Manual Chapter :
Example: Secure SSH traffic with the SSH Proxy
Applies To:
Show VersionsBIG-IP AFM
- 17.1.2, 17.1.1, 17.1.0, 17.0.0, 16.1.5, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0, 15.1.10, 15.1.9, 15.1.8, 15.1.7, 15.1.6, 15.1.5, 15.1.4, 15.1.3, 15.1.2, 15.1.1, 15.1.0
Example: Secure SSH traffic with the SSH Proxy
In this example, you create an SSH proxy configuration, create a virtual server for SSH
traffic, and apply the SSH proxy to the virtual server. This example contains IP addresses and
public and private keys that do not apply to your configuration, but are included for example
purposes only.
In this configuration, password or keyboard interactive authentication is used, and the SSH
proxy policy disallows SCP downloads and uploads, and terminates the tunnel connection on a REXEC
command.