With the increase in loT devices, which two challenges do enterprises face? (Choose two.)
Based on the ZTNA logs provided, the true statement is:
A) The Remote_user ZTNA tag has matched the ZTNA rule: The log includes a user tag 'ztna_user' and a policy name 'External_Access_FAZ', which suggests that the ZTNA tag for 'Remote_User' has successfully matched the ZTNA rule defined in the policy to allow access.
The other options are not supported by the information in the log:
B) An authentication scheme is configured: The log does not provide details about an authentication scheme.
C) The external IP for ZTNA server is 10.122.0.139: The log entry indicates 'dstip=10.122.0.139' which suggests that this is the destination IP address for the traffic, not necessarily the external IP of the ZTNA server.
D) Traffic is allowed by firewall policy 1: The log entry 'policyid=1' indicates that the traffic is matched to firewall policy ID 1, but it does not explicitly state that the traffic is allowed; although the term 'action=accept' suggests that the action taken by the policy is to allow the traffic, the answer option D could be considered correct as well.
Interpretation of FortiGate ZTNA Log Files.
Analyzing Traffic Logs for Zero Trust Network Access.
Rodrigo
28 days agoFidelia
1 months agoKattie
1 days agoNoah
1 days agoSharika
2 days agoTy
9 days agoShawna
17 days agoKassandra
17 days agoReena
24 days agoHershel
25 days agoWynell
1 months agoChau
2 months agoVashti
1 months agoIzetta
1 months agoDeeanna
2 months agoParis
2 months agoHildegarde
9 days agoNgoc
14 days agoQuentin
22 days agoCarole
25 days agoElvera
2 months agoTony
2 months ago