Last Updated On : 26-Mar-2026


Fortinet NSE 6 SD-WAN 7.6 Enterprise Administrator - NSE6_SDW_AD-7.6 Practice Questions

Total 95 Questions


(You are configuring SD-WAN to load balance network traffic and you want to take into account the link quality. Which two facts should you consider? Choose two answers.)



A. When applicable, FortiGate load balances the traffic through all members that meet the SLA target.


B. You can select the best quality strategy and allow SD-WAN load balancing.


C. You can select the lowest cost service level agreement (SLA) strategy and allow SD-WAN load balancing.


D. The best quality strategy supports only the round-robin hash mode.





A.
  When applicable, FortiGate load balances the traffic through all members that meet the SLA target.

C.
  You can select the lowest cost service level agreement (SLA) strategy and allow SD-WAN load balancing.

Explanation:

When configuring SD-WAN to load balance traffic while considering link quality (Performance SLAs), you must understand how different strategies interact with the load-balancing engine in FortiOS 7.6.

Correct Answers

A. When applicable, FortiGate load balances the traffic through all members that meet the SLA target.
In FortiOS, certain SD-WAN strategies (specifically Lowest Cost (SLA) and the dedicated Load Balance strategy) allow the FortiGate to distribute traffic among multiple interfaces. However, if an SLA target is configured, the FortiGate intelligently filters the member list and only performs load balancing across those specific members that are currently meeting the required SLA metrics (latency, jitter, or packet loss).

C. You can select the lowest cost service level agreement (SLA) strategy and allow SD-WAN load balancing.
The Lowest Cost (SLA) strategy is designed to prefer the most cost-effective link. However, if multiple members have the same cost (priority) and they all meet the defined SLA target, the FortiGate can be configured to load balance traffic across those members using various hash methods (Source IP, Source-Destination IP, etc.).

Incorrect Answers

B. You can select the best quality strategy and allow SD-WAN load balancing.
The Best Quality strategy is a "winner-takes-all" approach. It continuously measures all members and steers all matching traffic to the single "best" interface based on the selected quality criterion (e.g., lowest latency). It does not natively support concurrent load balancing across multiple members; it is designed for strict path optimization.

D. The best quality strategy supports only the round-robin hash mode.
This is incorrect for two reasons: First, the Best Quality strategy does not perform load balancing. Second, in strategies that do support load balancing (like Manual or Lowest Cost), FortiOS supports multiple hash modes including Source IP, Source-Destination IP, Spillover, and Usage-based, not just Round-Robin.

References
FortiOS 7.6 Administration Guide: SD-WAN Rules — Strategy and Load Balancing.
Fortinet Training Institute (NSE 6 SD-WAN 7.6): Topic: SD-WAN Traffic Steering Strategies.
Fortinet Knowledge Base: Technical Note: Understanding Load Balancing in SLA-based SD-WAN Rules.

An administrator is configuring SD-WAN to load balance their network traffic. Which two things should they consider when setting up SD-WAN? (Choose two.)



A. You can select the outbandwidth hash mode with all strategies that allow load balancing.


B. Only the manual and best-quality strategies allow SD-WAN load balancing.


C. When applicable. FortiGate load balances the traffic through all members that meet the SLA target.


D. SD-WAN load balancing is possible only using the best quality and lowest cost (SLA) strategies.





A.
  You can select the outbandwidth hash mode with all strategies that allow load balancing.

C.
  When applicable. FortiGate load balances the traffic through all members that meet the SLA target.

Explanation:

A. You can select the outbandwidth hash mode with all strategies that allow load balancing:
In FortiOS, when using the Volume-Based (Load Balance) strategy, you can select different algorithms to distribute traffic. The outbandwidth (outbound bandwidth) hash mode is a valid option that allows FortiGate to load balance based on the measured egress bandwidth of the member interfaces.

C. When applicable, FortiGate load balances the traffic through all members that meet the SLA target:
This is a fundamental behavior of the Lowest Cost (SLA) and Maximize Bandwidth (SLA) strategies. If multiple member interfaces have the same cost (or are part of the same priority tier) and both currently satisfy the Performance SLA requirements, FortiGate will distribute sessions across all of them.

Why the other options are incorrect:

B. Only the manual and best-quality strategies allow SD-WAN load balancing:
This is incorrect. The Manual strategy is a fixed priority list (no load balancing), and the Best Quality strategy strictly selects the single "winner" interface with the best metric.

