Quick Contact Form
X

    ACMA (Aruba Certified Mobility Associate)

    ACMA ratifies your technical knowledge about the deployment of WLANs in enterprise environments with a single mobility controller.

    The Aruba-Certified Mobility Associate (ACMA) exam questions cover the topics listed below. The questions include key concepts, networking and topology design, GUI and CLI interpretation, GUI and CLI troubleshooting and interpretation of CLI configuration file segments.

    The Pearson/VUE administered exam consists of 40 multiple-choice questions that must be completed within 60 minutes. The exam fee is $125.

    ACMA tests your knowledge on deploying a single controller WLAN.

    Prerequisite

    Basic IT knowledge

    Product Knowledge

    1. Mobility Controllers Models
    • Understand the limits of user scaling for different controller models
    • Understand the limits of AP scaling for different controller models
    • Understand the limits of Remote AP scaling for different controller models
    • Power supplies offered for various models
    • Chassis based controller modules
    • Power-over-Ethernet support
    2. AP models
    • Indoor AP models
    • Outdoor AP models
    • Models supporting internal and external antennas
    • Antenna types offered as external antennas
    • Models supporting Power-over-Ethernet support
    • 802.11a/b/g/n support by model
    3. Licensing
    • Understand the 6.3 licensing model for all controllers
    • Understand Centralized Licensing in AOS 6.3
    • Be able to articulate the features and functions of the Aruba software licenses
    • Be able to articulate the features and functions included in the base ArubaOS
    • Models supporting Power-over-Ethernet support

    Firewall Roles and Policies

    1. Policy Design
    • Function of firewall design
    • Interpretation and troubleshooting of firewall rule policy
    • Application of firewall policy to user roles
    • Application of firewall policy to interfaces
    • Be able to articulate the difference between a stateful firewall and an access control list (ACL)
    • Describe an Ethertype ACL
    2. Roles
    • Describe the function of built-in roles
    • Describe the use and creation of user created roles
    • Understand role derivation
    3. Aliases
    • Describe the function and use of aliases
    • Understand the built in aliases
    4. NAT
    • Describe the function of source NAT
    • Describe the function of destination NAT
    • Understand the use of NAT for captive portal authentication
    • Describe VLAN based NAT functionality

    Operations

    1. Authentication
    • 802.1X
    • Pre-Shared Keys
    • Open system
    • Captive portal with credentials
    • Captive portal with guest logon
    2. Configuration of the controller using the WebUI Wizard
    • VLAN and IP address configuration
    • Port configuration
    • Network time configuration
    • Controller role configuration
    • License configuration
    • LAN configuration
    • WLAN configuration for employee SSIDs
    • WLAN configuration for guest SSIDs
    • RADIUS server configuration
    • 802.1X authentication configuration
    • Captive portal configuration and customization
    3. Management
    • Software upgrades on the controllers and APs
    • Interface layout
    • AP management
    • License management
    • Configuration screens
    • Monitoring screens
    • Security screens
    4. Power over Ethernet
    • Power provided
    • Standards
    • Transmission distances
    5. RF management and ARM
    • ARM channel and power selection
    • ARM self-healing
    • ARM band steering
    • ARM Spectrum load balancing
    • ARM Airtime fairness
    • ARM rate shaping
    • ARM ClientMatch
    • Client aware ARM scanning
    • Spectrum Monitor provisioning
    • Spectrum Monitor usage
    6. Centralized Auth and Encryption
    • Centralized encryption
    • Encryption methods
    • RADIUS authentication
    • AP Provisioning and Configuration
    • Static provisioning
    • Dynamic provisioning
    • CLI configuration
    • Web interface configuration
    • Group selection
    • Antenna provisioning
    • Serial configuration
    7. User/Server Derivation Rules
    • User derivation rules
    • Server derivation rules
    • Rule based role derivation
    8. Profiles
    • Profile concept
    • Profile hierarchy
    • Profile reuse
    9. Controller configuration methods
    • VLANs and VLAN trunking
    • IP addressing
    • Use of the loopback interface

    Planning and Design

    1. Networking
    • Layer 2 networks
    • Layer 3 networks
    • Routing
    2. Self-healing
    • AP deployment design
    • ARM functionality
    3. Layer 2 model traffic flow
    4. Layer 3 model traffic flow
    5. Captive portal
    • Authentication types
    • Authentication sources
    • Provisioning capabilities
    • Internal DB functionality
    • Guest provisioning role
    6. Controller discovery

    Troubleshooting

    1. Client Connectivity
    • User connection
    • AP status
    2. Aruba platform
    • Layer 2 connectivity
    • Layer 3 connectivity
    • Licensing
    • AP counts
    • Firewall policy
    • Role derivation
    • AP connectivity
    • DHCP
    • Controller IP
    3. Infrastructure
    • Intervening ACLs
    • DHCP

    Applications and Solutions

    1. RAP
    • Configuration
    • Licensing
    • Operation modes
    • Forwarding modes
    • Maintenance

    Implementing Aruba WLAN

    • Aruba Architecture and Features
    • Overview of Aruba OS GUI and CLI commands
    • Mobility Controller initial setup and licensing using ArubaOS wizards
    • Aruba Wireless LAN Configuration
    • Use Visual RF Plan to determine your pre-deployment placement of APs
    • Import Visual RF Plan to AirWave
    • Overview of Aruba's ARM (Adaptive Radio Management) feature
    • Use the integrated Spectrum Analyzer to monitor RF environment and device classification
    • Provisioning Aruba thin APs using wizards and the GUI
    • Implementing network firewalls through Aruba roles and policies
    • Implementing various WLAN authentication policies including most secure 802.1x, and Enterprise WPA and WPA2 methods
    • Using WLAN policies to create a Secure Guest access with Aruba's Captive Portal features
    • Remote Access Point (RAP)
    • Overview of Aruba Controller Operations and Maintenance procedures and commands

Remotraining.com. Allrights Reserved