ACMP_6.3 Flashcards
Which of the following Aruba controllers is able to provide IEEE 802.3af? (Choose two)
A. 3200
B. 620
C. 650
D. 6000 with M3
E. 7000
B. 620
C. 650
What is the maximum number of remote APs supported by a 3600 controller?
A. 512
B. 1024
C. 128
D. 256
E. 2048
A. 512
Which dual radio access point models support concurrent operations in the 2.4Ghz band as well as the 5Ghz band? (Choose three)
A. AP-92
B. AP-93
C. AP-105
D. AP-224
E. AP-135
C. AP-105
D. AP-224
E. AP-135
Which of the following APs do NOT support dual radio operations? (Choose two)
A.
AP 93
B.
AP 105
C.
RAP 3WN
D.
AP 224
E.
AP 135
A.
AP 93
C.
RAP 3WN
Centralized licensing is not in use on an Aruba based network which has a Master and three local controllers. No APs terminate on the Master controller. Roles and Firewall policies need to be created and applied, hence PEF-NG license is required
On which controller should the license be installed?
A.
Only the master controller since role and firewall policies are created here.
B.
Only the local controllers since firewall policies are applied here
C.
The master and all three local controllers
D.
This isn’t the correct license for this purpose, use PEF-VPN license
E.
This is not needed because PEF-NG is part of base OS
C.
The master and all three local controllers
You need to generate a feature license key for an Aruba controller?
What information do you need to generate a feature license key for an Aruba controller?
A.
The controller’s MAC address and the feature description.
B.
Controller’s MAC address and the certificate number
C.
Controller’s Serial Number and the feature description
D.
Controller’s Serial Number and the certificate number
E.
Controller’s MAC address and Serial Number
D.
Controller’s Serial Number and the certificate number
What are the PEF-NG license limits based on?
A.
Number of APs
B.
One license per controller
C.
Number of users
D.
Number of local controllers
E.
Master Controller total user count
A.
Number of APs
Which of the following licenses are consumed by Mesh APs advertising an SSIDs?
A.
AP license
B.
Mesh license
C.
PEF-V license
D.
No license is required
E.
RAP License
A.
AP license
The permanent licenses on the controller will be deleted with the use of which command?
A.
Delete license
B.
Write erase
C.
Licenses cannot be deleted once activated
D.
Write erase all
E.
Reboot delete all
D.
Write erase all
A network administrator wants to terminate VPN sessions on a local controller in the DMZ.
Which statement is true about the PEF-VPN license?
A.
It is only applied to the master controller
B.
It is only applied to the DMZ controller.
C.
It is based on the number of APs
D.
One license is needed on the master and the DMZ local
E.
It is distributed by the license server as needed
D.
One license is needed on the master and the DMZ local
What is the best practice regarding licensing for a backup master to support Master Redundancy in a network without centralized licensing?
A.
Backup master only requires the AP license
B.
Supported limits and installed licenses should be the same on primary master and backup
Master
C.
Licenses are pushed from the primary to the backup Master along with the configuration
D.
The Backup Master does not require licenses to support master redundancy
E.
On the backup only one license of each type is needed.
B.
Supported limits and installed licenses should be the same on primary master and backup
Master
Which of the following licenses can be included in the licensing pool for centralized licensing? (Choose three)
A.
Factory default licenses
B.
PEFNG license
C.
Evaluation licenses
D.
RFProtect license
E.
PEFV license
B.
PEFNG license
C.
Evaluation licenses
D.
RFProtect license
By default Centralized licensing messages between master controllers are sent _______________.
A.
In the clear unencrypted
B.
Using CPSec
C.
Using IPSec site to site VPN tunnels
D.
Encrypted using GRE
E.
PAPI
A.
In the clear unencrypted
Which of the following will occur if a master license server fails with no standby server present? (Choose two)
A.
Local controllers licenses will continue to be valid for 30 days
B.
Local controllers will immediately remove all installed licenses
C.
No licenses will be sent to any new controllers that come online
D.
