Refer to the exhibit.

You are troubleshooting a network connectivity issue between two VMs that are deployed in Azure.
One VM is a FortiGate that has one interface in the DMZ subnet, which is in the Production VNet. The other VM is a Windows Server in the Servers subnet, which is also in the Production VNet. You cannot ping the Windows Server from the FortiGate VM.
What is the reason for this?
- You have not created a VPN to allow traffic between those subnets
- By default, Azure does not allow ICMP traffic between subnets
- The firewall in the Windows VM is blocking the traffic
- You have not configured a user-defined route for this traffic
Answer(s): C
Explanation:
The FortiGate VM and the Windows Server VM are in different subnets but within the same Production virtual network, which means they can communicate by default unless restricted. Azure allows ICMP between subnets, but Windows VMs have ICMP blocked by default in their firewall settings. Therefore, the likely reason for the ping failure is that the Windows Server's firewall is blocking ICMP (ping) traffic.
Reveal Solution Next Question