Which feature would be used to address this?

A customer is concerned about the integrity of user data tunneled between the WLA and the WLC.
Which feature would be used to address this?

A customer is concerned about the integrity of user data tunneled between the WLA and the WLC.
Which feature would be used to address this?

A.
Data Path Encryption

B.
AP Fingerprints

C.
AP Security

D.
IPsec Tunneling



Leave a Reply 0

Your email address will not be published. Required fields are marked *