An administrator has ArubaOS-Switches that support tunneled node. The administrator wants to tunnel all user traffic from the Ethernet ports on the switches, and have the controllers authenticate the user traffic and apply the appropriate user role.
Which implementation meets these requirements?
A. Role-based tunneled node with the controllers configured for standalone mode
B. Role-based tunneled node with the controllers configured in a cluster
C. Per-port tunneled node with the controllers configured for standalone mode
D. Per-port tunneled node with the controllers configured in a cluster
I bet C – EE is right. Table in module 16.
C.
Port-Based Tunnel – Supported in standalone MC, NO cluster support
absolutely correct
thanks