Which integration can you suggest?
You are designing an Aruba ClearPass Policy Manager (CPPM) solution for a customer. You learn that the customer has a Palo Alto firewall that filters traffic between clients in the campus and the data center. Which integration can you suggest?A . Sending Syslogs from the firewall to CPPM to signal...
How does Aruba Central handle security for site-to-site connections between AOS 10 gateways?
How does Aruba Central handle security for site-to-site connections between AOS 10 gateways?A . It uses an Aruba proprietary integrity and encryption technologies to secure site-to-site connections, making them resistant to zero day attacks. B. It automatically establishes IPsec tunnels for all site-to-site (all HUBs and Branches) connections using keys securely...
What should you do to help ensure that only authorized users obtain VIA connection settings?
A customer requires a secure solution for connecting remote users to the corporate main site. You are designing a client-to-site virtual private network (VPN) based on Aruba VIA and Aruba Mobility Controllers acting as VPN Concentrators (VPNCs). Remote users will first use the VIA client to contact the VPNCs and...
How should you set up this authentication source?
Refer to the scenario. A customer is migrating from on-prem AD to Azure AD as its sole domain solution. The customer also manages both wired and wireless devices with Microsoft Endpoint Manager (Intune). The customer wants to improve security for the network edge. You are helping the customer design a...
How could you fix this issue?
A company has an Aruba ClearPass server at 10.47.47.8, FQDN radius.acnsxtest.local. This exhibit shows ClearPass Policy Manager's (CPPM's) settings for an Aruba Mobility Controller (MC). The MC is already configured with RADIUS authentication settings for CPPM, and RADIUS requests between the MC and CPPM are working. A network admin enters...
What is a common characteristic of a beacon between a compromised device and a command and control server?
What is a common characteristic of a beacon between a compromised device and a command and control server?A . Use of IPv6 addressing instead of IPv4 addressing B. Lack of encryption C. Use of less common protocols such as SNAP D. Periodic transmission of small, identically sized packetsView AnswerAnswer: D
What is one of the changes that you must make to the policies to meet the scenario requirements?
Refer to the scenario. A customer requires these rights for clients in the “medical-mobile” AOS firewall role on Aruba Mobility Controllers (MCs): Permitted to receive IP addresses with DHCP Permitted access to DNS services from 10.8.9.7 and no other server Permitted access to all subnets in the 10.1.0.0/16 range except...
What is one change you must make to meet the scenario requirements?
Refer to the scenario. A customer requires these rights for clients in the “medical-mobile” AOS firewall role on Aruba Mobility Controllers (MCs): Permitted to receive IP addresses with DHCP Permitted access to DNS services from 10.8.9.7 and no other server Permitted access to all subnets in the 10.1.0.0/16 range except...
Which is a valid minimal configuration for the AOS-CX port-access roles?
Refer to the scenario. A customer has an Aruba ClearPass cluster. The customer has AOS-CX switches that implement 802.1X authentication to ClearPass Policy Manager (CPPM). Switches are using local port-access policies. The customer wants to start tunneling wired clients that pass user authentication only to an Aruba gateway cluster. The...
Which step could give you valuable context about the incident?
Refer to the scenario. A hospital has an AOS10 architecture that is managed by Aruba Central. The customer has deployed a pair of Aruba 9000 Series gateways with Security licenses at each clinic. The gateways implement IDS/IPS in IDS mode. The Security Dashboard shows these several recent events with the...