1.
A network administrator creates the role employees and adds this rule to it:
user any any permit
The first several wireless clients assigned to the employees role are assigned IP addresses in the 10.10.10.0/24 subnet. Several other wireless clients with the employees role are then assigned IP addresses in the 10.10.20.0/24.
When the Aruba firewall matches traffic from these clients to the user any any permit rule, what does it do?
2.
A company has many 7220 controllers in its Aruba wireless architecture. A network administrator wants to use the Traffic Analysis dashboard in order to monitor which type of applications are being used bywireless users.
What is required for this implementation?
3.
A network administrator configures an Aruba Mobility Master (MM)-based solution to provide wireless access to employees. The solution must meet these criteria:
Authenticate users to a network RADIUS server
Enforce different Aruba firewall rules based on the user department
How can the administrator meet these criteria in the simplest way?
4.
A network administrator configures this policy:
Users to which this policy apply are unable to receive IP addresses with DHCP. How should the administrator fix the issue?
5.
An Aruba solution runs ArubaOS 8 and uses a mobility master architecture. Which feature can network administrators use to balance wireless across APs on different channels?
6.
What is the difference between how a network administrator can monitor clients in the Mobility (MM) interface and in the AirWave Management Platform?
7.
An AP operates on channel 6. Which device causes the most significant and consistent interferencewith the signal?
8.
What is a reason for a company to choose to deploy an Aruba 7024 Mobility Controller (MC) rather than anAruba 7010 MC?
9.
A company has an Aruba solution that supports an employee WLAN. How can network administrators control in which subnets user receive IP addresses?
10.
A network manager wants to implement an Aruba wireless solution that accommodates 802.1X with EAP-TLS. All wireless users will utilize Active Directory (AD) accounts to authenticate.
Which device will the authenticator forward the authentication requests to in this type of solution?