Last Updated On : 13-Jan-2026


Fortinet FCSS - SD-WAN 7.6 Architect - FCSS_SDW_AR-7.6 Practice Questions

Total 94 Questions



The smartest way to prepare for your Fortinet FCSS_SDW_AR-7.6 exam isn't just reading—it's practicing. Our Fortinet FCSS - SD-WAN 7.6 Architect practice test bridge gap, transforming your knowledge into a passing score. Familiarize yourself with the exact style and difficulty of the real Fortinet FCSS_SDW_AR-7.6 practice questions, so there are no surprises. Get detailed feedback to identify your strengths and target your weaknesses, making your study time more efficient.


You update the spokes configuration of an existing auto-discovery VPN (ADVPN) topology by adding the parameters shown in the exhibit. Which is a valid objective of those settings? Choose one answer.)



A. Enable the tunnels as overlay links.


B. Convert the configuration from ADVPN to ADVPN 2.0.


C. Prevent cross-overlay shortcuts.


D. Prevent multiple shortcuts from being established over the same overlay.





A.
  Enable the tunnels as overlay links.

Explanation:

Correct Answer: A. Enable the tunnels as overlay links.
The configuration shown enables network-overlay and sets auto-discovery-shortcuts dependent on interfaces HUB-VPN1, HUB-VPN2, and HUB-VPN3 in an Auto-Discovery VPN (ADVPN) topology. In Fortinet SD-WAN, the set network-overlay enable command explicitly registers IPsec VPN tunnels as SD-WAN overlay members, allowing them to participate in SD-WAN rules, load balancing, health checks, and performance SLAs. This integrates the ADVPN shortcuts and hub-spoke tunnels into the SD-WAN fabric for optimized path selection.

Why Other Options Are Incorrect

B. Convert the configuration from ADVPN to ADVPN 2.0: Incorrect, as ADVPN 2.0 involves specific IKEv2 features like Network Overlay ID (not shown here) and enhanced shortcut handling, but this config only adds standard network-overlay to existing phase1-interfaces without version migration commands.​

C. Prevent cross-overlay shortcuts: Incorrect, since auto-discovery-shortcuts dependent actually enables spoke-to-spoke shortcuts dependent on hub connectivity across overlays; it does not block them.

D. Prevent multiple shortcuts from being established over the same overlay: Incorrect, as this setting allows multiple shortcuts per overlay based on traffic demand and doesn't impose per-overlay limits.

Reference
FortiOS 7.6 SD-WAN Administration Guide: Phase 1 configuration parameters, "network-overlay" under IPsec VPN interfaces for ADVPN+SD-WAN integration (Section on ADVPN Shortcuts and Overlay Membership).​

You used the HUB IPsec_Recommended and the BRANCH IPsec_Recommended templates to define the overlay topology. Then, you used the SD-WAN template to define the SD- WAN members, rules, and performance SLAs. You applied the changes to the devices and want to use the FortiManager monitors menu to get a graphical view that shows the status of each SD-WAN member. Which statement best explains how to obtain this graphical view?



A. Use the SD-WAN monitor template view to get a map view of the branches, hub, and tunnel status, including the SLA pass or missed status.


B. Use the SD-WAN monitor table view to get a donut view and a table view that shows the status of each SD-WAN member, including the SLA pass or missed status.


C. Use the VPN monitor map view to get a map view of the branches, hub, and tunnel status, including the SLA pass or missed status.


D. Use the SD-WAN monitor asset view to get a donut view and a table view that shows the status of each device and the SLA status of each SD-WAN member.





B.
  Use the SD-WAN monitor table view to get a donut view and a table view that shows the status of each SD-WAN member, including the SLA pass or missed status.

Explanation:

The correct answer is B. Use the SD-WAN monitor table view to get a donut view and a table view that shows the status of each SD-WAN member, including the SLA pass or missed status.

Here's why this fits best:
In FortiManager 7.6 (which aligns with the FCSS_SDW_AR-7.6 exam scope), when you go to the SD-WAN Monitor section (under SD-WAN Manager > Network > Monitor or sometimes still listed under Device Manager > Monitors > SD-WAN Monitor), there are multiple views available: Map View, Template View, Table View, History View, etc.

The Table View specifically provides:
🔹 A donut chart (or multiple donut charts) at the top showing aggregated status like overall device health, SLA compliance (pass/miss percentages across members), template status, etc.
🔹 A detailed table below listing each SD-WAN member (interfaces/tunnels), with columns for status, health, SLA metrics (pass/miss), bandwidth usage, latency/jitter/loss, and more. You can drill down per device or member for graphs and details.
This matches the question's request for a graphical view of each SD-WAN member's status (including SLA pass/miss).

Quick breakdown of why the others don't fit as well:

A (SD-WAN monitor template view): This is more of a map-style or topology view filtered by a selected SD-WAN Overlay template. It shows branches, hubs, and tunnel status geographically or logically, but it's not the primary place for per-member donut + table details with SLA pass/miss. It's better for overlay-wide visibility rather than granular member status.

C (VPN monitor map view): This is under the older VPN monitoring section. It shows IPsec tunnels on a map but doesn't tie directly into SD-WAN-specific SLA monitoring or member health the way the dedicated SD-WAN Monitor does. Since you used SD-WAN templates (not just plain IPsec), this isn't the right spot.

D (SD-WAN monitor asset view): There is no "asset view" in the standard SD-WAN Monitor tabs in FortiManager 7.6 docs. It seems like a distractor term—maybe confusing it with device asset lists elsewhere.

Reference:
Fortinet's official docs for FortiManager 7.6.5 (Administration Guide) cover this under SD-WAN Monitor sections:
🔹 Main SD-WAN Monitor page describes the views and donut charts for status/SLA.
🔹 Specifically see "SD-WAN monitor table view" for the donut + detailed table combo showing member and SLA status.

Refer to the exhibit.

The exhibit shows the health-check configuration on a FortiGate device used as a spoke. You notice that the hub FortiGate doesn’t prioritize the traffic as expected.
Which two configuration elements should you check on the hub? (Choose two.)



A. The performance SLA has the parameter priority-out-sla configured.


B. This performance SLA uses the same members.


C. The performance SLA uses the same criteria.


D. The performance SLA is configured with set embedded-measure accept.





B.
  This performance SLA uses the same members.

D.
  The performance SLA is configured with set embedded-measure accept.

Explanation:

Correct answers: B and D

Why the hub is not prioritizing traffic as expected
The key detail in the exhibit is this line on the spoke:
🔹 set embed-measured-health enable
This means the spoke is embedding its SD-WAN health measurements into traffic, so the hub must explicitly accept and use those measurements. If the hub is not aligned, prioritization will fail silently.

Now let’s go option by option.

✅ B. This performance SLA uses the same members
Why this is correct
Embedded health only works if both sides reference the same SD-WAN members.
The spoke is embedding health data for:
🔹 set members 3 4
If the hub SLA references different members (or member order does not match), the hub cannot map the received health metrics to its own interfaces. Result: no prioritization based on the embedded data.
This is a very common misconfiguration in hub-and-spoke SD-WAN designs.

✅ D. The performance SLA is configured with set embedded-measure accept
Why this is correct
This is the critical missing piece on the hub.
→ Spoke: set embed-measured-health enable
→ Hub: must have set embedded-measure accept
Without accept, the hub ignores the embedded SLA information, even if everything else matches.

This setting tells the hub:
“Trust and use SLA measurements coming from the spoke.”
No accept = no prioritization.

❌ A. The performance SLA has the parameter priority-out-sla configured
Why this is wrong
priority-out-sla is used for traffic prioritization decisions, but it is not required for embedded health to function.
If embedded health is accepted and members match, the hub can still use the SLA for routing decisions even without this parameter. This option is a distractor.

❌ C. The performance SLA uses the same criteria
Why this is wrong
When using embedded measured health, the hub does not need to actively probe or match SLA criteria such as latency, jitter, or packet loss.
The hub consumes the already-measured values from the spoke. Matching criteria is irrelevant in this context.

Summary
To make embedded SD-WAN health work correctly between spoke and hub:
→ The spoke embeds measurements
→ The hub accepts them
→ Both sides reference the same SD-WAN members

That maps directly to:
✅ B. Same members
✅ D. set embedded-measure accept

Reference (Fortinet documentation)
→ FortiOS SD-WAN Administration Guide
→ FortiOS 7.6 New Features Guide

Refer to the exhibit.

The administrator used the SD-WAN overlay template to prepare an IPsec tunnels configuration for a hub-and-spoke SD-WAN topology. The exhibit shows the FortiManager installation preview for one FortiGate device.
Based on the exhibit, which statement best describes the configuration applied to the FortiGate device?



A. It is a spoke device that establishes dynamic IPsec tunnels to the hub. The local subnet range is 10.10.128.0/23.


B. It is a hub device. It can send ADVPN shortcut offers.


C. It is a hub device. It will automatically discover the spoke devices and add them to the SD-WAN topology.


D. It is a spoke device that establishes dynamic IPsec tunnels to the hub It can send ADVPN shortcut requests.





B.
  It is a hub device. It can send ADVPN shortcut offers.

Explanation:

Correct Answer: B
It is a hub device. It can send ADVPN shortcut offers.
To determine the role of the device (fgt1) and its capabilities, we must look at specific commands within the config vpn ipsec phase1-interface block:

Why it is a Hub: set type dynamic: This indicates the interface is waiting for dial-up connections. In a Hub-and-Spoke topology, the Hub is configured with a dynamic (dial-up) tunnel to allow multiple spokes to connect to a single gateway without needing a static IPsec tunnel for every site.

set mode-cfg enable: The Hub uses Mode Config to assign IP addresses to the spoke tunnel interfaces.

set ipv4-start-ip / ipv4-end-ip: The presence of an IP pool (10.10.128.1 to 10.10.159.252) confirms this device is acting as a server (Hub) that hands out internal tunnel IP addresses to connecting clients (Spokes).

ADVPN Capability (Shortcut Offers):
set auto-discovery-sender enable: This is the specific command that enables a device to send ADVPN shortcut offers.
In the Fortinet ADVPN (Auto-Discovery VPN) process, when the Hub detects traffic passing between two spokes, it sends a "short-cut offer" to the spokes to tell them they can establish a direct tunnel. Only a Hub (the sender of the discovery information) has this set to enable.

Analysis of Incorrect Options

Option A & D: These are incorrect because the device is a Hub, not a Spoke. A Spoke device would have set type static (pointing to the Hub's IP) and would have set auto-discovery-receiver enable (to receive shortcut information) rather than sender.

Option C: This is a distractor. While the Hub "discovers" spokes as they dial in, the phrase "automatically add them to the SD-WAN topology" is technically inaccurate in terms of how the SD-WAN member configuration works. More importantly, it ignores the primary ADVPN function shown in the CLI (auto-discovery-sender).

Reference:
FortiOS 7.6 Administration Guide: Under VPN > ADVPN, the documentation specifies that auto-discovery-sender must be enabled on the Hub to facilitate the signaling required for spokes to establish direct shortcuts.
FortiManager SD-WAN Overlay Template: When selecting the "Hub" role in the FortiManager SD-WAN wizard, these specific CLI commands are generated to support the Hub-and-Spoke ADVPN architecture.

Refer to the exhibits.

You connect to a device behind a branch FortiGate device and initiate a ping test. The device is part of the LAN subnet and its IP address is 10.0.1.101.
Based on the exhibits, which interface uses branch 1_fgt to steer the test traffic?



A. port4


B. HUB1-VPN1


C. port1


D. port2





C.
  port1

Explanation:

Option A: port4 ❌ (Incorrect)
port4 is listed first in the Internet rule's path sequence, but the presence of a path_last_used marker only on port2 implicitly indicates port4 is inactive or unhealthy. FortiGate SD-WAN skips members that fail SLA or health checks. Since the active ping session was not logged as using port4, this interface was not selected for steering the test traffic.

Option B: HUB1-VPN1 ❌ (Incorrect)
HUB1-VPN1 is a VPN tunnel defined in the "Corp" rule, which exclusively matches traffic destined for the 10.0.0.0/8 corporate network. The ping destination (Facebook's public IP 157.240.19.35) is not within this private range. Therefore, this rule is not evaluated, and the VPN tunnel is not a candidate interface for this Internet-bound flow.

Option C: port1 ✅ (Correct)
The general Internet rule matches the traffic. Its member order is port4, port2, port1. With port4 likely unhealthy and port2 recently used for another session, the FortiGate's load-balancing or priority logic selects the next available member, port1, for the new ping flow. This aligns with the rule's hit count increment and the absence of port4/port2 as the new session's path.

Option D: port2 ❌ (Incorrect)
Although port2 is a member of the matched Internet rule and has a path_last_used timestamp, this denotes a prior session, not the current test. For a new session, the SD-WAN algorithm evaluates member status and order. Given the sequence and the likely bypass of port4, port1 becomes the chosen interface. Port2 was not selected for this specific ping operation.

Reference & Key Concept
Fortinet SD-WAN Rule Evaluation Order: Rules are evaluated top-down. The first matching rule based on source, destination, and application determines the steering.
Application-Based SD-WAN Steering: The FortiGate uses the Internet Service Database to identify applications (like Facebook) and can steer them based on rules that include application criteria.
Path Selection: Within a matched rule, the SD-WAN algorithm selects a healthy member from the configured list based on priority, SLA, or load-balancing method.

