An engineer needs to block SSH traffic going to the WLC, which does not originate on the
management interface. Where should the ACL be applied to accomplish this with the least
configuration?
A.
CPU
B.
Management interface
C.
WLAN interfaces
D.
SSID
Explanation: