Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free HP HPE6-A84 Practice Exam with Questions & Answers

Questions 1

Refer to the scenario.

# Introduction to the customer

You are helping a company add Aruba ClearPass to their network, which uses Aruba network infrastructure devices.

The company currently has a Windows domain and Windows CA. The Window CA issues certificates to domain computers, domain users, and servers such as domain controllers. An example of a certificate issued by the Windows CA is shown here.

HPE6-A84 Question 1

HPE6-A84 Question 1

The company is in the process of adding Microsoft Endpoint Manager (Intune) to manage its mobile clients. The customer is maintaining the on-prem AD for now and uses Azure AD Connect to sync with Azure AD.

# Requirements for issuing certificates to mobile clients

The company wants to use ClearPass Onboard to deploy certificates automatically to mobile clients enrolled in Intune. During this process, Onboard should communicate with Azure AD to validate the clients. High availability should also be provided for this scenario; in other words, clients should be able to get certificates from Subscriber 2 if Subscriber 1 is down.

The Intune admins intend to create certificate profiles that include a UPN SAN with the UPN of the user who enrolled the device.

# Requirements for authenticating clients

The customer requires all types of clients to connect and authenticate on the same corporate SSID.

The company wants CPPM to use these authentication methods:

HPE6-A84 Question 1EAP-TLS to authenticate users on mobile clients registered in Intune

HPE6-A84 Question 1TEAR, with EAP-TLS as the inner method to authenticate Windows domain computers and the users on them

To succeed, EAP-TLS (standalone or as a TEAP method) clients must meet these requirements:

HPE6-A84 Question 1Their certificate is valid and is not revoked, as validated by OCSP

HPE6-A84 Question 1The client’s username matches an account in AD

# Requirements for assigning clients to roles

After authentication, the customer wants the CPPM to assign clients to ClearPass roles based on the following rules:

HPE6-A84 Question 1Clients with certificates issued by Onboard are assigned the “mobile-onboarded” role

HPE6-A84 Question 1Clients that have passed TEAP Method 1 are assigned the “domain-computer” role

HPE6-A84 Question 1Clients in the AD group “Medical” are assigned the “medical-staff” role

HPE6-A84 Question 1Clients in the AD group “Reception” are assigned to the “reception-staff” role

The customer requires CPPM to assign authenticated clients to AOS firewall roles as follows:

HPE6-A84 Question 1Assign medical staff on mobile-onboarded clients to the “medical-mobile” firewall role

HPE6-A84 Question 1Assign other mobile-onboarded clients to the “mobile-other” firewall role

HPE6-A84 Question 1Assign medical staff on domain computers to the “medical-domain” firewall role

HPE6-A84 Question 1All reception staff on domain computers to the “reception-domain” firewall role

HPE6-A84 Question 1All domain computers with no valid user logged in to the “computer-only” firewall role

HPE6-A84 Question 1Deny other clients access

# Other requirements

Communications between ClearPass servers and on-prem AD domain controllers must be encrypted.

# Network topology

For the network infrastructure, this customer has Aruba APs and Aruba gateways, which are managed by Central. APs use tunneled WLANs, which tunnel traffic to the gateway cluster. The customer also has AOS-CX switches that are not managed by Central at this point.

HPE6-A84 Question 1

# ClearPass cluster IP addressing and hostnames

A customer’s ClearPass cluster has these IP addresses:

HPE6-A84 Question 1Publisher = 10.47.47.5

HPE6-A84 Question 1Subscriber 1 = 10.47.47.6

HPE6-A84 Question 1Subscriber 2 = 10.47.47.7

HPE6-A84 Question 1Virtual IP with Subscriber 1 and Subscriber 2 = 10.47.47.8

The customer’s DNS server has these entries

HPE6-A84 Question 1cp.acnsxtest.com = 10.47.47.5

HPE6-A84 Question 1cps1.acnsxtest.com = 10.47.47.6

HPE6-A84 Question 1cps2.acnsxtest.com = 10.47.47.7

HPE6-A84 Question 1radius.acnsxtest.com = 10.47.47.8

HPE6-A84 Question 1onboard.acnsxtest.com = 10.47.47.8

On CPPM, you are creating the authentication method shown in the exhibit below:

HPE6-A84 Question 1

You will use the method for standalone EAP-TLS and for inner methods in TEAP.

What should you do?

Options:
A.

Configure OCSP override and set the OCSP URL to localhost/onboard/mdps ocspphp/2

B.

Enable certificate comparison.

C.

Enable authorization.

D.

Configure OCSP override and leave the OCSP URL blank.

HP HPE6-A84 Premium Access
Questions 2

Refer to the scenario.

A customer requires these rights for clients in the “medical-mobile” AOS firewall role on Aruba Mobility Controllers (MCs):

HPE6-A84 Question 2Permitted to receive IP addresses with DHCP

HPE6-A84 Question 2Permitted access to DNS services from 10.8.9.7 and no other server

HPE6-A84 Question 2Permitted access to all subnets in the 10.1.0.0/16 range except denied access to 10.1.12.0/22

HPE6-A84 Question 2Denied access to other 10.0.0.0/8 subnets

HPE6-A84 Question 2Permitted access to the Internet

HPE6-A84 Question 2Denied access to the WLAN for a period of time if they send any SSH traffic

HPE6-A84 Question 2Denied access to the WLAN for a period of time if they send any Telnet traffic

HPE6-A84 Question 2Denied access to all high-risk websites

External devices should not be permitted to initiate sessions with “medical-mobile” clients, only send return traffic.

The exhibits below show the configuration for the role.

HPE6-A84 Question 2

There are multiple issues with this configuration. What is one change you must make to meet the scenario requirements? (In the options, rules in a policy are referenced from top to bottom. For example, “medical-mobile” rule 1 is “ipv4 any any svc-dhcp permit,” and rule 8 is “ipv4 any any any permit”.)

Options:
A.

In the “medical-mobile” policy, move rules 2 and 3 between rules 7 and 8.

B.

In the “medical-mobile” policy, change the subnet mask in rule 3 to 255.255.248.0.

C.

Move the rule in the “apprf-medical-mobile-sacl” policy between rules 7 and 8 in the “medical-mobile” policy.

D.

In the “medical-mobile” policy, change the source in rule 8 to “user.”

Questions 3

Refer to the scenario.

An organization wants the AOS-CX switch to trigger an alert if its RADIUS server (cp.acnsxtest.local) rejects an unusual number of client authentication requests per hour. After some discussions with other Aruba admins, you are still not sure how many rejections are usual or unusual. You expect that the value could be different on each switch.

You are helping the developer understand how to develop an NAE script for this use case.

You are helping a customer define an NAE script for AOS-CX switches. The script will monitor statistics from a RADIUS server defined on the switch. You want to future proof the script by enabling admins to select a different hostname or IP address for the monitored RADIUS server when they create an agent from the script.

What should you recommend?

Options:
A.

Use this variable, %{radius-ipV when defining the monitor URI in the NAE agent script.

B.

Define a parameter for the RADIUS server; reference that parameter instead of the server name/ip when defining the monitor URI.

C.

Use a callback action to collect the name of any RADIUS servers defined on the switch at the time the agent is created.

D.

Make the script editable so that admins can edit it on demand when they are creating scripts.

Questions 4

A customer requires a secure solution for connecting remote users to the corporate main site. You are designing a client-to-site virtual private network (VPN) based on Aruba VIA and Aruba Mobility Controllers acting as VPN Concentrators (VPNCs). Remote users will first use the VIA client to contact the VPNCs and obtain connection settings.

The users should only be allowed to receive the settings if they are the customer's “RemoteEmployees” AD group. After receiving the settings, the VIA clients will automatically establish VPN connections, authenticating to CPPM with certificates.

What should you do to help ensure that only authorized users obtain VIA connection settings?

Options:
A.

Set up the VPNCs' VIA web authentication profile to use CPPM as the authentication server; set up a service on CPPM that uses AD as the authentication source.

B.

Set up the VPNCs' VIA web authentication profile to use an AD domain controller as the LDAP server.

C.

Set up the VPNCs' VIA connection profile to use two authentication profiles, one RADIUS profile to CPPM and one LDAP profile to AD.

D.

Set up the VPNCs' VIA connection profile to use one authentication profile, which is set to the AD domain controller's hostname.

Questions 5

Refer to the exhibit.

