Last Updated On : 13-Jan-2026


Fortinet FCSS - SD-WAN 7.6 Architect - FCSS_SDW_AR-7.6 Practice Questions

Total 94 Questions


You plan a large SD-WAN deployment for a global company. You want to divide the network architecture into five geographical regions and install two hubs in each region for increased redundancy. You expect a significant amount of traffic within each region and limited traffic flow between spokes in different regions. You plan to connect the small branch sites to only the closest hub in their regions and the large branch sites to the two hubs in the regions. Which statement about your plan is true? (Choose one answer)



A. It is possible. You should use eBGP as the routing protocol between the regions.


B. It is not possible. FortiOS 7.6 supports multihub topologies with up to four hubs.


C. It is possible. You should use FortiManager and the overlay orchestrator multihub topology to simplify the deployment.


D. It is not possible. In a region, all spokes must have either single-hub or dual-hub connectivity.





B.
  It is not possible. FortiOS 7.6 supports multihub topologies with up to four hubs.

Explanation:

Summary: Designing for Regional Traffic Patterns
You're designing a hub-and-spoke SD-WAN for a global company. The key design goals are:

➡️ Geographic Segmentation: Split the network into five regions to keep most traffic local.
➡️ Regional Redundancy: Use two hubs per region (10 hubs total).
➡️ Flexible Spoke Connectivity: Allow small branches to connect to just one hub for simplicity/cost, while large branches connect to both for high availability.
➡️ Minimize Cross-Region Traffic: Spokes in different regions shouldn't talk directly to each other.

The question asks whether this specific, nuanced design is architecturally possible with FortiOS 7.6.

Detailed Answer Breakdown
Let's evaluate each option against the stated plan and Fortinet's capabilities.

❌ A. It is possible. You should use eBGP as the routing protocol between the regions.
Why it's incorrect: While the core statement "It is possible" is correct, the reasoning about eBGP is misleading and not the primary solution. eBGP is one possible routing protocol you could use for dynamic routing between large regional hubs (the inter-region "core"), but it is not the defining feature that makes this complex multihub topology possible. The question's focus is on the SD-WAN overlay topology (the hub-spoke connections), not the underlying routing protocol choice. Suggesting eBGP as the critical enforcer misses the mark.

✅ B. It is not possible. FortiOS 7.6 supports multihub topologies with up to four hubs.
Why it's CORRECT: This is the accurate technical limitation. Your plan calls for five regions with two hubs each, totaling 10 hubs. In FortiOS 7.6, a single SD-WAN overlay (managed via the Overlay Controller VPN in FortiManager or directly on the FortiGate) supports a maximum of four hub FortiGates. This is a hard platform limit for that release. Therefore, your plan to have 10 hubs in a single, unified SD-WAN overlay is not possible. You would need to redesign—perhaps by creating separate, independent SD-WAN overlays per region, which then connects via a separate core network.

❌ C. It is possible. You should use FortiManager and the overlay orchestrator multihub topology to simplify the deployment.
Why it's incorrect: This is a great best-practice suggestion for managing a multihub deployment, and the Overlay Orchestrator in FortiManager is indeed the recommended tool for this. However, it does not override the fundamental platform limit of four hubs per overlay. The Orchestrator simplifies configuration and policy application within that limit. It cannot magically enable a 10-hub single overlay.

❌ D. It is not possible. In a region, all spokes must have either single-hub or dual-hub connectivity.
Why it's incorrect: This statement is false. Fortinet's SD-WAN is flexible and allows for a mixed environment within the same overlay. You can absolutely have some spokes (small branches) configured with a single hub (a "spoke-to-hub" connection) and other spokes (large branches) configured with dual hubs (a "spoke-to-multihub" connection) in the same region and same SD-WAN topology. This flexibility is a key strength of the design.

Key Takeaway:
The critical constraint here isn't the logical design, which is sound, but the specific technical limit of FortiOS 7.6. Always check the platform's maximum scale numbers for your version. Your design would require either reducing hubs per overlay to 4 or less, or implementing multiple overlays.

Official Reference:
Fortinet Documentation Library: FortiOS 7.6 Administration Guide - SD-WAN Overlay

Your FortiGate is in production. To optimize WAN link use and improve redundancy, you enable and configure SD-WAN. What must you do as part of this configuration update process?



