Questions for the NSE8-812 were updated on : Dec 01 ,2025
Refer to the exhibits.
A customer is trying to restore a VPN connection configured on a FortiGate. Exhibits show output
during a troubleshooting session when the VPN was working and the current baseline VPN
configuration.
Which configuration parameters will restore VPN connectivity based on the diagnostic output?
A.
B.
C.
D.
C
Refer to the exhibit.
The Company Corp administrator has enabled Workflow mode in FortiManager and has assigned
approval roles to the current administrators. However, workflow approval does not function as
expected. The CTO is currently unable to approve submitted changes.
Given the exhibit, which two possible solutions will resolve the workflow approval problems with the
Workflow_72 ADOM? (Choose two.)
A, C
Refer to the exhibit of a FortiNAC configuration.
In this scenario, which two statements are correct? (Choose two.)
C, D
Explanation:
C . The IP address of the FortiSwitch is 10.12.240.2:
This statement is correct based on the exhibit and your clarification. The exhibit lists the "IP Address"
as 10.12.240.2 across multiple entries, including ports and VLANs associated with the device "sup-
fgt-hw" (FortiSwitch). Your reasoning indicates that this IP is the management address of the
FortiSwitch, as it is consistently shown as the IP for the device containing the ports. In Fortinet’s
architecture, as described in the NSE 8 study guide, the management IP of a FortiSwitch is typically
configured and visible in such configurations, especially when integrated with FortiGate and
FortiNAC. The "Device" column labeling "sup-fgt-hw" further supports that this is the FortiSwitch,
and the IP 10.12.240.2 is its management address. This aligns with FortiSwitch management and
integration details in the NSE 8 study guide.
D . An unknown host is connected to port3:
This statement is correct as the exhibit highlights port3 under the "Name" column for the device
"sup-fgt-hw" with a "Rogue Host" status in the "Connection" column, an IP address of 10.12.240.2, a
Default VLAN of 100, and an Operational Status of "Link Up." In FortiNAC, a "Rogue Host" indicates
an unknown or unauthorized device connected to the network, which FortiNAC identifies for further
action or isolation. This is consistent with FortiNAC’s capabilities for detecting and classifying
unknown devices, as detailed in the NSE 8 study guide under network access control and rogue
device detection.
Why A and B are incorrect:
A . A device that is modeled in FortiNAC is connected on VLAN_4093: This is incorrect based on your
clarification that there is no device connected on that port—it is simply the default VLAN (4093) for
that entry. The exhibit shows VLAN_4093 with a "Not Connected" status and "Link Up" operational
status, but no active device connection is indicated. The NSE 8 study guide emphasizes that FortiNAC
requires an active connection and device profiling for a device to be considered "connected," which
is not evident here for VLAN_4093.
B . Port8 is connected to a FortiGate in FortiLink mode: This is incorrect because the exhibit shows
port8 with a "Learned Uplink" status, which, as you noted, refers to any kind of uplink and does not
specifically indicate FortiLink mode. FortiLink mode is a specific configuration between FortiGate and
FortiSwitch requiring explicit settings, which are not mentioned or implied in the exhibit. The NSE 8
study guide clarifies that FortiLink mode involves distinct configuration details (e.g., FortiLink
interfaces), which are absent here.
Fortinet Network Security Expert 8 Study Guide Reference:
FortiNAC 7.2 Admin Guide (NSE 8): Sections on Device Visibility, VLAN Management, and Rogue
Device Detection.
FortiSwitch 7.2 Admin Guide (NSE 8): Sections on FortiLink Configuration, Network Segmentation,
and Management IP Configuration.
FortiGate 7.2 Admin Guide (NSE 8): Sections on Integration with FortiNAC and FortiSwitch for
Network Security.
Refer to the exhibit.
You need to create a base SD-WAN configuration that includes SD-WAN rules and Performance SLAs
for spoke sites with various connectivity types. It needs to be done in a way that can be easily applied
to new sites with a minimum amount of change. How should you create the SD-WAN zones?
A
A Hub FortiGate is connecting multiple branch FortiGate devices separating the traffic centrally in
unique VRFs. Routing information is exchanged using BGP between the Hub and the Branch
FortiGate devices.
You want to efficiently enable route leaking of specific routes between the VRFs.
Which two steps are required to achieve this requirement? (Choose two.)
AD
Explanation:
https://docs.fortinet.com/document/fortigate/7.0.1/administration-guide/834664/route-leaking-
between-vrfs-with-bgp
A FortiGate deployment contains the following configuration:
What is the result of this configuration?
D
Explanation:
https://docs.fortinet.com/document/fortigate/7.2.4/administration-guide/105611
You have configured a Site-to-Site IPsec VPN tunnel between a FortiGate and a third-party device but
notice that one of the error counters on the tunnel interface keeps increasing.
Which two configuration options can resolve this problem? (Choose two.)
C, D
Refer to the exhibits.
You must integrate a FortiMail and FortiSandbox Enhanced Cloud solution for a customer who is
concerned about the e-mails being delayed for too long.
According to the configuration shown in the exhibits, which would be an expected behavior?
A
A FortiGate must be configured to accept VoIP traffic which will include session initiation protocol
(SIP) traffic. Which statement about the VoIP configuration options is correct?
C
Refer to the exhibit.
A customer reports that they are not able to reach subnet 10.10.10.0/24 from their FortiGate device.
Based on the exhibit, what should you do to correct the situation?
C
Refer to the exhibits, which show a network topology and VPN configuration.
A network administrator has been tasked with modifying the existing dial-up IPsec VPN infrastructure
to detect the path quality to the remote endpoints.
After applying the configuration shown in the configuration exhibit, the VPN clients can still connect
and access the protected 172.16.205.0/24 network, but no SLA information shows up for the client
tunnels when issuing the diagnose sys link-monitor tunnel all command on the FortiGate CLI.
What is wrong with the configuration?
A
Which two types of interface have built-in active bypass in FortiDDoS devices? (Choose two.)
BD
Explanation:
https://help.fortinet.com/fddos/4-3-0/FortiDDoS/Built_in_bypass.htm
Refer to the exhibits.
During the implementation of a Fortinet Security Fabric configuration, CLI commands were issued in
the order shown in the exhibit. On the next day, the local admin for FGTC issues the following
command:
FGTC # config system csf
set configuration-sync default
end
In this scenario, which outcome is true regarding the "subnet_1" firewall address object on FGTC?
D
A FortiGate is configured to perform outbound firewall authentication with Azure AD as a SAML IdP.
What are two valid interactions that occur when the client attempts to access the internet? (Choose
two.)
A, B
Refer to the exhibit.
A customer is trying to setup a Playbook automation using a FortiAnalyzer, FortiWeb and FortiGate.
The intention is to have the FortiGate quarantine any source of SQL Injection detected by the
FortiWeb. They got the automation stitch to trigger on the FortiGate when simulating an attack to
their website, but the quarantine object was created with the IP 0.0.0.0. Referring to the
configuration and logs in the exhibits, which two statements are true? (Choose two.)
A, D