Which two statements about distributed automatic radio resource provisioning (DARRP) are correct? (Choose two.)
- A . DARRP performs continuous spectrum analysis to detect sources of interference. It uses this information to allow the AP to select the optimum channel.
- B . DARRP performs measurements of the number of BSSIDs and their signal strength (RSSI). The controller then uses this information to select the optimum channel for the AP.
- C . DARRP measurements can be scheduled to occur at specific times.
- D . DARRP requires that wireless intrusion detection (WIDS) be enabled to detect neighboring devices.
BC
Explanation:
According to Fortinet training: "When using DARRP, the AP selects the best channel available to use based on the scan results of BSSID/receive signal strength (RSSI) to AC" and "To set the running time for DARRP optimization, use the following CLI command within the wireless controller setting: set darrp-optimize {integer}. Note that DARRP doesn’t do continuous spectrum analysis…"
Which factor is the best indicator of wireless client connection quality?
- A . Downstream link rate, the connection rate for the AP to the client
- B . The receive signal strength (RSS) of the client at the AP
- C . Upstream link rate, the connection rate for the client to the AP
- D . The channel utilization of the channel the client is using
When configuring Auto TX Power control on an AP radio, which two statements best describe how the radio responds? (Choose two.)
- A . When the AP detects any other wireless signal stronger that -70 dBm, it will reduce its transmission power until it reaches the minimum configured TX power limit.
- B . When the AP detects PF Interference from an unknown source such as a cordless phone with a signal stronger that -70 dBm, it will increase its transmission power until it reaches the maximum configured TX power limit.
- C . When the AP detects any wireless client signal weaker than -70 dBm, it will reduce its transmission power until it reaches the maximum configured TX power limit.
- D . When the AP detects any interference from a trusted neighboring AP stronger that -70 dBm, it will reduce its transmission power until it reaches the minimum configured TX power limit.
A, D
Explanation:
According to the web search results, Auto TX Power control is a feature that allows the AP to automatically adjust its transmission power based on the RF environment. The goal is to minimize interference and optimize coverage cells for roaming. When the AP detects any other wireless signal stronger than -70 dBm, it means that there is a potential source of interference nearby, so it will reduce its transmission power until it reaches the minimum configured TX power limit. This will reduce the interference and improve coexistence with other devices. When the AP detects any interference from a trusted neighboring AP stronger than -70 dBm, it means that there is a high density of APs in the area, so it will also reduce its transmission power until it reaches the minimum configured TX power limit. This will balance the load and avoid overlapping coverage areas.
Reference: AP Transmit Power and Enable Power Reduction with Auto TX, Transmit Power and Antenna Configuration, Meraki Auto RF: Wi-Fi Channel and Power Management
Refer to the exhibits.
Exhibit A
Exhibit B
Exhibit C
A wireless network has been installed in a small office building and is being used by a business to connect its wireless clients. The network is used for multiple purposes, including corporate access, guest access, and connecting point-of-sale and IoТ devices.
Users connecting to the guest network located in the reception area are reporting slow performance. The network administrator is reviewing the information shown in the exhibits as part of the ongoing investigation of the problem. They show the profile used for the AP and the controller RF analysis output together with a screenshot of the GUI showing a summary of the AP and its neighboring APs.
To improve performance for the users connecting to the guest network in this area, which configuration change is most likely to improve performance?
- A . Increase the transmission power of the AP radios
- B . Enable frequency handoff on the AP to band steer clients
- C . Reduce the number of wireless networks being broadcast by the AP
- D . Install another AP in the reception area to improve available bandwidth
Which two statements about background rogue scanning are correct? (Choose two.)
- A . A dedicated radio configured for background scanning can support the connection of wireless clients
- B . When detecting rogue APs, a dedicated radio configured for background scanning can suppress the rogue AP
- C . Background rogue scanning requires DARRP to be enabled on the AP instance
- D . A dedicated radio configured for background scanning can detect rogue devices on all other channels in its configured frequency band
When configuring a wireless network for dynamic VLAN allocation, which three IETF attributes must be supplied by the radius server? (Choose three.)
- A . 81 Tunnel-Private-Group-ID
- B . 65 Tunnel-Medium-Type
- C . 83 Tunnel-Preference
- D . 58 Egress-VLAN-Name
- E . 64 Tunnel-Type
A, B, E
Explanation:
The RADIUS user attributes used for the VLAN ID assignment are:
IETF 64 (Tunnel Type)―Set this to VLAN.
IETF 65 (Tunnel Medium Type)―Set this to 802
IETF 81 (Tunnel Private Group ID)―Set this to VLAN ID.
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-vlan/71683-dynamicvlan-config.html
Dynamic VLAN allocation is a feature that allows wireless clients to be assigned to different VLANs based on RADIUS attributes returned by the authentication server. The three IETF attributes that must be supplied by the RADIUS server are: 81 Tunnel-Private-Group-ID, which specifies the VLAN ID for the client; 65 Tunnel-Medium-Type, which specifies the tunneling protocol as IEEE-802 (Ethernet); and 64 Tunnel-Type, which specifies the tunneling method as VLAN.
