Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free FCSS_LED_AR-7.6 Questions Attempt

Fortinet NSE 6 - LAN Edge 7.6 Architect Questions and Answers

Question 9

Refer to the exhibit.

Review the exhibits to analyze the network topology, SSID settings, and firewall policies.

FortiGate is configured to use an external captive portal for authentication to grant access to a wireless network. During testing, it was found that users attempting to connect to the SSID cannot access the captive portal login page.

What configuration change should be made to resolve this issue to allow users to access the captive portal?

Options:

A.

Change the SSID security mode to WPA2-Enterprise for authentication.

B.

Disable HTTPS redirection for the captive portal authentication page.

C.

Exclude FortiAuthenticator and Windows AD address objects from filtering.

D.

A firewall policy allowing Guest SSID traffic to reach FortiAuthenticator and Windows AD.

Question 10

Refer to the exhibits.

A set of SSID profiles has been configured on FortiManager, and an AP profile has been assigned to a group of APs managed by FortiGate. However, none of the designated SSIDs are being broadcast by these APs.

Which configuration change is required to make the APs broadcast these SSIDs as intended?

Options:

A.

Change the AP profile to use a platform that supports the configured mix of SSIDs.

B.

Adjust the AP profile to ensure all SSIDs are configured in a supported mode, either bridge or tunnel, but not a mix of both.

C.

Set the Transmit Power Mode to Auto.

D.

Choose Manual in the SSIDs setting and select the SSIDs to broadcast.

Question 11

You are configuring FortiAuthenticator to integrate with FSSO for user identification. To enable FortiAuthenticator to extract user information from syslog messages and inject it into FSSO, you have configured syslog matching rules.

What is the role of syslog matching rules in the process of injecting user information into FSSO?

Options:

A.

To automatically update user group memberships in FSSO based on syslog events

B.

To enforce user authentication policies based on syslog message contents

C.

To define how syslog messages are parsed and extract user information, such as usernames and IP addresses

D.

To filter and block irrelevant syslog messages from being processed by the FortiAuthenticator

Question 12

You are deploying a FortiSwitch device managed by FortiGate in a secure network environment. To ensure accurate communication, you must identify which protocols are required for communication and control between FortiGate and FortiSwitch.

Which three protocols are used by FortiGate to manage and control FortiSwitch devices? (Choose three.)

Options:

A.

SNMP can be used by FortiGate to manage FortiSwitch devices by monitoring their status.

B.

HTTPS is used by FortiGate to securely manage and configure FortiSwitch devices.

C.

FortiGate uses the FortiLink protocol to establish communication with FortiSwitch.

D.

CAPWAP is used to establish the control channel between FortiSwitch and FortiGate.

E.

IGMP is required for managing communication between FortiGate and FortiSwitch devices in multicast environments.