeting.
Service(1) lists Microsoft.Portal, Salesforce, and broad “Collaboration,” but GoToMeeting (ID 16354) isn’t explicitly included or perfectly covered. Even after detection, if the rule doesn’t recognize it precisely, traffic falls to the implicit rule. The exhibit shows no exact match, so some sessions never qualify for rule ID 1.

❌ A. Full SSL inspection is not enabled on the matching firewall policy.
SSL inspection helps with encrypted payloads, but SD-WAN app steering often uses ISDB (IP/port-based) or basic signatures first—GoToMeeting can be identified without full decryption. The logs already show the app detected, so missing inspection isn’t blocking the rule match here. Common misconception: assuming all app-ID needs deep inspection.

❌ C. FortiGate could not refresh the routing information on the session after the application was detected.
FortiGate can re-evaluate sessions mid-flow once the app is identified, but the issue is upstream: initial packets didn’t match any rule because of cache absence or config mismatch. The logs show detection happened, yet steering stayed implicit for some flows—pointing to no initial match, not a refresh failure.

You are configuring SD-WAN to load balance network traffic and you want to take into account the link quality. Which two facts should you consider? (Choose two answers.)


A. When applicable, FortiGate load balances the traffic through all members that meet the SLA target.


B. You can select the best quality strategy and allow SD-WAN load balancing.


C. You can select the lowest cost service level agreement (SLA) strategy and allow SDWAN load balancing.


D. The best quality strategy supports only the round-robin hash mode.





A.
  When applicable, FortiGate load balances the traffic through all members that meet the SLA target.

C.
  You can select the lowest cost service level agreement (SLA) strategy and allow SDWAN load balancing.

Explanation:

Correct Answer: A, C
When configuring SD-WAN load balancing with link quality consideration in Fortinet FortiGate (version 7.6), FortiGate evaluates performance SLAs to monitor metrics like latency, jitter, and packet loss across SD-WAN members. ​

✅ Option A
FortiGate load balances traffic across all eligible SD-WAN members that pass the configured SLA targets, ensuring optimal path selection based on real-time link health. This applies when load balancing is enabled in SD-WAN rules alongside SLA verification. ​

✅ Option C
The "lowest cost (SLA)" strategy prioritizes the cheapest member meeting SLA requirements while permitting load balancing among qualifying members, factoring in costs assigned to interfaces. This balances performance and expense in multi-link setups. ​

❌ Why Not B or D
Option B is inaccurate because "best quality" prioritizes the single highest-quality link (lowest latency/jitter/loss) without distributing load. Option D is false as best quality supports multiple load balancing modes like source-IP or session, not just round-robin.

Refer to the exhibit.

An administrator is troubleshooting SD-WAN on FortiGate. A device behind branch1_fgt generates traffic to the 10.0.0.0/8 network.
The administrator expects the traffic to match SD-WAN rule ID 1 and be routed over HUB1- VPN1. However, the traffic is routed over HUB1-VPN3.
Based on the output shown in the exhibit, which two reasons, individually or together, could explain the observed behavior? (Choose two.)


A. HUB1-VPN3 has a higher member configuration priority than HUB1-VPN1.


B. The traffic matches a regular policy route configured with HUB1-VPN3 as the outgoing device


C. HUB1-VPN1 does not have a valid route to the destination


D. HUB1-VPN3 has a lower route priority value (higher priority) than HUB1-VPN1.





B.
  The traffic matches a regular policy route configured with HUB1-VPN3 as the outgoing device

D.
  HUB1-VPN3 has a lower route priority value (higher priority) than HUB1-VPN1.

Explanation:

To understand why the traffic is taking HUB1-VPN3 instead of the expected HUB1-VPN1, we must look at the FortiGate steering hierarchy: Policy Routes > SD-WAN Rules > Routing Table.

1. Analysis of Policy Routes (Option B)
The Logic: In the FortiGate packet flow, Regular Policy Routes (manually configured under config router policy) are evaluated before SD-WAN rules.
If an administrator has configured a specific policy route that matches source 10.0.1.0/24 and destination 10.0.0.0/8 with the outgoing interface set to HUB1-VPN3, the FortiGate will forward the traffic immediately and never evaluate the SD-WAN rules list. This is a common reason why traffic "ignores" SD-WAN steering.