A. Replace references to interfaces used as SD-WAN members in the routing configuration.


B. Purchase and install the SD-WAN license, and reboot the FortiGate device.


C. Replace references to interfaces used as SD-WAN members in the firewall policies.


D. Disable the interface that you want to use as an SD-WAN member.





C.
  Replace references to interfaces used as SD-WAN members in the firewall policies.

Explanation:

When you enable SD-WAN on a FortiGate that is already in production, you are changing how traffic selects an egress path. SD-WAN does not magically inherit existing firewall policies that reference physical interfaces. Instead, SD-WAN introduces a logical SD-WAN interface, and traffic must explicitly use it. The critical task during migration is updating policies so traffic actually goes through SD-WAN instead of bypassing it.

✅ Correct answer: C. Replace references to interfaces used as SD-WAN members in the firewall policies.

Why this is correct
When you add interfaces to SD-WAN, FortiGate creates a logical interface called sdwan (or virtual-wan-link in older versions).
Existing firewall policies that reference physical WAN interfaces (for example wan1, wan2) do not automatically switch to SD-WAN.

To ensure:
🔹 Traffic is load-balanced
🔹 Health checks are enforced
🔹 Failover actually works

you must update firewall policies so that:
🔹 The outgoing interface is the SD-WAN interface, not the individual WAN links
This is the single most common step people miss during SD-WAN migration, which results in “SD-WAN enabled but not used” scenarios.

❌ Incorrect options

❌ A. Replace references to interfaces used as SD-WAN members in the routing configuration.

Why this is wrong
When SD-WAN is enabled:
🔹 FortiGate automatically manages routing for SD-WAN members
🔹 Static routes pointing to member interfaces are either removed or ignored
You do not manually replace routes with SD-WAN references. Routing decisions are made using SD-WAN rules, not traditional static routes.

Common misconception:
People assume SD-WAN requires rewriting routing tables. It doesn’t. SD-WAN replaces routing logic with policy-based path selection.

❌ B. Purchase and install the SD-WAN license, and reboot the FortiGate device.

Why this is wrong
SD-WAN is:
🔹 Built-in
🔹 License-free
🔹 Enabled without reboot
There is no separate SD-WAN license for FortiGate. If someone tells you otherwise, they are confusing SD-WAN with other Fortinet features like FortiAnalyzer or advanced security subscriptions.

❌ D. Disable the interface that you want to use as an SD-WAN member.

Why this is wrong
SD-WAN member interfaces must be:
🔹 Enabled
🔹 Physically up
🔹 Operational
Disabling an interface removes it from service entirely, which defeats redundancy and load balancing.

Common trap:
Some admins think interfaces must be “freed” or reset before SD-WAN use. That’s false. You add active interfaces directly into SD-WAN.

Key takeaway
SD-WAN does nothing unless traffic is sent through it.
Updating firewall policies to reference the SD-WAN interface is the critical step that makes SD-WAN actually work in production.

Exhibit.

The administrator configured the IPsec tunnel VPN1 on a FortiGate device with the parameters shown in exhibit.
Based on the configuration, which three conclusions can you draw about the characteristics and requirements of the VPN tunnel? (Choose three.)



A. The tunnel interface IP address on the spoke side is provided by the hub.


B. The remote end can be a third-party IPsec device.


C. The administrator must manually assign the tunnel interface IP address on the hub side


D. The remote end must support IKEv2.


E. This configuration allows user-defined overlay IP addresses.





B.
  The remote end can be a third-party IPsec device.

C.
  The administrator must manually assign the tunnel interface IP address on the hub side

E.
  This configuration allows user-defined overlay IP addresses.

Explanation:

Main Concept
This question tests your understanding of IPsec Phase 1 configuration on FortiGate, specifically focusing on what the configuration parameters tell you about tunnel characteristics, compatibility, and IP addressing behavior in a hub-and-spoke VPN topology.
The key here is analyzing what each configuration line reveals about the VPN setup. You need to understand IKE versions, IP address assignment methods, and interoperability with third-party devices.

Answer Analysis

✅ B. The remote end can be a third-party IPsec device.