All licenses go back into the pool for redistribution
E.
A Local Controller elects itself master license server
A.
Local controllers licenses will continue to be valid for 30 days
C.
No licenses will be sent to any new controllers that come online
Which may be applied directly to an VLAN interface? (Choose three)
A. Access List (ACL)
B.
Firewall Policy
C.
Roles
D.
AAA profiles
E.
RF Plan Map
A. Access List (ACL)
B.
Firewall Policy
D.
AAA profiles
When creating a firewall rule on an Aruba controller, which parameter is optional?
A.
Destination
B.
Service
C.
Source
D.
Log
E.
Action
D.
Log
An administrator creates a WLAN with an unmodified default AAA profile. What is the default role the user is placed in?
A.
default-logon
B.
logon
C.
guest-logon
D.
default-ap
E.
AP-Role
B.
logon
What is the first role a user is given when a user associates to an open WLAN?
A.
The guest post authentication role
B.
The initial role in the captive portal profile
C.
The role in the server group profile
D.
The initial role in the AAA profile
E.
The initial role in the 802.1x profile
D.
The initial role in the AAA profile
Which of the following could be used to set a user’s post-authentication role or VLAN association? (Choose two)
A.
AAA default role for authentication method
B.
Server Derivation Rule
C.
Vendor Specific Attributes
D.
AP Derivation Rule
E.
The Global AAA profile
B.
Server Derivation Rule
C.
Vendor Specific Attributes
Which describe “roles” as used on Aruba Mobility Controllers? (Choose two)
A.
Roles are assigned to users.
B.
Roles are applied to interfaces.
C.
Policies are built from roles.
D.
A user can belong to only one role at a time.
E.
Roles are a set of authentication rules
A.
Roles are assigned to users.
D.
A user can belong to only one role at a time.
Which netdestination aliases are built into the controller? (Choose three)
A.
logon
B.
any
C.
user
D.
guest
E.
local ip
B.
any
C.
user
E.
local ip
What are aliases used for?
A.
Improve controller performance
B.
Simplify the configuration process
C.
Tie IP addresses to ports
D.
Assign rules to policies
E.
Assign policies to roles
B.
Simplify the configuration process
Which of the following firewall rules allows a user to initiate an ICMP session to other devices? (Choose two)
A.
localip any svc-icmp permit
B.
user any svc-icmp permit
C.
user user svc-icmp permit
D.
any any svc-icmp permit
E.
mswitch any svc-icmp permit
B.
user any svc-icmp permit
D.
any any svc-icmp permit
**The Aruba Policy Enforcement Firewall (PEF-NG) module supports destination network address translation (dst-nat). Which is the default use of this statement in an Aruba controller configuration?**
A.
Source the IP addresses of users to specific IP address
B.
Redirect HTTP sessions to Captive Portal
C.
Redirect Access Points to another Aruba controller
D.
Provide a telnet connection to the controller
E.
Redirect a SSH session to terminate on the controller
B.
Redirect HTTP sessions to Captive Portal
The Aruba Policy Enforcement Firewall (PEF) module supports source network address translation (src-nat). **Which is a use of this statement in an Aruba configuration?**
A.
Provide a single source IP address for users in a role
B.
Redirect Captive Portal HTTP sessions
C.
Redirect Access Points to another Aruba controller
D.
Provide IP addresses to clients
E.
Redirects clients to Aruba Firewall
A.
Provide a single source IP address for users in a role
The network administrator wishes to terminate the VPN encryption on the Aruba controller.
When writing a firewall rule to accomplish the task of automatically moving the VPN traffic for the wireless clients from a third party VPN concentrator to an Aruba controller, which action needs to be configured in the rule?
A.
redirect to IPSec Group
B.
source NAT
C.
destination NAT
D.
redirect to tunnel
E.
redirect to GRE
C.
destination NAT
Review the following truncated output from an Aruba controller for this item.
