Part 3: Protecting a Private Endpoint

In the previous lab you learned how a F5 Distributed Cloud Mesh node can be deployed

In this next lab we will look at an additional topology of how you can use a “F5 Distributed Cloud Mesh” node to secure traffic that is going to an endpoint that is not directly exposed to the Internet.