Where should the ACL be applied to accomplish this with the least configuration?

An engineer needs to block SSH traffic going to the WLC, which does not originate on the
management interface. Where should the ACL be applied to accomplish this with the least

configuration?

An engineer needs to block SSH traffic going to the WLC, which does not originate on the
management interface. Where should the ACL be applied to accomplish this with the least

configuration?

A.
CPU

B.
Management interface

C.
WLAN interfaces

D.
SSID

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *