F5 BIG-IP V9 Local Traffic Management EE0-511 Demo Version
Question 1. Which three methods can be used for initial access to a BIG-IP system? (Choose three.) A. Serial console access B. SHH access to the management port C. SHH access to any of the switch ports D. HTTP access to the management port E. HTTP access to any of the switch ports F. HTTPS access to the management port G. HTTPS access to any of the switch ports Answer: A, B, F There are three ways to attach a management workstation or network to the traffic management system. Use a Serial console You can connect a null modem cable to the port marked CONSOLE on the unit, and access the command line with a terminal emulator. Add a network to the management interface You can configure an IP address on the Ethernet interface labeled Management and access the web-based Configuration utility to configure the traffic management software. Use the default network to connect to the management interface You can connect a cable to the Ethernet interface labeled Management and access the web-based Configuration utility to configure the traffic management software and use the default network for setup. Question 2. Which three files/data items are included in a BIG-IP backup file? (Choose three.) A. the BIG-IP license B. the BIG-IP log files C. the BIG-IP host name D. the BIG-IP administrator addresses Answer: A, C, D How do I back up and recover BIG-IP? Resolution: This Solution describes how to back up and restore your configuration data using a UCS configuration archive. Unless your configuration has been customized to run programs that are not normally supported on BIG-IP, the UCS archive will contain all files required to restore your current configuration to a new system. The.ucs file contains the following configuration data: All BIG-IP-specific configuration files BIG-IP product licenses User accounts and password information DNS zone files Installed SSL certificates and keys
Reference: http://tech.f5.com/home/bigip-next/solutions/instupg/sol3499.html Question 3. Which two statements are true concerning differences between BIG-IP platforms? (Choose two.) A. The 1500 host more ports than the 3400 B. All F5 switch ports are tri-speed; 10 100 or 1000 Mbps. C. All BIG-IP platforms use both an ASIC and CPU(s) to process traffic. D. The 1500 and 3400 are in a 1U chassis while the 6400 is in a 2U chassis. E. The 1500,3400 and 6400 have grater SSL capabilities after the initial SSL handshake than the 1000, 2400, and 5100, Answer: B, D Here is the specification detail of BIG-IP platforms. BIG-IP 6400: Dual Processors Layer 4 ASIC (PVA2) 4GB RAM 16 10/100/1000 Copper Ethernet Ports 4 Gigabit Fiber Ports BIG-IP 3400: Single Processor Layer 4 ASIC (PVA2) 2GB RAM 8 10/100/1000 Copper Ethernet Ports 2 Gigabit Fiber Ports BIG-IP 1500 Single Processor 2GB RAM 4 10/100/1000 Copper Ethernet Ports 2 Gigabit Fiber Ports Question 4. Which three methods are available for remote authentication of users allowed to administer a BIG-IP system through the Configuration Utility? (Choose three) A. LDAP B. OCSP
C. Radius D. VASCO E. Active Directory Answer: A, B, C The LTM modules that you can implement for remote authentication are: Lightweight Directory Access Protocol (LDAP) The LTM system can authenticate or authorize network traffic using data stored on a remote LDAP server or a Microsoft Windows Active Directory server. Client credentials are based on basic HTTP Remote Authentication Dial-In User Service (RADIUS) The LTM system can authenticate network traffic using data stored on a remote RADIUS server. Client credentials are based on basic HTTP TACACS+ The LTM system can authenticate network traffic using data stored on a remote TACACS+ server. Client credentials are based on basic HTTP SSL client certificate LDAP The LTM system can authorize network traffic using data stored on a remote LDAP server. Client credentials are based on SSL certificates, as well as defined user groups and roles. Online Certificate Status Protocol (OCSP) The LTM system can check on the revocation status of a client certificate using data stored on a remote OCSP server. Client credentials are based on SSL certificates. Question 5. What is the default IP address on a BIG-IP's management port? A. 192.168.1.245/16 B. 192.168.1.245/24 C. 192.168.245.245/16 D. 192.168.245.245/24 Answer: B You can run the Configuration utility remotely only from a workstation that is on the same LAN as the unit. To allow remote connections for the Configuration utility, the traffic management software comes with two pre-defined IP addresses, and a pre-defined root password. The default root password is default, and the preferred default IP address is 192.168.1.245. If this IP address is unsuitable for your network, the traffic management software uses an alternate IP address, 192.168.245.245. However, if you define an IP alias on an administrative workstation in the same IP network as the system, the unit detects the network of the alias and uses the corresponding default IP address. Once the utility finishes and the system reboots, these default IP addresses
are replaced by the information that you entered in the initial configuration you create with the Configuration utility. Question 6. Which two can be a part of a pool's definition? (Choose two.) A. rule(s) B. profile(s) C. monitor(s) D. persistence type E. load-balancing method Answer: C, E You can configure the LTM system to perform a number of different operations for a pool. You can: Associate health monitors with pools and pool members Enable or disable SNAT connections Rebind a connection to a different pool member if the originally-targeted pool member becomes unavailable Set the Quality of Service or Type of Service level within a packet Specify a load balancing algorithm for a pool Assign pool members to priority groups within a pool Question 7. How many types of monitors are supported in LTM? A. 1 B. 2 C. 3 D. 4 Answer: B An important feature of the BIG-IP local traffic management (LTM) system is a load-balancing tool called monitors. Monitors verify connections on pool members and nodes. A monitor can be either a health monitor or a performance monitor, designed to check the status of a pool, pool member, or node on an ongoing basis, at a set interval. Note: Send your comments, suggestions, or feedback at feedback@itcertkeys.com.