What is required for this implementation?
A company has many 7220 controllers in its Aruba wireless architecture. A network administrator wants to use the Traffic Analysis dashboard in order to monitor which type of applications are being used by wireless users. What is required for this implementation? A. AirMatch and ClientMatch must be enabled. B. The solution must have active PEFNG […]
When the Aruba firewall matches traffic from these clients to the user any any permit rule, what does it do?
A network administrator creates the role employees and adds this rule to it: user any any permit The first several wireless clients assigned to the employees role are assigned IP addresses in the 10.10.10.0/24 subnet. Several other wireless clients with the employees role are then assigned IP addresses in the 10.10.20.0/24. When the Aruba firewall […]
Which Enforcement Profile is applied?
Refer to the exhibit. A user who is tagged with the ClearPass roles of Role_Engineer and developer, but not testqa, connects to the network with a corporate Windows laptop. Which Enforcement Profile is applied? A. WIRELESS_GUEST_NETWORK B. WIRELESS_CAPTIVE_NETWORK C. WIRELESS_HANDHELD_NETWORK D. WIRELESS_EMPLOYEE_NETWORK
What does Authorization allow us to do in a Policy Service?
What does Authorization allow us to do in a Policy Service? A. To use attributes in databases in role mapping and Enforcement. B. To use attributes stored in databases in Enforcement only, but not role mapping. C. To use attributes stored in external databases for Enforcement, but not internal databases. D. To use attributes stored […]
Based on the Enforcement Policy configuration, when a user with Role Engineer connects to the network and the
Refer to the exhibit. Based on the Enforcement Policy configuration, when a user with Role Engineer connects to the network and the posture token assigned is Unknown, which Enforcement Profile will be applied? A. RestrictedACL B. HR VLAN C. Remote Employee ACL D. [Deny Access Profile] E. EMPLOYEE_VLAN
Which roles are assigned to the user in ClearPass? (Choose two.)
Refer to the exhibit. An AD user’s department attribute is configured as “HR”. The user connects on Monday using an Android phone to an Aruba Controller that belongs to the Device Group Remote NAD. Which roles are assigned to the user in ClearPass? (Choose two.) A. Remote Employee B. Executive C. Vendor D. iOS Device […]
Based on the Enforcement Profile configuration shown, which statement accurately describes what is sent?
Refer to the exhibit. Based on the Enforcement Profile configuration shown, which statement accurately describes what is sent? A. A limited access VLAN value is sent to the Network Access Device. B. A message is sent to the Onguard Agent on the client device. C. An unhealthy role value is sent to the Network Access […]
Which authorization servers are supported by ClearPass? (Choose two.)
Which authorization servers are supported by ClearPass? (Choose two.) A. Active Directory B. Cisco Controller C. Aruba Controller D. LDAP server E. Aruba Mobility Access Switch
What enforcement profile should be used in the health check service?
A customer wants to make enforcement decisions during 802.1x authentication based on a client’s Onguard posture token. What enforcement profile should be used in the health check service? A. Quarantine VLAN B. RADIUS CoA C. RADIUS Accept D. RADIUS Reject E. Full Access VLAN.
What is true? (Choose three.)
A bank would like to deploy ClearPass Guest with web login authentication so that their customers can self-register on the network to get network access when they have meetings with bank employees. However, they’re concerned about security. What is true? (Choose three.) A. If HTTPS is used for the web login page, after authentication is […]