D. SD-WAN load balancing is possible only using the best quality and lowest cost (SLA) strategies:
This is incorrect. As noted, Best Quality does not support load balancing. True load balancing is primarily found in the Volume-Based (Maximize Bandwidth) and Lowest Cost (when costs are equal) strategies.

Reference:
Fortinet NSE 6 - SD-WAN 7.6 Study Guide (SD-WAN Rules and Load Balancing).

You configured an SD-WAN rule with the best quality strategy and selected the predefined health check, Default_FortiGuard, to check the link performances against FortiGuard servers. For the quality criteria, you selected Custom-profile-1. Which factors does FortiGate use, and in which order. to determine the link that it should use to steer the traffic?



A. Latency – Member configuration order – Link cost threshold


B. Link quality index – Member configuration order – Link cost threshold


C. Links that meet the SLA targets – Member configuration order – Member local cost


D. Latency – Jitter - Packet loss – Bibandwidth – Member configuration order





B.
  Link quality index – Member configuration order – Link cost threshold

Explanation

You configured:
Strategy: Best quality
Health check: Default_FortiGuard
Quality criteria: Custom-profile-1

With the Best Quality strategy, FortiGate does not load balance. Instead, it selects one single best SD-WAN member based on calculated link quality.

How FortiGate selects the link (decision order)

1️⃣ Link Quality Index (LQI)
FortiGate first calculates a Link Quality Index using the SLA profile.
The LQI is derived from the SLA metrics defined in the custom profile:
latency
jitter
packet loss
These values are combined into a single score representing overall link quality.
👉 The link with the best LQI is preferred.

2️⃣ Member configuration order
If multiple links have equal quality scores, FortiGate uses the member order (sequence in SD-WAN configuration) as a tie-breaker.

3️⃣ Link cost threshold
If still equal, FortiGate evaluates the configured link cost to finalize selection.

Why the other options are incorrect

A. Latency first — Incorrect
Best Quality does not evaluate latency alone; it evaluates the combined LQI.

C. Links meeting SLA targets — Incorrect
That logic applies to Lowest Cost (SLA) strategy, not Best Quality.

D. Latency → Jitter → Packet loss → Bandwidth — Incorrect
Metrics are not evaluated sequentially; they are merged into the LQI score.

NSE6 SD-WAN Key Concept

Strategy-----Decision Basis
Best Quality-----    Link Quality Index (single best link)
Lowest Cost (SLA)-----    SLA compliance + load balancing
Manual/Priority    -----Static preference

Refer to the exhibits.
You use FortiManager to configure SD-WAN on three branch devices.
When you install the device settings, FortiManager prompts you with the error “Copy Failed” for the device branch1_fgt. When you click the log button, FortiManager displays the message shown in the exhibit. There are two different ways to resolve this issue. Based on the exhibits, which methods could you use? (Choose two.)



A. Update the management IP address of branch1_fgt.


B. Specify the gateway of the SD-WAN member port1 with an IP address or use the default value.


C. Do not define installation targets for SD-WAN members.


D. Review the per-device mapping configuration for metadata variables





B.
  Specify the gateway of the SD-WAN member port1 with an IP address or use the default value.

D.
  Review the per-device mapping configuration for metadata variables

Explanation:

The error message provides the key to understanding this problem:
invalid ip - prop[gateway]: ip4class($(sdwan_port1_gw)) invalid ip addr

This error indicates that FortiManager is trying to substitute the variable $(sdwan_port1_gw) with an IP address value, but the value it's using is not a valid IPv4 address. This is a common issue when using FortiManager policy blocks with variable substitution.

Why Option B is Correct:
B. Specify the gateway of the SD-WAN member port1 with an IP address or use the default value.
Looking at the SD-WAN zones configuration in the exhibit:
port1 shows gateway as Sdwan_port1_gw (this appears to be a variable name)
port2 shows gateway as 0.0.0.0
port4 shows gateway as Sdwan_port4_gw

The error specifically mentions $(sdwan_port1_gw) as having an invalid IP address. This means that when FortiManager tries to render the configuration for branch1_fgt, it attempts to replace the variable sdwan_port1_gw with an actual IP address value. The error indicates this substitution failed because the value is not a valid IP address.

There are two ways to fix this:
* Specify an actual IP address instead of using a variable — if you replace $(sdwan_port1_gw) with a concrete IP address (like the actual gateway IP for that interface), the variable substitution is no longer needed.
* Use the default value — if you keep the variable, ensure that the variable has a valid default IP address defined that FortiManager can use when per-device mapping isn't available.

Why Option D is Correct:
D. Review the per-device mapping configuration for metadata variables.
The error shows that the variable substitution is failing specifically for branch1_fgt (the other two branches show "Connection Up" and presumably installed correctly). This suggests that:
* The variable sdwan_port1_gw exists in the policy block
* The variable likely has per-device mappings defined for branch2_fgt and branch3_fgt
* However, for branch1_fgt, the per-device mapping for this variable is either missing, empty, or contains an invalid IP address

By reviewing the per-device mapping configuration (under Device Manager > Managed Devices > [Select Device] > Variables or via the Provisioning templates section), the administrator can verify what value is set for sdwan_port1_gw on branch1_fgt and correct it to a valid IP address.

Why the Other Options are Incorrect:

A. Update the management IP address of branch1_fgt.
Incorrect. The error has nothing to do with the management IP address of the FortiGate device. The management IP is used for FortiManager to FortiGate communication (which is working, as shown by "Connection Up" for the other devices). The error is specifically about a configuration variable for an SD-WAN member gateway.

C. Do not define installation targets for SD-WAN members.
Incorrect. Installation targets are used to control which devices receive specific configurations. Removing installation targets would not fix the variable substitution error; it would simply prevent the configuration from being installed on any device. Additionally, the exhibit shows installation targets are already not defined (the column appears empty for all SD-WAN members), so this isn't the issue.

Summary of the Solution
The error occurs because FortiManager cannot substitute the variable sdwan_port1_gw with a valid IP address for branch1_fgt. Two correct approaches to resolve this:
* Option B (Direct Fix): Replace the variable with a concrete IP address or ensure the variable has a valid default value. This eliminates the dependency on per-device mapping.
* Option D (Variable Mapping Fix): Review and correct the per-device mapping for sdwan_port1_gw specifically for branch1_fgt, ensuring it contains a valid gateway IP address that FortiManager can substitute.

Both methods address the root cause: the variable sdwan_port1_gw is not resolving to a valid IP address for branch1_fgt during configuration installation.

(Refer to the exhibit.

An SD-WAN zone configuration on the FortiGate GUI is shown. What can you conclude about the zone and member configuration on this device? Choose one answer.)



A. You can delete the virtual-wan-link zone.


B. The WAN2 zone contains no member.


C. You can delete the WAN1 zone.


D. You can add the member B-125 to the WAN3 zone and keep it as a member of the Test zone.





B.
  The WAN2 zone contains no member.

Explanation:

From the exhibit (SD-WAN Zones tab in FortiGate GUI):
The default/system zone virtual-wan-link is shown (grayed out or with lock icon, typical for system-defined zones).
WAN1 and WAN2 are listed as user-defined zones, but WAN2 has no expandable arrow or child members beneath it (no interfaces like portX assigned).
WAN3 has one member: port4 (with measured bandwidth 3.4 kbps download / 4.91 kbps upload, status Enable).
HUB1 (likely overlay zone) and Test are present.
Under Test, there is a member B-125 (possibly an IPsec tunnel or VPN interface name, with 0 bps bandwidth, status Enable).

Key conclusions from FortiOS SD-WAN behavior (7.6):
B is directly observable: WAN2 is empty (no members assigned), as no sub-items are indented or listed under it in the tree view.

Why not the others?

A. You can delete the virtual-wan-link zone. Incorrect.
virtual-wan-link is the default/system SD-WAN zone created when SD-WAN is enabled. It cannot be deleted (GUI delete option is unavailable/grayed out, or CLI rejects it). Fortinet docs confirm: the default zone is permanent and non-deletable.

C. You can delete the WAN1 zone. Incorrect / not concludable from exhibit.
WAN1 is listed but shows no members (similar to WAN2). While empty user-defined zones can be deleted (no minimum member requirement; zones can have 0 members), the exhibit does not indicate any delete eligibility or error — we cannot conclude it is deletable just from the screenshot (it might have hidden references like rules/routes/policies). The question asks what we can conclude from the shown config, and WAN1's deletability is not evident.

D. You can add the member B-125 to the WAN3 zone and keep it as a member of the Test zone. Incorrect.
In FortiOS SD-WAN, an interface/member (physical or tunnel) cannot belong to multiple zones simultaneously. Each SD-WAN member is assigned to exactly one zone. Adding B-125 to WAN3 would require removing it from Test first (or it fails with error). This is a core rule in docs: members are grouped exclusively into zones.

This aligns with FortiOS 7.6 Administration Guide (SD-WAN members and zones section: default zone undeletable, members exclusive to one zone, zones can be empty) and matches NSE6_SDW_AD-7.6 exam patterns for interpreting GUI zone/member tree views. The most definitive, observable conclusion from the exhibit is the empty WAN2 zone.

(Which two features must you configure before FortiGate can steer traffic according to SD-WAN rules? Choose two answers.)



A. Security profiles


B. Underlay links


C. Overlay links


D. Traffic shaping


E. Firewall policies





B.
  Underlay links

E.
  Firewall policies

Explanation:


Underlay links:
SD-WAN requires physical or logical WAN interfaces (underlay links) to be defined before traffic can be steered. These represent the real transport paths (ISP connections, MPLS, LTE, etc.) that SD-WAN rules will evaluate for performance metrics like latency, jitter, and packet loss. Without underlay links, there is no path for traffic steering.

Firewall policies:
Even with SD-WAN rules configured, traffic must be permitted and matched through firewall policies. Policies reference SD-WAN zones and determine which traffic flows are subject to SD-WAN rule evaluation. Without firewall policies, traffic cannot be processed or steered according to SD-WAN rules.

❌ Why not the others
A. Security profiles: Optional. These are applied for inspection (AV, IPS, etc.) but not required for SD-WAN steering.

C. Overlay links: Used in VPN/overlay scenarios, but SD-WAN steering works at the underlay level. Overlay links are not mandatory for basic SD-WAN traffic steering.

D. Traffic shaping: This is QoS-related and optional. It can prioritize traffic but is not required for SD-WAN rule-based steering.

📚 Reference
Fortinet SD-WAN Administration Guide (7.6) – Configuring SD-WAN rules requires defining WAN interfaces (underlay links) and applying firewall policies to direct traffic through SD-WAN zones.

FortiOS 7.6 CLI Reference – config system sdwan (for underlay links) and config firewall policy (for traffic steering).

Refer to the exhibit that shows a diagnose output on FortiGate.

Based on the output shown in the exhibit, what can you say about the device role and how it handles health checks?



A. The device is a spoke. It receives health-check measures for the tunnels of another spoke.


B. The device is a hub. It receives embedded health-check measures for each tunnel from the spoke.


C. The device is a spoke. It provides embedded health-check measures for each tunnel to the hub.


D. The device is a hub. It receives health-check measures for the tunnels of a spoke.





C.
  The device is a spoke. It provides embedded health-check measures for each tunnel to the hub.

Explanation:

The diagnose sys sdwan advpn-session command displays information about ADVPN (Auto Discovery VPN) sessions and health-check data exchange between SD-WAN nodes. To determine the device role and how it handles health checks, we need to analyze the output structure and content.

Analysis of the Exhibit
The output shows:
Session head(jfk-0-HUB1:1)
(1) Service ID(3), last access(4136110), remote health check info(3)
Selected path: local(HUB1-VPN1, port1) gw: 192.2.0.1 remote IP: 203.0.113.1 (192.168.1.2)
Remote information:
1: latency: 1.833133 jitter: 0.482600 pktloss: 0.000000 mos: 4.403007 sla: 0x1 cost: 0 remote gw: HUB1-VPN1 transport_group: 1 bandwidth up: 10239 down: 10239 bidirection: 2048 ipv4: 203.0.113.1(192.168.1.2) ...
2: latency: 1.725933 jitter: 0.469833 pktloss: 0.000000 mos: 4.403073 sla: 0x1 cost: 0 remote gw: HUB1-VPN2 transport_group: 1 bandwidth up: 10239 down: 10239 bidirection: 2048 ipv4: 203.0.113.9(192.168.1.66) ...
3: latency: 1.240333 jitter: 0.269700 pktloss: 0.000000 mos: 4.403513 sla: 0x1 cost: 0 remote gw: HUB1-VPN3 transport_group: 0 bandwidth up: 9999999 down: 9999999 bidirection: 19999998 ipv4: 172.16.0.9(192.168.1.130) ...

Key observations:
- Session head naming: jfk-0-HUB1:1 - The name "HUB1" in the session head strongly suggests this device is a hub.
- Multiple remote entries: The output shows three distinct remote entries with different IP addresses and tunnel identifiers (HUB1-VPN1, HUB1-VPN2, HUB1-VPN3).
- Remote health check info: The line remote health check info(3) indicates that this device has received health-check information from three remote sources.
- Remote information structure: Each entry contains latency, jitter, packet loss, and MOS (Mean Opinion Score) data—all metrics typically gathered by performance SLA health checks.

