|Exam Name||:||Aruba Certified Mobility Professional 6.4|
|Questions and Answers||:||258 Q & A|
|Updated On||:||Click to Check Update|
|PDF Download Mirror||:||HPE6-A29 Brain Dump|
|Get Full Version||:||Pass4sure HPE6-A29 Full Version|
An Aruba controller can be securely accessed with which CLI-based remote access method?
An administrator implements the AP Fast Failover (APFF) feature on a pair of Aruba controllers that run in a local operation mode. which role should the administrator to the controllers so both can accept connections from Aps and process WLAN traffic from users?
An administrator con figures a new AP for the company's network. The AP has wired users connected to some of the Ethemet ports that will need to be authenticated with 802.1X.Currently, no policy exists to authenticate users connected to wired ports on the APs. In the Aruba Mobility controller Web GUI, where should the administrator enable wired port policy authenticate these users?
Configuration > Network > Ports
Configuration > Advanced > Wired Policies
Configuration > Wireless > AP configuration
Configuration > Security > Authentication
Which statement is true about the order in which a controller is discovered when an AP boots up?
DHCP is discovered before ADP broadcast.
DNS is discovered before static.
ADP unicast is discovered before static.
ADP multicast is discovered before ADP broadcast.
What is one configuration that can support a VLAN pool?
Trunk native VLAN
Hash on SSIDs
VLAN name with single VLAN
An administrator supports a wireless network that includes Aruba Moblilty controllers and Aruba APs. The network has one Virtual AP (VAP) profile configured for employees and one VAP profile configured for guests. The network has 200 employees now. but, because of rapid expansion and the move to a brand new campus network, the number of employees is expected to increase to over 500 The administrator wants
to continue to use only two VAPs to keep the WLAN implementation simple.
Which feture should the administrator implement for the employee VAP that will allow it to scale to a large number of users?
An administrator a network in an office building. The Aruba APs in the network are configured for tunnel mode when they connect to the Aruba Mobility controller in the data center. Each floor of the builiding has a separate VLAN for the wireless users These VLANs are included in the trunk configuration from the Aruba Mobility controller to the Router Which default gateway address should the wireless users receive with DHCP?
Aruba AP on each respective floor
Router's interface connected to the switch on each respective floor
An administrator APs to boot and discover the master controller in a master-local topology. After APs connect to the master, the APs will connect to the appropriate local controller based on the AP Group configuration DNS will be used to discover the master controller. The company's domain name is company.com Which fully-qualifed domain name (FQDN) will the APs query to discover the master controller's IP address?
An administrator wants to create a customized captive portal firewall policy. Which required action must the administrator define for a firewall rule in order to redirect the initial Web traffic to the controller to authenticate guest access?
Examine this file segment from an Aruba Mobility controller: ip access-list session anewone
user network 10.1.1.0 255.255.255.0 any permit user any any permit host 10.1.1.1 host 10.2.2.2 any deny
A user sends a frame with the following attributes:
source IP : 10.1.2.2 Destination IP: 10.2.2.2 Destination port: 25
Based on the configuration file segment. What will this policy do with the user frame?
The frame is accepted because of the user network 10.1.1.0 255.225.255.0 any permit statement
The frame is accepted because of the user any any permit statement.
The frame is discarded because of the user host 10.1.1.1 host 10.2.2.2 deny statement.
The frame is discarded because of the implicit dney all at the end of the policy
How are aliases used?
to tie IP addresses to ports
to make rule configurations more scalable
to assign rules to policies
to assign policies to roles