Part 3 of this series describes how to configure the TLS protocol version on the ASM gateway to enhance website security.
Part 4 of this series explains traffic mirroring, typical traffic mirroring scenarios, and how to enable/use traffic mirroring across clusters.