Q: 14
Given: Your network includes a controller-based WLAN architecture with centralized data forwarding.
The AP builds an encrypted tunnel to the WLAN controller. The WLAN controller is uplinked to the
network via a trunked 1 Gbps Ethernet port supporting all necessary VLANs for management,
control, and client traffic.
What processes can be used to force an authenticated WLAN client's data traffic into a specific VLAN
as it exits the WLAN controller interface onto the wired uplink? (Choose 3)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.