Fortinet FCSS_SDW_AR-7.6 Exam (page: 2)
Fortinet FCSS - SD-WAN 7.6 Architect
Updated on: 31-Mar-2026

Viewing Page 2 of 13

Refer to the exhibit.



An administrator configures SD-WAN rules for a DIA setup using the FortiGate GUI. The page to configure the source and destination part of the rule looks as shown in the exhibit. The GUI page shows no option to configure an application as the destination of the SD-WAN rule Why?

  1. You cannot use applications as the destination when FortiGate is used for a DIA setup.
  2. FortiGate allows the configuration of applications as the destination of SD-WAN rules only on the CLI.
  3. You must enable the feature on the CLI.
  4. You must enable the feature first using the GUI menu System > Feature Visibility.

Answer(s): D



You are planning a new SD-WAN deployment with the following criteria:

- Two regions

- Most of the traffic is expected to remain within its region

- No requirement for inter-region ADVPN

To remain within the recommended best practices, which routing protocol should you select for the overlays?

  1. OSPF for the routing within each region and EBGP between the regions.
  2. IBGP with BGP on loopback within each region and EBGP between the regions.
  3. IBGP with BGP per overlays within each region and IBGP with BGP on loopback between the regions.
  4. IBGP within each region and between the regions.

Answer(s): B

Explanation:

For SD-WAN deployments that span multiple regions--where most traffic is intra-region and there is no requirement for inter-region ADVPN--the best practice is to use IBGP with BGP on loopback interfaces for routing within each region and EBGP between the regions. This approach ensures robust and scalable routing, isolates regional routing domains, and enables policy control at region boundaries. BGP on loopback is preferred for its reliability and flexibility, as it enables peering that is not tied to specific physical interfaces. EBGP between regions allows each region to maintain independent routing policies and summarization, optimizing performance and manageability. By separating IBGP (intra-region) and EBGP (inter-region), you create a modular architecture that scales easily and simplifies fault isolation and troubleshooting.


Reference:

Fortinet SD-WAN Reference Architecture Guide 7.4, "Regional Routing Best Practices"

FortiOS 7.4 SD-WAN Overlay Design Guidelines



Exhibit.



The administrator configured the IPsec tunnel VPN1 on a FortiGate device with the parameters shown in exhibit.

Based on the configuration, which three conclusions can you draw about the characteristics and requirements of the VPN tunnel? (Choose three.)

  1. The tunnel interface IP address on the spoke side is provided by the hub.
  2. The remote end can be a third-party IPsec device.
  3. The administrator must manually assign the tunnel interface IP address on the hub side
  4. The remote end must support IKEv2.
  5. This configuration allows user-defined overlay IP addresses.

Answer(s): B,C,E

Explanation:

This configuration demonstrates a typical IPsec setup for SD-WAN overlays where the hub side requires a manually defined tunnel IP address, and the spoke can be flexibly configured, including interoperability with third-party IPsec devices. As described in the Fortinet SD-WAN Architect Guide:
"For some overlays, the tunnel interface IP is configured statically on the hub side, which allows more control over overlay subnetting and facilitates the use of user-defined overlay IP addresses. This approach is also a requirement for compatibility with non-FortiGate endpoints, such as third- party IPsec devices that may not support dynamic address assignment via IKE or proprietary mechanisms." This enables hybrid SD-WAN environments and advanced designs involving external partners or cloud services. Overlay IP flexibility is critical for route control and segmentation.


Reference:

FortiOS 7.4 SD-WAN Reference Architecture, "Overlay IP Address Management"

SD-WAN 7.4 Concept Guide, Section: "Interoperability with Third-Party Devices"



You have a FortiGate configuration with three user-defined SD-WAN zones and two members in each of these zones. One SD-WAN member is no longer in use in health-check and SD-WAN rules. You want to delete it.

What happens if you delete the SD-WAN member from the FortiGate GUI?

  1. FodiGate accepts the deletion and removes routes as required.
  2. FortiGate displays an error message. You must use the CLI to delete an SD-WAN member.
  3. FortiGate displays an error message. SD-WAN zones must contain at least two members
  4. FortiGate accepts the deletion and places the member in the default SD-WAN zone.

