User Tools

Site Tools


dardan:f5:101_exam:index_of_material
###########################################################################################
S1  OSI
OSI layers, Data Link Layer, network layer, transport layer, application layer
	The OSI Model
		The Application Layer
		The Presentation Layer
		The Session Layer
		The Transport Layer
		The Network Layer
		The Data Link Layer
		The Physical Layer
	Differentiate between the OSI layers
	OSI layers functional
	Data Link Layer
		Forwarding Database
		ARP
		MAC Addresses
		Broadcast Domain, How to Restrict BD?
		Virtual Local Area Network (VLAN)
			Are VLANs required?
			When do I need a VLAN?
			Why not just subnet my network?
			How can devices on different VLAN’s communicate?
			What do VLAN’s offer?
		Introducing trunks
			 link aggregation
				LACP
	Network layer
		Understanding IP Addresses
		Network Masks
			Math Example
		Route Tables	
			Network destination
			Gateway
			Metric
		Routing Protocols	
			Dynamic
	Fragmentation		
		Why does fragmentation occur?
		How are the packets reassembled?
		Fragmenting a Packet
	TTL	
	Packet Traversing a Topology
	IPv6
		Unicast
		Multicast
		Anycast
		Address Dissection
Transport layer		
	MTU
	MSS
	About TCP and MSS
	Protocol Ports
	UDP	
	TCP
		TCP Three-way handshake
		TCP Timeout and Retransmission
		What are TCP RST Packets?
		TCP Options
		TCP Checksum
		Detecting Transmission Errors Using Checksums
		TCP Error Correction
		Flow Control
		Congestion control
		Delayed Binding
	Application layer		
		HTTP Protocol
			HTTP versions
			Structure of HTTP Transactions
			Initial Response Line (Status Line)
			status codes
			HTTP Methods
				HEAD Method
				POST Method
			HTTP Keep-alives	
			HTTP Headers
			HTTP Cookies
				How do Web sites use cookies?
			URL - Uniform Resource Locator	
		DNS
			Name Resolution Process
		SIP
		FTP
			Active FTP vs. Passive FTP
		SMTP 	

############################################################################################

S2 F5 Solutions and Technology
	F5 products
		APM
		LTM
		ASM
		GTM
		AAM
		AFM
	iRules	
		What is an iRule?
		How does an iRule work?
		When would I use an iRule?
		When would I not use an iRule
	iApps
		What’s an iApp?
		iApp Templates
		When do you use an iApp?
	Proxy and Packet forwarding
		full proxy architecture
			Full proxy architecture - What do they mean?
			full-proxy data center architecture
		Proxies
			Forward Proxies
			Reverse Proxies
			Half Proxies
			Full Proxies
		Packet Forwarding
		Packet-based Design
			What is a packet-based design?
			What is a proxy-based design (full proxy)?
			Redefining the Solution
	High availability (HA)
		Single device
		Redundant devices
		What is failover?
		active/active, Understanding active-active redundancy
		active/standby, Understanding active-standby redundancy and  failover in active/standby mode

############################################################################################

S3 Load Balancing Essentials
	Distribution of Load
	Local Traffic Manager load balancing methods
		Round Robin
		Ratio (member) 		   		Ratio (node)
		Dynamic Ratio (member) 		Dynamic Ratio (node)
		Fastest (node) 		   		Fastest (application)
		Least Connections (member)  Least Connections (node)
		Weighted Least Connections (member) Weighted Least Connections (node)
		Observed (member) Observed (node)
		Predictive (member) Predictive (node)
		Least Sessions
		Ratio Least Connections
	Persistent and Persistence	
		Persistent
		Persistence
	Client and Server	
		Client
		Server

############################################################################################

S4 Security
	Positive Security Model, Benefits
	Negative Security Model, Benefits
	
	Non-Blueprint
		Positive & Negative Security model
		What Does “Good” Security Cost?
		Positive vs. Negative Application Security
		Factors of an Effective Applied Security Model
		The Effect of Content Variability
		Rule Specificity
		Order of Precedence
		Best Practices
	Signing, Purpose
	Encryption, Topic
	Certificates and Certificate Chains
	private/public keys
		Private Key Encryption
		Public Key Encryption
	Symmetric Encryption
	Asymmetric Encryption
	
	Authentication
		single sign on
			Password Authentication
			Single Sign On Authentication
		Multi-factor Authentication
		Authentication, Authorization, and Accounting (AAA)
		SAML Authentication

	IPsec and SSL VPN	
		IPsec - IP Security
			Why should you use IPsec?
			Replacing IPsec
		SSL VPN
			Why you should transition to SSL VPN
		SSL VPN vs IPSec

############################################################################################

S5 Application Delivery Platforms
	Hardware vs. Software
		Hardware
			Advantages
			Challenges
		Virtual Hardware
			Advantages
			Challenges
		Hardware (SSL card, compression card)
		Appliance Hardware Editions
		Viprion Hardware Editions
	TCP optimization
		Optimizing TCP
		General TCP Optimizations
		Decreasing Server-side TCP Connections
		Increasing Client-side TCP Connections
	HTTP Protocol and Web Application Optimizations
		Caching
		Compression
		Pipelining
		HTTP pipelining

###########################################################################################

dardan/f5/101_exam/index_of_material.txt · Last modified: 2019/06/28 21:19 by dardan

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki