Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet NSE7_SSE_AD-25 Exam - Topic 2 Question 1 Discussion

Actual exam question for Fortinet's NSE7_SSE_AD-25 exam
Question #: 1
Topic #: 2
[All NSE7_SSE_AD-25 Questions]

Refer to the exhibits.

A FortiSASE administrator has configured FortiSASE as a spoke to a FortiGate hub. The tunnel is up to the FortiGate hub. However, the remote FortiClient is not able to access the web server hosted behind the FortiGate hub. What is the reason for the access failure? (Choose one answer)

Show Suggested Answer Hide Answer
Suggested Answer: C

Based on the detailed analysis of the provided exhibits (image_65feb6.jpg), the connectivity failure is caused by a mismatch in the Hub firewall policy configuration.

Endpoint Analysis: The Network Diagram shows the FortiClient endpoint has an IP address of 100.65.80.2/20 and currently carries the FortiSASE-Compliant ZTNA tag.

FortiSASE Policy Validation: The Private access policy on FortiSASE shows an 'Accept' rule for traffic originating from 'FortiSASE-Compliant' sources destined for 'All Private Access Traffic'. This confirms the traffic is successfully leaving the FortiSASE PoP.

Routing Validation: The Learned BGP Routes on FortiSASE table shows the prefix 10.160.160.0/24 (the Server subnet) is correctly received via Next Hop 10.11.11.1. Routing is correctly established.

Hub Firewall Policy Error: Examining the Hub firewall policy (edit 7), the srcaddr is set to 'SASE_Remote_Access'. Looking at the address object definition for 'SASE_Remote_Access,' it is configured with the subnet 10.11.11.0 255.255.255.0.

The Conflict: The FortiClient's actual IP address (100.65.80.2) does not fall within the 10.11.11.0/24 range defined in the policy's source address. On a FortiGate hub, for traffic to be permitted through the tunnel to the internal server, the firewall policy must include the specific subnet assigned to the remote clients, not just the tunnel interface subnet. Because the FortiClient address range is missing from the hub's policy, the traffic is dropped at the hub.


Contribute your Thoughts:

0/2000 characters
Beata
3 days ago
B seems plausible too, compliance issues can be tricky.
upvoted 0 times
...
Julian
8 days ago
I agree with C, the address range is crucial for access.
upvoted 0 times
...
Nelida
13 days ago
Wait, how can the tunnel be up but still no access? Sounds odd.
upvoted 0 times
...
Ruthann
18 days ago
Definitely A, if the routes aren't advertised, no access!
upvoted 0 times
...
Yolando
23 days ago
I think it's option C, the firewall policy might be blocking it.
upvoted 0 times
...
Edna
29 days ago
I vaguely recall something about BGP routes and how they need to be received correctly, so option D might be worth considering too.
upvoted 0 times
...
Kenny
1 month ago
I practiced a similar question where the firewall policy was the issue, so I'm leaning towards option C since it seems like a common mistake.
upvoted 0 times
...
Eura
1 month ago
I'm not entirely sure, but I think if the FortiClient is being blocked, it could be due to a compliance issue, which makes option B a possibility.
upvoted 0 times
...
Ronald
1 month ago
I remember something about route advertisement being crucial for connectivity, so maybe option A is the right choice?
upvoted 0 times
...

Save Cancel