Your customer asked for help to apply an ACL for wireless guest users with the following criteria:
* Wi-Fi guests are on VLAN 555
* allow internet access
* only allow access to public DNS servers
* deny access to all internal networks except for any DHCP server
These session ACLs are already present in the CLI of the mobility gateway group:
You have access to the CLl. Which user role meets all the criteria?
A)
B)
C)
D)
Answer : A
Based on the criteria provided for wireless guest users, the correct user role configuration must allow internet access, only allow access to public DNS servers, deny access to all internal networks except for any DHCP server, and place the Wi-Fi guests on VLAN 555. The ACLs must permit services necessary for basic internet access (such as DNS and DHCP) and block access to internal networks.
Option A satisfies these criteria with the following configurations:
user-role 'WiFi-guest': This defines the role for Wi-Fi guests.
access-list session dhcp-acl: This applies the access list that likely permits DHCP, which is necessary for guests to obtain an IP address.
access-list session dns-acl: This applies the DNS access list, which likely restricts guests to using public DNS servers.
access-list session internal-networks: This applies the internal networks access list, which denies access to internal networks.
vlan 555: This sets the VLAN for Wi-Fi guests to 555.
Options B, C, and D are incorrect because they include access-list session allowall which would permit all traffic, contradicting the requirement to deny access to all internal networks.
You are testing the use of the automated port-access role configuration process using RadSec authentication over VXLAN. During your testing you observed that the RadSec connection will fan during the digital certificate exchange
What would be the cause of this Issue?
Answer : D
During the testing of RadSec authentication over VXLAN, if the RadSec connection fails during the digital certificate exchange, it typically indicates an issue with the establishment of the TLS tunnel, which is required for RadSec's secure communication. The failure of TLS tunnel establishment can occur due to RADIUS TCP packets being dropped, preventing the secure exchange of digital certificates necessary for RadSec authentication. The other options, such as IPv6 address reachability, tracking mode settings, and proxy server misconfiguration, are not directly related to the failure of the TLS tunnel establishment during the certificate exchange process
A customer is evaluating device profiles on a CX 6300 switch. The test device has the following attributes:
* MAC address = 81:cd:93:13:ab:31
* LLDP sys-desc = iotcontroller
The test device is being assigned to the ''lot-dev'' role However, the customer requires the "lot-prod'' role be applied.
Given the configuration, what is causing the "iot-dev" role to be applied to the device'?
Answer : D
In device profile configuration, the device role is often determined by matching attributes such as MAC address, LLDP system description, and CDP information against defined conditions. The test device is being assigned the 'iot-dev' role because its LLDP system description matches the 'iot-lldp' group configuration that is associated with the 'iot-dev' role.
Which command would allow you to verity receipt of a CoA message on an AOS 10 GW?
Answer : B
The Change of Authorization (CoA) messages are used in network access control scenarios and are typically received by the network access server, in this case, an Aruba AOS 10 Gateway. The correct command to verify the receipt of a CoA message is related to the control path traffic because CoA is a control plane function.
Option B, packet-capture controlpath udp 3799, is the correct answer because it specifies capturing control plane traffic on UDP port 3799, which is the standard port for CoA messages.
Options A, C, and D are incorrect because:
Option A captures data plane traffic, not control plane traffic.
Option C's packet-capture interprocess udp 3799 does not refer to a standard command for capturing CoA messages.
Option D, tcpdump host-port 3799, does not specify the correct syntax for capturing traffic on Aruba devices.
Which option shows the correct Banawidth Control for 1024 kbps down and 2048 Kops up for the SSID?
A)
B)
C)
D)
Answer : D
The correct Bandwidth Control settings for 1024 Kbps down and 2048 Kbps up for the SSID are shown in Option D. In Option D, the downstream is set at 1024 Kbps and the upstream at 2048 Kbps, both configured per user, which matches the requested configuration. This setup ensures that each user has a guaranteed bandwidth allocation of the specified rates when connected to the SSID, providing a controlled and predictable user experience.
A campus topology uses VSX with a collapsed core topology. The customer added redundant SFP+ transceivers and reconfigured their mobility gateways from a single link to an aggregate Link. You are asked to verify the CLI output for the link aggregation configuration for one of the mobility gateway cluster members below.
What is a valid configuration?
A)
B)
C)
D)
Answer : A
The configuration shown in Option A is a valid configuration for a multi-chassis link aggregation (MC-LAG) setup. It specifies the use of LACP (Link Aggregation Control Protocol) with a fast rate of LACP PDUs exchange, which is appropriate for creating a resilient and high-throughput link aggregation. The 'vlan trunk allowed all' command allows all VLANs across the trunk, and 'vlan trunk native 100' sets VLAN 100 as the native VLAN for untagged traffic.
You are troubleshooting a WLAN deployment with APs and gateways set up with an 802.1X tunneled SSIO. End-users are complaining that they can't connect to die enterprise SSID. Which possible AP tunnel states could be the cause of the Issue? (Select two.)
Answer : A, E
When troubleshooting a WLAN with 802.1X tunneled SSID issues, AP tunnel states indicate the status of the connection between the AP and the gateway/controller. The states 'SM_STATE_REKEYING' and 'SM_STATE_CONNECTING' could indicate transitional states where the connection has not been fully established, hence users might face issues connecting to the SSID. 'SM_STATE_REKEYING' implies that the AP is in the process of re-establishing encryption keys, while 'SM_STATE_CONNECTING' indicates that the AP is trying to establish a connection with the controller or gateway. These states could lead to temporary connectivity issues until the state transitions to 'SM_STATE_CONNECTED'.