Fortinet NSE 5 FortiSASE and SD-WAN 7.6: Core Administrator Study Notes

1. Introduction to FortiSASE and SD-WAN 7.6

FortiSASE (Secure Access Service Edge) is Fortinet’s cloud-delivered security platform that combines networking and security services. It helps organizations securely connect users to applications from anywhere.
FortiOS SD-WAN 7.6 enhances WAN performance by intelligently routing traffic across multiple links based on application needs, performance, and policies.

Together, FortiSASE and SD-WAN provide secure, optimized, and scalable connectivity for modern distributed environments.


2. FortiSASE Architecture Overview

FortiSASE architecture is built on a cloud-first model. It integrates:

  • Secure Web Gateway (SWG)
  • Firewall-as-a-Service (FWaaS)
  • Zero Trust Network Access (ZTNA)
  • SD-WAN integration with FortiGate

Traffic is inspected at cloud edge points, reducing latency and improving security coverage globally.


3. FortiGate SD-WAN Fundamentals

FortiGate SD-WAN enables multiple WAN links (MPLS, broadband, LTE) to work together. Key features include:

  • Link aggregation and load balancing
  • Application-based routing
  • Centralized control via SD-WAN rules
  • Dynamic path selection based on SLA performance

4. FortiSASE Deployment Models

FortiSASE can be deployed in different ways:

  • Full cloud-based SASE deployment
  • Hybrid deployment with on-prem FortiGate
  • Remote user-based deployment
  • Branch office integration with SD-WAN

Each model depends on business size and network requirements.


5. SD-WAN Underlay and Overlay Concepts

  • Underlay network: Physical transport like ISP, MPLS, or broadband
  • Overlay network: Logical SD-WAN tunnels created over underlay links

The overlay ensures secure, encrypted communication between sites regardless of underlying ISP quality.


6. SD-WAN Configuration and Routing

Configuration involves:

  • Defining WAN interfaces
  • Creating SD-WAN zones
  • Setting performance SLAs
  • Configuring static or dynamic routing

Routing decisions are based on real-time link performance.


7. Application Steering and Traffic Management

SD-WAN can identify applications (e.g., Zoom, Microsoft Teams) and route them based on policies:

  • Business-critical apps → high-quality links
  • Bulk traffic → lower-cost links
  • Real-time apps → low latency paths

This improves user experience and reduces downtime.


8. Security Integration in FortiSASE

FortiSASE integrates multiple security services:

  • Antivirus scanning
  • Intrusion Prevention System (IPS)
  • Web filtering
  • DNS security

All traffic is inspected before reaching the destination.


9. Zero Trust Network Access (ZTNA) Concepts

ZTNA ensures that users are verified before accessing applications.

Key principles:

  • Never trust, always verify
  • Role-based access control
  • Device and user authentication
  • Application-level access instead of network-level access

10. Security Profiles and Policy Enforcement

Security profiles define how traffic is handled:

  • Web filtering profiles
  • Application control
  • Antivirus policies
  • SSL inspection

Policies determine which profiles apply to which users or traffic types.


11. WAN Optimization and Performance Monitoring

WAN optimization improves:

  • Latency reduction
  • Bandwidth efficiency
  • Packet loss handling

Monitoring tools track:

  • Jitter
  • Latency
  • Packet loss
  • Link health

12. SD-WAN Performance SLAs and Health Checks

SLA targets define acceptable performance levels. Examples include:

  • Latency threshold
  • Packet loss limit
  • Jitter tolerance

Health checks continuously monitor WAN links to ensure SLA compliance.


13. FortiManager and FortiCloud Integration

  • FortiManager: Centralized configuration and policy management
  • FortiCloud: Cloud-based monitoring and logging

These tools simplify large-scale deployments and improve visibility.


14. Logging, Monitoring, and Analytics

FortiGate and FortiSASE provide detailed logs for:

  • Traffic analysis
  • Security events
  • Application usage
  • SD-WAN performance

FortiAnalyzer helps visualize and analyze this data.


15. Troubleshooting FortiSASE and SD-WAN Issues

Common troubleshooting steps include:

  • Checking interface status
  • Verifying SD-WAN rules
  • Reviewing logs and event history
  • Testing SLA performance
  • Using diagnostic commands

Proper troubleshooting ensures stable network performance.


