Security Basics for LTM
Before a rather nasty PC crash, I was working off a number of bookmarks to F5 docs with some best practice type security steps for securing Internet facing LTMs. I'm speaking to those steps one should take long before ever placing the device on an active connection. After going through thru a compromise first hand, I am writing a paper for this in house. I am looking for any and all suggestions people are doing today or the links to the docs they use. Keep in mind, we are running 10.1.0 HFC2 till we finish our legacy migrations.