New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

F5 Networks 301a Exam - Topic 7 Question 78 Discussion

Actual exam question for F5 Networks's 301a exam
Question #: 78
Topic #: 7
[All 301a Questions]

An TLM Specialist needs to configure a virtual server to terminate SSL connection on the LTM device.

Cryptographic information must be re-authorized for SSL sessions that remain open for longer than 30 seconds.

Which settings should the LTM Specialist configure in the client SSL profile?

Show Suggested Answer Hide Answer
Suggested Answer: A, C

It is required that cookie persist must be used and http profile must be used, and SSL offloading must also be required. It must be in standard mode, excluding BD E.


Contribute your Thoughts:

0/2000 characters
Jennie
3 months ago
B seems unnecessary, we don’t need Peer SN1 for this setup.
upvoted 0 times
...
Marquetta
3 months ago
I’d go with A instead. Handshake Timeout is crucial too!
upvoted 0 times
...
Samira
4 months ago
Wait, are we sure 30 seconds is enough time? Seems a bit short.
upvoted 0 times
...
Theresia
4 months ago
Totally agree with C! It fits the requirement perfectly.
upvoted 0 times
...
Mattie
4 months ago
I think option C is the right choice. Renegotiate Period makes sense.
upvoted 0 times
...
Yen
4 months ago
I don't think Require Peer SN1 Support is relevant for this scenario, but I could be mistaken. It seems more about the connection itself rather than session re-authorization.
upvoted 0 times
...
Gabriele
4 months ago
I feel like the Renegotiate Max Record Delay could be a factor too, but I can't recall the specifics on how it ties into the 30-second requirement.
upvoted 0 times
...
Stephaine
4 months ago
I remember practicing a question about renegotiation settings, so maybe the Renegotiate Period is the right choice here?
upvoted 0 times
...
Tamar
5 months ago
I think the Handshake Timeout might be related, but I'm not sure if it directly affects the re-authorization for SSL sessions.
upvoted 0 times
...
Malcom
5 months ago
Okay, I've got this. The question is specifically asking about the client SSL profile settings, and the requirement is to re-authorize the crypto info every 30 seconds. So the answer has to be option C, setting the Renegotiate Period to 30 seconds.
upvoted 0 times
...
Maia
5 months ago
Hmm, I'm a bit confused. Is the question asking about the Handshake Timeout, Renegotiate Period, or Renegotiate Max Record Delay? I'll need to carefully read through the options to determine the best setting.
upvoted 0 times
...
Theresia
5 months ago
This looks like a straightforward SSL configuration question. I think the key is to focus on the requirement to re-authorize the cryptographic information every 30 seconds.
upvoted 0 times
...
Jin
5 months ago
I'm not entirely sure about this one. The wording is a bit tricky, and I'm not familiar with all the SSL profile settings. I'll need to review my notes and maybe ask the instructor for some clarification before attempting to answer.
upvoted 0 times
...
Elouise
5 months ago
This is a tricky one. I'll need to think carefully about the potential data loss implications.
upvoted 0 times
...
Fatima
5 months ago
Once a minute? That seems way too frequent for signature updates. I doubt Palo Alto is pushing out changes that rapidly. I'm leaning towards either once a day or once a week as the more reasonable options here. I'll need to weigh the pros and cons of each.
upvoted 0 times
...
Denny
9 months ago
Ah, the joys of SSL configuration. It's like a never-ending game of 'Guess the Right Setting'.
upvoted 0 times
...
Reita
9 months ago
Hmm, I'm not sure about that 'Require Peer SN1 Support' option. Sounds like something straight out of a sci-fi movie. Let's stick to the basics and go with the Renegotiate Period.
upvoted 0 times
...
Twana
9 months ago
Whoa, 30 seconds for the Renegotiate Period? That's like an eternity in the digital world! Might as well set it to 'Never' and call it a day.
upvoted 0 times
Rodolfo
8 months ago
Exactly, we need to make sure the SSL sessions are secure and up to date.
upvoted 0 times
...
Sabra
8 months ago
I agree, it's better to be safe than sorry when it comes to SSL connections.
upvoted 0 times
...
Ashlee
8 months ago
Yeah, it's important to re-authorize cryptographic information for security.
upvoted 0 times
...
Teresita
9 months ago
I think setting the Renegotiate Period to 30 seconds is a good idea.
upvoted 0 times
...
...
Mitzie
10 months ago
Setting the Renegotiate Period to 30 seconds seems like the obvious choice here. Gotta keep those SSL sessions secure!
upvoted 0 times
Viola
9 months ago
D) set the Renegotiate Max Record Delay to 30
upvoted 0 times
...
Maybelle
10 months ago
C) set the Renegotiate Period to 30 seconds
upvoted 0 times
...
Andree
10 months ago
A) set the Handshake Timeout to 30 seconds
upvoted 0 times
...
...
Queenie
11 months ago
I'm not sure, but I think enabling Require Peer SN1 Support could also be a valid option for terminating SSL connections.
upvoted 0 times
...
Leslie
11 months ago
I agree with Samira, setting the Renegotiate Period to 30 seconds makes sense for re-authorization of SSL sessions.
upvoted 0 times
...
Samira
11 months ago
I think the correct setting is to set the Renegotiate Period to 30 seconds.
upvoted 0 times
...

Save Cancel