Refer to the exhibit that shows event logs on FortiGate.

Based on the output shown in the exhibit, what can you say about the tunnels on this device?



A. The master tunnel HU82-VPN3 cannot accept ADVPN shortcuts.


B. The device steers voice traffic through the VPN tunnel HUB1-VPN3.


C. The VPN tunnel HUB1-VPN1_0 is a shortcut tunnel.


D. There is one shortcut tunnel built from master tunnel VPN4.





C.
  The VPN tunnel HUB1-VPN1_0 is a shortcut tunnel.

Explanation:

Looking at the event logs, here's what's actually happening:

Entry 8 (line starting with "8:") shows:
🔹 action="tunnel-stats"
🔹 remip="192.2.0.1"
🔹 assignip=172.168.1.1
🔹 vpntunnel="HUB1-VPN1_0"
🔹 tunnelid=3050027486
🔹 tunneltype="ipsec"

Entry 9 shows:
🔹 action="tunnel-stats"
🔹 remip="172.16.1.1"
🔹 assignip=192.168.1.193
🔹 vpntunnel="HUB2-VPN3"
🔹 tunnelid=3050027467
🔹 tunneltype="ipsec"

The key indicator is the tunnel naming convention. In Fortinet ADVPN:
🔹 Master tunnels use simple names like "HUB1-VPN3" or "HUB2-VPN3"
🔹 Shortcut tunnels append _0, _1, _2 etc. to indicate dynamically created shortcuts
HUB1-VPN1_0 follows the shortcut naming pattern with the _0 suffix.

Why other answers are wrong:

A is wrong: Entry 6 shows vpntunnel="HUB2-VPN3" with status="up". Nothing in the logs indicates it cannot accept ADVPN shortcuts. The tunnel is functioning normally.

B is wrong: Entry 6 shows SD-WAN traffic (subtype="sdwan") with health checks, but there's no specific indication that voice traffic is being steered through HUB1-VPN3. The logs show general tunnel statistics, not application-specific routing decisions.

D is wrong: There's no mention of "VPN4" anywhere in these logs. The tunnels shown are HUB1-VPN1_0, HUB2-VPN3, and references to HUB1-VPN3 in entry 6.

Reference: FortiOS SD-WAN documentation on ADVPN (Auto Discovery VPN) shortcut tunnel naming conventions and tunnel statistics logging.

Refer to the exhibits.
You use FortiManager to configure SD-WAN on three branch devices.

When you install the device settings, FortiManager prompts you with the error “Copy Failed” for the device branch1_fgt. When you click the log button, FortiManager displays the message shown in the exhibit.
There are two different ways to resolve this issue. Based on the exhibits, which methods could you use? (Choose two.)



A. Update the management IP address of branch1_fgt.


B. Specify the gateway of the SD-WAN member port1 with an IP address or use the default value.


C. Do not define installation targets for SD-WAN members.


D. Review the per-device mapping configuration for metadata variables





B.
  Specify the gateway of the SD-WAN member port1 with an IP address or use the default value.

D.
  Review the per-device mapping configuration for metadata variables

Explanation:

The correct answers are B and D.
B. Specify the gateway of the SD-WAN member port1 with an IP address or use the default value.
D. Review the per-device mapping configuration for metadata variables.

Here's the reasoning based on the exhibits:
The error in the install log is crystal clear:
error -999 - ... invalid ip prop[gateway]: ipclass($sdwan_port1_gw)) invalid ip addr
This happens during the copy/commit phase when FortiManager tries to push the SD-WAN zone member configuration for port1 on branch1_fgt. The gateway is set to $sdwan_port1_gw (a metadata variable), but FortiManager can't resolve it to a valid IP address for that device.
In FortiManager SD-WAN templates (especially when using variables like $sdwan_portX_gw for per-device differences in branch gateways), the variable must resolve to a proper IPv4 address (or be blank/default in some cases). If the per-device mapping is missing, empty, or has junk (non-IP value), you get exactly this -999 invalid IP error on install.

Why B works:
You can bypass the variable entirely for that member by hardcoding a valid gateway IP directly in the template for port1 (or using 0.0.0.0 if it's dynamic/DHCP). This avoids the variable lookup failure. It's a quick fix if you don't need per-device variability for that link.

Why D works:
The root cause is almost always a bad/missing per-device mapping for the metadata variable $sdwan_port1_gw on branch1_fgt. Go to Policy & Objects > Advanced > Metadata Variables, find the variable, then check/edit the Per-Device Mapping tab. Make sure branch1_fgt has a valid IP entered (e.g., the actual next-hop gateway for its port1). Save, re-validate, and install again. This is the cleanest way when using centralized templates across branches with different ISP gateways.

