f5

Objective 2.04 Explain the purpose, use, and advantages of iControl.

A. Explain the purpose of iControl As iRules is to network traffic, iControl is to F5 configurations. iControl is our open, web services based API that allows complete, dynamic, programmatic control of F5 configuration objects. This means you can add, modify or remove bits from your F5 device on the fly, automatically. Whether you’re looking… Continue reading Objective 2.04 Explain the purpose, use, and advantages of iControl.

f5

Objective 2.03 Explain the purpose, use, and advantages of iApps.

A. Explain the purpose of iApps F5 iApps is a powerful set of features in the BIG-IP system that provides 
a new way to architect application delivery in the data center. It gives you a holistic, application-centric view of how applications are managed and delivered inside, outside, and beyond the data center. By managing application services rather… Continue reading Objective 2.03 Explain the purpose, use, and advantages of iApps.

f5

Objective 2.02 Explain the purpose use and advantages of iRules

A. Explain the purpose of iRules F5 iRules is a flexible, programmatic interface that makes it possible to extend and customize the functionality of the BIG-IP system. As an event-driven scripting language, iRules gives you the ability to architect application delivery solutions that improve the security, resiliency, and scale of applications in the data center.… Continue reading Objective 2.02 Explain the purpose use and advantages of iRules

f5

Objective 2.01 Articulate the role of F5 products.

Explain the purpose use and benefits of: APM BIG-IP Access Policy Manager (APM) is a flexible, high-performance access and security solution that provides unified global access to your applications and network. By converging and consolidating remote access, LAN access, and wireless connections within a single management interface, and providing easy-to-manage access policies, BIG-IP APM helps… Continue reading Objective 2.01 Articulate the role of F5 products.

f5

Objective 1.05 Explain the features and functionality of protocols and technologies specific to the application layer

A. Explain the purpose and functionality of HTTP The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems.[1] HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. HTTP is the protocol to exchange or transfer hypertext. The standards development of HTTP was coordinated by the Internet… Continue reading Objective 1.05 Explain the features and functionality of protocols and technologies specific to the application layer

f5

Objective 1.04 Explain the features and functionality of protocols and technologies specific to the transport layer

A. Compare/Contrast purpose and functionality of MTU and MSS In computer networking, the maximum transmission unit (MTU) of a communications protocol of a layer is the size (in bytes) of the largest protocol data unit that the layer can pass onwards. MTU parameters usually appear in association with a communications interface (NIC, serial port, etc.). Standards (Ethernet, for example) can fix the size of an MTU;… Continue reading Objective 1.04 Explain the features and functionality of protocols and technologies specific to the transport layer

f5

Objective 1.03 Explain protocols and apply technologies specific to the Network layer.

A. Explain the purpose and functionality of IP addressing and subnetting. IP (Internet Protocol) addresses are used to identify hosts on the campus Internet, a Cornell network that ties into the Internet, a global network. If the computer is attached to Cornell’s network, it needs an IP address to be recognized as part of the… Continue reading Objective 1.03 Explain protocols and apply technologies specific to the Network layer.

f5

Objective 1.02 Explain protocols and technologies specific to the data link layer.

A. Explain the purpose of the switch’s forwarding database. Both bridges and switches build a forwarding database. The database is a list of Data Link (MAC) addresses and the port used to reach the device. Bridges and switches can automatically learn about devices to build the forwarding database. A network administrator can also program the… Continue reading Objective 1.02 Explain protocols and technologies specific to the data link layer.

f5

Objective 1.01 Explain, compare, and contrast the OSI layers.

A. Describe the function of each OSI layer   B. Differentiate between the OSI layers The Open Systems Interconnection (OSI) reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer. The OSI reference model is a conceptual model composed of seven… Continue reading Objective 1.01 Explain, compare, and contrast the OSI layers.