2. Analysis of the Routing Table (Option D)
Looking at the get router info routing-table all output in the exhibit:
There is a Static Route (S) for 10.0.0.0/8 specifically via HUB1-VPN3.
The diagnose sys sdwan member output shows the Route Priority (distinct from SD-WAN member priority) for each interface:
➡️ HUB1-VPN1 (Member 4): Priority 15
➡️ HUB1-VPN2 (Member 5): Priority 10
➡️ HUB1-VPN3 (Member 6): Priority 1

The Logic: In FortiOS, a lower priority value in the routing table means a higher preference. Since HUB1-VPN3 has a priority of 1 (the lowest value shown), it is the most preferred route in the RIB. SD-WAN rules generally require matching routes to exist; if multiple routes exist, the underlying routing table priority can influence selection if the SD-WAN rule criteria are tied or if the "Preserve-order" is influenced by the RIB.

Why the other options are incorrect:

Option A (HUB1-VPN3 has a higher member configuration priority): The diagnose sys sdwan service output shows that for Service ID 4, the cfg_order for HUB1-VPN1 is 0 (which is the highest priority in config order), while HUB1-VPN3 is 1. If the SD-WAN rule was being followed correctly, it would prefer VPN1. Therefore, configuration priority isn't the reason for the failure; it's the reason why the behavior is unexpected.

Option C (HUB1-VPN1 does not have a valid route): The routing table output clearly shows BGP (B) routes for 10.1.0.0/24 and other subnets reachable via HUB1-VPN1. It has a valid path to the destination network.

Reference:
FortiOS 7.6 Study Guide: Refer to the "SD-WAN Traffic Steering" section, specifically the Policy Route vs. SD-WAN Rule evaluation order.
FortiGate Troubleshooting: Check diagnose firewall proute list to confirm if a regular policy route is intercepting the traffic before it hits the SD-WAN engine.

Refer to the exhibit. The administrator configured two SD-WAN rules to load balance the traffic.

Which interfaces does FortiGate use to steer the traffic from 10.0.1.124 to 10.0.0.254? (Choose one answer.)


A. HUB2-VPN2


B. HUB1-VPN2 or HUB2-VPN2


C. port1 or port2


D. Any interface in the HUB1 or HUB2 zones





B.
  HUB1-VPN2 or HUB2-VPN2

Explanation:

Let's analyze the provided CLI output and the question step by step.

1. Understanding the Traffic Flow:
The question asks about traffic from 10.0.1.124 to 10.0.0.254. We must determine which SD-WAN rule this traffic matches and, therefore, which interfaces are used to steer it.

2. Analyzing the SD-WAN Rules:
We have two SD-WAN services configured: Service(2) and Service(3).

Service(2):
🔹 Members: port2 (WAN2) and port1 (WAN1). These are physical WAN interfaces.
🔹 Source: 10.0.1.0-10.0.1.255
🔹 Destination: Not specified in the rule. This means it matches any destination.
🔹 Application Control: This rule is specifically for Facebook, LinkedIn, and Game traffic.

Service(3):
🔹 Members: Six VPN tunnels to two hubs (HUB1-VPN1/2/3, HUB2-VPN1/2/3).
🔹 Source: 10.0.1.0-10.0.1.255
🔹 Destination: 10.0.0.0-10.255.255.255
🔹 Application Control: Not specified. This means it matches all applications.

3. Matching the Traffic to a Rule:
The traffic is from 10.0.1.124 (which falls within 10.0.1.0/24) to 10.0.0.254 (which falls within 10.0.0.0/8).

Does it match Service(2)?
🔹 Source: YES (10.0.1.124 is in 10.0.1.0/24).
🔹 Destination: YES (Service(2) has no destination constraint).
🔹 Application: NO. The traffic destination is an IP address (10.0.0.254). The FortiGate has no context about what application this is (it's not Facebook, LinkedIn, or a tagged Game). Therefore, it does not match the Application Control filter of Service(2). Service(2) is not selected.

Does it match Service(3)?
🔹 Source: YES (10.0.1.124 is in 10.0.1.0/24).
🔹 Destination: YES (10.0.0.254 is in 10.0.0.0/8).
🔹 Application: YES (Service(3) has no Application filter).
🔹 Conclusion: Service(3) is the matching rule.

4. Determining the Interface Selection within Service(3):
Now we must see how Service(3) selects an interface. The key is in its configuration line: Mode(sla hash-mode=round-robin)
🔹 sla: This means member selection is SLA-driven. Only members meeting the SLA targets are candidates for selection.
🔹 hash-mode=round-robin: This is the tie-breaking method used when multiple members meet the SLA.

