Which of the following techniques are part of the way to implement STA fast roaming?
After setting up tunnels with the active and standby ACs, the AP sends Echo messages to monitor tunnel status. The Echo messages contain the active/standby status of the tunnels. When the AP detects that the primary tunnel fails, it sends an Echo Request message with the active flag to the standby AC. After receiving the Echo Request message, the standby AC becomes the active AC, and the AP sends STA data to this AC.
When the STA uses the WPA2-802.1x security policy and supports fast roaming, the STA only needs to perform key negotiation, but does not need to pass 802.lx authentication again during roaming.
In the hot standby, the following statement about the HSB backup channel is wrong?
Which command can display information about the AP groups in the specified Mesh profile and information about the AP specific profile.
Which is the correct sequence for selecting a proper AP for 802.Ilk-capable STAs in smart roaming?
1. Determine whether latency-sensitive services exist.
2. Filter out APs that do not support load balancing.
3. Filter out APs that do not meet the CAC requirement.
4. Select the AP with the strongest signal strength as the target AP.
5. Select APs meeting the difference threshold conditions.
In a WLAN network environment, after a Spoof spoofing attack, the attacking terminal cannot be determined by the MAC address.
In the channel switching service uninterrupted feature, the time that the AP and the terminal agree to switch the channel synchronously is based on the beacon frame. The two parties agree to switch the channel synchronously after the time node of the certain beacon frame.
Which of the following statements about 802.lx authentication methods are TRUE? (Multiple Choice)
What device types can be defined based on security level on a WLAN? (Multiple Choice)
An engineer wants to use the Agile Controller as the Portal server and synchronize data from an external source. No exceptions occur in the synchronization, but Portal authentication frequently fails. What is the possible cause? (Multiple Choice)
Which statements about Layer 2 and Layer 3 roaming are TRUE? (Multiple Choice)
In a WLAN network that enables flood attack detection, the AP detects flooding attacks by detecting which of the following items.
Which of the following statements about backup CAPWAP tunnel setup are TRUE? (Multiple Choice)
As shown in the figure, different companies on adjacent floors of an office building use multiple SSIDs. If a company enables WIDS rogue device countermeasure, APs of other companies will be affected. Which of the following functions can solve this problem?
On a WLAN network, the following two types of packets are included in the Spoof spoofing attack packet?
When using the Agile Controller to synchronize data, an engineer finds that information of the following users cannot be synchronized: Jack=boss/ Mike=leader/ Mary=manager, Ann=girlfriend. There are no duplicate user names in the related user groups or OUs. What may cause the synchronization failure?
Radar systems in some areas operate in the 5G band and interfere with AP RF signals operating in the 5G band. With the DFS function, when the AP detects that there is interference in the frequency band of its working channel, engineers need to manually switch the working channel.
The Agile Controller supports multiple authentication methods in wireless access authentication. Which of the following statements is FALSE?
As shown in the following figure, the data traffic before roaming is forwarded to the STA-HAP-HAC-upper layer network. The forwarding mode is direct forwarding. The home agent is configured on the AC. After the three-layer roaming, the data forwarding traffic is forwarded.
According to different scenarios, the Layer 3 roaming of the direct forwarding network can set the AC or AP as the home agent. When the AP is set as the home agent, tunnel forwarding needs to be established between the APs before and after roaming.
When dual-link HSB is configured, an AP sets up CAPWAP links with both the active and standby ACs.
Regarding the NAC statement, what is wrong with the following description?
Globally, the AC runs the () and () algorithms based on the neighbor relationship, interference, and load information to generate the new transmit power and working channel of the AP.
The AP detects whether the number of key negotiation failures of the key negotiation packets in the WPA/WPA2 PSK, WAPI-PSK, and WEP-Share-Key authentication exceeds the configured threshold to detect whether it is brute-forced.
When the VRRP hot backup is configured, the active and standby ACs can be hot standby through Layer 3 interworking on two different Layer 2 networks.
A company needs to set up a large WLAN network. The current number of employees in the company is large, the amount of business data is large, and there may be a need for WLAN expansion in the later stage. Is the following statement correct?
In the N+1 backup networking shown in the figure, 300 APs (API to AP300) go online on AC1 and 400 APs (AP301 to AP700) go online on AC2. AC3 is the standby AC and a maximum of 700 online APs can be configured on AC3. However, AC3 allows a maximum of 500 APs to go online concurrently. Which of the following statements are FALSE when the configuration remains unchanged? (Multiple Choice)
In the WLAN network with WIDS enabled, which of the following statements about device information is wrong?
Improper processing of which of the following packets will lead to packet congestion? (Multiple Choice)
What information does an authorized AP need to collect and report to the AC during passive neighbor probe? (Multiple Choice)
In the same-frequency mesh network, the transmission bandwidth of two APs is about 200M. What is the average transmission bandwidth when an AP is added?