Reference: FortiOS 6.4.0 Handbook – Wireless Controller, page 60; FortiAP / FortiWiFi 6.4.0 Administration Guide, page 68.
Which two phases are part of the process to plan a wireless design project? (Choose two.)
- A . Project information phase
- B . Hardware selection phase
- C . Site survey phase
- D . Installation phase
AC
Explanation:
According to the web search results, the project information phase and the site survey phase are part of the process to plan a wireless design project. The project information phase involves defining the project scope, objectives, requirements, deliverables, and stakeholders. It also includes creating a project plan, a risk management plan, a communication plan, and a budget.1 The site survey phase involves conducting a physical inspection of the site where the wireless network will be deployed, measuring the signal strength and interference levels, identifying the optimal locations for the access points and antennas, and validating the network performance and coverage.2 The hardware selection phase and the installation phase are not part of the planning process, but rather part of the implementation process. The hardware selection phase involves choosing the appropriate wireless devices, such as access points, routers, switches, controllers, and cables, based on the network design and specifications.3 The installation phase involves installing, configuring, testing, and documenting the wireless network components according to the project plan and best practices.3
Reference: Wireless Device Network Planning and Design – Emerson, Telecommunications and Implementation Project Management – BICSI, Project Planning | Wireless Design Services | Digi International
When enabling security fabric on the FortiGate interface to manage FortiAPs, which two types of communication channels are established between FortiGate and FortiAPs? (Choose two.)
- A . Control channels
- B . Security channels
- C . FortLink channels
- D . Data channels
A, D
Explanation:
The control channel for managing traffic, which is always encrypted by DTLS. l The data channel for carrying client data packets.
Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ac61f4d3-ce67-11e9-8977-00505692583a/FortiWiFi_and_FortiAP-6.2-Cookbook.pdf
When enabling security fabric on the FortiGate interface to manage FortiAPs, two types of communication channels are established between FortiGate and FortiAPs: control channels and data channels. Control channels are used for management and configuration of the FortiAPs, such as firmware updates, provisioning, and monitoring. Data channels are used for tunneling wireless traffic from the FortiAPs to the FortiGate for security inspection and policy enforcement.
Reference: FortiOS 6.4.0 Handbook – Security Fabric, page 17; FortiOS 6.4.0 Handbook – Wireless Controller, page 15.
Part of the location service registration process is to link FortiAPs in FortiPresence.
Which two management services can configure the discovered AP registration information from the FortiPresence cloud? (Choose two.)
- A . AP Manager
- B . FortiAP Cloud
- C . FortiSwitch
- D . FortiGate
B, D
Explanation:
FortiGate, FortiCloud wireless access points (send visitor data in the form of station reports directly to FortiPresence)
Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/df877622-c976-11e9-8977-00505692583a/FortiPresence-v4.3-release-notes.pdf
Part of the location service registration process is to link FortiAPs in FortiPresence, which is a cloud-based service that provides location analytics and customer engagement tools for wireless networks. The management services that can configure the discovered AP registration information from the FortiPresence cloud are FortiAP Cloud and FortiGate. FortiAP Cloud is a cloud-based wireless LAN management platform that can discover, configure, monitor, and troubleshoot FortiAP devices. FortiGate is a network security appliance that can act as a wireless controller and manage FortiAP devices through security fabric or CAPWAP protocols.
Reference: FortiPresence Data Sheet, page 1; FortiOS 6.4.0 Handbook – Wireless Controller, page 9.
Which two configurations are compatible for Wireless Single Sign-On (WSSO)? (Choose two.)
- A . A VAP configured for captive portal authentication
- B . A VAP configured for WPA2 or 3 Enterprise
- C . A VAP configured to authenticate locally on FortiGate
- D . A VAP configured to authenticate using a radius server
B, D
Explanation:
In the SSID choose WPA2-Enterprise authentication.
WSSO is RADIUS-based authentication that passes the user’s user group memberships to the FortiGate.
Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/b92a67f9-73a6-11ea-9384-00505692583a/FortiWiFi_and_FortiAP-6.4.2-Configuration_Guide.pdf Wireless Single Sign-On (WSSO) is a RADIUS-based authentication method that passes the user’s user group memberships to the FortiGate for policy enforcement. WSSO can be configured for a VAP that uses WPA2 or WPA3 Enterprise authentication, which requires users to enter their credentials when connecting to the wireless network. WSSO can also be configured for a VAP that authenticates users using a RADIUS server, which returns the user group information in the Fortinet-Group-Name attribute.
Reference: FortiOS 6.4.0 Handbook – Wireless Controller, page 57; FortiOS 6.4.0 Handbook
– Authentication, page 59.