A. 900 MHz
B. 5 MHz
C. 2.4 GHz
D. 5 GHz
E. 2.4 MHz
A. Distance to Controller
B. AP Type
C. PHY Type
D. Desired Data Rate
E. Environment
A. Station
B. End node
C. Client Device
D. Supplicant
E. Authenticated Client
A. If multiple servers are assigned to the server group, all except the 1st will be ignored
B. A server group can have more than 1 server
C. Server rules are used to send information to the configured servers
D. All the servers in a server group will be used round robin style
E. If the internal database is used in the server group, then no external servers can be added
A. Use restrictive firewall policies to limit the guest user's access to internal resources
B. Providing guests their own APs and controllers
C. Authenticate users with the internal captive portal against the internal database or other server
D. Dedicated APs
E. DoS guest users off of the system and make them use wired ports
A. Service
B. Mirror
C. Destination
D. Action
E. Policy
A. Changes to policy rules that use aliases are auto updated.
B. Can be applied to a Role
C. Simplifies repetitive configuration.
D. End users are applied to the proper role.
E. Makes policies more readable.