On a WLAN with the WIDS function enabled, APs with the following MAC addresses are detected:
01-01-22-22-33-33
02-01-01-22-33-33
02-01-01-22-33-34
02-01-22-01-01-22
OUI 01-01-22 has been added to the whitelist. Which of these APs will be identified as rogue APs?
(Multiple Choice)
During global radio calibration the AC runs ( ) and ( ) algorithms according to the AP neighbor relationship, interference, and load information to generate new transmit power and working channels and delivers them to APs. (Multiple Choice)
Which of the following statements about the N+l backup networking shown in the figure are
TRUE? (Multiple Choice)
Which of the following statements about rogue devices are TRUE? (Multiple Choice)
On a WLAN network, AP group ap-group1 and WIDS profile wids1 are configured. Which of the following is the correct procedure to configure rogue device countermeasure against an AP that forges SSID huawei?
Which of the following statements are TRUE about load balancing modes provided by the HSB solution?
(Multiple Choice)
On a large WLAN network, you can set the DSCP priority of CAPWAP management packets to high priority to improve the reliability of the CAPWAP link between the AP and the AC.
As shown in the figure, which AP and STA in the figure cannot perform normal data communication?
Multiple AD directory servers are used as external source on a large-scale network. Some user information fails to be synchronized to the Agile Controller. What is the possible cause of the failure? (Multiple Choice)
From the roaming process, which of the following processes does roaming need to go through?
According to probe results reported by an AP, an AC can obtain neighbor relationships between the AP and surrounding devices (including authorized APs, rogue APs, and non-Wi-Fi devices), as shown in the following figure. To avoid reported data getting oversized, only data from authorized APs whose signal strength is greater than -85 dBm and rogue APs whose signal strength is greater than ( ) dBm is reported.
In long-distance point-to-point communication over WLAN, if a stable communication link is to be maintained, what percentage of the first Fresnel area can't be blocked?
Engineers of a large enterprise configure the VLAN Pool function when deploying the WLAN. Which of the following options may be the reasons for configuring the function? (Multiple Choice)
A large enterprise deploys a WLAN network, and some SSIDs use direct forwarding. The following description of the direct forwarding mode is correct?
For a small-scale enterprise, which of the following WIDS/WIPS functions is recommended for WLAN security guarantee?
In a data frame, which values of the To DS and From DS fields identify the device type as AP?
When a WLAN network is set up in an enterprise, when the WLAN network is configured, the order of the following steps is correct according to the order of general configuration. 1. Adding an AP to the line 2. Configuring a security profile, SSID profile, and VAP profile 3. Configuring the source interface 4, creating an AP group 5, connecting the STA to the line, and verifying the configuration result 6. The AP group references the security profile, the SSID profile, and the VAP profile. Configure country code
An engineer sets the synchronization type of the Agile Controller to be synchronized by group. However, after synchronization, there is no information on the Controller. Check the AD directory server and find that the directory server is normal. User information and user group information are normal. What is the possible cause of this phenomenon?
Which of the following statements about the three backup modes are TRUE? (Multiple Choice)
Which two types of spoofing attack packets are there on a WLAN? (Multiple Choice)
An enterprise needs to upgrade the AC. Which of the following methods is used to upload the upgrade file to the AC?
To quickly obtain information about the AC from which an STA goes online, the online status of al ACs in the roaming group and STAs must be saved on each AC.
What is the correct configuration for referencing a wired interface template?
A large enterprise needs to deploy a WLAN and has deployed Huawei chassis switches (S7700/9700/12700) on the live network. To save equipment room space and facilitate network capacity expansion in the future, the customer can install AC cards on chassis switches to deploy the WLAN.
Which types of ACs can be installed on chassis switches?
(Multiple Choice)
In the WLAN network environment where the WIDS function is enabled, the detected AP device MAC addresses include: 01-01-22-22-33-33 02-01-01-22-33-33 02-01-01-22-33 -34 02-01-22-01-01-22 The configured oui white list is 01-01-22; Which of the above is an illegal AP?
According to the detection result reported by the AP, the AC can obtain the neighbor relationship between the AP and the neighboring devices, and the neighbor relationships of all the radio devices (including the legal AP, the rogue AP, and the non-Wi-Fi interference device) in the entire AC, as shown in the following figure: The reported data is too large. Only the legal neighbors whose signal strength is greater than -85dBm and the illegal neighbors whose signal strength is greater than ()dBm are reported here?
On a WLAN that uses the AC6005 as the RADIUS client, which of the following statements is TRUE about the authentication-free rule profile?
As shown in the figure, in order to prevent the STP packets from being transparently transmitted, the loops affect each other. The following does not need to enable the STP spanning tree protocol?