You have an Aruba solution with multiple Mobility Controllers (MCs) and campus APs. You want to deploy a WPA3-Enterprise WLAN and authenticate users to Aruba ClearPass Policy Manager (CPPM) with EAP-TLS.
What is a guideline for ensuring a successful deployment?
Answer : D
For WPA3-Enterprise with EAP-TLS, it's crucial that clients have a trusted certificate installed for the authentication process. EAP-TLS relies on a mutual exchange of certificates for authentication. Deploying client certificates signed by a CA that CPPM trusts ensures that the ClearPass Policy Manager can verify the authenticity of the client certificates during the TLS handshake process. Trust in the root CA is typically required for the server side of the authentication process, not the client side, which is covered by the client's own certificate.
A company has added a new user group. Users in the group try to connect to the WLAN and receive errors that the connection has no Internet access. The users cannot reach any resources. The first exhibit shows the record for one of the users who cannot connect. The second exhibit shows the role to which the ArubaOS device assigned the user's client.
What is a likely problem?
Answer : C
The image indicates that there is an issue with the user role assignment, which is key to network access in ArubaOS. If the user role name sent by CPPM doesn't match any of the roles defined in the ArubaOS, then the user will be assigned a default or incorrect role that does not have the necessary permissions, thus leading to the connection errors and lack of Internet access. Ensuring that the role names are consistent between CPPM and ArubaOS can resolve this issue.
You have been authorized to use containment to respond to rogue APs detected by ArubaOS Wireless Intrusion Prevention (WIP). What is a consideration for using tarpit containment versus traditional wireless containment?
Answer : D
Tarpit containment is a method used in ArubaOS Wireless Intrusion Prevention (WIP) to contain rogue APs. It differs from traditional wireless containment in several ways, particularly in how it interacts with clients and manages network resources.
Here's why the other options are not correct:
Option A is incorrect because tarpit containment does not involve sending ARP frames over the wired network. It operates wirelessly by creating a fake channel or BSSID.
Option B is incorrect because tarpit containment does not selectively target authorized clients; it affects all clients connected to the rogue AP.
Option C is incorrect because tarpit containment does require an RF Protect license to function2.
You have an AOS-8 architecture, consisting of a Mobility Conductor (MC) and Mobility Controllers (MCs). You want to monitor wireless clients' application usage in the Traffic Analysis dashboard. What is a requirement?
Answer : D
In an AOS-8 architecture with a Mobility Conductor (MC) and Mobility Controllers (MCs), the Traffic Analysis dashboard (available in the MC UI) allows administrators to monitor wireless clients' application usage (e.g., identifying traffic from applications like Zoom, YouTube, or Skype). To enable this functionality, the MCs must be able to inspect and classify client traffic at the application level.
Firewall Visibility and DPI: The AOS-8 platform includes a stateful firewall that can perform deep packet inspection (DPI) to classify traffic based on application signatures. Enabling 'firewall visibility' on the MCs activates DPI, allowing the firewall to inspect packet payloads and identify applications. This data is then used by the Traffic Analysis dashboard to display application usage statistics for wireless clients.
Option D, 'Enabling firewall visibility and deep packet inspection (DPI) on the MCs,' is correct. Firewall visibility must be enabled on the MCs to perform DPI and classify client traffic by application. This is typically done with the command firewall visibility in the MC configuration, which activates DPI and allows the Traffic Analysis dashboard to display application usage data.
Option A, 'Configuring packet capturing on the MCs' data plane,' is incorrect. Packet capturing (e.g., using the packet-capture command) is used for manual troubleshooting or analysis, not for enabling the Traffic Analysis dashboard. Packet captures generate raw packet data, which is not processed for application usage statistics.
Option B, 'Enabling logging on the users category on the MCs,' is incorrect. Enabling logging for the 'users' category (e.g., using the logging command) generates logs for user events (e.g., authentication, role assignment), but it does not provide application usage data for the Traffic Analysis dashboard.
Option C, 'Discovering the mobility devices in HPE Aruba Networking Central,' is incorrect. While discovering devices in Aruba Central can provide centralized monitoring, the Traffic Analysis dashboard in AOS-8 is a local feature on the MC and does not require Aruba Central. Additionally, application usage monitoring requires DPI on the MCs, not just device discovery.
