A network administrator has racked up a 7210 Mobility Controller (MC) that will be terminating 200+ Aps on a medium-size branch office. Next, the technician cabled the appliance with 4SPF+ Direct Attached Cables (DACs) distributed between two-member switching stack and powered it up.
What must the administrator do next in the MCs to assure maximum wired bandwidth utilization?
Refer to the exhibits.
A network administrator deploys User Based Tunneling (UBT) in a corporate network to unify the security policies enforcement. When users authenticate with 802.1X, ClearPass shows Accept results, and sends the Aruba-User-Role attribute as expected. However, the AOS-CX based switch does not seem to build the tunnel to the Mobility Controller (MC) for this user.
Why does the switch fail to run UBT for the user?
A customer wants a WLAN solution that permits Aps to terminate WPA-2 encrypted traffic from different SSIDs to different geographic locations where non-related IT departments will take care of enforcing security policies. A key requirement is to minimize network congestion, overhead, and delay while providing data privacy from the client to the security policy enforcement point. Therefore, the solution must use the shortest path from source to destination.
Which Aruba feature best accommodates this scenario?
Refer to the exhibit.
A network administrator has Mobility Master (MM) - Mobility Controller (MC) based network and has fully integrated the MCs with ClearPass for RADIUS-based AAA services. The administrator is testing different ways to run user role derivation.
Based on the show command output, what method has the administrator use for assigning the “corp” role to client with MAC xx:xx:xx:xx:xx:xx?
A company with 50 small coffee shops in a single country requires a single mobility solution that solves connectivity needs at both the main office and branch locations. Coffee shops must be provisioned with local WiFi internet access for customers.
The shops must also have a private WLAN that offers communication to resources at the main office to upload sales, request supplies through a computer system, and make phone calls if needed. In order to simplify network operations, network devices at the coffee shops should be cloud managed.
Which technologies best meet the company needs at the lowest cost?
A network administrator has deployed an Airwave Management Platform (AMP) server and integrated it with a Mobility Master (MM) – Mobility Controller (MC) based WLAN. The AMP server already has all Aruba Mobility devices including Access Points (APs) in the “UP” devices list.
What are two actions the administrator can execute upon the APs under “Airwave>Devices>Monitor”? (Choose two.)
Refer to the exhibits.
Exhibit 1
Exhibit 2
Exhibit 3
A network administrator wants to allow contractors to access the corporate WLAN named EmployeesNet with the contractor role in VLAN 40. When users connect, they do not seem to get an IP address. After some verification checks, the network administrator confirms the DHCP server (10.254.1.21) is reachable from the Mobility Controller (MC) and obtains the outputs shown in the exhibits.
What should the network administrator do next to troubleshoot this problem?
A network administrator is in charge of a Mobility Master (MM) – Mobility Controller (MC) based network security. Recently the Air Monitors detected a Rogue AP in the network and the administrator wants to enable “Tarpit” based wireless containment.
What profile must the administrator enable “tarpit” wireless containment on?
An organization has several RAPs at different locations that broadcast two SSIDs. The internet-only SSID is in bridge/always mode, and the corporate SSID is in split-tunneling/standard mode. The network administrator deploys 10 more RAPs in different locations.
Users can successfully connect to the corporate SSID that is propagated by a RAP at a remote location. However, they report that it takes too long to access public internet web sites.
What is one part of the configuration that should be checked by the network administrator to verify this RAP deployment?
Refer to the exhibit.
A network administrator wants to configure an 802.1x supplicant for a wireless network that includes the following:
• AES encryption
• EAP-MSCHAP v2-based user and machine authentication
• Validation of server certificate in Microsoft Windows 10
The network administrator creates a WLAN profile and selects the change connection settings option. Then the network administrator changes the security type to Microsoft: Protected EAP (PEAP), and enables user and machine authentication under Additional Settings.
What must the network administrator do next to accomplish the task?
A software development company has 764 employees who work from home. The company also has small offices located in different cities throughout the world. During working hours, they use RAPs to connect to a datacenter to upload software code as well as interact with databases.
In the past two month, cabling issues have occurred connection to the 7240XM Mobility Controller (MC) that runs ArubaOS 8 and terminates the RAPs. These RAPs disconnect, affecting the users connected to the RAPs. This also causes problems with code uploads and database synchronizations. Therefore, the company decides to add a second 7240XM controller for redundancy.
How should the network administrator deploy both controllers in order to provide the redundancy while preventing failover events from disconnecting users?
A network administrator has updated the ArubaOS code of a standalone Mobility Controller (MC) that is used for User-Based Tunneling (UBT) to a newer early release. Ever since the MC seems to reject PAPI sessions from the switch with the 10.1.10.10 IP address. Also the controller’s prompt is now followed by a star mark: “(MC_VA) [mynode] *#”
When opening a support ticket, an Aruba TAC engineer asks the administrator to gather the crash logs and if possible replicate UBT connection attempts from the switch while running packet captures of PAPI traffic on the controller and obtain the PCAP files. The administrator has a PC with Wireshark and TFTP server using the 10.0.20.20 IP address.
What commands must the administrator issue to accomplish these requests? (Choose two.)
An organization owns a fully functional multi-controller Aruba network with a Virtual Mobility Master (VMM) in VLAN20. They have asked a network consultant to deploy a redundant MM on a different server. The solution must offer the lowest convergence time and require no human interaction in case of failure.
The servers host other virtual machines and are connected to different switches that implement ACLs to protect them. The organization grants the network consultant access to the servers only, and appoints a network administrator to assist with the deployment.
What must the network administrator do so the network consultant can successfully deploy the solution? (Choose two.)