An administrator has ArubaOS-Switches that support tunneled node. The administrator wants to tunnel all user traffic from the Ethernet ports on the switches, and have the controllers authenticate the user traffic and apply the appropriate user role.
Which implementation meets these requirements?