Looking at the members' status:
HUB1-VPN2: sla(0x1), num of pass(1) → Passes SLA.
HUB2-VPN2: sla(0x2), num of pass(1) → Passes SLA.
All other members (HUB1-VPN1, HUB1-VPN3, HUB2-VPN1, HUB2-VPN3) have sla(0x0) and num of pass(0) → Fail SLA.
Therefore, only HUB1-VPN2 and HUB2-VPN2 are eligible for traffic steering. The round-robin hash mode will distribute sessions between these two healthy members.

Why the Other Options Are Incorrect:

A. HUB2-VPN2: This is partially correct but incomplete. It ignores the fact that HUB1-VPN2 also passes SLA and will be used in a round-robin fashion.

C. port1 or port2: These are members of Service(2), which does not match our traffic due to the Application Control mismatch.

D. Any interface in the HUB1 or HUB2 zones: This is too broad and incorrect. The rule uses SLA-driven selection. Only the interfaces that pass the SLA (HUB1-VPN2 and HUB2-VPN2) are selected. The other four VPN tunnels in those zones are alive but fail SLA and are therefore not used.

Reference / Key Concept:
This question tests your understanding of the SD-WAN rule matching order and logic.
Rule Order: FortiGate evaluates SD-WAN rules from top to bottom (in this case, Service ID 2, then 3). The first rule that matches all criteria (source, destination, application, etc.) is used.
Member Selection Logic: Once a rule is matched, you must apply its configured selection logic (manual, sla, priority, etc.) to the rule's members to determine the egress interface.
The exhibit clearly shows the result of this logic: Service(3) is matched, and within it, only the two SLA-passing members are selected.

SD-WAN interacts with many other FortiGate features. Some of them are required to allow SD-WAN to steer the traffic. Which three configuration elements that you must configure before FortiGate can steer traffic according to SD-WAN rules? (Choose three.)


A. Firewall policies


B. Interfaces


C. Security profiles


D. Traffic shaping


E. Routing





A.
  Firewall policies

B.
  Interfaces

E.
  Routing

Explanation:

A) Firewall policies
SD-WAN steers traffic by controlling how packets flow through the FortiGate. To enforce SD-WAN rules, firewall policies must be in place to define which traffic is allowed and how it should be handled. Without firewall policies, traffic cannot be directed or matched properly for SD-WAN steering.

B) Interfaces
SD-WAN operates over multiple WAN interfaces. These interfaces must be configured and linked to the SD-WAN virtual interface. The FortiGate uses these interfaces to send traffic across different paths based on SD-WAN rules.

E) Routing
Proper routing setup is essential for SD-WAN to steer traffic. SD-WAN modifies routing decisions by steering traffic through the best path based on the rules and performance SLA metrics configured. Without routing, the device won’t know how to direct traffic to the chosen interface.

Why Not the Others?

C) Security profiles
Security profiles apply inspection and filtering but don’t influence traffic steering. They are not required for SD-WAN path selection.

D) Traffic shaping
Traffic shaping manages bandwidth but is not a prerequisite for SD-WAN steering. It can be used optionally to manage traffic flow, but steering depends on firewall policies, interfaces, and routing.

Reference:
Fortinet Document: FortiOS Handbook - SD-WAN

You want FortiGate to use SD-WAN rules to steer local-out traffic. Which two constraints should you consider? (Choose two.)


A. By default, FortiGate uses SD-WAN rules only for local-out traffic that corresponds to ping and traceroute.


B. By default, local-out traffic does not use SD-WAN.


C. You can steer local-out traffic only with SD-WAN rules that use the manual strategy.


D. You must configure each local-out feature individually to use SD-WAN.





B.
  By default, local-out traffic does not use SD-WAN.

D.
  You must configure each local-out feature individually to use SD-WAN.

Explanation:

B. By default, local-out traffic does not use SD-WAN.
This is correct. Local-out traffic (traffic originating from FortiGate itself, like updates, DNS queries, or management traffic) doesn't automatically follow SD-WAN rules. It uses the routing table by default. You need to explicitly enable SD-WAN for local-out traffic.

