An administrator has ArubaOS-Switches that support tunneled node. The administrator wants to tunnel all user traffic from the Ethernet ports on the switches, and have the controllers authenticate the user traffic and apply the appropriate user role.
Which implementation meets these requirements?
A . Role-based tunneled node with the controllers configured for standalone mode
B . Role-based tunneled node with the controllers configured in a cluster
C . Per-port tunneled node with the controllers configured for standalone mode
D . Per-port tunneled node with the controllers configured in a cluster
Answer: B
Latest HPE6-A44 Dumps Valid Version with 163 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund