Architect and Deploy Applications |
- Given an expected traffic volume, determine the appropriate SNAT configuration
- Explain when SNAT is required
- Describe the benefit of using SNAT pools
- Describe the difference of SNAT object types
- Given a scenario, determine the minimum profiles for an application
- Explain security options available for the application
- Explain how to use LTM as a service proxy
- Describe how a given service is deployed on an LTM
- Given an application configuration, determine which functions can be offloaded to the LTM device
- Explain how to offload HTTP servers for SSL compression and caching
- Explain how to configure LTM to handle SSL offload
- Given an iRule functionality, determine the profiles and configuration options necessary to implement the iRule.
- Explain how to create an HTTP configuration to handle an HTTP server error
- Given application requirements, determine the appropriate profile and persistence settings.
- Explain how to create an HTTP configuration for mobile clients
- Explain how to create an HTTP configuration to optimize WAN connectivity
- Determine when connection mirroring is required
- Explain the steps necessary to configure AVR
- Explain the steps necessary to configure the AVR
- Explain how to create an AVR profile and options
- Given a set of reporting requirements, determine the AVR metrics and entities to collect
- Explain the sizing implications of AVR on the LTM device
- Explain the logging and notifications options of AVR
- Explain the uses of the collected metrics and entities
- Given a scenario, determine the appropriate monitor type and parameters to use
- Explain how to create an application specific monitor
- Given a desired outcome, determine where to apply health monitors
- Determine under which circumstances an external monitor is required
- Given a set of parameters, predict an outcome of a monitor status on other LTM device objects
- Determine the effect of a monitor on the virtual server status
- Determine the effect of active versus inline monitors on the application status or on the LTM device
- Given a health monitor configuration and pool member response predict the resulting status of the pool member
- Given a set of parameters, predict an outcome of a monitor status on other LTM objects
- Determine the effect of a monitor on the status of a node, pool member, pool and/or virtual server
- Given a set of application SSL requirements, determine the appropriate profiles and profile options
- Describe the difference between client and server SSL profiles and functionality
- Explain how to configure the different SSL profile settings
- Describe the process to update expired SSL certificates
- Given a scenario determine the steps required to maintain SSL certificates
- Describe the process to update expired SSL certificates
- Explain how to implement SSL chain certificate
- Given a set of application requirements, determine the appropriate virtual server type to use
- Describe the relationship between profiles and virtual servers
- Describe which steps are necessary to complete prior to creating the virtual server
- Describe the security features when creating a virtual server
- Explain the effect of changing different virtual server types
- Given a set of application requirements, determine the appropriate virtual server configuration settings
- Explain the effect of changing different virtual server options: types, configuration settings, and/or resource settings
- Differentiate between client side and server side settings
- Explain the matching order of multiple virtual servers
- Explain how to configure source addresses from which virtual servers can accept traffic
- Given a scenario, determine the appropriate load balancing method(s)
- Differentiate different load balancing methods
- Explain how to perform outbound load balancing
- Explain how persistence and pool member status effects load balancing decisions
- Given a scenario, describe how to configure or modify pool settings
- Describe priority group activation within a pool
- Describe the effects of Slow Ramp Time
- Describe how an iRule can effect the persistence behavior
- Explain how load balancing decisions are impacted by the statistics of nodes or pool members
- Explain the effects of action on service-now
- Explain the effect of configuration options and resource health on load balancing decisions
- Determine the effect that virtual server traffic and/or resource status will have on load balancing decisions
- Given a scenario, determine the appropriate load balancing methods
- Describe how to deploy and modify applications using existing and/or updated iApp application templates
- Identify use cases for deploying application templates
- Describe how to locate, retrieve, and import new updated application templates
- Describe how to update an existing application that was created from an iApp
|
Set-up, administer, and secure LTM devices |
- Distinguish between the management interface configuration and application
traffic interface configuration
- Explain the requirements for management of the LTM devices
- Explain the differences between the flow of management and application traffic
- Explain how to configure management connectivity options: AOM, serial console, USB & Management
- Ethernet Port
- Given a network diagram, determine the appropriate network and system settings (i.e., VLANs, self-IPs, trunks, routes, NTP servers, DNS servers, SNMP receivers and syslog servers)
- Explain the requirements for self-IPs (including port lockdown)
- Explain routing requirements for management and application traffic (including route domains and IPv6)
- Explain the effect of system time on LTM devices
- Explain how to configure remote authentication and multiple administration roles on the LTM device
- Explain the mapping between remote users and remote role groups
- Explain the options for partition access and terminal access
- Explain the uses of administrative partitions
- Explain the relationship between route domains, user roles and administrative partitions
- Explain the options for partition access and terminal access
- Given a scenario, determine an appropriate high availability configuration (i.e., failsafe, failover and timers)
- Explain how the score is calculated for HA groups
- Explain the required objects on an HA pair
- Explain how to configure device trust
- Given a scenario, describe the steps necessary to set up a device group, traffic group and HA group
- Explain how to set up sync-only and sync-failover device service cluster
- Explain how to configure HA groups
- Explain how to assign virtual servers to traffic groups
- Predict the behavior of an LTM device group or traffic groups in a given failure scenario
- Compare and contrast network and serial failovers
- Compare and contrast failover unicast and multicast
- Determine the effect of LTM features and/or modules on LTM device performance and/or memory
- Determine the effect of iRules on performance
- Determine the effect of RAM cache on performance and memory
- Determine the effect of compression on performance
- Determine the effect of modules on performance and memory
- Determine the effect of traffic levels on LTM device performance
- Explain how to use traffic groups to maximize capacity
- Determine the effect of virtual server settings on LTM device performance.
- Determine the effect of connection mirroring on performance
- Describe how to deploy or upgrade vCMP guests and how the resources are distributed.
- Identify the performance impact of vCMP guests on other guests
- Understand that the vCMP guest license is inherited from the host
- Describe how to deploy and/or upgrade vCMP guests and related dependency on host version
- Determine the appropriate LTM device security configuration to protect against a security threat
- Explain the implications of SNAT versus NAT on unintended access
- Explain the implications of forwarding virtual servers on the environment security
- Explain how to set up and enable SNMP device traps on the LTM device
- Describe the implications of port lockdown settings
|