D. You must configure each local-out feature individually to use SD-WAN.
This is correct. You can't enable SD-WAN for all local-out traffic with a single global setting. Each service that generates local-out traffic needs to be configured separately. For example:
🔹 FortiGuard updates
🔹 DNS queries
🔹 NTP traffic
🔹 RADIUS/LDAP authentication
🔹 Logging to remote servers
Each one requires specific configuration to use SD-WAN instead of the default routing table.

Why the other options are wrong

A. By default, FortiGate uses SD-WAN rules only for local-out traffic that corresponds to ping and traceroute.
Wrong. By default, FortiGate doesn't use SD-WAN rules for ANY local-out traffic, including ping and traceroute. Option B already tells us local-out traffic doesn't use SD-WAN by default.

C. You can steer local-out traffic only with SD-WAN rules that use the manual strategy.
Wrong. You can use various load balancing strategies (volume-based, session-based, spillover, etc.) for local-out traffic, not just manual strategy. The strategy choice depends on your needs.

Reference
FortiOS SD-WAN documentation covers local-out traffic behavior under SD-WAN configuration sections. The key point is that local-out traffic requires explicit per-feature configuration to leverage SD-WAN rules instead of standard routing.

As an IT manager for a healthcare company, you want to delegate the installation and management of your SD-WAN deployment to a managed security service provider (MSSP). Each site must maintain direct internet access and ensure that it is secure. You expected significant traffic flow between the sites and want to delegate as much of the network administration and management as possible to the MSSP. Which two MSSP deployment blueprints best address the customer’s requirements? (Choose two.)


A. Use a shared hub at the MSSP premises with a dedicated VDOM for the new customer, and install the spokes at the customer premises.


B. Use a shared hub at the MSSP premises and a dedicated hub at the customer premises and install the spokes at the customer premises.


C. Install a dedicated hub at the MSSP premises for the new customer, and install the spokes at the customer premises.


D. Install the hub and spokes at the customer premises and enable the MSSP to manage the SD-WAN deployment using FortiManager with a dedicated ADOM.





A.
  Use a shared hub at the MSSP premises with a dedicated VDOM for the new customer, and install the spokes at the customer premises.

C.
  Install a dedicated hub at the MSSP premises for the new customer, and install the spokes at the customer premises.

Explanation:

In Fortinet Secure SD-WAN for managed service providers (MSSPs), the big decision is where to place the hub(s) versus the spokes. Spokes (at branch/customer sites) usually handle local decisions like secure direct internet breakout (DIA). Hubs act as the central glue for control plane (BGP, ADVPN shortcut negotiation, routing policies) and sometimes data-plane transit.
When you want to delegate installation + ongoing management as much as possible to the MSSP (especially in regulated healthcare), while keeping secure local DIA at every site and efficiently handling lots of branch-to-branch traffic (via ADVPN shortcuts whenever possible), the winning strategy is to let the MSSP own and operate the hub(s) at their premises. This removes hardware installation, patching, scaling, and deep overlay admin from your team. Spokes stay local so internet exits directly and securely at each site.

Now let’s evaluate each option with the icons you wanted:

✅ A. Use a shared hub at the MSSP premises with a dedicated VDOM for the new customer, and install the spokes at the customer premises.
This is a classic MSSP blueprint (often called “MSSP premises, multitenant”). The MSSP installs and runs one physical/VM FortiGate (or cluster) as the hub, carving out a dedicated VDOM just for your organization—strong logical isolation without needing separate hardware. They own all hub-related installation, maintenance, FortiManager ADOM config, overlay policies, and ADVPN facilitation. Your spokes go on your sites → direct secure DIA stays local. For heavy inter-site traffic, ADVPN creates dynamic spoke-to-spoke tunnels most of the time (minimal hub transit), which is efficient and low-latency. Maximum delegation achieved. Many MSSPs prefer this for cost-efficiency and scale.

❌ B. Use a shared hub at the MSSP premises and a dedicated hub at the customer premises and install the spokes at the customer premises.
This hybrid adds unnecessary complexity and reduces delegation. You now have to install, power, rack (or VM), and physically maintain a dedicated hub device/VM on your premises—exactly what you wanted to hand off. Even if the MSSP manages it remotely, they don’t own the hardware lifecycle. It also forces more potential hair-pinning through your local hub instead of optimizing via the MSSP-hosted control plane. Common misconception: “more hubs = better redundancy”—but in this scenario it actually increases your operational burden without clear benefit over pure MSSP-hosted models.

