A customer is concerned about the integrity of user data tunneled between the WLA and the WLC.
Which feature would be used to address this?
A.
Data Path Encryption
B.
AP Fingerprints
C.
AP Security
D.
IPsec Tunneling
A customer is concerned about the integrity of user data tunneled between the WLA and the WLC.
Which feature would be used to address this?
A customer is concerned about the integrity of user data tunneled between the WLA and the WLC.
Which feature would be used to address this?
A.
Data Path Encryption
B.
AP Fingerprints
C.
AP Security
D.
IPsec Tunneling