Q: 17
A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on the
management interface via SSH. The BIG-IP Administrator needs to restrict SSH access to the
management interface.
Where should this be accomplished?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.