Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet Exam NSE6_FWB-6.4 Topic 1 Question 32 Discussion

Actual exam question for Fortinet's NSE6_FWB-6.4 exam
Question #: 32
Topic #: 1
[All NSE6_FWB-6.4 Questions]

Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers.

What must the administrator do to avoid this problem? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Lynda
28 days ago
Option D, 'Enable the Add X-Forwarded-For setting on FortiWeb', seems like the most straightforward solution. Keep it simple, you know?
upvoted 0 times
...
Leslie
1 months ago
Haha, the setup is 'breaking all connectivity'? Sounds like a real nightmare! I'd definitely choose option A or D to avoid that headache.
upvoted 0 times
...
Corinne
1 months ago
Placing FortiWeb in front of FortiADC, as suggested in option C, could work, but it seems like an overly complicated solution. I'd go with option A or D instead.
upvoted 0 times
...
Corinne
2 months ago
Option B doesn't sound right to me. If the attack is blocking access, we can't just rely on a timeout to fix it. We need to take proactive steps.
upvoted 0 times
Kathryn
16 days ago
Agreed, adding X-Forwarded-For can also help in this situation.
upvoted 0 times
...
Rory
17 days ago
D) Enable the Add X-Forwarded-For setting on FortiWeb.
upvoted 0 times
...
Frank
28 days ago
Yes, enabling X-Forwarded-For on FortiWeb can help with the source IP address issue.
upvoted 0 times
...
Evelynn
1 months ago
C) Place FortiWeb in front of FortiADC.
upvoted 0 times
...
Jerlene
1 months ago
A) Enable the Use X-Forwarded-For setting on FortiWeb.
upvoted 0 times
...
...
Florinda
2 months ago
I think option A is the way to go. Enabling the Use X-Forwarded-For setting on FortiWeb should help preserve the original client IP address and avoid the connectivity issues.
upvoted 0 times
Almeta
1 months ago
User2: Yeah, enabling the Use X-Forwarded-For setting on FortiWeb should help preserve the original client IP address.
upvoted 0 times
...
Felicia
2 months ago
User1: I agree, option A seems like the best solution.
upvoted 0 times
...
...
Jutta
2 months ago
I also think placing FortiWeb in front of FortiADC could be a good solution to avoid breaking connectivity.
upvoted 0 times
...
Bette
2 months ago
I agree with Domonique. Enabling the Use X-Forwarded-For setting will help avoid blocking genuine clients.
upvoted 0 times
...
Domonique
3 months ago
I think the administrator should enable the Use X-Forwarded-For setting on FortiWeb.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77