New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet NSE4_FGT_AD-7.6 Exam - Topic 3 Question 4 Discussion

Actual exam question for Fortinet's NSE4_FGT_AD-7.6 exam
Question #: 4
Topic #: 3
[All NSE4_FGT_AD-7.6 Questions]

You have configured an application control profile, set peer-to-peer traffic to Block under the Categories tab. and applied it to the firewall policy. However, your peer-to-peer traffic on known ports is passing through the FortiGate without being blocked.

What FortiGate settings should you check to resolve this issue?

Show Suggested Answer Hide Answer
Suggested Answer: B

When the Application sensor receives traffic on that port, the protocol decoder will try to determine if the received data matches the HTTPS traffic In this case it will not match because it is P2P traffic, so this will class as violation and blocked The protocol decoder also try to determine what type of traffic it is, and even if it could not figure out it is P2P traffic, it still count as a violation because even though it does not know what it is, it knows for fact it is not HTTPS


Contribute your Thoughts:

0/2000 characters
Ceola
5 days ago
I'm not entirely sure, but I remember something about application and filter overrides possibly allowing certain traffic even if it's blocked in the profile.
upvoted 0 times
...
Dominga
10 days ago
I think we might need to check the FortiGuard category ratings since that's where the application control profiles get their info from, right?
upvoted 0 times
...
Juliann
15 days ago
I'm feeling pretty confident about this one. I think the key is to methodically go through each of the options and see which one is causing the issue. Gotta love those troubleshooting questions!
upvoted 0 times
...
Willow
20 days ago
Ah, I see. The replacement messages for UDP-based applications could also be a factor here. It's worth taking a look at those settings as well.
upvoted 0 times
...
Dawne
25 days ago
Okay, let me think this through. I'd probably start by checking the Application and Filter Overrides to see if there's anything there that's allowing the peer-to-peer traffic to bypass the block.
upvoted 0 times
...
Yvonne
1 month ago
I'm a bit confused here. Shouldn't we be looking at the Network Protocol Enforcement settings instead? That seems like the most likely culprit.
upvoted 0 times
...
Hester
1 month ago
Hmm, this seems like a tricky one. I'd start by checking the FortiGuard category ratings to make sure the peer-to-peer traffic is properly categorized.
upvoted 0 times
...

Save Cancel