The scenario involves an HPE Aruba Networking Mobility Controller (MC) that is physically secured in a locked closet, which provides protection against physical tampering. However, additional steps are needed to protect the MC from unauthorized access, particularly through administrative interfaces (e.g., SSH, web UI, console).
Option A, "Set the local admin password to a long random value that is unknown or locked up securely," is correct. HPE Aruba Networking recommends securing administrative access to the MC by setting a strong, random password for the local admin account (e.g., the default "admin" user). The password should be long (e.g., 16+ characters), random, and stored securely (e.g., in a password manager or safe). This ensures that even if an attacker gains physical access to the MC (e.g., by bypassing the locked closet) or attempts remote access, they cannot easily guess or brute-force the password.
Option B, "Disable local authentication of administrators entirely," is incorrect. Disabling local authentication entirely would prevent any fallback access to the MC if external authentication (e.g., RADIUS, TACACS+) fails. HPE Aruba Networking recommends maintaining a local admin account as a backup, but securing it with a strong password.
Option C, "Change the password recovery password," is incorrect. AOS-8 Mobility Controllers do not have a specific "password recovery password." Password recovery typically involves physical access to the device (e.g., via the console port) and a factory reset, which would be mitigated by the locked closet. This option is not a standard recommendation for securing the MC.
Option D, "Use local authentication rather than external authentication to authenticate admins," is incorrect. HPE Aruba Networking recommends using external authentication (e.g., RADIUS or TACACS+) for centralized management and stronger security (e.g., two-factor authentication). Local authentication should be a fallback, not the primary method, and it must be secured with a strong password.
The HPE Aruba Networking AOS-8 8.11 User Guide states:
"To protect the Mobility Controller from unauthorized access, even if it is physically secured in a locked closet, set the local admin password to a long, random value that is unknown or locked up securely. For example, use a password of at least 16 characters generated by a password manager, and store it in a secure location (e.g., a safe). This ensures that the local admin account, which is used as a fallback, is protected against unauthorized access attempts." (Page 385, Securing Administrative Access Section)
Additionally, the HPE Aruba Networking Security Best Practices Guide notes:
"A recommended step to secure the Mobility Controller is to set a strong, random password for the local admin account. The password should be long (e.g., 16+ characters), randomly generated, and stored securely to prevent unauthorized access, even if the device is physically protected in a locked closet." (Page 28, Administrative Security Section)
[References:, HPE Aruba Networking AOS-8 8.11 User Guide, Securing Administrative Access Section, Page 385., HPE Aruba Networking Security Best Practices Guide, Administrative Security Section, Page 28.===========]