HPE6-A48 無料問題集「HP Aruba Certified Mobility Expert Written」
A financial institution contacts an Aruba partner to deploy an advanced and secure Mobility Master (MM)-Mobility Controller (MC) WLAN solution in its main campus and 14 small offices/home offices (SOHOs). Key requirements are that users at all locations, including telecommuters with VIA, should be assigned roles with policies that filter undesired traffic. Also, advanced WIPs should be enforced at the campus only.
These are additional requirements for this deployment:
RAPs should ship directly to their final destinations without any pre-setup and should come up with the right configuration as soon as they get Internet access.

Activate should be configured with devices MACs, serial numbers, and provisioning rules that redirect them to the standalone VMC at the DMZ

Users should be able to reach DNS, FTP, Web and telephone servers in the campus as well as send and receive IP telephone calls to and from the voice

10.1.50.0/24 segment.
Local Internet access should be granted.

Refer to the exhibit.

Refer to the scenario and the exhibit.

The standalone VMC will act as a VPN Concentrator of the RAPs. The network administrator configures the Standalone VMC with a pool of addresses and the SOHOs AP Group from the MM.
Which additional steps must the network administrator perform to allow the RAPs to terminate their IPSec tunnels and associate to the Standalone VMC?
These are additional requirements for this deployment:
RAPs should ship directly to their final destinations without any pre-setup and should come up with the right configuration as soon as they get Internet access.

Activate should be configured with devices MACs, serial numbers, and provisioning rules that redirect them to the standalone VMC at the DMZ

Users should be able to reach DNS, FTP, Web and telephone servers in the campus as well as send and receive IP telephone calls to and from the voice

10.1.50.0/24 segment.
Local Internet access should be granted.

Refer to the exhibit.

Refer to the scenario and the exhibit.

The standalone VMC will act as a VPN Concentrator of the RAPs. The network administrator configures the Standalone VMC with a pool of addresses and the SOHOs AP Group from the MM.
Which additional steps must the network administrator perform to allow the RAPs to terminate their IPSec tunnels and associate to the Standalone VMC?
正解:C
解答を投票する
Refer to the exhibit.

A user reports show response time to a network administrator and suggests that there might be a problem with the WLAN. The user's laptop supports 802.11n in the 2.4 GHz band only. The network administrator finds the user on the Mobility Master (MM) and reviews the output shown in the exhibit.
What can the network administrator conclude after analyzing the data?

A user reports show response time to a network administrator and suggests that there might be a problem with the WLAN. The user's laptop supports 802.11n in the 2.4 GHz band only. The network administrator finds the user on the Mobility Master (MM) and reviews the output shown in the exhibit.
What can the network administrator conclude after analyzing the data?
正解:B
解答を投票する
A network engineer utilizes VLAN pool technology to solve the lack of a large network subnet for a big company. However, many wireless users report that they lose communication with the network when they move to different locations on the same floor. The users state they have to disconnect and reconnect to the Wi-Fi again to communicate with the network. The engineer notices that the client roams between two controllers and gets a different subnet.
How can the engineer correct issue?
How can the engineer correct issue?
正解:A
解答を投票する
During master controller redundancy and failover, these steps occur:
1. Master 1 acts as the primary master and it goes down, therefore, Master 2 takes over as primary.
2. Master 1 comes back up again (reboots).
3. Master 2 continues to be the active master.
Based on this scenario, how is master redundancy configured on the controller?
1. Master 1 acts as the primary master and it goes down, therefore, Master 2 takes over as primary.
2. Master 1 comes back up again (reboots).
3. Master 2 continues to be the active master.
Based on this scenario, how is master redundancy configured on the controller?
正解:B
解答を投票する
Refer to the exhibits.
Exhibit 1

Exhibit 2

Exhibit 3

A network engineer deploys a Master Controller (MC) cluster at Headquarter to offer high levels of redundancy, and prepares the wired side of the network. This preparation includes the VLAN, DHCP Settings, and unicast routing services that APs require to reach the cluster.
The network engineer waits for 20 minutes after connecting the APs and sees that no SSIDs are advertised. The network engineer logs into one of the MCs and one of the AP's consoles to obtain the outputs shown in the exhibits.
What can the network engineer do to fix the APs discovery process, to ensure the best scalability even if one MC fails?
Exhibit 1

Exhibit 2

Exhibit 3

A network engineer deploys a Master Controller (MC) cluster at Headquarter to offer high levels of redundancy, and prepares the wired side of the network. This preparation includes the VLAN, DHCP Settings, and unicast routing services that APs require to reach the cluster.
The network engineer waits for 20 minutes after connecting the APs and sees that no SSIDs are advertised. The network engineer logs into one of the MCs and one of the AP's consoles to obtain the outputs shown in the exhibits.
What can the network engineer do to fix the APs discovery process, to ensure the best scalability even if one MC fails?
正解:D
解答を投票する
An organization wants to deploy a WLAN infrastructure that provides connectivity to these client categories:
Employees

Contractors

Guest users

Corporate IoT legacy devices that support no authentication or encryption

Employees and contractors must authenticate with company credentials and get network access based on AD group membership. Guest users are required to authenticate with captive portal using predefined credentials. Only employees will run L2 encryption.
Which implementation plan fulfills the requirements while maximizing the channel usage?
Employees

Contractors

Guest users

Corporate IoT legacy devices that support no authentication or encryption

Employees and contractors must authenticate with company credentials and get network access based on AD group membership. Guest users are required to authenticate with captive portal using predefined credentials. Only employees will run L2 encryption.
Which implementation plan fulfills the requirements while maximizing the channel usage?
正解:A
解答を投票する
Refer to the exhibit.

A network administrator deploys a Mobility Master (MM)-Mobility Controller (MC) solution in the headquarters. The network administrator prepares the wired side of the network with the proper VLAN, DHCP settings, and routing services to ensure that APs can reach the MCs.
The network administrator connects two APs in different IP segments and waits for 20 minutes, but SSIDs are advertised in one of the APs only. The engineer logs into the MC console and sees the output shown in the exhibit.
What is the reason that the AP20 is not broadcasting SSIDs?

A network administrator deploys a Mobility Master (MM)-Mobility Controller (MC) solution in the headquarters. The network administrator prepares the wired side of the network with the proper VLAN, DHCP settings, and routing services to ensure that APs can reach the MCs.
The network administrator connects two APs in different IP segments and waits for 20 minutes, but SSIDs are advertised in one of the APs only. The engineer logs into the MC console and sees the output shown in the exhibit.
What is the reason that the AP20 is not broadcasting SSIDs?
正解:A
解答を投票する