Q: 4
You have configured an application control profile, set peer-to-peer traffic to Block under the
Categories tab, and applied it to the firewall policy. However, your peer-to-peer traffic on known
ports is passing through the FortiGate without being blocked.
What FortiGate settings should you check to resolve this issue?
Options
Discussion
Makes sense to pick C here. Network Protocol Enforcement is what controls traffic on standard ports when app control doesn't catch it, so if P2P is still getting through, that's probably not enforced. Open to other insights but that's how I've seen it work.
Option C
C. same issue happened to me. Protocol enforcement needs to be enabled so P2P gets blocked on known ports.
D tbh, but C is tricky since protocol enforcement can matter if App Control doesn't catch everything.
Yeah, I've run into this on FortiGates before. C is the one you want because Network Protocol Enforcement deals with traffic that still makes it through using standard ports, even if app control doesn't tag it as P2P. If enforcement isn't blocking, your firewall rule lets it pass. Pretty sure that's what's happening in this scenario, but open to other takes.
C here. Network Protocol Enforcement decides what happens if app signatures don't detect the P2P but it's still using the standard ports. I've seen similar cases in exam reports, pretty sure that's what they're testing for, unless there's something I'm missing.
B not C
Probably C since protocol enforcement deals with traffic on known ports, not just signatures.
B would be my pick. Application and Filter Overrides can let specific traffic bypass the main category block if there's an override set. It's a common trap since overrides take priority, so I'd double-check those before protocol enforcement. Not 100% though, could see why C is used too.
C Saw something similar in an exam report, network protocol enforcement was the missing piece for port-based stuff.
Be respectful. No spam.