exam questions

Exam FCP_FGT_AD-7.4 All Questions

View all questions & answers for the FCP_FGT_AD-7.4 exam

Exam FCP_FGT_AD-7.4 topic 1 question 12 discussion

Actual exam question from Fortinet's FCP_FGT_AD-7.4
Question #: 12
Topic #: 1
[All FCP_FGT_AD-7.4 Questions]

An employee needs to connect to the office through a high-latency internet connection.
Which SSL VPN setting should the administrator adjust to prevent SSL VPN negotiation failure?

  • A. SSL VPN idle-timeout
  • B. SSL VPN login-timeout
  • C. SSL VPN dtls-hello-timeout
  • D. SSL VPN session-ttl
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
IBB90704
Highly Voted 7 months, 2 weeks ago
Selected Answer: B
Segun el libro pagina 287 deberia ser B y C When connected to SSL VPN over high latency connections, FortiGate can time out the client before the client can finish the negotiation process, such as DNS lookup and time to enter a token. Two new CLI commands under config vpn ssl settings have been added to address this. The first command allows you to set up the login timeout, replacing the previous hard timeout value. The second command allows you to set up the maximum DTLS hello timeout for SSL VPN connections.
upvoted 9 times
...
Cantero75
Highly Voted 5 months, 2 weeks ago
It is C, In a Fortinet SSL VPN, the "dtls-hello-timeout" setting defines the maximum time a FortiGate will wait for an initial "Hello" message from a client during the DTLS (Datagram Transport Layer Security) handshake process, essentially setting a time limit for establishing a secure connection before considering the attempt failed due to network latency or issues with the client device; this is crucial for preventing prolonged connection attempts and improving overall VPN connection stability. The SSL VPN login-timeout in FortiGate controls the amount of time that the SSL VPN waits before disconnecting
upvoted 6 times
...
fangeel
Most Recent 1 month, 1 week ago
7.6 Admin Study Guide p.347, login-timeout: 10-180 seconds, dtls-hello-timeout: 10-60 seconds
upvoted 1 times
...
Sidetone
1 month, 1 week ago
Selected Answer: B
B was the correct answer in the 7.2 exam
upvoted 1 times
...
davidmdlp85
1 month, 2 weeks ago
Selected Answer: C
SSL VPN dtls-hello-timeout: This setting determines how long the FortiGate will wait for a DTLS hello message from the client. For high-latency connections, increasing this timeout will prevent SSL VPN negotiation failures caused by delays in receiving the DTLS hello message. SSL VPN login-timeout: This setting controls the maximum time allowed for a user to log in, but does not affect connection negotiation.
upvoted 1 times
...
truserud
2 months, 1 week ago
Selected Answer: C
For high latency client connections, you can adjust the dtls-hello-timeout settings. This is detailed in the FCP FGT admin study guide on pages 287 through 289.
upvoted 1 times
...
6bee64f
3 months, 1 week ago
Selected Answer: C
Key word is "negotiation", that's why it is C
upvoted 1 times
...
Pelau_the_Engineer
3 months, 2 weeks ago
Selected Answer: C
Best practices for configuring SSL VPNs require setting the DTLS timeout settings.
upvoted 1 times
...
wohny
3 months, 2 weeks ago
Selected Answer: B
Another reason why B is the correct answer is: you have to manualy reconfigure the forticlient to DTLS. To use DTLS with FortiClient: Go to File -> Settings and enable 'Preferred DTLS Tunnel'. Source: To use DTLS with FortiClient: Go to File -> Settings and enable 'Preferred DTLS Tunnel'.
upvoted 1 times
...
alaahaider
3 months, 3 weeks ago
Selected Answer: B
allows more time for the SSL handshake to complete, which is essential in a high-latency environment to prevent the handshake from timing out prematurely
upvoted 1 times
...
rigonet
3 months, 3 weeks ago
Selected Answer: C
Correct answer: C. SSL VPN dtls-hello-timeout Explanation: Both login-timeout and dtls-hello-timeout are mentioned as important adjustments for solving SSL VPN connection issues in high-latency networks. However, dtls-hello-timeout specifically addresses the timeout for DTLS negotiation, which is crucial for UDP connections. This is supported by the FortiGate Administrator Study Guide 7.4, on page 287, where it is stated that both parameters should be adjusted in high-latency environments, but dtls-hello-timeout is more relevant to negotiation problems. Adjusting both is best practice, but for this scenario, dtls-hello-timeout is the most appropriate answer.
upvoted 1 times
...
SingSingHK
4 months ago
Selected Answer: B
i know most people will pick B, while C also looks feasible option... me too, I will go for B. >> high latency, let's say RTT is 500ms, but it still very unlikely will impact the DTLS handshake cycle that its timeout is in terms of seconds.
upvoted 1 times
...
Thespis
4 months ago
Selected Answer: C
Both B and C are correct. A new SSL VPN driver was added to FortiClient 5.6.0 and later to resolve SSL VPN connection issues. If the FortiOS version is compatible, upgrade to use one of these versions. Latency or poor network connectivity can cause login timeout on FortiGate. In v5.6.0 and later, use the following commands to allow a user to increase the SSL VPN login timeout setting. config vpn ssl settings set login-timeout 180 (default is 30) set dtls-hello-timeout 60 (default is 10) end
upvoted 3 times
...
hecjoseroag
4 months, 1 week ago
Selected Answer: C
I think that the most correct answer would be C but I have the doubt because there are portals where they indicate that it is a configuration that must have both the dtls and login timed out would be perhaps B and C. I leave a part of the manual where they indicate scenario to use the DTLS "Many factors can contribute to slow throughput.This recommendation tries to improve throughput by using the FortiOS Datagram Transport Layer Security (DTLS) tunnel option, available in FortiOS 5.4 and above. DTLS allows SSL VPN to encrypt traffic using TLS and uses UDP as the transport layer instead of TCP. This avoids retransmission problems that can occur with TCP-in-TCP."
upvoted 3 times
...
sxcap
4 months, 2 weeks ago
Selected Answer: B
You need to give more time to complete the login, so you need to adjust the default 10sec timeout for the login.
upvoted 1 times
...
1zwan
4 months, 2 weeks ago
Selected Answer: C
C beause this setting determines how long the FortiGate will wait for a DTLS hello message from the client. For high-latency connections, increasing this timeout will prevent SSL VPN negotiation failures caused by delays in receiving the DTLS hello message. imo not B because this setting controls the maximum time allowed for a user to log in, but does not affect connection negotiation.
upvoted 2 times
...
hkhan049
4 months, 3 weeks ago
According to study guide page 287, B AND C are correct. The question is, if this example question is really near on the question in the real exam. Otherwise I prefer the dtls-hello-timeout, because it has a shorter default value
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago