You are asked to design a secure solution using Fortinet products for a company. The company recently has Web servers that were exploited and defaced. The customer has also experienced Denial or Service due to SYN Flood attacks. Taking this into consideration, the customers solution should have the following requirements:- management requires network-based content filtering with man-in-the-middle inspection- the customer has no existing public key infrastructure but requires centralized certificate management- users are tracked by their active directory username without installing any software on their hosts- Web servers that have been exploited need to be protected from the OWASP Top 10- notification of high volume SYN Flood attacks when a threshold has been triggeredWhich three solutions satisfy these requirements? (Choose three.)
A customer just bought an additional FortiGate device and plans to use their existing load balancer to distribute traffic across two FortiGate units participating on aBGP network serving different neighbors. The customer has mixed traffic of IPv4 and IPv6 TCP, UDP, and ICMP. The two FortiGate devices shown in the exhibit should be redundant to each other so that the NAT session and active session tables will synchronize and fail over to the unit that is still operating without any loss of data if one of the units fail.Which high availability solution would you implement?
A university is looking for a solution with the following requirements:- wired and wireless connectivity- authentication (LDAP)- Web filtering, DLP and application control- data base integration using LDAP to provide access to those students who are up-to-date with their monthly payments- support for an external captive portalWhich solution meets these requirements?
A customer wants to secure the network shown in the exhibit with a full redundancy design.Which security design would you use?
A customer has the following requirements:- local peer with two Internet links- remote peer with one Internet link- secure traffic between the two peers- granular control with Accept policiesWhich solution provides security and redundancy for traffic between the two peers?
How would you apply security to the network shown in the exhibit?