ExamGecko
Question list
Search
Search

Question 162 - NSE4_FGT-7.2 discussion

Report
Export

What are two functions of the ZTNA rule? (Choose two.)

A.
It redirects the client request to the access proxy.
Answers
A.
It redirects the client request to the access proxy.
B.
It applies security profiles to protect traffic.
Answers
B.
It applies security profiles to protect traffic.
C.
It defines the access proxy.
Answers
C.
It defines the access proxy.
D.
It enforces access control.
Answers
D.
It enforces access control.
Suggested answer: B, D

Explanation:

A ZTNA rule is a policy that enforces access control and applies security profiles to protect traffic between the client and the access proxy1. A ZTNA rule defines the following parameters1:

Incoming interface: The interface that receives the client request.

Source: The address and user group of the client.

ZTNA tag: The tag that identifies the domain that the client belongs to.

ZTNA server: The server that hosts the access proxy.

Destination: The address of the application that the client wants to access.

Action: The action to take for the traffic that matches the rule. It can be accept, deny, or redirect.

Security profiles: The security features to apply to the traffic, such as antivirus, web filter, application control, and so on.

A ZTNA rule does not redirect the client request to the access proxy. That is the function of a policy route that matches the ZTNA tag and sends the traffic to the ZTNA server2.

A ZTNA rule does not define the access proxy. That is done by creating a ZTNA server object that specifies the IP address, port, and certificate of the access proxy3.

FortiGate Infrastructure 7.2 Study Guide (p.177): 'A ZTNA rule is a proxy policy used to enforce access control. You can define ZTNA tags or tag groups to enforce zero-trust role-based access. To create a rule, type a rule name, and add IP addresses and ZTNA tags or tag groups that are allowed or blocked access. You also select the ZTNA server as the destination. You can also apply security profiles to protect this traffic.'

asked 18/09/2024
Dustin Sickle
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first