(example) #show rights logon
access-list List
—————-
Position Name Location
——– —- ——–
1 logon-control
2 captiveportal
logon-control
————-
Priority Source Destination Service Action
——– —— ———– ——- ——
1 user any udp 68 deny
2 any any svc-icmp permit
3 any any svc-dns permit
4 any any svc-dhcp permit
5 any any svc-natt permit
captiveportal
————-
Priority Source Destination Service Action
——– —— ———– ——- ——
1 user controller svc-https dst-nat 8081
2 user any svc-http dst-nat 8080
3 user any svc-https dst-nat 8081
4 user any svc-http-proxy1 dst-nat 8088
5 user any svc-http-proxy2 dst-nat 8088
6 user any svc-http-proxy3 dst-nat 8088
Based on the above output from an Aruba controller, an unauthenticated user assigned to
the logon role attempts to start an http session to IP address 172.16.43.170.
What will happen?
A.
the user’s traffic will be passed to the IP address because of the policy statement:
user any svc-http dst-nat 8080
B.
the user’s traffic will be passed to the IP address because of the policy statement:
user any svc-https dst-nat 8081
C.
the user’s traffic will be passed to the IP address because of the policy statement:
user any svc-http-proxy1 dst-nat 8088
D.
the user will not reach the IP address because of the policy statement:
user any svc-http dst-nat 8080
E.
the user will not reach the IP address because of the implicit deny any any at the end of
the policy.
D.
the user will not reach the IP address because of the policy statement:
user any svc-http dst-nat 8080
Refer to the following configuration segment for this item.
ip access-list session anewone
user network 172.16.1.0 255.255.255.0 any permit
user host 172.16.1.1 any deny
user any any permit
An administrator wants users to have access to all destinations except 172.16.1.1. Based on the above Aruba Mobility Controller configuration segment, which statements best describe this policy? (Choose two)
A.
The rule user host 172.16.1.1 any deny is redundant because of the implicit deny all at
the end.
B.
The rule user network 172.16.1.0 255.255.255.0 any permit is redundant.
C.
The two rules user network 172.16.1.0 255.255.255.0 any permit and user host
172.16.1.1 any deny need to be re-sequenced.
D.
The last statement user any any permit is not required
E.
The last statement should be any any any deny
B.
The rule user network 172.16.1.0 255.255.255.0 any permit is redundant.
C.
The two rules user network 172.16.1.0 255.255.255.0 any permit and user host
172.16.1.1 any deny need to be re-sequenced.
How will the frame be handled by this firewall policy?
Refer to the following configuration segment for this item.
netdestination “internal”
no invert
network 172.16.43.0 255.255.255.0 position 1
range 172.16.11.0 172.16.11.16 position 2
!
ip access-list session “My-Policy”
alias “user” alias “internal” service_any permit queue low
!
A user frame is evaluated against this firewall policy with the following attributes:
Source IP: 172.17.49.3 Destination IP: 10.100.86.37 Destination Port: 80
Referring to the above file segment, how will the frame be handled by this firewall policy?
A.
The frame will be dropped because of the implicit deny all at the end of the netdestination
definition.
B.
The frame will be dropped because of the implicit deny all at the end of the firewall policy.
C.
The frame will be forwarded because of the implicit permit all at the end of the firewall
policy.
D.
The frame will be passed because there is no service specified in the firewall policy.
E.
The frame will be dropped because there is no service specified in the firewall policy.
B.
The frame will be dropped because of the implicit deny all at the end of the firewall policy.
What will this policy do with the user frame?
ip access-list session anewone
user network 10.1.1.0 255.255.255.0 any permit
user any any permit
host 10.1.1.1 host 10.2.2.2 any deny
A user sends a frame with the following attributes:
Source IP: 10.1.1.1 Destination IP: 10.2.2.2 Destination Port: 25
Based on the above Mobility Controller configuration file segment, what will this policy do
with the user frame?
A.
The frame is discarded because of the implicit deny all at the end of the policy.
B.
The frame is discarded because of the statement:
user host 10.1.1.1 host 10.2.2.2 deny.
C.
