Professional Documents
Culture Documents
LTM
GTM
APM
ASM
Edge Gateway
Link Controller
WOM
WebAccelerator
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
ARX Series
FirePass
192.168.1.245
27
/cong/RegKey.license
/cong/bigip.license
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
Dedicated
Moninal
Minimum
None
Lite
/etc/hsots.allow
/cong/bigip.conf
/cong/bigip_base.conf
/cong/BigDB.dat
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
*.ucs
A pool is what?
system logs
/var/log/messages
/var/log/pktlter
/var/log/ltm
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
audit logs
bugger-and-stitch- methodology
DSR
iRules
Single Device HA
Core system services being up and running on one of the two BIP-IP
systems
Connection being available between the BIP-IP system and a pool of
routers, and VLANS on the system being able to send and receive tr
ac.
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
Hard-wired failover
Network Failover
what is CongSync
a process where you replicate one units main cong le on the peer
unit.
what is a node?
the physical server itself that will receive trac from the load balan
cer
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
a member includes the TCP port of the actual application that will b
e receiving the trac
Random Algorithm
passes each new connection request to the next server in line, eve
ntually distributing connection evenly across the array of machines
being load balanced.
Fastest Algorithm
The system passes a new connection to the server that has the lea
st number of current connections. Works best with equipment all h
as similar capabilities.
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
Observed Algorithm
Predictive Algorithm
The system analyzes the trend of the ranking over time, determinin
g whether a servers performance is currently improving or declinin
g.
What is the primary reason for tracking and storing session data?
To ensure that client requests are directed to the same pool memb
er throughout the life of a session, or during subsequent sessions.
Cookie persistence
hash persistence
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
SIP Persistence
SSL Persistence
Univresal persistence
Reset on Timeout
The system sends a reset (RST) and deletes the TCP connection wh
en the connection exceeds the idle timeout value. If disabled, the s
ystem will delete the TCP connection when it exceeds the idle timeo
ut value, but will not send an RST to the client.
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
SIP
GET
POST
PUT
DELETE
HEAD
With the get method, all query parameters are mart of what?
URI
200 OK
This shows that the resource in question has not changed and the b
rowser should load it from its cache instead. This is used only when
the browser performs a conditional GET request
This indcates that the resource is protected and requires valid cred
entials before the server can grant access
This signies that the server had a problem processing the request
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
HTTP Version
Accept-Encoding: gzip, deate
Connection: Keep-Alive
If-* headers
Cache-Control or Pragma no cache
HTTP Version
connection: Keep-Alive/Close
Encoding: gzip, deate
Cach-strong headers (max-age)
Content-Type:
Date:
Accept-Ranges: bytes
instructs the browser to not cache the object that contain the meta
tag
Forces the browser to always get a full download of that object
IPSEC
-> HDR, SA
<- HDR, SA
<- HDr, KE, Ni
-> HDR, KE, Nr
<- HDY*, ID_I, [CERT], SIG_I
-> HDR*, ID_R[CERT], SIG_R
HDR ISAKMP header
SA Security Association
KE HDR,
Die-Hellman
exchanged
public value
->
SA, KE, Ni,
ID_I
Ni Nr
theSA,
nonce
<HDR,
KE, Nr, ID_R, [CERT], SIG_R
ID IHDR,
ID R [CERT],
the Initiator
Responder
->
SIG_R
CERTISAKMP
the certicate
HDR
header
SIG Security
I SIG R the
signature for the Initiator Re
SA
Association
sponder
respectively
KE
Die-Hellman
exchanged public value
Ni Nr the nonce
ID I ID R the Initiator Responder
CERT the certicate
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
What is SSL?
Handshake protocol
Change Cipher Spec protocol
Alert protocol
Application Data protocol
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
Digital Signature
MAC
Tunnel Mode
Transport Mode
Host-to-host connection. The data between the two entities are encr
ypted.
PFS
100 Continue
This means that the server has received the request headers, and
that the client should proceed to send the request body
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
This means the requester has asked the server to switch protocols
and the server is acknowledging that it will do so.
200 OK
201 Created
The request has been fullled and resulted in a new resource being
created.
202 Accepted
The request has been accepted for processing, but the processing
has not been completed. The request might or might not eventuall
y be acted upon, as it might be disallowed when processing actuall
y takes place.
204 No Content
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
207 Multi-Status
The message body that follows is an XML message and can contain
a number of separate response codes, depending on how many su
b-requests were made.
The server has fullled a GET request for the resource, and the res
ponse is a representation of the result of one or more instance-ma
nipulations applied to the current instance.
SNAT
Indicates multiple options for the resource that the client may follo
w. It, for instance, could be used to present dierent format options
for video, list les with dierent extensions, or word sense disambi
guation.
This and all future requests should be directed to the given URI.
302 Found
The response to the request can be found under another URI using
a GET method. When received in response to a POST (or PUT/DELET
E), it should be assumed that the server has received the data and
the redirect should be issued with a separate GET message.
F5 101(2)
Study this set online at: http://www.cram.com/ashcards/f5-1012-4973187
Indicates that the resource has not been modied since the version
specied by the request headers If-Modied-Since or If-Match. This
means that there is no need to retransmit the resource, since the cl
ient still has a previously-downloaded copy.
The request, and all future requests should be repeated using anoth
er URI. 307 and 308 (as proposed) parallel the behaviours of 302 a
nd 301, but do not allow the HTTP method to change. So, for exam
ple, submitting a form to a permanently redirected resource may c
ontinue smoothly.