Which configuration method can be used to restrict access to the NSIP?

Prepare for the Citrix ADC 1Y0-241 exam. Study with multiple choice questions, hints, and detailed explanations to enhance your traffic management skills. Boost your readiness for the certification!

Multiple Choice

Which configuration method can be used to restrict access to the NSIP?

Explanation:
Using an Access Control List to restrict management access to the NSIP. An ACL filters traffic by source IP, so you can permit management traffic only from trusted networks and block everything else from reaching the NetScaler’s NSIP. This is the standard way to control who can access the management interface over protocols like SSH or HTTPS, directly at the network edge. Other options don’t fit this specific need as cleanly: a command policy limits what commands can be run on the device but doesn’t control who can reach the NSIP; authentication and authorization policies govern user identity and what they can do after logging in, not the IP-based access to the management IP. So the correct approach is applying an ACL to the NSIP.

Using an Access Control List to restrict management access to the NSIP.

An ACL filters traffic by source IP, so you can permit management traffic only from trusted networks and block everything else from reaching the NetScaler’s NSIP. This is the standard way to control who can access the management interface over protocols like SSH or HTTPS, directly at the network edge.

Other options don’t fit this specific need as cleanly: a command policy limits what commands can be run on the device but doesn’t control who can reach the NSIP; authentication and authorization policies govern user identity and what they can do after logging in, not the IP-based access to the management IP. So the correct approach is applying an ACL to the NSIP.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy