Refer to the exhibit.
A network administrator deploys a new Mobility Master (MM) - Mobility Controller (MC) network. To
test the solution, the network administrator accesses the console of a pair of APs and statically
provisions them. However, one of the APs does not propagate the configured SSIDs. The network
administrator looks at the logs and sees the output shown in the exhibit.
Which actions must the network administrator take to solve the problem?
D
Refer to the exhibit.
The network administrator must ensure that the configuration will force users to authenticate
periodically every eight hours. Which configuration is required to effect this change?
A
Refer to the exhibit.
After deploying several cluster pairs, the network administrator notices that all APs assigned to
Cluster1 communicate with MC1 instead of being distributed between members of the cluster. Also,
no IP addresses are shown under the Standby IP column.
What should the network administrator do to fix this situation?
C
Refer to the exhibits.
A network administrator deploys User Based Tunneling (UBT) in a corporate network to unify the
security policies enforcement. When users authenticate with 802.1X, ClearPass shows Accept results,
and sends the Aruba-User-Role attribute as expected. However, the AOS-CX based switch does not
seem to build the tunnel to the Mobility Controller (MC) for this user.
Why does the switch fail to run UBT for the user?
B
Refer to the exhibit.
A network administrator completes the initial configuration dialog of the Mobility Controllers (MCs)
and they join the Mobility Master (MM) for the first time. After the MM-MC association process,
network administrator only creates AP groups, VAPs, and roles. Next, the network administrator
proceeds with the configuration of the policies and creates the policy shown in the exhibit.
Which additional steps must be done to make sure this configuration takes effect over the contractor
users?
C
Refer to the exhibit.
A network administrator is evaluating a deployment to validate that a user is assigned the proper
role and reviews the output in the exhibit. How is the role assigned to user?
C
A network administrator is in charge of a Mobility Master (MM) Mobility Controller (MC) based
network security. Recently the Air Monitors detected a Rogue AP in the network and the
administrator wants to enable Tarpit based wireless containment.
What profile must the administrator enable tarpit wireless containment on?
A
Refer to the exhibit.
A network administrator has recently enabled WMM on the VAPs SSID profile and enabled UCC
Skype4B ALG at the Mobility Master level. During testing, some voice and video conference calls
were made, and it was concluded that the call quality has dramatically improved. However, end to
end information isnt displayed in the calls details. Also, Skype4B app-sharings performance is poor
at times.
What must the administrator do next in order to enable end to end call visibility and QoS correction
to app-sharing service?
D
Refer to the exhibit.
A network administrator is validating client connectivity and executes the show command shown in
the exhibit. Which authentication method was used by a wireless station?
D
Refer to the exhibit.
A network administrator has Mobility Master (MM) - Mobility Controller (MC) based network and
has fully integrated the MCs with ClearPass for RADIUS-based AAA services. The administrator is
testing different ways to run user role derivation.
Based on the show command output, what method has the administrator use for assigning the
corp role to client with MAC xx:xx:xx:xx:xx:xx?
A