The frame is accepted because of the statement:
user any any permit.
D.
The frame is accepted because of the statement:
user network 10.1.1.0 255.255.255.0 any permit.
E.
This is not a valid policy.
C.
The frame is accepted because of the statement:
user any any permit.
ip access-list session anewone
user network 10.1.1.0 255.255.255.0 any permit
user host 10.1.1.1 any deny
user any any permit
Referring to the above portion of a Mobility Controller configuration file, what can you conclude? (Choose two)
A.
This is a session firewall policy.
B.
This is an extended Access Control List (ACL).
C.
Any traffic going to destination 10.1.1.1 will be denied.
D.
Any traffic going to destination 10.2.2.2 will be denied.
E.
Any traffic going to destination 172.16.100.100 will be permitted.
A.
This is a session firewall policy.
E.
Any traffic going to destination 172.16.100.100 will be permitted.
Which of these are NOT a client attribute that can be configured in user derivation rules?
A.
MAC address
B.
DHCP option value
C.
BSSID
D.
Filter ID
E.
encryption
D.
Filter ID
What are the types of user derivation rules that can be applied to a user? (Choose two)
A.
SSID
B.
MAC
C.
VLAN
D.
Role
E.
AP
C.
VLAN
D.
Role
Which is a Device Specific Attribute that can be evaluated in a user derivation rule?
A.
user login name
B.
authentication server
C.
location by AP Name
D.
controller Loopback address
E.
controller IP
C.
location by AP Name
Which match condition can be used by a server derivation rule? (Choose two)
A.
greater than
B.
less than
C.
inverse of
D.
contains
E.
equals
D.
contains
E.
equals
An administrator wants to assign a VLAN to a user based upon the authentication process
using Vendor Specific Attributes (VSA). Where are Aruba Vendor Specific Attribute (VSA) values provisioned?
A.
controller
B.
client
C.
RADIUS server
D.
Internal user database
E.
Option 60 of DHCP reply
C.
RADIUS server
A company has provisioned the same VAP, AAA and SSID profiles at both its Miami and NY
offices. This Server Group is applied for 802.1x authentication at both locations. The user’s
credentials are only found in the Miami Radius server “RadiusMiami”. There is no Radius
synchronization and both servers are reachable. What happens when the user attempts to authenticate?
A.
The controller recognizes the users Domainand sends the authentication request directly to RadiusMiami.
B.
The request is initially sent to RadiusNY1 then RadiusNY1 redirects the controller to send
the authentication request to RadiusMiami
C.
RadiusNY1 receives the request and returns a deny. No other action is taken.
D.
RadiusNY1 receives the request and returns a deny. The authentication request will then
be sent to RadiusMiami.
E.
The RadiusNY1 sends the request to RadiusMiami that replies to the controller
C.
RadiusNY1 receives the request and returns a deny. No other action is taken.
A user associated to an SSID with 802.1x using this server group. RadiusNY returned a
standard radius attribute of filter-Id with a value of “employee”. The user was placed in the
guest Role. What statements below are correct? (Choose two)
A.
The user was placed in the 802.1x authentication default Role guest
B.
The user was placed in the initial Role guest
C.
Role derivation failed because roles are case sensitive
D.
Role derivation failed because the incorrect operation “value-of” was used
E.
802.1x authentication failed so the user was automatically placed in the guest Role
A.
The user was placed in the 802.1x authentication default Role guest
C.
Role derivation failed because roles are case sensitive
A user associated to an SSID with 802.1x using this server group. RadiusNY returned a standard radius attribute of filter-Id with a value of “employee”.
What Role will the user get?
A.
The User will get the Emp Role
B.
The User will get the 802.1x authentication default Role
C.
The User will get the employee Role
D.
The User will get the Employee Role
E.
The User will get the initial Role
B.
The User will get the 802.1x authentication default Role
Which profiles are required in an AP Group to enable an SSID with VLAN 1, WPA2 and LMSIP? (Choose three)
A.
Virtual-AP profile
B.
WLAN profile
C.
