You are troubleshooting a WLAN deployment with APs and gateways set up with an 802.1X tunneled SSIO. End-users are complaining that they can't connect to die enterprise SSID. Which possible AP tunnel states could be the cause of the Issue? (Select two.)
Answer : A, E
When troubleshooting a WLAN with 802.1X tunneled SSID issues, AP tunnel states indicate the status of the connection between the AP and the gateway/controller. The states 'SM_STATE_REKEYING' and 'SM_STATE_CONNECTING' could indicate transitional states where the connection has not been fully established, hence users might face issues connecting to the SSID. 'SM_STATE_REKEYING' implies that the AP is in the process of re-establishing encryption keys, while 'SM_STATE_CONNECTING' indicates that the AP is trying to establish a connection with the controller or gateway. These states could lead to temporary connectivity issues until the state transitions to 'SM_STATE_CONNECTED'.
in a WLAN network with a tunneled SSID. you see the following events in HPE Aruba Networking Central:
The customer asks you to investigate log messages What should you tell them?
Answer : B
The event log showing PMK (Pairwise Master Key) and OKC (Opportunistic Key Caching) key add/update and delete operations is indicative of normal client behavior in a WLAN environment. These events are part of the standard process for maintaining client session security and do not necessarily indicate any issue.
A customer is running out of IP addresses in a network segment. What will happen If they add an additional IPsubnet to the same VLAN?
Answer : D
Adding an additional IP subnet to the same VLAN means that devices configured with either subnet can communicate at Layer 2 without the need for routing. This is because they are on the same VLAN and thus in the same broadcast domain. However, to communicate between subnets, an L3 device or inter-VLAN routing would be required.
A campus topology uses VSX with a collapsed core topology. The customer added redundant SFP+ transceivers and reconfigured their mobility gateways from a single link to an aggregate Link. You are asked to verify the CLI output for the link aggregation configuration for one of the mobility gateway cluster members below.
What is a valid configuration?
A)
B)
C)
D)
Answer : A
The configuration shown in Option A is a valid configuration for a multi-chassis link aggregation (MC-LAG) setup. It specifies the use of LACP (Link Aggregation Control Protocol) with a fast rate of LACP PDUs exchange, which is appropriate for creating a resilient and high-throughput link aggregation. The 'vlan trunk allowed all' command allows all VLANs across the trunk, and 'vlan trunk native 100' sets VLAN 100 as the native VLAN for untagged traffic.
What directly affects the MCS used by wireless stations? (Select two.)
Answer : A, E
The Modulation and Coding Scheme (MCS) used by wireless stations is directly affected by the signal-to-noise ratio (SNR) and the frequency band. Higher SNR can lead to higher MCS values, which means better data rates. The frequency band can affect MCS due to different channel characteristics, such as the presence of interference and propagation properties, which are factors in determining data rates.
Which command would allow you to verity receipt of a CoA message on an AOS 10 GW?
Answer : B
The Change of Authorization (CoA) messages are used in network access control scenarios and are typically received by the network access server, in this case, an Aruba AOS 10 Gateway. The correct command to verify the receipt of a CoA message is related to the control path traffic because CoA is a control plane function.
Option B, packet-capture controlpath udp 3799, is the correct answer because it specifies capturing control plane traffic on UDP port 3799, which is the standard port for CoA messages.
Options A, C, and D are incorrect because:
Option A captures data plane traffic, not control plane traffic.
Option C's packet-capture interprocess udp 3799 does not refer to a standard command for capturing CoA messages.
Option D, tcpdump host-port 3799, does not specify the correct syntax for capturing traffic on Aruba devices.
Your customer asked for help to apply an ACL for wireless guest users with the following criteria:
* Wi-Fi guests are on VLAN 555
* allow internet access
* only allow access to public DNS servers
* deny access to all internal networks except for any DHCP server
These session ACLs are already present in the CLI of the mobility gateway group:
You have access to the CLl. Which user role meets all the criteria?
A)
B)
C)
D)
Answer : A
Based on the criteria provided for wireless guest users, the correct user role configuration must allow internet access, only allow access to public DNS servers, deny access to all internal networks except for any DHCP server, and place the Wi-Fi guests on VLAN 555. The ACLs must permit services necessary for basic internet access (such as DNS and DHCP) and block access to internal networks.
Option A satisfies these criteria with the following configurations:
user-role 'WiFi-guest': This defines the role for Wi-Fi guests.
access-list session dhcp-acl: This applies the access list that likely permits DHCP, which is necessary for guests to obtain an IP address.
access-list session dns-acl: This applies the DNS access list, which likely restricts guests to using public DNS servers.
access-list session internal-networks: This applies the internal networks access list, which denies access to internal networks.
vlan 555: This sets the VLAN for Wi-Fi guests to 555.
Options B, C, and D are incorrect because they include access-list session allowall which would permit all traffic, contradicting the requirement to deny access to all internal networks.