✅ C. Install a dedicated hub at the MSSP premises for the new customer, and install the spokes at the customer premises.
This matches the “MSSP premises, no multitenancy / dedicated per customer” blueprint. Instead of sharing hardware + VDOM, the MSSP gives you your own isolated FortiGate/VM instance as the hub—often chosen in healthcare or other regulated industries for maximum separation and compliance comfort. Delegation is still very high: MSSP handles all hub installation, upgrades, monitoring, and overlay control. Spokes remain at your sites for local secure DIA. Inter-site traffic behaves the same—ADVPN shortcuts for direct spoke-to-spoke flows, hub only as fallback. It’s slightly more expensive for the MSSP (hence higher price to you), but still far better delegation than keeping anything hub-like on your premises.

❌ D. Install the hub and spokes at the customer premises and enable the MSSP to manage the SD-WAN deployment using FortiManager with a dedicated ADOM.
Everything (hub + spokes) stays physically at your sites → you (or your staff/vendor) handle installation, cabling, power, cooling, hardware refreshes, and on-site troubleshooting. The MSSP only does remote config/monitoring via FortiManager (nice ADOM separation, yes), but that’s only partial delegation. You didn’t offload the “installation” part at all, which was a core requirement. Common trap: people think “remote management = full delegation”—but in MSSP speak, true high-delegation blueprints put the heavy hub infrastructure at the provider’s data center.

So the two blueprints that best satisfy “delegate as much as possible” + local secure DIA + efficient inter-site handling are A and C—both keep the control-plane-heavy hub(s) fully with the MSSP while spokes stay local.

Refer to the exhibit.

An administrator configures SD-WAN rules for a DIA setup using the FortiGate GUI. The page to configure the source and destination part of the rule looks as shown in the exhibit. The GUI page shows no option to configure an application as the destination of the SDWAN rule Why?


A. You cannot use applications as the destination when FortiGate is used for a DIA setup.


B. FortiGate allows the configuration of applications as the destination of SD-WAN rules only on the CLI.


C. You must enable the feature on the CLI.


D. You must enable the feature first using the GUI menu System > Feature Visibility.





D.
  You must enable the feature first using the GUI menu System > Feature Visibility.

Explanation:

By default, FortiGate hides certain advanced or specific configuration options in the GUI to prevent the interface from becoming cluttered. This is known as Feature Visibility. If you are looking for a specific field—such as "Application" in an SD-WAN rule—and it simply isn't there, it usually means the toggle for that feature is turned off globally. Enabling it allows you to use Deep Packet Inspection (DPI) and Application Control signatures to steer traffic, which is a cornerstone of a sophisticated Direct Internet Access (DIA) setup.

Analysis of Options

✅ D. You must enable the feature first using the GUI menu System > Feature Visibility. This is the correct answer. In FortiOS, many granular controls for SD-WAN, including the ability to select specific Applications as a destination rather than just "Internet Services" or "IP Addresses," are controlled by the Feature Visibility settings. Once you toggle the "Application Control" or relevant SD-WAN features on in that menu, the "Application" field will appear in the SD-WAN rule creation screen.

❌ A. You cannot use applications as the destination when FortiGate is used for a DIA setup. This is incorrect. Steering traffic by application is one of the primary benefits of using SD-WAN for DIA (Direct Internet Access). For example, you might want to send Office 365 traffic over your cleanest fiber link while sending generic web browsing over a cheaper broadband link. FortiGate fully supports this.

❌ B. FortiGate allows the configuration of applications as the destination of SD-WAN rules only on the CLI. While almost everything can be done via CLI, this is not a CLI-only feature. Fortinet prioritizes making SD-WAN management accessible via the GUI because of the complexity involved in managing many business rules. If it's missing from the GUI, it's a visibility setting, not a platform limitation.

❌ C. You must enable the feature on the CLI. While you could technically use the CLI to enable a feature, the standard administrative workflow and the specific answer the exam looks for is the GUI-based "Feature Visibility" menu. In the context of the FortiGate GUI missing a field, the solution is almost always located within the GUI's own settings.

Reference
For more details on interface customization and SD-WAN rule requirements, you can refer to the official documentation: https://docs.fortinet.com

You are tasked with configuring ADVPN 2.0 on an SD-WAN topology already configured for ADVPN. What should you do to implement ADVPN 2.0 in this scenario?


