For more information regarding the security incident at F5, the actions we are taking to address it, and our ongoing efforts to protect our customers, click here.

Forum Discussion

1 Reply

  • It is a two step process.

     

    1. Create an Access Policy.
    2. Create a Virtual Server using the new Access Policy.

    For information on how to do these things you need to spend some time at F5 university on those products. It is far and away too complex to explain such a thing here.