Reply Traffic Interface and Session Handling Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of sessions are triggered by a change in the reply traffic interface?

  • Asymmetric sessions
  • Symmetric sessions
  • Auxiliary sessions
  • Dirty sessions (correct)

What handles dirty sessions triggered by reply interface changes?

  • Symmetric sessions
  • System CPU (correct)
  • FortiGate VMs
  • Hardware offload

Why is hardware offloading not used for dirty sessions triggered by reply interface changes?

  • To improve performance (correct)
  • To offload asymmetric sessions
  • To prevent high CPU utilization
  • To preserve session symmetry

What is the default behavior for route lookup of reply traffic?

<p>Consider routes over original ingress interface only (A)</p> Signup and view all the answers

What prevents reply traffic from switching to a better performing member?

<p>Default route lookup behavior (A)</p> Signup and view all the answers

What are auxiliary sessions also known as?

<p>Reflect sessions (A)</p> Signup and view all the answers

What is the purpose of auxiliary sessions?

<p>To offload asymmetric traffic to hardware (C)</p> Signup and view all the answers

What is the benefit of using auxiliary sessions for FortiGate VMs?

<p>Performance is improved (C)</p> Signup and view all the answers

What can result from a huge amount of traffic handled by dirty sessions?

<p>High CPU utilization and poor performance (A)</p> Signup and view all the answers

Why is a change in the reply traffic interface often seen in SD-WAN?

<p>To switch to a better performing link (C)</p> Signup and view all the answers

Which FortiGate device routes the reply traffic over port1 in the original direction?

<p>Both FGT-1 and FGT-2 (C)</p> Signup and view all the answers

What happens when auxiliary sessions are enabled on both FortiGate devices?

<p>Both FGT-1 and FGT-2 can offload the session to hardware (C)</p> Signup and view all the answers

How can you enable auxiliary sessions per V-Dom on the FortiGate CLI?

<p>config system settings set auxiliary-session enable end (A)</p> Signup and view all the answers

What does the debug flow sample on FGT-1 show when an auxiliary session is created for an SSH connection?

<p>The index number of the interfaces used for creating the auxiliary session (C)</p> Signup and view all the answers

What is an auxiliary session?

<p>An extension of the main session used for symmetric traffic (D)</p> Signup and view all the answers

How can you reference a member in a firewall policy?

<p>By placing the member in a separate zone and referencing that zone (D)</p> Signup and view all the answers

What does the underlay zone contain in the example firewall policy?

<p>Port1 and port2 as members (D)</p> Signup and view all the answers

What can firewall policy changes lead to?

<p>High CPU utilization (B)</p> Signup and view all the answers

Which sessions are flagged as dirty when the 'check-all' option is enabled?

<p>All impacted sessions (A)</p> Signup and view all the answers

How do you configure SD-WAN firewall policies?

<p>By referencing an SD-WAN zone (C)</p> Signup and view all the answers

Which setting instructs FortiGate to flag all sessions as dirty when a change is made to a firewall policy?

<p>check-all (B)</p> Signup and view all the answers

What is the purpose of flagging sessions as dirty when a change is made to a firewall policy?

<p>To perform a firewall policy lookup for all sessions (B)</p> Signup and view all the answers

What can be done to prevent high CPU utilization when a firewall policy change impacts a large number of sessions?

<p>Set firewall-session-dirty to check-new (B)</p> Signup and view all the answers

When is the firewall-session-dirty setting evaluated?

<p>When a new session is established (D)</p> Signup and view all the answers

What does the presence of the persistent flag in a session indicate?

<p>A new session against the new firewall policy configuration (B)</p> Signup and view all the answers

What is the default value for the firewall-session-dirty setting?

<p>check-all (A)</p> Signup and view all the answers

When can the firewall policy-level setting be used?

<p>When the V-Dom-level setting is set to check-policy-option (A)</p> Signup and view all the answers

What does the may_dirty flag indicate?

<p>A configuration change on the matching policy (D)</p> Signup and view all the answers

What is the purpose of the V-Dom-level setting?

<p>To determine if the firewall policy-level setting can be used (A)</p> Signup and view all the answers

What does the check-policy-option value for the V-Dom-level setting indicate?

<p>To follow the firewall policy-level setting (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser