The correct answer isDbecause HPE Aruba Networking focuses onidentity-based, role-driven policiesthat automatically follow users and devices across the network. This eliminates the need for manual reconfiguration of VLANs or ACLs, ensuringconsistent policy enforcementacross wired, wireless, and WAN environments. This dynamic, user- and device-centric approach is a cornerstone of Aruba’sZero Trust Securityframework.
Relevant extracts from official HPE Aruba Networking documentation:
“Dynamic Segmentation enforces consistent access and security policies that follow users and devices wherever they connect, across LAN, WLAN, and WAN.”
“By applying role-based policies centrally, Aruba solutions eliminate inconsistencies and security gaps caused by static VLANs and manual ACLs.”
“This approach ensures that policies are applied consistently regardless of location, device type, or connection method, reducing attack surfaces.”
“Aruba Zero Trust Security extends policy enforcement across the enterprise, simplifying operations while closing security gaps.”
Why the other options are incorrect:
AAruba does not rely on endpoint agents for policy enforcement; instead, it uses agentless discovery, ClearPass, and role-based access.
BAruba policies are not location-based; they are identity- and role-based, following the user/device everywhere.
CAruba does not force all traffic through a central gateway (a traditional VPN/firewall model); it applies distributed enforcement at the point of access.
References (HPE Aruba Networking Solutions / Study Guides):
Aruba Dynamic Segmentation — Solution Overview
Aruba ESP Zero Trust Security — White Paper
Aruba ClearPass Policy Manager — Technical Guide
Aruba Role-Based Access Control — Product Brief
===========
Submit