Refer to the exhibit.
The exhibit shows proxy policies and proxy addresses, the authentication rule and authentication scheme, users, and firewall address.
An explicit web proxy is configured for subnet range 10.0.1.0/24 with three explicit web proxy policies.
The authentication rule is configured to authenticate HTTP requests for subnet range 10.0.1.0/24 with a form-based authentication scheme for the FortiGate local user database. Users will be prompted for authentication.
How will FortiGate process the traffic when the HTTP request comes from a machine with the source IP 10.0.1.10 to the destination http:// www.fortinet.com? (Choose two.)
sahilk
Highly Voted 3 years, 8 months agokkkvo
3 years, 8 months agoCarol254
3 years, 3 months agothissiteisgreat
Highly Voted 3 years, 10 months agocessyang
3 years, 10 months agoEist
Most Recent 1 year, 7 months agoJuanTrabal
2 years, 9 months agomesql
2 years, 9 months agoSandroAlex
3 years, 1 month agoxYanivDx
3 years, 2 months agoScottXYZ
3 years, 5 months agoSeph1
3 years, 8 months ago2021gene
3 years, 8 months ago