ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 32 - NSE8_812 discussion

Report
Export

A remote worker requests access to an SSH server inside the network. You deployed a ZTNA Rule to their FortiClient. You need to follow the security requirements to inspect this traffic.

Which two statements are true regarding the requirements? (Choose two.)

A.
FortiGate can perform SSH access proxy host-key validation.
Answers
A.
FortiGate can perform SSH access proxy host-key validation.
B.
You need to configure a FortiClient SSL-VPN tunnel to inspect the SSH traffic.
Answers
B.
You need to configure a FortiClient SSL-VPN tunnel to inspect the SSH traffic.
C.
SSH traffic is tunneled between the client and the access proxy over HTTPS
Answers
C.
SSH traffic is tunneled between the client and the access proxy over HTTPS
D.
Traffic is discarded as ZTNA does not support SSH connection rules
Answers
D.
Traffic is discarded as ZTNA does not support SSH connection rules
Suggested answer: A, C

Explanation:

ZTNA supports SSH connection rules that allow remote workers to access SSH servers inside the network through an HTTPS tunnel between the client and the access proxy (FortiGate). The access proxy acts as an SSH client to connect to the real SSH server on behalf of the user, and performs hostkey validation to verify the identity of the server. The user can use any SSH client that supports HTTPS proxy settings, such as PuTTY or OpenSSH. Reference:

https://docs.fortinet.com/document/fortigate/7.0.0/ztna-deployment/899992/configuring-ztnarules-to-control-access

asked 18/09/2024
Sacha CONTI
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first