F5 Related Exams
F5CAB1 Exam
What are the two options for securing a BIG-IP’s management interface?
(Choose two.)
A BIG-IP Administrator discovers malicious brute-force attempts to access the BIG-IP device on themanagement interfacevia SSH.
The administrator needs to restrict SSH access to the management interface.
Where should this be accomplished?
A BIG-IP Administrator upgrades the BIG-IP LTM to a newer software version. After the administrator reboots into the new volume, the configuration fails to load.
Why is the configuration failing to load?