Académique Documents
Professionnel Documents
Culture Documents
1. OSI
1.1 Explain, compare, and contrast the OSI layers
1.2 Explain protocols and technologies specific to the data link layer
1.3 Explain protocols and apply technologies specific to the network layer
1.4 Explain the features and functionality of protocols and technologies specific to the
transport layer
1.5 Explain the features and functionality of protocols and technologies specific to the
application layer
Product Datasheet
Products
F5 BIG-IP Product Matrix
2.2 Explain the purpose, use, and advantages of iRules
4. Security
4.1 Compare and contrast positive and negative security models
Book: SSL and TLS: Designing and Building Secure Systems by Eric Rescorla
http://www.amazon.com/SSL-TLS-Designing-Building-Systems/dp/0201615983
Authentication 101 Whitepaper
SOL15596: Troubleshooting TACACS+ authentication for BIG-IP administrative users
SOL15811: Troubleshooting LDAP authentication for BIG-IP administrative users
Manual Chapter: Active Directory Authentication
Manual Chapter: Configuring Remote User Authentication and Authorization
Manual Chapter: Authentication Profiles
Manual Chapter: LDAP and LDAPS Authentication
4.4 Describe the purpose, advantages, and use cases of IPsec and SSL VPN
Book: SSL and TLS: Designing and Building Secure Systems by Eric Rescorla
http://www.amazon.com/SSL-TLS-Designing-Building-Systems/dp/0201615983
A Technical Comparison of IPSec and SSL
SOL14783: Overview of the Client SSL profile (11.x)
SOL14806: Overview of the Server SSL profile (11.x)
SOL10209: Overview of packet tracing with the ssldump utility