Why Option B is Correct:
B. The device is a hub. It receives embedded health-check measures for each tunnel from the spoke.

This conclusion is supported by:
- Device role: The session head identifier includes "HUB1," confirming this device is functioning as an SD-WAN hub.
- Health check direction: The hub is receiving health-check measurements from multiple spokes (three entries). In SD-WAN ADVPN deployments, spokes perform health checks to the hub and then embed these measurements in keepalive messages sent back to the hub. This allows the hub to have visibility into the quality of the reverse path (spoke to hub).
- "Remote health check info": This explicitly indicates that the hub is receiving health-check data from remote devices (spokes).
- Multiple entries: The three entries correspond to three different spokes (or three tunnels from the same spoke) that are sending their health-check results to this hub.

How Health Checks Work in Hub-and-Spoke ADVPN
- Spokes perform health checks to the hub (or to specified targets) to measure link quality.
- Spokes embed health-check results in ADVPN keepalive messages sent to the hub.
- Hubs receive and store these health-check measurements for each spoke tunnel.
- Hubs can use this information for path selection decisions when traffic needs to be sent back to spokes or when facilitating direct spoke-to-spoke tunnels.

This embedded health-check mechanism is crucial for:
- Bidirectional path awareness: Hubs know the quality of the path from each spoke to the hub.
- Dynamic path selection: Hubs can make informed decisions about which path to use for return traffic.
- ADVPN shortcut initiation: When setting up direct spoke-to-spoke tunnels, both endpoints need visibility into path quality.

Why the Other Options are Incorrect:
A. The device is a spoke. It receives health-check measures for the tunnels of another spoke.
Incorrect. Spokes do not typically receive health-check measures for other spokes. The hub aggregates this information. Additionally, the session head identifier "HUB1" clearly indicates this is a hub, not a spoke.

C. The device is a spoke. It provides embedded health-check measures for each tunnel to the hub.
Incorrect. While the second part is accurate (spokes do provide embedded health checks to hubs), the device role is wrong. The session head identifier confirms this is a hub.

D. The device is a hub. It receives health-check measures for the tunnels of a spoke.
Incorrect. This option is partially correct (hub receives health checks) but incorrectly limits it to "a spoke" (singular). The output clearly shows three entries, indicating the hub is receiving health-check measures from multiple spokes (or multiple tunnels). Option B correctly states "for each tunnel from the spoke," implying multiple tunnels/spokes.

Reference
Fortinet SD-WAN ADVPN documentation explains:
- In ADVPN deployments, spokes perform health checks to measure link quality to the hub.
- Health-check results are embedded in ADVPN control messages sent from spokes to hubs.
- Hubs maintain a database of received health-check information for all connected spoke tunnels.
- This information is used for dynamic path selection and shortcut setup decisions.
- The command diagnose sys sdwan advpn-session displays this stored health-check information on the hub device.

Page 5 out of 14 Pages
PreviousNext
2345678
NSE6_SDW_AD-7.6 Practice Test Home

Why Prepare with PrepForti NSE6_SDW_AD-7.6 Practice Test?

Choosing the right preparation material is critical for passing the Fortinet NSE 6 SD-WAN 7.6 Enterprise Administrator exam. Here’s how our NSE6_SDW_AD-7.6 practice test is designed to bridge the gap between knowledge and a passing score.

Experience the Real Exam Format:


Familiarize yourself with the exact style, difficulty, and question types you will encounter on the official Fortinet exam. Our Free Fortinet NSE 6 SD-WAN 7.6 Enterprise Administrator NSE6_SDW_AD-7.6 test questions, like the samples on this page, cover specific technical scenarios and MCQs to ensure there are no surprises on test day.

Turn Knowledge into Application:


The smartest way to prepare isn't just reading - it's practicing. Our Fortinet NSE 6 SD-WAN 7.6 Enterprise Administrator practice exam transforms your theoretical understanding into practical problem-solving skills, exactly what is required to pass.

Learn with Detailed Explanations:


All NSE6_SDW_AD-7.6 exam questions comes with a comprehensive summary and a breakdown of why the correct option is right and the others are wrong. This detailed feedback helps you identify your strengths and target your weaknesses, making your Fortinet NSE 6 SD-WAN 7.6 Enterprise Administrator study time far more efficient.



Experience the Real Exam Now!