Why this is correct:
The configuration shows set peertype any, which is the critical line here. This setting tells the FortiGate to accept IPsec connections from any peer type—not just other FortiGate devices. It enables interoperability with third-party IPsec vendors like Cisco, Palo Alto, Juniper, or any standards-compliant IPsec device.
If this were restricted to FortiGate-only communication, you'd see set peertype fortigate instead. The "any" value means the tunnel will work with any device that supports the configured IKE and IPsec parameters (IKEv2, AES256-SHA256 in this case).

✅ C. The administrator must manually assign the tunnel interface IP address on the hub side.

Why this is correct:
Look at what's missing in this configuration—there's no set mode-config enable on the hub side. The mode-config feature is what allows a hub to dynamically assign IP addresses to spokes.
Since mode-config is disabled (set mode-cfg disable), the hub cannot push IP addresses to remote peers. This means the administrator has to manually configure the tunnel interface IP address on the hub side using something like set ip 10.0.0.1/24 under the tunnel interface configuration.
The hub is essentially saying: "I'm not handing out addresses automatically, so you need to configure my tunnel IP manually."

✅ E. This configuration allows user-defined overlay IP addresses.

Why this is correct:
Because mode-cfg disable is set, there's no automatic IP address assignment happening. This gives administrators full control to define whatever overlay IP addressing scheme they want for the tunnel interfaces.
You're not locked into a specific range that mode-config would assign. You can choose 10.0.0.0/24, 172.16.0.0/16, or any custom subnet that fits your network design. This flexibility is what "user-defined" means—you decide the overlay addressing, not the FortiGate's automatic assignment mechanism.

❌ A. The tunnel interface IP address on the spoke side is provided by the hub.

Why this is wrong:
This would only be true if set mode-cfg enable was configured. Mode-config is the feature that allows hubs to dynamically assign tunnel IP addresses to spokes (similar to DHCP for VPN tunnels).
Since the configuration explicitly shows set mode-cfg disable, the hub is NOT providing IP addresses to spokes. Each spoke must have its tunnel IP manually configured, just like the hub. Common misconception: People sometimes assume that in hub-and-spoke topologies, the hub always assigns addresses. That's only true when mode-config is enabled. Without it, everything is manual.

❌ D. The remote end must support IKEv2.

Why this is wrong:
The configuration shows set ike-version 2, which means THIS FortiGate is using IKEv2. However, this doesn't mean the remote end is forced to use IKEv2 only.
Actually, when you set ike-version 2 on FortiGate, it typically supports both IKEv1 and IKEv2 for backward compatibility (FortiGate can auto-negotiate). The remote end could potentially connect using IKEv1 depending on the FortiGate's broader configuration and firmware version behavior.
More importantly, the question asks what you can conclusively draw from the exhibit. The exhibit alone doesn't prove that IKEv2 is absolutely required—you'd need to see additional configuration or know the specific FortiOS behavior to make that determination.

Common misconception: Seeing ike-version 2 and assuming it's IKEv2-only. In practice, FortiGate's IKE version handling is more flexible than a strict enforcement.

Reference
Official Fortinet Documentation: https://docs.fortinet.com

Refer to the exhibit.

The exhibit shows the details of a session and the index numbers of some relevant interfaces on a FortiGate device that supports hardware offloading. Based on the information shown in the exhibits, which two conclusions can you draw?



A. By default, FortiGate offloads symmetric and asymmetric flows.


B. The original direction of the symmetric traffic flows from port3 to port2.


C. The reply direction of the asymmetric traffic flows from port2 to port3.


D. The auxiliary session can be offloaded to hardware.





C.
  The reply direction of the asymmetric traffic flows from port2 to port3.

Explanation:

This exhibit reveals an asymmetric session on a hardware-offloading-capable FortiGate. The main/original session expects symmetric paths (dev=7→5/5→7 → port3 in → port1 out). But return traffic arrives on a different interface, triggering a reflect/auxiliary session (dev=7→6/6→7 → port3 ↔ port2). This shows how FortiGate tracks mismatched directions.

❌ A. By default, FortiGate offloads symmetric and asymmetric flows.
By default, offload favors symmetric flows (easy NPU state tracking). Asymmetric flows usually stay on CPU unless you explicitly enable auxiliary-session (not default in many versions). The exhibit shows offload on the main session but doesn't prove default asymmetric offload—common overgeneralization trap.

