Interface and interface groups Address, user, device, and Internet service objects Service definitions Schedules NAT rules Security profiles
Objects used by policies
Policy types
IPv4, IPv6 Virtual wire pair (IPv4, IPv6) Proxy Multicast Local In Policy (Origin and destination is FortiGate itself) DoS (IPv4. IPv6) Traffic shaping
What criteria does FortiGate use to match traffic to a firewall policy?
A. Source and destination interfaces
B. Security profiles
What must be selected in the Source field of a firewall policy?
A. At least one address object
B. At least one source user and one source address object
On which FortiGate interface is Device Detection enabled when configuring a firewall policy with a device definition?
A. Source interface of the firewall policy
B. Destination interface of the firewall policy
Types of traffic shapers
shared Per IP
network shared Per IP
FortiGate allows you to create three types of traffic shaping policies: ❌: bandwidth management of user IP addresses ❌: bandwidth management of secunty policies ❌: bandwidth management by application
Firewall policy name is mandatory when configuring on the
A. CLI
B. GUI
What will happen when the Action option in the firewall policy is set to Learn?
A. All services in firewall policy are enabled.
B. Hidden security profiles are enabled.
What is the purpose of applying security profiles to a firewall policy?
A To allow access to certain subnets
B. To protect your network from threats and control access to specific applications and URLs
If a firewall policy is configured with the any interface, you can only view the firewall policy list in
A. The By Sequence View
B. The Interface Pair View
What does the number in the Ref. column represent?
A. The number of places where that object is being used
B. The policy ID of the firewall policy where that object is being used
Which of the following naming formats is correct when configuring a name for a firewall address object?
A. Good_Training
B. Good(Training)
What is the purpose of the policy lookup feature on FortiGate?
A. To find a matching policy based on input criteria
B. To block traffic based on input criteria