The HPE Aruba Networking AOS-8 8.11 User Guide states:
'The Traffic Analysis dashboard on the Mobility Controller provides visibility into wireless clients' application usage, such as identifying traffic from applications like Zoom or YouTube. To enable this feature, you must enable firewall visibility and deep packet inspection (DPI) on the MCs. Use the command firewall visibility to activate DPI, which allows the firewall to classify traffic by application. The classified data is then displayed in the Traffic Analysis dashboard under Monitoring > Traffic Analysis.' (Page 360, Traffic Analysis Dashboard Section)
Additionally, the HPE Aruba Networking Security Guide notes:
'Firewall visibility on AOS-8 Mobility Controllers enables deep packet inspection (DPI) to classify client traffic by application. This is required for features like the Traffic Analysis dashboard, which displays application usage statistics for wireless clients, helping administrators monitor network activity.' (Page 55, Firewall Visibility Section)
:
HPE Aruba Networking AOS-8 8.11 User Guide, Traffic Analysis Dashboard Section, Page 360.
HPE Aruba Networking Security Guide, Firewall Visibility Section, Page 55.
===========
You have enabled 802.1X authentication on an AOS-CX switch, including on port 1/1/1. That port has these port-access roles configured on it:
Fallback role = roleA
Auth role = roleB
Critical role = roleC
No other port-access roles are configured on the port. A client connects to that port. The user succeeds authentication, and CPPM does not send an Aruba-User-Role VSA.
What role does the client receive?
Answer : C
In an AOS-CX switch environment, 802.1X authentication is used to authenticate clients connecting to ports, and roles are assigned based on the authentication outcome and configuration. The roles mentioned in the question---fallback, auth, and critical---have specific purposes in the AOS-CX port-access configuration:
Auth role (roleB): This role is applied when a client successfully authenticates via 802.1X and no specific role is assigned by the RADIUS server (e.g., via an Aruba-User-Role VSA). It is the default role for successful authentication.
Fallback role (roleA): This role is applied when no authentication method is attempted (e.g., the client does not support 802.1X or MAC authentication and no other method is configured).
Critical role (roleC): This role is applied when the switch cannot contact the RADIUS server (e.g., during a server timeout or failure), allowing the client to have limited access in a 'critical' state.
In this scenario, the client successfully authenticates via 802.1X, and CPPM does not send an Aruba-User-Role VSA. Since authentication is successful, the switch applies the auth role (roleB) as the default role for successful authentication when no specific role is provided by the RADIUS server.
Option A, 'The client receives roleC,' is incorrect because the critical role is only applied when the RADIUS server is unreachable, which is not the case here since authentication succeeded.
Option B, 'The client is denied access,' is incorrect because the client successfully authenticated, so access is granted with the appropriate role.
Option D, 'The client receives roleA,' is incorrect because the fallback role is applied only when no authentication is attempted, not when authentication succeeds.
The HPE Aruba Networking AOS-CX 10.12 Security Guide states:
'When a client successfully authenticates using 802.1X, the switch assigns the client to the auth role configured for the port, unless the RADIUS server specifies a different role via the Aruba-User-Role VSA. If no Aruba-User-Role VSA is present in the Access-Accept message, the auth role is applied.' (Page 132, 802.1X Authentication Section)
Additionally, the guide clarifies the roles:
'Auth role: Applied after successful 802.1X or MAC authentication if no role is specified by the RADIUS server.'
'Fallback role: Applied when no authentication method is attempted.'
'Critical role: Applied when the RADIUS server is unavailable.' (Page 134, Port-Access Roles Section)
:
HPE Aruba Networking AOS-CX 10.12 Security Guide, 802.1X Authentication Section, Page 132.
HPE Aruba Networking AOS-CX 10.12 Security Guide, Port-Access Roles Section, Page 134.
===========
What is a consideration for implementing wireless containment in response to unauthorized devices discovered by ArubaOS Wireless Intrusion Detection (WIP)?
Answer : C
When implementing wireless containment as a response to unauthorized devices, a company should consider the legal implications. Wireless containment might affect devices that are not part of the company's network and could be considered as a form of interference. This could have legal consequences, and therefore, such actions should be carefully reviewed and ideally should be performed in a targeted and controlled manner, reducing the risk of legal issues.
Refer to the exhibits.
A company has added a new user group. Users in the group try to connect to the WLAN and receive errors that the connection has no Internet access. The users cannot reach any resources. The first exhibit shows the record for one of the users who cannot connect. The second exhibit shows the role to which the AOS device assigned the user's client.
What is a likely problem?
Answer : D
The scenario involves an AOS-8 Mobility Controller (MC) with a WLAN where a new user group has been added. Users in this group cannot connect to the WLAN, receiving errors indicating no Internet access and inability to reach resources. Exhibit 1 shows the ClearPass Policy Manager (CPPM) Access Tracker record for one user:
CPPM sends an Access-Accept with the VSA Radius:Aruba:Aruba-User-Role user_group4.
The endpoint is classified as 'Known,' but the user cannot access resources. Exhibit 2 (not provided but described) shows that the AOS device (MC) assigned the user's client to the 'denyall' role, which likely denies all access, explaining the lack of Internet and resource access.
Analysis:
CPPM sends the Aruba-User-Role VSA with the value 'user_group4,' indicating that the user should be assigned to the 'user_group4' role on the MC.
However, the MC assigns the client to the 'denyall' role, which typically denies all traffic, resulting in no Internet or resource access.
The issue lies in why the MC did not apply the 'user_group4' role sent by CPPM.
Option A, 'The AOS device does not have the correct RADIUS dictionaries installed on it to understand the Aruba-User-Role VSA,' is incorrect. If the MC did not have the correct RADIUS dictionaries to understand the Aruba-User-Role VSA, it would not process the VSA at all, and the issue would likely affect all users, not just the new user group. Additionally, Aruba-User-Role is a standard VSA in AOS-8, and the dictionaries are built into the system.
Option B, 'The AOS device has a server derivation rule configured on it that has overridden the role sent by CPPM,' is incorrect. Server derivation rules on the MC can override roles sent by the RADIUS server (e.g., based on attributes like username or NAS-IP), but there is no indication in the scenario that such a rule is configured. If a derivation rule were overriding the role, it would likely affect more users, and the issue would not be specific to the new user group.
Option C, 'The clients rejected the server authentication on their side because they do not have the root CA for CPPM's RADIUS/EAP certificate,' is incorrect. If the clients rejected the server authentication (e.g., due to a missing root CA for CPPM's certificate), the authentication would fail entirely, and CPPM would not send an Access-Accept with the Aruba-User-Role VSA. The scenario confirms that authentication succeeded (Access-Accept was sent), so this is not the issue.
Option D, 'The role name that CPPM is sending does not match the role name configured on the AOS device,' is correct. CPPM sends the role 'user_group4' in the Aruba-User-Role VSA, but the MC assigns the client to the 'denyall' role. This suggests that the role 'user_group4' does not exist on the MC, or there is a mismatch in the role name (e.g., due to case sensitivity, typos, or underscores vs. hyphens). In AOS-8, if the role specified in the Aruba-User-Role VSA does not exist on the MC, the MC falls back to a default role, which in this case appears to be 'denyall,' denying all access. The likely problem is that the role name 'user_group4' sent by CPPM does not match the role name configured on the MC (e.g., it might be 'user-group4' or a different name).
The HPE Aruba Networking AOS-8 8.11 User Guide states:
'When the Mobility Controller receives an Aruba-User-Role VSA in a RADIUS Access-Accept message, it attempts to assign the specified role to the client. If the role name sent by the RADIUS server (e.g., 'user_group4') does not match a role configured on the controller, the controller will fall back to a default role, such as 'denyall,' which may deny all access. To resolve this, ensure that the role name sent by the RADIUS server matches the role name configured on the controller, accounting for case sensitivity and naming conventions (e.g., underscores vs. hyphens).' (Page 306, Role Assignment Troubleshooting Section)
Additionally, the HPE Aruba Networking ClearPass Policy Manager 6.11 User Guide notes:
'A common issue when assigning roles via the Aruba-User-Role VSA is a mismatch between the role name sent by ClearPass and the role name configured on the Aruba device. If the role name does not match (e.g., 'user_group4' vs. 'user-group4'), the device will not apply the intended role, and the client may be assigned a default role like 'denyall,' resulting in access issues. Verify that the role names match exactly in both ClearPass and the device configuration.' (Page 290, RADIUS Role Assignment Issues Section)
:
HPE Aruba Networking AOS-8 8.11 User Guide, Role Assignment Troubleshooting Section, Page 306.
HPE Aruba Networking ClearPass Policy Manager 6.11 User Guide, RADIUS Role Assignment Issues Section, Page 290.
===========