802.1x authentication profile
D.
AP System Profile
E.
SSID Profile
A.
Virtual-AP profile
D.
AP System Profile
E.
SSID Profile
A user connected to a Captive Portal VAP successfully. When the user opens their browser
and tries to access their homepage, they get redirected as expected to another URL on the
Aruba Controller. However, they see an error message that web authentication has been
disabled. What might be a cause of this?
A.
Captive Portal has not been assigned in the SSID profile.
B.
The Captive portal profile has not been assigned to the AAA profile.
C.
A server group has not been assigned to the captive portal profile.
D.
An initial role has not been assigned to the AAA profile.
E.
The Captive portal profile has not been assigned to the initial role.
E.
The Captive portal profile has not been assigned to the initial role.
Which of the following will accept named VLANs as a parameter? (Choose three)
A.
Virtual AP profile
B.
User derivation rule for a single VLAN
C.
Server derivation rule for a single VLAN
D.
Server derivation rule for a VLAN Pool
E.
Access VLAN for a VLAN Pool
A.
Virtual AP profile
B.
User derivation rule for a single VLAN
C.
Server derivation rule for a single VLAN
A customer has a remote AP deployment, where each remote AP has an IPSEC VPN tunnel with L2TP to the controller. 1 of the remote APs is stuck in the user table and hasn’t yet transitioned to the AP active table in the controller. The customer suspects that the AP is not
setting up its VPN connection successfully. Which of the following commands might be useful in troubleshooting this? (Choose three)
A.
Logging level debugging security process localdb
B.
Logging level debugging security process l2tp
C.
Logging level debugging security process dot1x
D.
Logging level debugging security process crypto
E.
Logging level debugging security process vpn
A.
Logging level debugging security process localdb
B.
Logging level debugging security process l2tp
D.
Logging level debugging security process crypto
If machine authentication fails and user authentication passes, which role will be assigned?
A.
employee
B.
guest
C.
contractor
D.
logon
E.
no role is assigned
B.
guest
If machine authentication passes and user authentication fails, which role will be assigned?
A.
employee
B.
guest
C.
contractor
D.
logon
E.
no role is assigned
B.
guest
If machine authentication fails and user authentication fails, which role will be assigned?
A.
Employee
B.
Guest
C.
Captive Portal
D.
Logon
E.
No role will be assigned
E.
No role will be assigned
What can NOT be configured from the Aruba controller configuration wizards?
A.
Controller IP
B.
Boot Partition
C.
User firewall policy.
D.
User derivation rules.
E.
Radius Servers
B.
Boot Partition
An administrator is setting up a factory default controller. No new AP groups were created.
When adding a WLAN SSID in the Campus WLAN wizard what AP group is available?
A.
The air-monitors AP group
B.
The logon AP group
C.
The default AP group
D.
The initial AP group
E.
The Spectrum AP group
C.
The default AP group
The reusable Aruba Controller wizards are accessible in what way?
A.
Only on startup through the CLI
B.
Through the CLI, after the initial CLI wizard has been completed
C.
In the Web UI under maintenance.
D.
In the Web UI under configuration.
E.
Must be initialized from CLI first.
D.
In the Web UI under configuration.
The Contrtoller wizard enables which of the following controller clock configurations?
(Choose three)
A.
NTP to a time server
B.
Set time zone
C.
Daylight savings time
D.
Only GMT can be configured
E.
Manual configuration of date and time
A.
NTP to a time server
B.
Set time zone
E.
Manual configuration of date and time
When configuring ports in the Controller wizard, which of the following are NOT configuration
options? (Choose two)
A.
Inter-VLAN routing
B.
Speed
C.
Trusted
D.
LACP
E.
Trunk
A.
Inter-VLAN routing
D.
LACP
By default, which CLI based remote access method is enabled on Aruba controllers?
A.
RSH
B.
Telnet
C.
SSH
D.
Telnet and SSH
E.
Telnet, SSH and RSH
C.
SSH
An Aruba controller can be accessed with which CLI based remote access methods?
