Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet NSE4_FGT_AD-7.6 Exam - Topic 3 Question 4 Discussion

Actual exam question for Fortinet's NSE4_FGT_AD-7.6 exam
Question #: 4
Topic #: 3
[All NSE4_FGT_AD-7.6 Questions]

You have configured an application control profile, set peer-to-peer traffic to Block under the Categories tab. and applied it to the firewall policy. However, your peer-to-peer traffic on known ports is passing through the FortiGate without being blocked.

What FortiGate settings should you check to resolve this issue?

Show Suggested Answer Hide Answer
Suggested Answer: B

When the Application sensor receives traffic on that port, the protocol decoder will try to determine if the received data matches the HTTPS traffic In this case it will not match because it is P2P traffic, so this will class as violation and blocked The protocol decoder also try to determine what type of traffic it is, and even if it could not figure out it is P2P traffic, it still count as a violation because even though it does not know what it is, it knows for fact it is not HTTPS


Contribute your Thoughts:

0/2000 characters
Carlee
1 day ago
Haha, I bet the answer is always "check the settings" no matter what the question is. Just kidding, I'd say D) is the way to go.
upvoted 0 times
...
Shaniqua
6 days ago
Hmm, C) Replacement Messages for UDP-based Applications? That's an interesting one, could be worth a shot.
upvoted 0 times
...
Angelo
12 days ago
I'd go with B) Network Protocol Enforcement. Gotta make sure the protocol enforcement is set up properly.
upvoted 0 times
...
Eden
17 days ago
D) Application and Filter Overrides seems like the right choice here.
upvoted 0 times
...
Chara
22 days ago
I wonder if the replacement messages for UDP-based applications could be affecting the traffic. I think we discussed that in class too.
upvoted 0 times
...
Daniel
27 days ago
Could it be related to Network Protocol Enforcement? I feel like we practiced a question on that, but I can't recall the details.
upvoted 0 times
...
Ceola
2 months ago
I'm not entirely sure, but I remember something about application and filter overrides possibly allowing certain traffic even if it's blocked in the profile.
upvoted 0 times
...
Dominga
2 months ago
I think we might need to check the FortiGuard category ratings since that's where the application control profiles get their info from, right?
upvoted 0 times
...
Juliann
2 months ago
I'm feeling pretty confident about this one. I think the key is to methodically go through each of the options and see which one is causing the issue. Gotta love those troubleshooting questions!
upvoted 0 times
...
Willow
2 months ago
Ah, I see. The replacement messages for UDP-based applications could also be a factor here. It's worth taking a look at those settings as well.
upvoted 0 times
...
Dawne
2 months ago
Okay, let me think this through. I'd probably start by checking the Application and Filter Overrides to see if there's anything there that's allowing the peer-to-peer traffic to bypass the block.
upvoted 0 times
...
Yvonne
3 months ago
I'm a bit confused here. Shouldn't we be looking at the Network Protocol Enforcement settings instead? That seems like the most likely culprit.
upvoted 0 times
...
Hester
3 months ago
Hmm, this seems like a tricky one. I'd start by checking the FortiGuard category ratings to make sure the peer-to-peer traffic is properly categorized.
upvoted 0 times
...

Save Cancel