A. Update the IPsec tunnel configurations on the hub.


B. Update the SD-WAN configuration on the branches.


C. Update the IPsec tunnel configuration on the branches.


D. Delete the existing ADVPN configuration and configure ADVPN 2.0.





A.
  Update the IPsec tunnel configurations on the hub.

Explanation:

✅ A. Update the IPsec tunnel configurations on the hub.
Updating the IPsec tunnels on the hub is the right move because the hub acts as the central coordinator in ADVPN topologies. In ADVPN 2.0, enhanced features like improved shortcut handling and better scalability require the hub's tunnels to support new negotiation parameters (like updated Phase 1/2 settings for dynamic discovery). Branches can continue using their existing dial-up configurations, as the hub pushes the necessary updates during tunnel establishment—this minimizes disruption across your spokes. ​

❌ B. Update the SD-WAN configuration on the branches.
SD-WAN rules on branches handle traffic steering and SLAs, but they don't control the core ADVPN discovery mechanism. A common mix-up here is thinking spoke-side SD-WAN changes are needed first, but that's not the case—branches rely on hub-driven signaling, so tweaking their SD-WAN won't trigger the 2.0 upgrade. ​

❌ C. Update the IPsec tunnel configuration on the branches.
While branches do form IPsec tunnels, forcing updates there creates unnecessary work and potential outages across all spokes. Many folks mistakenly prioritize spokes since they're the "demand" side, but ADVPN 2.0 upgrades propagate from the hub outward, keeping branch configs simpler and dial-up compatible. ​

❌ D. Delete the existing ADVPN configuration and configure ADVPN 2.0.
Starting from scratch sounds thorough but risks downtime and misconfiguration in a live SD-WAN setup. Fortinet's design allows in-place evolution to 2.0 without deletion—the hub update alone enables new features while preserving existing tunnels.

Reference
https://docs.fortinet.com

You plan a large SD-WAN deployment for a global company. You want to divide the network architecture into five geographical regions and install two hubs in each region for increased redundancy. You expect a significant amount of traffic within each region and limited traffic flow between spokes in different regions. You plan to connect the small branch sites to only the closest hub in their regions and the large branch sites to the two hubs in the regions. Which statement about your plan is true? (Choose one answer)


A. It is possible. You should use eBGP as the routing protocol between the regions.


B. It is not possible. FortiOS 7.6 supports multihub topologies with up to four hubs.


C. It is possible. You should use FortiManager and the overlay orchestrator multihub topology to simplify the deployment.


D. It is not possible. In a region, all spokes must have either single-hub or dual-hub connectivity.





B.
  It is not possible. FortiOS 7.6 supports multihub topologies with up to four hubs.

Explanation:

Summary: Designing for Regional Traffic Patterns
You're designing a hub-and-spoke SD-WAN for a global company. The key design goals are:

➡️ Geographic Segmentation: Split the network into five regions to keep most traffic local.
➡️ Regional Redundancy: Use two hubs per region (10 hubs total).
➡️ Flexible Spoke Connectivity: Allow small branches to connect to just one hub for simplicity/cost, while large branches connect to both for high availability.
➡️ Minimize Cross-Region Traffic: Spokes in different regions shouldn't talk directly to each other.

The question asks whether this specific, nuanced design is architecturally possible with FortiOS 7.6.

Detailed Answer Breakdown
Let's evaluate each option against the stated plan and Fortinet's capabilities.

❌ A. It is possible. You should use eBGP as the routing protocol between the regions.
Why it's incorrect: While the core statement "It is possible" is correct, the reasoning about eBGP is misleading and not the primary solution. eBGP is one possible routing protocol you could use for dynamic routing between large regional hubs (the inter-region "core"), but it is not the defining feature that makes this complex multihub topology possible. The question's focus is on the SD-WAN overlay topology (the hub-spoke connections), not the underlying routing protocol choice. Suggesting eBGP as the critical enforcer misses the mark.

✅ B. It is not possible. FortiOS 7.6 supports multihub topologies with up to four hubs.
Why it's CORRECT: This is the accurate technical limitation. Your plan calls for five regions with two hubs each, totaling 10 hubs. In FortiOS 7.6, a single SD-WAN overlay (managed via the Overlay Controller VPN in FortiManager or directly on the FortiGate) supports a maximum of four hub FortiGates. This is a hard platform limit for that release. Therefore, your plan to have 10 hubs in a single, unified SD-WAN overlay is not possible. You would need to redesign—perhaps by creating separate, independent SD-WAN overlays per region, which then connects via a separate core network.

❌ C. It is possible. You should use FortiManager and the overlay orchestrator multihub topology to simplify the deployment.
Why it's incorrect: This is a great best-practice suggestion for managing a multihub deployment, and the Overlay Orchestrator in FortiManager is indeed the recommended tool for this. However, it does not override the fundamental platform limit of four hubs per overlay. The Orchestrator simplifies configuration and policy application within that limit. It cannot magically enable a 10-hub single overlay.

❌ D. It is not possible. In a region, all spokes must have either single-hub or dual-hub connectivity.
Why it's incorrect: This statement is false. Fortinet's SD-WAN is flexible and allows for a mixed environment within the same overlay. You can absolutely have some spokes (small branches) configured with a single hub (a "spoke-to-hub" connection) and other spokes (large branches) configured with dual hubs (a "spoke-to-multihub" connection) in the same region and same SD-WAN topology. This flexibility is a key strength of the design.

Key Takeaway:
The critical constraint here isn't the logical design, which is sound, but the specific technical limit of FortiOS 7.6. Always check the platform's maximum scale numbers for your version. Your design would require either reducing hubs per overlay to 4 or less, or implementing multiple overlays.

Official Reference:
Fortinet Documentation Library: FortiOS 7.6 Administration Guide - SD-WAN Overlay

Your FortiGate is in production. To optimize WAN link use and improve redundancy, you enable and configure SD-WAN. What must you do as part of this configuration update process?


A. Replace references to interfaces used as SD-WAN members in the routing configuration.


B. Purchase and install the SD-WAN license, and reboot the FortiGate device.


C. Replace references to interfaces used as SD-WAN members in the firewall policies.


D. Disable the interface that you want to use as an SD-WAN member.





C.
  Replace references to interfaces used as SD-WAN members in the firewall policies.

Explanation:

When you enable SD-WAN on a FortiGate that is already in production, you are changing how traffic selects an egress path. SD-WAN does not magically inherit existing firewall policies that reference physical interfaces. Instead, SD-WAN introduces a logical SD-WAN interface, and traffic must explicitly use it. The critical task during migration is updating policies so traffic actually goes through SD-WAN instead of bypassing it.

✅ Correct answer: C. Replace references to interfaces used as SD-WAN members in the firewall policies.

Why this is correct
When you add interfaces to SD-WAN, FortiGate creates a logical interface called sdwan (or virtual-wan-link in older versions).
Existing firewall policies that reference physical WAN interfaces (for example wan1, wan2) do not automatically switch to SD-WAN.

To ensure:
🔹 Traffic is load-balanced
🔹 Health checks are enforced
🔹 Failover actually works

you must update firewall policies so that:
🔹 The outgoing interface is the SD-WAN interface, not the individual WAN links
This is the single most common step people miss during SD-WAN migration, which results in “SD-WAN enabled but not used” scenarios.

❌ Incorrect options

❌ A. Replace references to interfaces used as SD-WAN members in the routing configuration.

Why this is wrong
When SD-WAN is enabled:
🔹 FortiGate automatically manages routing for SD-WAN members
🔹 Static routes pointing to member interfaces are either removed or ignored
You do not manually replace routes with SD-WAN references. Routing decisions are made using SD-WAN rules, not traditional static routes.

Common misconception:
People assume SD-WAN requires rewriting routing tables. It doesn’t. SD-WAN replaces routing logic with policy-based path selection.

❌ B. Purchase and install the SD-WAN license, and reboot the FortiGate device.

Why this is wrong
SD-WAN is:
🔹 Built-in
🔹 License-free
🔹 Enabled without reboot
There is no separate SD-WAN license for FortiGate. If someone tells you otherwise, they are confusing SD-WAN with other Fortinet features like FortiAnalyzer or advanced security subscriptions.

❌ D. Disable the interface that you want to use as an SD-WAN member.

Why this is wrong
SD-WAN member interfaces must be:
🔹 Enabled
🔹 Physically up
🔹 Operational
Disabling an interface removes it from service entirely, which defeats redundancy and load balancing.

Common trap:
Some admins think interfaces must be “freed” or reset before SD-WAN use. That’s false. You add active interfaces directly into SD-WAN.

Key takeaway
SD-WAN does nothing unless traffic is sent through it.
Updating firewall policies to reference the SD-WAN interface is the critical step that makes SD-WAN actually work in production.

