Refer to the exhibit. The exhibit shows a FortiGate configuration. How does FortiGate handle web proxy traffic coming from the IP address 10.2.1.200, that requires authorization?
A.
It always authorizes the traffic without requiring authentication.
B.
It drops the traffic
C.
It authenticates the traffic using the authentication scheme SCHEME2.
D.
It authenticates the traffic using the authentication scheme SCHEME1.
- FGT Security 7.2 p310
- The application control profile scans for matches in this order:
○ Application and filter overrides: If you have configured any applications overrides or filter overrides, the application control profile considers those first. It looks for a matching override starting at the top of the list, like firewall policies.
○ Categories: Finally, the application control profiles applies the action that you've configured for applications in your selected categories.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
nerdypitt
1 year, 3 months agoDiego_Farani
1 year, 6 months agoAOC
4 years agopollyy
4 years, 2 months ago