HPE6-A84 Question 5

A customer requires protection against ARP poisoning in VLAN 4. Below are listed all settings for VLAN 4 and the VLAN 4 associated physical interfaces on the AOS-CX access layer switch:

HPE6-A84 Question 5

What is one issue with this configuration?

Options:
A.

ARP proxy is not enabled on VLAN 4.

B.

LAG 1 is configured as trusted for ARP inspection but should be untrusted.

C.

DHCP snooping is not enabled on VLAN 4.

D.

Edge ports are not configured as untrusted for ARP inspection.

Questions 6

Refer to the scenario.

A customer has an AOS10 architecture that is managed by Aruba Central. Aruba infrastructure devices authenticate clients to an Aruba ClearPass cluster.

In Aruba Central, you are examining network traffic flows on a wireless IoT device that is categorized as “Raspberry Pi” clients. You see SSH traffic. You then check several more wireless IoT clients and see that they are sending SSH also.

You want a fast way to find a list of all the IoT clients that have used SSH.

What step can you take?

Options:
A.

Create and apply a Central client profile tag that selects the SSH application and the clients' category.

B.

Run a search for SSH traffic and loT client IDs in Aruba ClearPass Policy Manager's (CPPM's) accounting information.

C.

Use Central's Live Events monitoring tool to detect which clients meet the desired criteria.

D.

Use Central's Gateway IDS/IPS Security Dashboard to search for SSH events and sources.

Questions 7

You are working with a developer to design a custom NAE script for a customer. The NAE agent should trigger an alert when ARP inspection drops packets on a VLAN. The customer wants the admins to be able to select the correct VLAN ID for the agent to monitor when they create the agent.

What should you tell the developer to do?

Options:
A.

Use this variable, %{vlan-id} when defining the monitor URI in the NAE agent script.

B.

Define a VLAN ID parameter; reference that parameter when defining the monitor URI.

C.

Create multiple monitors within the script from which admins can select when they create the agent.

D.

Use a callback action to collect the ID of the VLAN on which admins have enabled NAE monitoring.

Questions 8

Refer to the scenario.

# Introduction to the customer

You are helping a company add Aruba ClearPass to their network, which uses Aruba network infrastructure devices.

The company currently has a Windows domain and Windows CA. The Window CA issues certificates to domain computers, domain users, and servers such as domain controllers. An example of a certificate issued by the Windows CA is shown here.

HPE6-A84 Question 8

HPE6-A84 Question 8

The company is in the process of adding Microsoft Endpoint Manager (Intune) to manage its mobile clients. The customer is maintaining the on-prem AD for now and uses Azure AD Connect to sync with Azure AD.

# Requirements for issuing certificates to mobile clients

The company wants to use ClearPass Onboard to deploy certificates automatically to mobile clients enrolled in Intune. During this process, Onboard should communicate with Azure AD to validate the clients. High availability should also be provided for this scenario; in other words, clients should be able to get certificates from Subscriber 2 if Subscriber 1 is down.

The Intune admins intend to create certificate profiles that include a UPN SAN with the UPN of the user who enrolled the device.

# Requirements for authenticating clients

The customer requires all types of clients to connect and authenticate on the same corporate SSID.

The company wants CPPM to use these authentication methods:

HPE6-A84 Question 8EAP-TLS to authenticate users on mobile clients registered in Intune

HPE6-A84 Question 8TEAR, with EAP-TLS as the inner method to authenticate Windows domain computers and the users on them

To succeed, EAP-TLS (standalone or as a TEAP method) clients must meet these requirements:

HPE6-A84 Question 8Their certificate is valid and is not revoked, as validated by OCSP

HPE6-A84 Question 8The client’s username matches an account in AD

# Requirements for assigning clients to roles

After authentication, the customer wants the CPPM to assign clients to ClearPass roles based on the following rules:

HPE6-A84 Question 8Clients with certificates issued by Onboard are assigned the “mobile-onboarded” role

HPE6-A84 Question 8Clients that have passed TEAP Method 1 are assigned the “domain-computer” role

HPE6-A84 Question 8Clients in the AD group “Medical” are assigned the “medical-staff” role

HPE6-A84 Question 8Clients in the AD group “Reception” are assigned to the “reception-staff” role

The customer requires CPPM to assign authenticated clients to AOS firewall roles as follows:

HPE6-A84 Question 8Assign medical staff on mobile-onboarded clients to the “medical-mobile” firewall role

HPE6-A84 Question 8Assign other mobile-onboarded clients to the “mobile-other” firewall role

HPE6-A84 Question 8Assign medical staff on domain computers to the “medical-domain” firewall role

HPE6-A84 Question 8All reception staff on domain computers to the “reception-domain” firewall role

HPE6-A84 Question 8All domain computers with no valid user logged in to the “computer-only” firewall role

HPE6-A84 Question 8Deny other clients access

# Other requirements

Communications between ClearPass servers and on-prem AD domain controllers must be encrypted.