16. High Availability and Redundancy Design

High availability ensures continuous service:

  • Active-active or active-passive FortiGate setups
  • Redundant WAN links
  • Failover policies in SD-WAN

This minimizes downtime during failures.


17. Best Practices for FortiSASE Deployment

  • Use multiple WAN links for redundancy
  • Apply strict security policies
  • Enable SSL inspection where needed
  • Monitor SLA performance regularly
  • Use centralized management tools

18. Exam Objectives and Key Topics Review

For NSE 5 preparation, focus on:

  • SD-WAN architecture and configuration
  • FortiSASE security services
  • Application steering and policies
  • ZTNA concepts
  • Monitoring and troubleshooting
  • High availability design

Visit Here For More Information: https://www.prepforti.com/NSE5_SSE_AD-7.6-Practice-Questions

Mcqs: Fortinet NSE 5 FortiSASE and SD-WAN 7.6 Core Administrator

1. FortiSASE Introduction

Q1. What does FortiSASE primarily combine?
A. Database and storage services
B. Security and networking services in the cloud
C. Only firewall services
D. Only VPN services

Answer: B


Q2. FortiSASE is best described as:
A. On-prem firewall solution
B. Cloud-delivered security framework
C. Antivirus software
D. Routing protocol

Answer: B


2. SD-WAN Fundamentals

Q3. What is the main purpose of SD-WAN?
A. Encrypt emails
B. Improve WAN performance and routing
C. Replace routers completely
D. Provide cloud storage

Answer: B


Q4. SD-WAN uses which method for path selection?
A. Random selection
B. Static routing only
C. Application and performance-based routing
D. DNS-based routing only

Answer: C


3. Underlay and Overlay

Q5. In SD-WAN, the underlay refers to:
A. Virtual tunnels
B. Physical network connections
C. Firewall rules
D. Application policies

Answer: B


Q6. The overlay network in SD-WAN is:
A. Physical cables
B. ISP network
C. Logical tunnels over underlay
D. DNS system

Answer: C


4. Application Steering

Q7. Application steering in SD-WAN is used to:
A. Block all traffic
B. Route traffic based on application type
C. Encrypt storage
D. Manage users only

Answer: B


Q8. Real-time applications like video calls should use:
A. High-latency links
B. Low-quality links
C. Low-latency high-performance links
D. Random links

Answer: C


5. Security in FortiSASE

Q9. Which is NOT part of FortiSASE security services?
A. IPS
B. Web filtering
C. Antivirus
D. CPU overclocking

Answer: D


Q10. FortiSASE inspects traffic mainly at:
A. End user device only
B. Cloud edge
C. Router only
D. Printer

Answer: B


6. ZTNA Concepts

Q11. ZTNA stands for:
A. Zero Trust Network Access
B. Zone Traffic Network Architecture
C. Zero Tunnel Network Access
D. Zoned Transfer Network Application

Answer: A


Q12. ZTNA principle is:
A. Trust everyone
B. Never verify users
C. Never trust, always verify
D. Disable authentication

Answer: C


7. SD-WAN SLA

Q13. SLA in SD-WAN is used to measure:
A. Storage size
B. Network performance quality
C. CPU usage
D. Antivirus status

Answer: B


Q14. Which is NOT an SLA metric?
A. Latency
B. Jitter
C. Packet loss
D. Screen brightness

Answer: D


8. Troubleshooting

Q15. First step in SD-WAN troubleshooting is:
A. Reinstall OS
B. Check interface and link status
C. Change ISP
D. Disable firewall

Answer: B


9. High Availability

Q16. The purpose of HA in SD-WAN is:
A. Increase downtime
B. Ensure network redundancy
C. Slow traffic
D. Reduce encryption

Answer: B


10. Management Tools

Q17. FortiManager is used for:
A. Gaming
B. Centralized policy management
C. Internet browsing
D. Email hosting

Answer: B


Q18. FortiAnalyzer is mainly used for:
A. Logging and reporting
B. Firewall replacement
C. DNS resolution
D. VPN tunneling

Answer: A

Scroll to Top