(Choose two)
A.
RSH
B.
Telnet
C.
SSH
D.
SFTP
E.
SCP
B.
Telnet
C.
SSH
As an admin/root user, what other type of role-based management users can be created on
Aruba controllers?
A.
Auditing-compliance user
B.
AirWave management user
C.
Reporting Generation user
D.
Guest provisioning user
E.
Maintenance user
D.
Guest provisioning user
Which log type should be enabled to troubleshoot IPSec authentication issues on Aruba
Controllers?
A.
Security Logs
B.
Management Logs
C.
Wireless Logs
D.
IDS Logs
E.
System Logs
A.
Security Logs
Referring to the above screen capture, if an administrator desires to change a specific AP
into a Spectrum Monitor without assigning the AP to a new group, which menus could be used?
A.
Network > Controller
B.
Wireless > AP Configuration
C.
Wireless > AP Installation
D.
Advanced Services > Wireless
E.
Wizards > WIP Wizard
B.
Wireless > AP Configuration
A customer forgot all passwords for a controller. What method could you use to reset the passwords?
A.
Telnet to the controller and login to the password recovery account
B.
SSH to the controller and login to the password recovery account
C.
Connect directly to the serial console and login to the password recovery account
D.
Interrupt the boot process at CP-boot and select password recovery
E.
Open the controller and press the reset switch
C.
Connect directly to the serial console and login to the password recovery account
With CPSec disabled, which tunnel protocol is used between APs and Controllers in an Aruba environment?
A.
Basic IP
B.
GRE
C.
IPinIP
D.
Mobile IP
E.
IPSec
B.
GRE
In an Aruba controller based system, the L3 mobility tunnel exists between the home agent and which other element?
A.
the default gateway
B.
the remote AP
C.
the foreign agent
D.
the mobile node
E.
the foreign switch
C.
the foreign agent
When an 802.11 client roams what device decides when to move the client to another AP?
A.
Aruba AP
B.
Aruba controller
C.
Client
D.
Radius Server
E.
Router
C.
Client
The above diagram has one master and three local controllers. AP1 GRE terminates on controller Local 1. All controllers are configured with the wireless user VLAN 201. A wireless
user associates with AP 1. Only L2 mobility is enabled.
Which elements will know about this association?
A.
Local 1 only
B.
Local 1 and the Master
C.
Local 1 and Local 2 and the Master
D.
Local 1 and AP1
E.
All Controllers
B.
Local 1 and the Master
Which command will show all client association history?
A.
Aruba-6000# show mobile trail current (ip address)
B.
Aruba-6000# show ip mobile trail (ip address)
C.
Aruba-6000# show ap client status (mac address)
D.
Aruba-6000# show current client ip (ip address)
E.
Aruba-6000# show client ip (ip address) mobility
B.
Aruba-6000# show ip mobile trail (ip address)
With CPSec enabled, which tunnel protocol is used between APs and Controllers in an Aruba environment?
A.
EAP
B.
SSH
C.
IPinIP
D.
Mobile IP
E.
IPSec
E.
IPSec
By default, how long will an AP scan a single channel when ARM is enabled?
A.
80 milliseconds
B.
90 milliseconds
C.
100 milliseconds
D.
110 milliseconds
E.
200 milliseconds
D.
110 milliseconds
Which actions does ARM (Adaptive Radio Management) perform? (Choose two)
A.
Allows controllers to provision the AP Radio type
B.
Allows controllers to provision the best channel for APs
C.
Allows controllers to provision the best power setting for APs
D.
Allows controllers to provision allowed Radio bands
E.
Allows controllers to provision lower power when unauthorized APs are detected
B.
Allows controllers to provision the best channel for APs
C.
Which of the following metrics does the ARM feature use to calculate the optimal channel and power level for Access Points? (Choose two)
A.
RF Spectrum Index
B.
Priority Index
C.
Interference Index
D.
Coverage Index
E.
Frequency Index
C.
Interference Index
D.
Coverage Index