❌ B. The original direction of the symmetric traffic flows from port3 to port2.
No—the original/symmetric direction (main session) is port3 (dev7) → port1 (dev5). Port2 (dev6) only shows up in the reflect session for the asymmetric reply. Easy mix-up: people glance at reflect and think it's the "original"—but original is always the first flow's path.

✅ C. The reply direction of the asymmetric traffic flows from port2 to port3.
Spot on. Reflect session dev=7→6/6→7 means reply enters on port2 (6) and exits on port3 (7). That's the asymmetric return path captured exactly—direct evidence from the output.

❌ D. The auxiliary session can be offloaded to hardware.
While newer FortiOS versions allow auxiliary-session offload (with feature enabled), the exhibit doesn't show explicit offload stats for the reflect part (often limited or CPU-bound historically). The statement claims capability as fact, but the output doesn't confirm it here—plus default behavior leans against it.

Bottom line: The two firm conclusions from the exhibit are about the directions—not defaults or offload guarantees. C nails the asymmetric reply; the other correct one (per many sources matching this pattern) often ties to recognizing the asymmetry itself, but here B misstates the original direction

Refer to the exhibits.

The exhibits show the configuration for SD-WAN performance. SD-WAN rule, the application IDs of Facebook and YouTube along with the firewall policy configuration and the underlay zone status. Which two statements are true about the health and performance of SD-WAN members 3 and 4? (Choose two.)



A. Only related TCP traffic is used for performance measurement.


B. The performance is an average of the metrics measured for Facebook and YouTube traffic passing through the member.


C. Encrypted traffic is not used for the performance measurement.


D. FortiGate identifies the member as dead when there is no Facebook and YouTube traffic passing through the member.





B.
  The performance is an average of the metrics measured for Facebook and YouTube traffic passing through the member.

D.
  FortiGate identifies the member as dead when there is no Facebook and YouTube traffic passing through the member.

Explanation:

When you use Passive Measurement in SD-WAN, FortiGate monitors the real-world applications specified in your SD-WAN rule (in this case, Facebook and YouTube) as they traverse the members (port1 and port2). It calculates performance metrics like latency and jitter based on the actual packets of these applications. If no traffic for these specific applications is seen on a link, FortiGate has no data to verify the link's health for that rule, leading it to consider the member "dead" or inactive for that specific service.

Analysis of Options

✅ B. The performance is an average of the metrics measured for Facebook and YouTube traffic passing through the member.
Because the SD-WAN rule (service edit 1) includes multiple application IDs (15832 for Facebook and 31077 for YouTube), FortiGate tracks the performance of both. To provide a single health score for the link relative to this rule, it averages the observed metrics from these two traffic streams. This ensures that the steering decision is based on the overall performance of the "Social Media" category defined in your rule.

✅ D. FortiGate identifies the member as dead when there is no Facebook and YouTube traffic passing through the member.
This is a critical characteristic of passive health checks. In the exhibit, set detect-mode passive is configured. Passive monitoring relies entirely on existing traffic. If users stop using Facebook and YouTube, the FortiGate receives zero telemetry data for those links. Without data, it cannot confirm the link is "alive" for those applications, and consequently, it marks the members as dead within the context of that health check.

❌ A. Only related TCP traffic is used for performance measurement.
While Facebook and YouTube utilize TCP, passive measurement is not strictly limited to TCP. FortiGate can derive metrics from various protocols as long as the application signatures are recognized and the traffic is flowing. Furthermore, some video streaming elements within these apps may use UDP (like QUIC), which FortiGate can also monitor if configured correctly.

❌ C. Encrypted traffic is not used for the performance measurement.
This is a common misconception. FortiGate can measure the performance of encrypted traffic (HTTPS) without needing full SSL inspection for basic health metrics. It looks at the packet arrival times and sequences (telemetry) to calculate jitter and latency. While it can't see inside the encrypted payload without deep inspection, it can certainly measure how fast the encrypted packets are traveling.

Reference:
For further study on SD-WAN passive vs. active health monitoring, please consult the official documentation: https://docs.fortinet.com

Refer to the exhibit.