Why not the others?

A (Update management IP of branch1_fgt): Management IP is unrelated to SD-WAN gateway validation during install. The device connects fine (other branches succeeded), so this isn't it.

C (Do not define installation targets for SD-WAN members): The exhibit shows installation targets are used (e.g., "1 Device in Total" on some, specific branch on others), but that's normal and required for per-device mapping to kick in. Removing targets would break variable resolution even more, not fix it.

Reference:
Fortinet docs (FortiManager 7.x Administration Guide, SD-WAN Templates section) and community articles stress that metadata variables for SD-WAN member gateways must have valid IP values in per-device mappings, or install fails with invalid IP errors. See also resolved issues in some FortiManager release notes around metadata/IP validation during install.

Page 1 out of 14 Pages

Why Prepare with PrepForti FCSS_SDW_AR-7.6 Practice Test?

Choosing the right preparation material is critical for passing the Fortinet FCSS - SD-WAN 7.6 Architect exam. Here’s how our FCSS_SDW_AR-7.6 practice test is designed to bridge the gap between knowledge and a passing score.

Experience the Real Exam Format:


Familiarize yourself with the exact style, difficulty, and question types you will encounter on the official Fortinet exam. Our FCSS - SD-WAN 7.6 ArchitectFCSS_SDW_AR-7.6 test questions, like the samples on this page, cover specific technical scenarios and MCQs to ensure there are no surprises on test day.

Turn Knowledge into Application:


The smartest way to prepare isn't just reading - it's practicing. Our FCSS - SD-WAN 7.6 Architect practice test questions transforms your theoretical understanding into practical problem-solving skills, exactly what is required to pass.

Learn with Detailed Explanations:


All FCSS_SDW_AR-7.6 exam questions comes with a comprehensive summary and a breakdown of why the correct option is right and the others are wrong. This detailed feedback helps you identify your strengths and target your weaknesses, making your FCSS - SD-WAN 7.6 Architect study time far more efficient.



Experience the Real Exam Now!

10 Must-Know Strategies to Pass Your Fortinet FCSS SD-WAN 7.6 Architect Exam


1. Architect, Dont Just Configure

Move beyond memorizing CLI commands. Focus on why you design a topology a certain way. Understand how design choices impact performance, security, and high availability.

2. Master the "Fortinet Security Fabric" Integration

This is crucial. Know how SD-WAN seamlessly integrates with FortiGate, FortiManager, and FortiAnalyzer for centralized management and unified threat protection.

3. Get Hands-On with Performance SLA Logic

Dont just define SLAs—predict how they will behave. Know exactly how metrics like latency and jitter trigger link failover and application steering.

4. Diagram Core Topologies

Sketch out Active-Active, Active-Passive, and Hub-and-Spoke deployments from memory. Understand the traffic flow and failure scenarios for each.

5. Know Your Application Steering Inside Out

Distinguish between manual, SLA-based, and shortest-path steering rules. Be ready to choose the correct method for business-critical versus best-effort apps.

6. Isolate Troubleshooting Domains

When presented with a problem, systematically isolate it: Is it a BGP/OSPF routing issue, an SLA misconfiguration, or an application rule conflict?

7. Prioritize Security-Driven Design

Remember, this is a Fortinet exam. Weave security policies (like IPS and SSL inspection) directly into your SD-WAN design scenarios.

8. Calculate Your Time Wisely
With 60 FCSS_SDW_AR-7.6 exam questions in 105 minutes, you have just under 1.75 minutes per question. Flag tough ones and move on to ensure you complete the exam.

9. Focus on Real-World Scenarios

Fortinet FCSS SD-WAN 7.6 Architect exam questions are scenario-based. Practice interpreting business requirements (e.g., "ensure VoIP quality") and translating them into technical configurations.

10. Validate Knowledge with Realistic Practice

Reading alone is not enough. Test your applied knowledge with challenging, scenario-based FCSS SD-WAN 7.6 Architect practice questions that mirror the test difficulty. High-quality FCSS_SDW_AR-7.6 practice tests from PrepForti.com are invaluable here, helping you identify weak spots and build exam-day confidence.

Ready to test your readiness? Try the targeted FCSS_SDW_AR-7.6 practice exam to simulate the real test and secure your passing score.

Fortinet FCSS - SD-WAN 7.6 Architect Practice Exam Questions