New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

F5 Networks F5CAB5 Exam - Topic 6 Question 6 Discussion

Actual exam question for F5 Networks's F5CAB5 exam
Question #: 6
Topic #: 6
[All F5CAB5 Questions]

Refer to the exhibit.

A BIG-IP Administrator needs to deploy an application on the BIG-IP system to perform SSL offload and re-encrypt the traffic to pool members. During testing, users are unable to connect to the application.

What must the BIG-IP Administrator do to resolve the issue? (Choose one answer)

Show Suggested Answer Hide Answer
Suggested Answer: D

To successfully perform SSL offload and re-encryption on a BIG-IP system, the virtual server must be configured with both a Client SSL profile and a Server SSL profile. The Client SSL profile enables BIG-IP to decrypt inbound HTTPS traffic from clients, while the Server SSL profile is required to re-encrypt traffic before forwarding it to the pool members.

From the exhibit, the virtual server has a Client SSL profile configured, which allows BIG-IP to accept HTTPS connections from clients. However, there is no Server SSL profile attached, meaning BIG-IP attempts to send unencrypted HTTP traffic to pool members listening on HTTPS (port 443). This protocol mismatch causes the server-side SSL handshake to fail, resulting in users being unable to connect to the application.

This behavior is well documented in BIG-IP SSL troubleshooting guides: when backend servers expect HTTPS, a Server SSL profile is mandatory to establish a secure connection from BIG-IP to the pool members.

The other options are incorrect:

Removing the Client SSL profile (Option A) would break client-side HTTPS.

The server-side TCP profile (Option B) is unrelated to SSL encryption.

Forward Proxy (Option C) is only used for outbound SSL inspection scenarios.

Therefore, configuring an SSL Profile (Server) is the correct and required solution.


Contribute your Thoughts:

0/2000 characters
Vernell
4 days ago
Option B is just silly. Splitsession-default-tcp? What is this, a secret code? D is the way to go.
upvoted 0 times
...
Delisa
9 days ago
Haha, I bet the BIG-IP Administrator is scratching their head right now, trying to figure out why the users can't connect. Maybe they forgot to turn on the "magic" button.
upvoted 0 times
...
Ahmed
14 days ago
The answer is clearly D. You need to configure an SSL Profile (Server) to re-encrypt the traffic to the pool members.
upvoted 0 times
...
Verdell
19 days ago
I remember that removing the SSL Profile isn't usually a good idea, but I can't remember if enabling Forward Proxy is necessary for this scenario.
upvoted 0 times
...
Mabel
24 days ago
I’m leaning towards configuring the SSL Profile for the server, but I’m unsure if the Protocol Profile option could also be relevant here.
upvoted 0 times
...
Devorah
30 days ago
I feel like we practiced a similar question where enabling Forward Proxy was the right answer, but I can't recall the exact context.
upvoted 0 times
...
Lang
1 month ago
I think I remember something about needing an SSL Profile for the server, but I'm not entirely sure if that's the only thing we need to check.
upvoted 0 times
...
Vallie
1 month ago
I'm pretty confident the answer is C. The question states the BIG-IP is doing SSL offload, so the SSL Profile (Client) is the key. Enabling Forward Proxy in that profile should help re-encrypt the traffic to the pool members and fix the connection problem.
upvoted 0 times
...
Annalee
2 months ago
I'm leaning towards option B. The question mentions the BIG-IP is performing SSL offload, so the server-side protocol profile is likely the problem. Configuring it as splitsession-default-tcp could help resolve the connectivity issue.
upvoted 0 times
...
Myong
2 months ago
Okay, let me think this through. If it's an SSL offload scenario, then the SSL Profile (Client) is handling the client-side SSL termination. But the users can't connect, so the server-side settings must be the issue. I'll go with option D and configure an SSL Profile (Server).
upvoted 0 times
...
Adell
2 months ago
Hmm, I'm a bit confused. The question says users can't connect, so it seems like the problem is on the server side. Maybe I should focus on the Protocol Profile (Server) and SSL Profile (Server) settings.
upvoted 0 times
...
Mohammad
2 months ago
I think I'd start by looking at the SSL profiles. The question mentions SSL offload, so the SSL Profile (Client) is probably the key issue.
upvoted 0 times
...

Save Cancel