You configure SD-WAN on a standalone FortiGate device. You want to create an SD-WAN rule that steers Facebook and Linkedin traffic through the less costly internet link. The FortiGate GUI page appears as shown in the exhibit. What should you do to set Facebook and LinkedIn as destinations?



A. Install a license to allow applications as destinations of SD-WAN rules.


B. In the Internet service field, select Facebook and LinkedIn.


C. Enable the applications as destinations of the SD-WAN rule feature visibility.


D. You cannot configure applications as destinations of an SD-WAN rule on a standalone FortiGate device.





B.
  In the Internet service field, select Facebook and LinkedIn.

Explanation:

You are on the GUI page for creating or editing an SD-WAN Rule on a standalone FortiGate. The goal is simple: steer traffic for Facebook and LinkedIn over a specific, cheaper internet link. The exhibit shows the "Destination" section of the rule, which currently has empty fields for Address and Internet Service. The question is: how do you correctly specify Facebook and LinkedIn as the traffic to be matched?

Detailed Answer Breakdown
Let's look at why one option is the straightforward, correct action, and the others are either misleading or incorrect.

❌ A. Install a license to allow applications as destinations of SD-WAN rules.
Why it's incorrect: This is a common misconception. While FortiGate's Application Control feature (which identifies thousands of applications like Facebook) does require a UTM (Universal Threat Management) license to function, the "Internet Service" database is a different system. The Internet Service database includes definitions for major services (like Facebook, LinkedIn, Netflix, AWS, etc.) based on their public IP addresses. Using Internet Service as a matching criterion in any policy (Firewall, SD-WAN, etc.) is a base feature of FortiOS and does not require a separate license. You only need an internet connection for the FortiGate to occasionally update this database.

✅ B. In the Internet service field, select Facebook and LinkedIn.
Why it's CORRECT: This is the direct and proper method. The exhibit clearly shows the "Internet service" field with a + button, indicating you can add items to it. Clicking that + button opens the Internet Service database selector, where you can search for and add "Facebook" and "LinkedIn." These are predefined services in Fortinet's Internet Service database. By adding them here, the SD-WAN rule will match all traffic destined for the known IP ranges of these social networks, perfectly fulfilling your requirement.

❌ C. Enable the applications as destinations of the SD-WAN rule feature visibility.
Why it's incorrect: This option references a GUI concept called "Feature Visibility" (under System > Feature Visibility), where you can enable or disable advanced GUI pages. While there is a setting to enable "SD-WAN Application Performance SLA," there is no specific feature visibility setting to "enable applications as destinations." The "Internet Service" field is always available if the feature is supported in your FortiOS version. This option distracts with a semi-related administrative concept that doesn't apply to the problem.

❌ D. You cannot configure applications as destinations of an SD-WAN rule on a standalone FortiGate device.
Why it's incorrect: This statement is false. The capability to use Internet Service as a destination matching criterion is fully available on a standalone FortiGate. The distinction between "standalone" and "FortiManager-managed" is irrelevant for this specific feature. The GUI page in the exhibit is from a standalone FortiGate, and the "Internet service" field is right there, ready to be used.

Key Takeaway: For steering traffic to major public cloud or social media services, the Internet Service destination is the most efficient and accurate tool. It's superior to trying to manually maintain IP address lists for these constantly changing services.

Exhibit.

Refer to the exhibit, which shows the SD-WAN rule status and configuration. Based on the exhibit, which change in the measured packet loss will make HUB1-VPN3 the new preferred member?



A. When HUB1-VPN1 has 4% packet loss


B. When HUB1-VPN1 has 12% packet loss


C. When HUB1-VPN3 has 4% packet loss


D. When all three members have the same packet loss





D.
  When all three members have the same packet loss

Explanation:

This question tests your understanding of SD-WAN member selection logic on FortiGate, specifically how packet loss affects link selection when using the priority mode with link-cost-factor packet-loss and link-cost-threshold 0.
The tricky part here is understanding how FortiGate evaluates links when packet loss thresholds and priority-based selection interact. You need to know when a lower-priority member can overtake a higher-priority member based on link quality.

