What must the admin...
 
Notifications
Clear all

What must the administrator do to avoid this problem?

1 Posts
1 Users
0 Likes
89 Views
 Coy
(@millotcoy)
Posts: 688
Noble Member
Topic starter
 

Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers .

What must the administrator do to avoid this problem? (Choose two.)

  • A . Enable the Use X-Forwarded-For setting on FortiWeb.
    B. No Special configuration is required; connectivity will be re-established after the set timeout.
    C. Place FortiWeb in front of FortiADC.
    D. Enable the Add X-Forwarded-For setting on FortiWeb.

Show Answer Hide Answer

Suggested Answer: A, C

Explanation:

Configure your load balancer to insert or append to an X-Forwarded-For:, X-Real-IP:, or other HTTP X-header. Also configure FortiWeb to find the original attacker’s or client’s IP address in that HTTP header

Reference: https://help.fortinet.com/fweb/560/Content/FortiWeb/fortiweb-admin/planning_topology.htm
 
Posted : 05/02/2023 12:32 am

Latest Fortinet NSE6_FWB-6.4 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: