Refer to the exhibit, which contains a partial configuration of the global system.

What can you conclude from this output?
Refer to the exhibit, which contains a partial configuration of the global system.
What can you conclude from this output?
The configuration uses 'set check-protocol-header loose' which implies that the protocol header check is not strict. Enabling strict header checking would disable all hardware acceleration including NP and CP processing, but since the configuration is set to loose, all hardware acceleration remains enabled. Therefore, NPs (Network Processors) and CPs (Content Processors) are enabled.
Enabling strict header checking disables all hardware acceleration. This includes NP, SP, and CP processing.
It's C as per https://docs.fortinet.com/document/fortigate/7.2.4/hardware-acceleration/39956 "Enabling strict header checking disables all hardware acceleration. This includes NP, SP, and CP processing."
the question says: "loose" set check-protocol-header "loose" Enabling "strict" header checking disables all hardware acceleration (not loose config). This includes NP, SP, and CP processing. so C is correct
charruco is correct - scrub my comment !
set check-protocol-header loose command can infer that there is an NP enabled, thus A is wrong. C is wrong D is most close to answer imo
Apologies Study guide P53, set check-protocol-header loose, infers that the NP CP are NOT disabled, so D is wrong C - Correct
"D" e a opção correta. Ao habilitar o "check-protocol-header loose" o FortiGate irá fazer um inspeção rigorosa no cabeçalho em L4, com isso TODA aceleração e desativada NP, SP e CP.
Answer : C P53 check-protocol-header strict disables all NPs and CPs. "The option 'strict-dirty-session-check' will enable to check the session against the original policy when re-validating. This can prevent dropping of redirected sessions when web-filtering and authentication are enabled together. If this option is enabled, the FortiGate unit deletes a session if a routing or policy change causes the session to no longer match the policy that originally allowed the session. enable: Enable strict dirty-session check. disable: Disable strict dirty-session check." https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-fix-fw-strict-dirty-session-check-drop/ta-p/224031
Answer: D when check-protocol-header is enabled in strict or loose mode all NPs and CPs are disabled.
agreed. "Enabling strict header checking disables all hardware acceleration. This includes NP, SP, and CP processing." https://docs.fortinet.com/document/fortigate/7.4.3/hardware-acceleration/39956/strict-protocol-header-checking-disables-hardware-acceleration
The documentation only mentions strict NOT loose
Answer: D "Enabling strict header checking disables all hardware acceleration. This includes NP, SP, and CP processing." https://docs.fortinet.com/document/fortigate/7.4.3/hardware-acceleration/39956/strict-protocol-header-checking-disables-hardware-acceleration
The answer is A
The answer is C, nothing here can prove that NP or CP is disabled
The answer is C,
C is the correct answer. check-protocol-header strict diables all NPPs and CPs. Loose doesn't disable them.