Exhibit A shows the firewall policy and exhibit B shows the traffic shaping policy.
The traffic shaping policy is being applied to all outbound traffic; however, inbound traffic is not being evaluated by the shaping policy.
Based on the exhibits, what configuration change must be made in which policy so that traffic shaping can be applied to inbound traffic?
What are two benefits of choosing packet duplication over FEC for data loss correction on noisy links? (Choose two.)
What are two reasons why FortiGate would be unable to complete the zero-touch provisioning process? (Choose two.)
In the default SD-WAN minimum configuration, which two statements are correct when traffic matches the default implicit SD-WAN rule? (Choose two )
Refer to the exhibits.
Exhibit A
Exhibit B -
Exhibit A shows the configuration for an SD-WAN rule and exhibit B shows the respective rule status, the routing table, and the member status.
The administrator wants to understand the expected behavior for traffic matching the SD-WAN rule.
Based on the exhibits, what can the administrator expect for traffic matching the SD-WAN rule?
Which SD-WAN setting enables FortiGate to delay the recovery of ADVPN shortcuts?
Refer to the exhibit, which shows the IPsec phase 1 configuration of a spoke.
What must you configure on the IPsec phase 1 configuration for ADVPN to work with SD-WAN?
Refer to the exhibit.
Based on the exhibit, which two actions does FortiGate perform on sessions after a firewall policy change? (Choose two.)
Refer to the exhibit.
Based on the exhibit, which statement about FortiGate re-evaluating traffic is true?
Which action fortigate performs on the traffic that is subject to a per-IP traffic shaper of 10 Mbps?
Which two performance SLA protocols enable you to verify that the server response contains a specific value? (Choose two.)
Which two settings can you configure to speed up routing convergence in BGP? (Choose two.)
Refer to the exhibit.
The exhibit shows the details of a session and the index numbers of some relevant interfaces on a FortiGate appliance that supports hardware offloading. Based on the information shown in the exhibits, which two statements about the session are true? (Choose two.)
What are two benefits of using forward error correction (FEC) in IPsec VPNs? (Choose two.)
Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two.)
The administrator uses the FortiManager SD-WAN overlay template to prepare an SD-WAN deployment. With information provided through the SD-WAN overlay template wizard, FortiManager creates templates ready to install on spoke and hub devices.
Select three templates created by the SD-WAN overlay template for a spoke device. (Choose three.)
Which best describes the SD-WAN traffic shaping mode that bases itself on a percentage of available bandwidth?
Refer to the exhibit.
An administrator used the SD-WAN overlay template to prepare an IPsec configuration for a hub-and-spoke SD-WAN topology. The exhibit shows the installation preview for one FortiGate device. In the exhibit, which statement best describes the configuration applied to the FortiGate device?