# Network topology

For the network infrastructure, this customer has Aruba APs and Aruba gateways, which are managed by Central. APs use tunneled WLANs, which tunnel traffic to the gateway cluster. The customer also has AOS-CX switches that are not managed by Central at this point.

HPE6-A84 Question 8

# ClearPass cluster IP addressing and hostnames

A customer’s ClearPass cluster has these IP addresses:

HPE6-A84 Question 8Publisher = 10.47.47.5

HPE6-A84 Question 8Subscriber 1 = 10.47.47.6

HPE6-A84 Question 8Subscriber 2 = 10.47.47.7

HPE6-A84 Question 8Virtual IP with Subscriber 1 and Subscriber 2 = 10.47.47.8

The customer’s DNS server has these entries

HPE6-A84 Question 8cp.acnsxtest.com = 10.47.47.5

HPE6-A84 Question 8cps1.acnsxtest.com = 10.47.47.6

HPE6-A84 Question 8cps2.acnsxtest.com = 10.47.47.7

HPE6-A84 Question 8radius.acnsxtest.com = 10.47.47.8

HPE6-A84 Question 8onboard.acnsxtest.com = 10.47.47.8

You cannot see flow attributes for wireless clients.

What should you check?

Options:
A.

Deep packet inspection is enabled on the role to which the Aruba APs assign the wireless clients.

B.

Firewall application visibility is enabled on the Aruba gateways, and the gateways have been rebooted.

C.

Gateway IDS/IPS is enabled on the Aruba gateways, and the gateways have been rebooted.

D.

Deep packet inspection is enabled on the Aruba Aps, and the APs have been rebooted.

Questions 9

You are designing an Aruba ClearPass Policy Manager (CPPM) solution for a customer. You learn that the customer has a Palo Alto firewall that filters traffic between clients in the campus and the data center.

Which integration can you suggest?

Options:
A.

Sending Syslogs from the firewall to CPPM to signal CPPM to change the authentication status for misbehaving clients

B.

Importing clients' MAC addresses to configure known clients for MAC authentication more quickly

C.

Establishing a double layer of authentication at both the campus edge and the data center DMZ

D.

Importing the firewall's rules to program downloadable user roles for AOS-CX switches more quickly

Questions 10

Refer to the scenario.

A customer requires these rights for clients in the “medical-mobile” AOS firewall role on Aruba Mobility Controllers (MCs):

HPE6-A84 Question 10Permitted to receive IP addresses with DHCP

HPE6-A84 Question 10Permitted access to DNS services from 10.8.9.7 and no other server

HPE6-A84 Question 10Permitted access to all subnets in the 10.1.0.0/16 range except denied access to 10.1.12.0/22

HPE6-A84 Question 10Denied access to other 10.0.0.0/8 subnets

HPE6-A84 Question 10Permitted access to the Internet

HPE6-A84 Question 10Denied access to the WLAN for a period of time if they send any SSH traffic

HPE6-A84 Question 10Denied access to the WLAN for a period of time if they send any Telnet traffic

HPE6-A84 Question 10Denied access to all high-risk websites

External devices should not be permitted to initiate sessions with “medical-mobile” clients, only send return traffic.

The exhibits below show the configuration for the role.

HPE6-A84 Question 10

What setting not shown in the exhibit must you check to ensure that the requirements of the scenario are met?

Options:
A.

That denylisting is enabled globally on the MCs’ firewalls

B.

That stateful handling of traffic is enabled globally on the MCs’ firewalls and on the medical-mobile role.

C.

That AppRF and WebCC are enabled globally and on the medical-mobile role

D.

That the MCs are assigned RF Protect licenses