Answer(s): A



Refer to the exhibits.



The exhibits show the source NAT (SNAT) global setting. port2 interface settings, and the routing table on FortiGate.

The administrator increases the member priority on port2 to 20.

Upon configuration changes and the receipt of new packets, which two actions does FortiGate perform on existing sessions established over port2? (Choose two.)

  1. FortiGate continues routing all existing sessions over port2.
  2. FortiGate routes only new sessions over port2.
  3. FortiGate flags the SNAT session as dirty only if the administrator has assigned an IP pool to the firewall policies with NAT.
  4. FortiGate flags the sessions as dirty.
  5. FortiGate updates the gateway information of the sessions with SNAT so that they use port1 instead of port2.

Answer(s): D,E

Explanation:

When the member priority of a port is increased (e.g., port2 to 20), FortiGate evaluates existing sessions and applies "dirty" flags where applicable. The SD-WAN session management mechanism is described in detail: "Upon a change in SD-WAN member priority, all existing sessions using that member are marked as dirty. For SNAT sessions, the gateway information is updated to ensure future packets are routed through the newly preferred member, in this case, port1. This automatic re- evaluation allows SD-WAN to dynamically respond to topology or priority changes, maintaining optimal routing." This is fundamental to seamless failover and session persistence in Fortinet SD- WAN, ensuring active flows are redirected based on updated priorities or health status.


Reference:

FortiOS 7.4 SD-WAN Concept Guide, "Session Management During Path Change"

FortiGate CLI diagnose sys session list



Refer to the exhibits.



The exhibits show the configuration for SD-WAN performance. SD-WAN rule, the application IDs of Facebook and YouTube along with the firewall policy configuration and the underlay zone status.

Which two statements are true about the health and performance of SD-WAN members 3 and 4? (Choose two.)

  1. Only related TCP traffic is used for performance measurement.
  2. The performance is an average of the metrics measured for Facebook and YouTube traffic passing through the member.
  3. Encrypted traffic is not used for the performance measurement.
  4. FortiGate identifies the member as dead when there is no Facebook and YouTube traffic passing through the member.

Answer(s): B,D



When you use the command diagnose sys session list, how do you identify the sessions that correspond to traffic steered according to SD-WAN rules?

  1. You identify sessions steered according to SD-WAN rules with the flag vwl.
  2. You cannot identify SD-WAN sessions. You must use the sdwar. session filter.
  3. You identify sessions steered according to SD-WAN rules with the data vwl_mbr_seq.
  4. You identify sessions steered according to SD-WAN rules with the data 3dwan_service_id.

Answer(s): D

Explanation:

When using the diagnose sys session list command, SD-WAN-specific session steering is indicated by the presence of the sdwan_service_id field in the session data. This identifier ties the session directly to a specific SD-WAN rule or service. As noted in the Fortinet documentation: "Sessions that are handled according to SD-WAN rules will include a service ID tag (sdwan_service_id) in their session listing. This allows administrators to correlate live sessions with SD-WAN policy matches for troubleshooting and visibility." This is a crucial diagnostic tool, as it distinguishes between traffic managed by traditional routing and that explicitly controlled by SD-WAN steering logic, aiding in operational insight and troubleshooting.


Reference:

FortiOS 7.4 CLI Reference, "diagnose sys session list: SD-WAN Service ID Tagging"

SD-WAN 7.4 Concept Guide, Section: "Session Identification for SD-WAN Traffic"



SD-WAN interacts with many other FortiGate features. Some of them are required to allow SD-WAN to steer the traffic.

Which three configuration elements that you must configure before FortiGate can steer traffic according to SD-WAN rules? (Choose three.)

  1. Firewall policies
  2. Interfaces
  3. Security profiles
  4. Traffic shaping
  5. Routing

Answer(s): A,B,E

Explanation:

Before FortiGate can steer traffic according to SD-WAN rules, certain configuration elements must be present. The guide states:
"SD-WAN is not a standalone feature and interacts with several fundamental FortiGate configurations. Specifically, you must: (1) Define the interfaces (physical, VLAN, or IPsec) that will act as SD-WAN members, (2) Create firewall policies to allow traffic to be steered by SD-WAN, and (3) Set up routing so that traffic has valid routes via SD-WAN members. Without these, SD-WAN rules will not be able to match or steer any traffic."
Security profiles and traffic shaping are not mandatory for basic SD-WAN steering but can be layered on for enhanced security and QoS once foundational elements are present.