Answer Analysis

✅ D. When all three members have the same packet loss

Why this is correct:
Looking at the configuration, you can see:
Mode: priority
Link-cost-factor: packet-loss
Link-cost-threshold: 0
Priority-members: 6 4 5 (which maps to HUB1-VPN3, HUB1-VPN1, HUB1-VPN2 based on sequence numbers)

Here's the key: In priority mode with link-cost-threshold 0, FortiGate will stick with the highest priority member (lowest priority number) as long as it's alive. It won't switch based on link quality degradation because the threshold is set to 0.
However, when all members have the same packet loss, there's no link quality difference to consider. At that point, FortiGate falls back to pure priority-based selection. Since the priority order is 6 4 5, member 6 (HUB1-VPN3) has the highest priority and would become the preferred member.
Currently, HUB1-VPN1 (member 4, Seq_num 5) is selected with 4% packet loss. HUB1-VPN3 won't take over based on better performance, but it will take over when performance is equal across all members because it has higher priority.

❌ A. When HUB1-VPN1 has 4% packet loss

Why this is wrong:
HUB1-VPN1 already has 4% packet loss according to the exhibit (packet loss: 4.000%), and it's currently the selected member. This isn't a change—it's the current state.
For HUB1-VPN3 to become preferred, something needs to change from the current condition. Option A describes the existing situation, so it can't be the answer to "which change will make HUB1-VPN3 the new preferred member."
Common misconception: Thinking that seeing the current packet loss percentage means it's a trigger condition. The question asks for a change, not the current state.

❌ B. When HUB1-VPN1 has 12% packet loss

Why this is wrong:
With link-cost-threshold 0, FortiGate doesn't trigger a failover based on link quality degradation. The threshold of 0 means "don't consider link cost penalties for switching."
Even if HUB1-VPN1's packet loss increases to 12%, it won't automatically trigger a switch to HUB1-VPN3. In priority mode with a zero threshold, FortiGate essentially ignores performance degradation and sticks with the selected member unless it goes completely down or all members reach equal quality.
The link-cost-threshold would need to be set to a value like 10 or 20 for packet loss to trigger a penalty-based switch. With 0, performance degradation alone won't cause the change.
Common misconception: Assuming that high packet loss automatically triggers failover. In SD-WAN, the link-cost-threshold value determines when quality degradation matters.

❌ C. When HUB1-VPN3 has 4% packet loss

Why this is wrong:
HUB1-VPN3 already has 4% packet loss (packet loss: 12.000% shown for member 2, but looking at the sequence, HUB1-VPN3 likely has 4% or similar). Even if HUB1-VPN3 improves to 4%, that doesn't trigger a switch.
In priority mode with link-cost-threshold 0, having better performance than the current member doesn't cause a switch. The currently selected member (HUB1-VPN1) will remain active as long as it's alive.
Priority mode with zero threshold means "stick with what's selected based on priority unless there's a compelling reason to switch"—and better performance by a lower-priority member isn't compelling enough.
Common misconception: Thinking that a lower-priority member with better performance will automatically take over. That's not how priority mode works—it favors stability over optimization.

Page 4 out of 14 Pages
FCSS_SDW_AR-7.6 Practice Test Home Previous

Why Prepare with PrepForti FCSS_SDW_AR-7.6 Practice Test?

Choosing the right preparation material is critical for passing the Fortinet FCSS - SD-WAN 7.6 Architect exam. Here’s how our FCSS_SDW_AR-7.6 practice test is designed to bridge the gap between knowledge and a passing score.

Experience the Real Exam Format:


Familiarize yourself with the exact style, difficulty, and question types you will encounter on the official Fortinet exam. Our FCSS - SD-WAN 7.6 ArchitectFCSS_SDW_AR-7.6 test questions, like the samples on this page, cover specific technical scenarios and MCQs to ensure there are no surprises on test day.

Turn Knowledge into Application:


The smartest way to prepare isn't just reading - it's practicing. Our FCSS - SD-WAN 7.6 Architect practice test questions transforms your theoretical understanding into practical problem-solving skills, exactly what is required to pass.

Learn with Detailed Explanations:


All FCSS_SDW_AR-7.6 exam questions comes with a comprehensive summary and a breakdown of why the correct option is right and the others are wrong. This detailed feedback helps you identify your strengths and target your weaknesses, making your FCSS - SD-WAN 7.6 Architect study time far more efficient.



Experience the Real Exam Now!

Fortinet FCSS - SD-WAN 7.6 Architect Practice Exam Questions