Exhibit.

The administrator configured the IPsec tunnel VPN1 on a FortiGate device with the parameters shown in exhibit.
Based on the configuration, which three conclusions can you draw about the characteristics and requirements of the VPN tunnel? (Choose three.)


A. The tunnel interface IP address on the spoke side is provided by the hub.


B. The remote end can be a third-party IPsec device.


C. The administrator must manually assign the tunnel interface IP address on the hub side


D. The remote end must support IKEv2.


E. This configuration allows user-defined overlay IP addresses.





B.
  The remote end can be a third-party IPsec device.

C.
  The administrator must manually assign the tunnel interface IP address on the hub side

E.
  This configuration allows user-defined overlay IP addresses.

Explanation:

Main Concept
This question tests your understanding of IPsec Phase 1 configuration on FortiGate, specifically focusing on what the configuration parameters tell you about tunnel characteristics, compatibility, and IP addressing behavior in a hub-and-spoke VPN topology.
The key here is analyzing what each configuration line reveals about the VPN setup. You need to understand IKE versions, IP address assignment methods, and interoperability with third-party devices.

Answer Analysis

✅ B. The remote end can be a third-party IPsec device.

Why this is correct:
The configuration shows set peertype any, which is the critical line here. This setting tells the FortiGate to accept IPsec connections from any peer type—not just other FortiGate devices. It enables interoperability with third-party IPsec vendors like Cisco, Palo Alto, Juniper, or any standards-compliant IPsec device.
If this were restricted to FortiGate-only communication, you'd see set peertype fortigate instead. The "any" value means the tunnel will work with any device that supports the configured IKE and IPsec parameters (IKEv2, AES256-SHA256 in this case).

✅ C. The administrator must manually assign the tunnel interface IP address on the hub side.

Why this is correct:
Look at what's missing in this configuration—there's no set mode-config enable on the hub side. The mode-config feature is what allows a hub to dynamically assign IP addresses to spokes.
Since mode-config is disabled (set mode-cfg disable), the hub cannot push IP addresses to remote peers. This means the administrator has to manually configure the tunnel interface IP address on the hub side using something like set ip 10.0.0.1/24 under the tunnel interface configuration.
The hub is essentially saying: "I'm not handing out addresses automatically, so you need to configure my tunnel IP manually."

✅ E. This configuration allows user-defined overlay IP addresses.

Why this is correct:
Because mode-cfg disable is set, there's no automatic IP address assignment happening. This gives administrators full control to define whatever overlay IP addressing scheme they want for the tunnel interfaces.
You're not locked into a specific range that mode-config would assign. You can choose 10.0.0.0/24, 172.16.0.0/16, or any custom subnet that fits your network design. This flexibility is what "user-defined" means—you decide the overlay addressing, not the FortiGate's automatic assignment mechanism.

❌ A. The tunnel interface IP address on the spoke side is provided by the hub.

Why this is wrong:
This would only be true if set mode-cfg enable was configured. Mode-config is the feature that allows hubs to dynamically assign tunnel IP addresses to spokes (similar to DHCP for VPN tunnels).
Since the configuration explicitly shows set mode-cfg disable, the hub is NOT providing IP addresses to spokes. Each spoke must have its tunnel IP manually configured, just like the hub. Common misconception: People sometimes assume that in hub-and-spoke topologies, the hub always assigns addresses. That's only true when mode-config is enabled. Without it, everything is manual.

❌ D. The remote end must support IKEv2.

Why this is wrong:
The configuration shows set ike-version 2, which means THIS FortiGate is using IKEv2. However, this doesn't mean the remote end is forced to use IKEv2 only.
Actually, when you set ike-version 2 on FortiGate, it typically supports both IKEv1 and IKEv2 for backward compatibility (FortiGate can auto-negotiate). The remote end could potentially connect using IKEv1 depending on the FortiGate's broader configuration and firmware version behavior.
More importantly, the question asks what you can conclusively draw from the exhibit. The exhibit alone doesn't prove that IKEv2 is absolutely required—you'd need to see additional configuration or know the specific FortiOS behavior to make that determination.

Common misconception: Seeing ike-version 2 and assuming it's IKEv2-only. In practice, FortiGate's IKE version handling is more flexible than a strict enforcement.

Reference
Official Fortinet Documentation: https://docs.fortinet.com


Page 2 out of 8 Pages
Previous