An administrator has ArubaOS-Switches that support tunneled node. The administrator wants to tunnel all user traffic from the Ethernet ports on the switches, and have
the controllers authenticate the user traffic and apply the appropriate user role.
Which implementation meets these requirements?
A. Role-based tunneled node with the controllers configured for standalone mode
B. Role-based tunneled node with the control
lers configured in a cluster
C. Per-port tunneled node with the controllers configured for standalone mode
D. Per-port tunneled node with the controllers configured in a cluster