F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 LTM Local Traffic Manager Full proxy between users and application servers. Creates a layer o f abstraction to secure, optimize, and load balance application traffi c. GTM Global Traffic Manager Automatically routes connections to the closest or best performing data center in the event of an outage, overload, or other disruption . APM Access Policy Manager Provides secure, context-aware , and policy-based access control. It centralizes and simplifies AAA management directly on the BIG-IP s ystem ASM Advanced web application firewall that protects critical applications and their data by defending against application specific attacks that bypass conventional firewalls Edge Gateway Provides SSL VPN remote access security with applications accelera tion and optimization services at the edge of the network. Link Controller Prevents costly downtime due to ISP problems or other link failures by autmatically switching traffic to alternate ISP connections and en suring use of the fastest available connection WOM WAN optimization Manager Overcomes network and application issues on the WAN to ensure th at application performance, data replication, and disaster recovery requirements are met. WebAccelerator Give your users an instant improvement in web application perform ance ad helps reduce costs. By offloading your network and server s, BIG-IP WEBaccelerator decreases your spending on additional ba ndwidth and new hardware F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 ARX Series Evnable you to dramatically simplify data management and reduce storage costs. File virtualization results in dramatic improvement in cost,agility an d business efficiency FirePass Allows users secure access from anywhere they have an Internet c onnection, while Firepass ensures that connected computers are full y patched and protefcted 4 LTM inital set up steps 1. Setup MGMT port IP address via config utility 2. License the system through web interface 3. Run the setup utility Default ltm MGMT port IP address? 192.168.1.245 To gain a license, you need to use your registration key to generag e what? a Dossier and them present the dossier to the license server Base registration key is how many characters? 27 Systems are shipped with your registration key where? /config/RegKey.license After generating the dossier, what is it names and where is it locat ed? /config/bigip.license F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 Dedicated designed for situations wher eonyl one module is functional on the s ystem, such as GTM Moninal Gives the module its minimun functional resources and distributes a dditional resources to the module if they are available. Minimum Give the module minimum functional resources and distributes addi tional resources to other modules. None Designed for situation where another module need dedicated acces s to resources Lite Available for selected modules granting limited feartures for trials Setup Utility includes the following: Self-IP Addresses and Netmasks for VLANS Assign interfaces to VLANs IP address of the default route root password for cli admin password for gui ip address allowed for ssh Administrative IP access Files: /etc/hsots.allow Interface and configuration files: /config/bigip.conf /config/bigip_base.conf /config/BigDB.dat F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 Default terminal settings for console access.. 8-N-1 19,200 bps File extension for backups *.ucs pool members are? each of the actual servers used for client traffic. includes and IP address and port The devices represented by the IP addreses of pool membera are c alled what? Nodes -- they may represent multiple pool members A pool is what? A group of pool members. system logs /var/log/messages packet filter logs /var/log/pktfilter local traffic logs /var/log/ltm F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 audit logs Displays system configuration chagnes by user ad time. A Full proxy maintains how many session tables? 2 bugger-and-stitch- methodology Proxy buffers a connection, often through the TCP handshake proce ss and potentially into the first few packets of application data, but then stitches a connection to a given server on the back-end using either layer 4 or layer 7 data. DSR Direct Server Return Requests are proxied by the deice, but the responses do not return through the device. Known as a half proxy because only half the co nnection is proxied. what is a proxy-based design A fill proxy completely understand the protocols, and is itself an en dpoint and an originator for the protocols. The connections between a client and the full proxy is fully independent of the connection bet ween the full proxy and the server. iRules scripts created using TCL with custom F5 extensions that enables us ers to create unique functions triggered from TMOS events. Single Device HA -Core services being up and running on that device -VLANs being able to send and receive traffic Redundant system configuration HA Core system services being up and running on one of the two BIP-IP systems Connection being available between the BIP-IP system and a pool of routers, and VLANS on the system being able to send and receive tr affic. F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 Hard-wired failover you enable failover by using a failover cable to physically connect t he two dedundant units default setting Network Failover Enable failover by configuring redundant system to use the network to determine the statuc of the active unit. what is ConfigSync a process where you replicate one units main config file on the peer unit. What does SNAT do? Secure Network Address Translation maps the source client IP in a request to a translation address defin ed on the BIG-IP device what is Intelligent SNAT the mapping of one or more original client IP address to a translatio n address. However, you impliment this type of SNAT mapping withi n an iRule Can be based on any piece of packet data you specifiy how to monitor the number of concurrent connections going throug h the SNAT? tmsh show /ltm snat Auto Last Hop Is a global setting that is used to track the source MAC address of i ncoming connections. Allows the BIG-IP system to send return traffic from pools to the MA C address that transmitted the request, even though the routing tab le points to a different network or interface. what is a node? the physical server itself that will receive traffic from the load balan cer F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 How is a member different than a node? What is a basic load balancing transaction... a member includes the TCP port of the actual application that will b e receiving the traffic 1. Client attempts to connect with the service on the load balancer 2. LB accepts the connection, and changes the destination IP to mat ch the service of the selected host 3. Host accepts the connection and responds back to the original so urce, the client, via its default route 4. The LB intercepts the return packet from the host and now chang es the source IP to match the virtual server IP and port, and forwar ds packet 5. Clients receives the return packet, believing that it came from th e virtual server. Random Algorithm randomly distributes load across the servers availables. Round Robin Algorithm passes each new connection request to the next server in line, eve ntually distributing connection evenly across the array of machines being load balanced. Weighted Route Robin Algorithm(Ratio) Algorithm the number of connections that each machine receives over time is proportionate to a ratio weight you define for each machine Dynamic Round Robin (dynamic ratio) Algorithm Weights are based on continuous monitoring of the servers and are therefore continually changing. Distributed based on real-time serve r performance analysis. Fastest Algorithm Passes a new connection based on the fastest response time of all server. Least Connections Algorithm The system passes a new connection to the server that has the lea st number of current connections. Works best with equipment all h as similar capabilities. F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 Observed Algorithm Uses a combination of the logic used in the Least Connections and F astest Algorithms to load balance connections to servers. Servers a re ranked based on current connections and response time. Predictive Algorithm The system analyzes the trend of the ranking over time, determinin g whether a servers performance is currently improving or declinin g. What is the primary reason for tracking and storing session data? To ensure that client requests are directed to the same pool memb er throughout the life of a session, or during subsequent sessions. what is a Persistence Profile? a pre-configured obect that automatically enables persistence when you assign the profile to a VS Cookie persistence Cookie persistence uses an HTTP cookie stored on a clients comput er to allow the client to reconnect to the same server previously vis ited at a web site. Destination address affinity persistence Also known as sticky persistence, destination address affinity persis tence supports TCP and UDP protocols, and directs session requests to the same server based solely on the destination IP address of a packet. hash persistence Hash persistence allows you to create a persistence hash based on an existing iRule Microsoft® Remote Desktop Protocol persistence Microsoft® Remote Desktop Protocol (MSRDP) persistence tracks se ssions between clients and servers running the Microsoft® Remote Desktop Protocol (RDP) service. F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 SIP Persistence SIP persistence is a type of persistence used for servers that receiv e Session Initiation Protocol (SIP) messages sent through UDP, SCTP , or TCP. Source address affinity persistence Also known as simple persistence, source address affinity persisten ce supports TCP and UDP protocols, and directs