Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

F5 Networks F5CAB3 Exam - Topic 1 Question 7 Discussion

Actual exam question for F5 Networks's F5CAB3 exam
Question #: 7
Topic #: 1
[All F5CAB3 Questions]

For a given Virtual Server, the BIG-IP must perform SSL Offload and negotiate secure communication over TLSv1.2 only. What should the BIG-IP Administrator do to meet this requirement?

Show Suggested Answer Hide Answer
Suggested Answer: A

To fulfill the requirement of 'SSL Offload' limited to 'TLSv1.2 only,' the administrator must focus on the client-side of the connection. SSL Offload means the BIG-IP terminates the encrypted connection from the user, processes the traffic (often as plain text internally), and optionally sends it to the backend. The profile responsible for this termination and the initial negotiation with the client's browser is the Client SSL Profile.

A custom Client SSL Profile must be created because the default clientssl profile typically allows a broad range of protocols for compatibility (including TLS 1.0, 1.1, and 1.2). To restrict communication specifically to TLS 1.2, the administrator modifies the Ciphers string within the profile. Using a string such as DEFAULT:!SSLv3:!TLSv1:!TLSv1.1 or specifically defining TLSv1.2-only suites ensures that the BIG-IP will reject any handshake attempts from older, less secure protocols.

Server SSL Profiles (Options B and C) are used for the encryption between the BIG-IP and the backend nodes, which is not what is requested here. Simply selecting 'no TLSv1' in an options list (Option D) is insufficient and often refers to older versions of the software; the modern and standard way to control protocol negotiation on a BIG-IP is through the precise application of Cipher Strings within the Client SSL profile. This ensures compliance with security standards like PCI-DSS while providing the offloading benefits to the backend infrastructure.


Contribute your Thoughts:

0/2000 characters
Hortencia
4 days ago
I think C) is better since it focuses on the server side.
upvoted 0 times
...
Patria
9 days ago
A) is the way to go for TLSv1.2!
upvoted 0 times
...
Ernie
30 days ago
I believe we need to configure a custom SSL Profile (Client) with the right cipher string, but I’m not entirely sure if that’s enough to enforce TLSv1.2 only.
upvoted 0 times
...
Shenika
1 month ago
I’m a bit confused about the difference between the client and server profiles. I thought both needed to be configured for TLSv1.2, but I can't recall the specifics.
upvoted 0 times
...
Stephaine
1 month ago
I remember practicing a similar question where we had to disable older TLS versions. I feel like option D might be the right choice since it mentions selecting no TLSv1.
upvoted 0 times
...
Monte
2 months ago
I think we need to focus on the SSL Profile settings, but I'm not sure if it's the client or server profile we should be modifying.
upvoted 0 times
...

Save Cancel