3:33 the two servers are members of the pool and "not the pool". The right context is very important for understanding. Great video all the same.
@babakb2k811 ай бұрын
Thanks for the video. very helpful! One drawback of this method is that the back-end servers (pool members) will be exposed to the client network. It is important to use proper access-control methods and measures to make sure only traffic coming from F5 is accepted by the servers. However, direct connectivity between clients and pool members can be considered as a last resort option for high-impact outage.
@mohamedkamal35142 ай бұрын
Excellent
@JaferSabir2 ай бұрын
Thank you 😊
@Cybersecurity_For_Dummies2 жыл бұрын
very clear explanation... thanks
@JaferSabir2 жыл бұрын
Thank you Mohamed
@Techfortress-6163 жыл бұрын
Perfect explanation. (y). request you to also make video on LB methods?