List of questions
Related questions
Question 32 - NSE8_812 discussion
A remote worker requests access to an SSH server inside the network. You deployed a ZTNA Rule to their FortiClient. You need to follow the security requirements to inspect this traffic.
Which two statements are true regarding the requirements? (Choose two.)
A.
FortiGate can perform SSH access proxy host-key validation.
B.
You need to configure a FortiClient SSL-VPN tunnel to inspect the SSH traffic.
C.
SSH traffic is tunneled between the client and the access proxy over HTTPS
D.
Traffic is discarded as ZTNA does not support SSH connection rules
Your answer:
0 comments
Sorted by
Leave a comment first