NSE4_FGT-7.0 Exam QuestionsBrowse all questions from this exam

NSE4_FGT-7.0 Exam - Question 76


In which two ways can RPF checking be disabled? (Choose two.)

Show Answer
Correct Answer: BD

To disable RPF checking, you can either disable the RPF check at the FortiGate interface level for the source check or enable asymmetric routing. Disabling RPF checks at the interface level specifically involves configuring the interface to not perform source checks, which directly disables RPF for that interface. Enabling asymmetric routing globally disables RPF checking across the FortiGate system, though it may reduce network security.

Discussion

11 comments
Sign in to comment
KutchekOptions: BD
Sep 19, 2023

explanation in comment

Febrian
Sep 12, 2023

I think it's BD because disabling/enabling strict src check only change rpf mode to loose or strict not really disable rpf check.

Kutchek
Sep 19, 2023

"You can disable RPF checking in two ways. If you enable asymmetric routing, it disables RPF checking system wide. However this reduces the security of your network. Features, such as antivirus and IPS become noneffective. So, if you need to disable RPF checking, you can do so at the interface level using the commands shown on this slide (set asymroute enable & set src-check disable @ interface)

zeebo340Options: BD
Mar 5, 2024

B & D are correct. Ref Fortigate Security 7.0 - P216

BUZOMDOptions: BD
Mar 15, 2024

FortiGate_Infrastructure_7.0_Study_Guide-Online – page 39 enable asymmetric routing and disable checking at the interface level ...reduces security of your network

hamidreza0010Options: BC
Feb 17, 2024

B, C are correct

einstein85Options: CD
Mar 31, 2024

C - D Reference: https://kb.fortinet.com/kb/documentLink.do?externalID=FD33955

Timbal
Jun 12, 2024

B is correct, because to disable RPF at interface level you use: config system interface edit <interface> set src-check disable end In other words, one thing is strict-src-check at system level and there is src-check at interfase level.

Kirey
Jun 15, 2024

B and D correct: https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-disable-Reverse-Path-Forwarding-RPF-per/ta-p/193338 disable strict-src-check change the RPF mode to feasible path, but does not disable RPF

Selvapraba15Options: CD
Aug 11, 2024

C and D asymetric routing enable" - trict-src-check disable" + adding a supernet route as "feasible patch"

Mahant55Options: BD
Oct 2, 2024

https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-disable-Reverse-Path-Forwarding-RPF-per/ta-p/193338

LaScarD
Dec 1, 2024

B and D about D. https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-disable-Reverse-Path-Forwarding-RPF-per/ta-p/193338 and between B and C take a look here : https://community.fortinet.com/t5/FortiGate/Technical-Note-Reverse-Path-Forwarding-RPF-implementation-and/ta-p/194382 C is not enough as you have to add a supernet route as "feasible patch" or + adding the same route as the best matching one (same subnet, same prefix, same distance) but having a higher priority value than the best match one. This will force the route to be injected in the routing table as a second choice.