BACK UP THE BIG-IP SYSTEM CONFIGURATION FOR SAFEKEEPING
CONFIGURE VIRTUAL SERVERS, POOLS, MONITORS, PROFILES, AND PERSISTENCE OBJECTS
TEST AND VERIFY APPLICATION DELIVERY THROUGH THE BIG-IP SYSTEM USING LOCAL TRAFFIC STATISTICS
CONFIGURE PRIORITY GROUP ACTIVATION ON A LOAD BALANCING POOL TO ALLOW SERVERS TO BE ACTIVATED ONLY AS NEEDED TO PROCESS TRAFFIC
COMPARE AND CONTRAST MEMBER-BASED AND NODE-BASED DYNAMIC LOAD BALANCING METHODS
CONFIGURE CONNECTION LIMITS TO PLACE A THRESHOLD ON TRAFFIC VOLUME TO PARTICULAR POOL MEMBERS AND NODES
DIFFERENTIATE BETWEEN COOKIE, SSL, SIP, UNIVERSAL, AND DESTINATION ADDRESS AFFINITY PERSISTENCE, AND DESCRIBE USE CASES FOR EACH
DESCRIBE THE THREE MATCH ACROSS SERVICES PERSISTENCE OPTIONS AND USE CASES FOR EACH
CONFIGURE HEALTH MONITORS TO APPROPRIATELY MONITOR APPLICATION DELIVERY THROUGH A BIG-IP SYSTEM
CONFIGURE DIFFERENT TYPES OF VIRTUAL SERVICES TO SUPPORT DIFFERENT TYPES OF TRAFFIC PROCESSING THROUGH A BIG-IP SYSTEM
CONFIGURE DIFFERENT TYPES OF SNATS TO SUPPORT ROUTING OF TRAFFIC THROUGH A BIG-IP SYSTEM
CONFIGURE VLAN TAGGING AND TRUNKING
CONFIGURE SNMP ALERTS AND TRAPS IN SUPPORT OF REMOTE MONITORING OF THE BIG-IP SYSTEM
CONFIGURER LES ALERTES ET LES INTERRUPTIONS SNMP POUR PRENDRE EN CHARGE LA SURVEILLANCE À DISTANCE DU SYSTÈME BIG-IP
USE IRULES AND LOCAL TRAFFIC POLICIES APPROPRIATELY TO CUSTOMIZE APPLICATION DELIVERY THROUGH THE BIG-IP SYSTEM
CONFIGURE THE BIG-IP TO DETECT AND MITIGATE SOME COMMON ATTACKS AT THE NETWORK AND APPLICATION LAYERS USING LTM FEATURES SUCH AS SYN CHECK, EVICTION POLICIES, IRULES AND LOCAL TRAFFIC POLICIES