Reference:

FortiOS 7.4 SD-WAN Concept Guide, "Prerequisite Configuration Elements for SD-WAN Steering



Viewing Page 2 of 13



Share your comments for Fortinet FCSS_SDW_AR-7.6 exam with other users:

Anna 1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?
KOREA REPUBLIC OF


Bhavya 9/13/2023 10:15:00 AM

very usefull
Anonymous


Rahul Kumar 8/31/2023 12:30:00 PM

need certification.
CANADA


Diran Ole 9/17/2023 5:15:00 PM

great exam prep
CANADA


Venkata Subbarao Bandaru 6/24/2023 8:45:00 AM

i require dump
Anonymous


D 7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,
Anonymous


Ann 9/15/2023 5:39:00 PM

hi can you please upload the dumps for sap contingent module. thanks
AUSTRALIA


Sridhar 1/16/2024 9:19:00 PM

good questions
Anonymous


Summer 10/4/2023 9:57:00 PM

looking forward to the real exam
Anonymous


vv 12/2/2023 2:45:00 PM

good ones for exam preparation
UNITED STATES


Danny Zas 9/15/2023 4:45:00 AM

this is a good experience
UNITED STATES


SM 1211 10/12/2023 10:06:00 PM

hi everyone
UNITED STATES


A 10/2/2023 6:08:00 PM

waiting for the dump. please upload.
UNITED STATES


Anonymous 7/16/2023 11:05:00 AM

upload cks exam questions
Anonymous


Johan 12/13/2023 8:16:00 AM

awesome training material
NETHERLANDS


PC 7/28/2023 3:49:00 PM

where is dump
Anonymous


YoloStar Yoloing 10/22/2023 9:58:00 PM

q. 289 - the correct answer should be b not d, since the question asks for the most secure way to provide access to a s3 bucket (a single one), and by principle of the least privilege you should not be giving access to all buckets.
Anonymous


Zelalem Nega 5/14/2023 12:45:00 PM

please i need if possible h12-831,
UNITED KINGDOM


unknown-R 11/23/2023 7:36:00 AM

good collection of questions and solution for pl500 certification
UNITED STATES


Swaminathan 5/11/2023 9:59:00 AM

i would like to appear the exam.
Anonymous


Veenu 10/24/2023 6:26:00 AM

i am very happy as i cleared my comptia a+ 220-1101 exam. i studied from as it has all exam dumps and mock tests available. i got 91% on the test.
Anonymous


Karan 5/17/2023 4:26:00 AM

need this dump
Anonymous


Ramesh Kutumbaka 12/30/2023 11:17:00 PM

its really good to eventuate knowledge before appearing for the actual exam.
Anonymous


anonymous 7/20/2023 10:31:00 PM

this is great
CANADA


Xenofon 6/26/2023 9:35:00 AM

please i want the questions to pass the exam
UNITED STATES


Diego 1/21/2024 8:21:00 PM

i need to pass exam
Anonymous


Vichhai 12/25/2023 3:25:00 AM

great, i appreciate it.
AUSTRALIA


P Simon 8/25/2023 2:39:00 AM

please could you upload (isc)2 certified in cybersecurity (cc) exam questions
SOUTH AFRICA


Karim 10/8/2023 8:34:00 PM

good questions, wrong answers
Anonymous


Itumeleng 1/6/2024 12:53:00 PM

im preparing for exams
Anonymous


MS 1/19/2024 2:56:00 PM

question no: 42 isnt azure vm an iaas solution? so, shouldnt the answer be "no"?
Anonymous


keylly 11/28/2023 10:10:00 AM

im study azure
Anonymous


dorcas 9/22/2023 8:08:00 AM

i need this now
Anonymous


treyf 11/9/2023 5:13:00 AM

i took the aws saa-c03 test and scored 935/1000. it has all the exam dumps and important info.
UNITED STATES