session requests to the same server based solely on the source IP address of a packet. SSL Persistence SSL persistence is a type of persistence that tracks non-terminated SSL sessions, using the SSL session ID. Univresal persistence Universal persistence allows you to write an expression that defines what to persist on in a packet. The expression, written using the sa me expression syntax that you use in iRulesTM, defines some sequ ence of bytes to use as a session identifier. What is the Positive Security Model One that defines what is allowed, and rejects everything else. What is the Negative Security Model Defines what is disallowed, while implicitly allowing everything else. Benefit of the Positive Security Model Reset on Timeout Is that new attacks, not anticipated by the admin/deveoper, will be prevented. The system sends a reset (RST) and deletes the TCP connection wh en the connection exceeds the idle timeout value. If disabled, the s ystem will delete the TCP connection when it exceeds the idle timeo ut value, but will not send an RST to the client. F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 SIP Session Initiated Protocol Application layer protocol that can establish, modify, and terminate multimedia sessions such as Internet telephony calls. HTTP Header Methods? GET POST PUT DELETE HEAD With the get method, all query parameters are mart of what? URI 200 OK This indicates a success 304 Not Modified This shows that the resource in question has not changed and the b rowser should load it from its cache instead. This is used only when the browser performs a conditional GET request 404 Not Found This suggests that the resource requested cannot be found on the s erver 401 Authorization Required This indcates that the resource is protected and requires valid cred entials before the server can grant access 500 Internal Error This signifies that the server had a problem processing the request F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 most important browser headers? HTTP Version Accept-Encoding: gzip, deflate Connection: Keep-Alive If-* headers Cache-Control or Pragma no cache Most important web server headers? HTTP Version connection: Keep-Alive/Close Encoding: gzip, deflate Cach-strong headers (max-age) Content-Type: Date: Accept-Ranges: bytes no-cache meta tag instructs the browser to not cache the object that contain the meta tag Forces the browser to always get a full download of that object refresh meta tag often used to mimic an HTTP 302 redirect response. Tells the browser to override the browser's cache settings and reval idate every object referenced by the refresh tag. IPSEC IP layer protocol that enables the sending and receiving of cryptogr aphically protected pachets of any times (TCP, UDP, ICMP) without a ny modification What two cryptographic services does IPSec provide? 1. confidentiality and authenticity (Encapsulated Security Payload) 2. Or authenticity only. (Authentication Header) Main Mode exchanges Aggressive Mode Exchanges -> HDR, SA <- HDR, SA <- HDr, KE, Ni -> HDR, KE, Nr <- HDY*, ID_I, [CERT], SIG_I -> HDR*, ID_R[CERT], SIG_R HDR ISAKMP header SA Security Association KE HDR, Diffie-Hellman exchanged public value -> SA, KE, Ni, ID_I Ni Nr theSA, nonce <HDR, KE, Nr, ID_R, [CERT], SIG_R ID IHDR, ID R [CERT], the Initiator Responder -> SIG_R CERTISAKMP the certicate HDR header SIG Security I SIG R the signature for the Initiator Re SA Association sponder respectively KE Diffie-Hellman exchanged public value Ni Nr the nonce ID I ID R the Initiator Responder CERT the certicate F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 What does Phase 2 do? Negotiates the cipher and authentication algorithm required to prote ct further transactions. What does Phase 1 do? Performs mutual authentication and produces the encryption key re quired to protect Phase 2. What is SSL? an application layer protocol. Mostly utilized to protect HTTP transac tions, and has been used for other purposed like IMAP and POP3 Only compatible with applications running over TCP SSL is composed of what 4 protocols? Handshake protocol Change Cipher Spec protocol Alert protocol Application Data protocol What is the handshake protocol used for? To perform authentication and key exchanges What is the Change Cipher Spec Protocol used for? To indicate that the chosen keys will now be used What is the Alert protocol used for? Signaling errors and session closure What is the application data protocol used for? to transmist and receive encrypted data F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 Hash algoritms used in SSL "Client Authentication"? ND5 and SHA-1 IPSec supports the use of Digital Signature ad the use of a Secret K Ey Alforithm, where SSL supports only the use of what? Digital Signature MAC Message Authentication Code Used for authentication the exchanged messages after the connecti on is established. What two connection modes what IPSec have? Tunnel Mode Transport Mode What is Tunnel mode? Established between gateway-to-gateway, gateway-to-host, and hos t-to-host. It established a tunnel between the endpoint and it requir es adding a new IP header to the original packet What is Transport mode? Host-to-host connection. The data between the two entities are encr ypted. PFS Perfect Forward Secrecy Exchanges new DH values each time a session is resumed 100 Continue This means that the server has received the request headers, and that the client should proceed to send the request body F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 101 Switching Protocols This means the requester has asked the server to switch protocols and the server is acknowledging that it will do so. 200 OK Standard response for successful HTTP requests. 201 Created The request has been fulfilled and resulted in a new resource being created. 202 Accepted The request has been accepted for processing, but the processing has not been completed. The request might or might not eventuall y be acted upon, as it might be disallowed when processing actuall y takes place. 203 Non-Authoritative Information (since HTTP/1.1) The server successfully processed the request, but is returning info rmation that may be from another source. 204 No Content The server successfully processed the request, but is not returning any content. Usually used as a response to a successful delete requ est. 205 Reset Content The server successfully processed the request, but is not returning any content. Unlike a 204 response, this response requires that the requester reset the document view. 206 Partial Content The server is delivering only part of the resource due to a range he ader sent by the client. The range header is used by tools like wget to enable resuming of interrupted downloads, or split a download in to multiple simultaneous streams. F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 207 Multi-Status The message body that follows is an XML message and can contain a number of separate response codes, depending on how many su b-requests were made. 208 Already Reported The members of a DAV binding have already been enumerated in a previous reply to this request, and are not being included again. 226 IM Used (RFC 3229) The server has fulfilled a GET request for the resource, and the res ponse is a representation of the result of one or more instance-ma nipulations applied to the current instance. SNAT Security Network Address Translation Maps the source client IP address in a request to a translation addr ess defined on the BIG-IP device 300 Multiple Choices Indicates multiple options for the resource that the client may follo w. It, for instance, could be used to present different format options for video, list files with different extensions, or word sense disambi guation. 301 Moved Permanently This and all future requests should be directed to the given URI. 302 Found This is an example of industry practice contradicting the standard. The HTTP/1.0 specification (RFC 1945) required the client to perfor m a temporary redirect (the original describing phrase was "Moved Temporarily"),[5] but popular browsers implemented 302 with the fu nctionality of a 303 See Other. Therefore, HTTP/1.1 added status co des 303 and 307 to distinguish between the two behaviours.[6] How ever, some Web applications and frameworks use the 302 status co de as if it were the 303.[7] 303 See Other The response to the request can be found under another URI using a GET method. When received in response to a POST (or PUT/DELET E), it should be assumed that the server has received the data and the redirect should be issued with a separate GET message. F5 101(2) Study this set online at: http://www.cram.com/flashcards/f5-1012-4973187 304 Not Modified Indicates that the resource has not been modified since the version specified by the request headers If-Modified-Since or If-Match. This means that there is no need to retransmit the resource, since the cl ient still has a previously-downloaded copy. 305 Use Proxy The requested resource is only available through a proxy, whose a ddress is provided in the response. Many HTTP clients (such as Mozi lla[8] and Internet Explorer) do not correctly handle responses with this status code, primarily for security reasons 306 Switch Proxy No longer used. Originally meant "Subsequent requests should use the specified proxy 307 Temporary Redirect the request should be repeated with another URI; however, future r equests should still use the original URI. In contrast to how 302 was historically implemented, the request method is not allowed to be c hanged when reissuing the original request. For instance, a POST re quest should be repeated using another POST request 308 Permanent Redirect The request, and all future requests should be repeated using anoth er URI. 307 and 308 (as proposed) parallel the behaviours of 302 a nd 301, but do not allow the HTTP method to change. So, for exam ple, submitting a form to a permanently redirected resource may c ontinue smoothly.