Archive for silva

F5 Access for Your Chromebook

Posted in security, f5, big-ip, ssl vpn, cloud, silva, application delivery, mobile, devcentral by psilva on October 12th, 2016

My 5th grader has a Chromebook for school. She loves it and it allows her access to school applications and educational tools where she can complete her assignments and check her grades. But if 5th grade is a tiny dot in your rear-view and you’re looking to deploy Chromebooks in the enterprise, BIG-IP v12 can secure and encrypt ChromeOS device access to enterprise networks and applications. With network access, Chromebook users can run applications such as RDP, SSH, Citrix, VMware View, and other enterprise applications on their Chrome OS devices.

From an employee’s perspective, it is very easy to get the SSLVPN configured. Log on to a Chromebook, open Chrome Web Store, search for ‘F5 Access’ and press the +ADD TO CHROME button. Add app when the dialogue box pops and F5 Access will appear in your ‘All Apps’ window.

f5_access.jpg

Next, when launched, you’ll need to accept the license agreement and then add a server from the Configuration tab:

add_server.jpg 

Next, give it a unique name, enter the BIG-IP APM server URL and optionally add your username and password. Your password will not be cached unless that’s allowed by the APM Access Policy. You can also select a client certificate if required. Once configured, it’ll appear in the list. You can also have multiple server configurations if needed:

added_server.jpg 

To connect, click the bottom tray bar and select the tile that says, ‘VPN Disconnected.’

f5access_tile.jpg

And select the server configured when setting up the app. Depending on the configuration, you’ll either get the native login window or the WebTop version:

f5access_login.jpg 

Once connected, there won’t be any indication in the tray but if you click it, you’ll see the connection status in the same VPN area as above and it’ll show ‘connected’ within the F5 Access app:

f5access_connected.jpg 

As you can see in the above image, you can also check Statistics and Diagnostics if those are of interest. To end the connection, click the tray again, select the VPN tile and click Disconnect.

For administrators, it’s as simple as adding a ‘ChromeOS’ branch off the ClientOS VPE action:

f5access_clientos.jpg

Then add a Connectivity Profile to BIG-IP:

f5access_connectivity_profile.jpg 

In addition to generic session variables, client session variables are also available. Check out the release notes and BIG-IP Access Policy Manager and F5 Access for Chrome OS v1.0.0 manual for more info.

ps

Related:




Q/A with ExITeam’s Security Engineer Stanislas Piron - DevCentral’s Featured Member for October

Posted in security, f5, big-ip, silva, devcentral, irules by psilva on October 4th, 2016

stanislas1.jpg

Stanislas Piron is a Security Engineer for ExITeam. 16 years ago, Stanislas started out with Firewalls, email and Web content security. His first F5 deployment was with LTM and Link Controller 10 years ago and he is DevCentral’s Featured Member for October!

He started to focus on F5 products as pre-sales engineer for a IT security distributor in charge of F5 development. 4 years ago, he joined Exiteam, a small company of two security engineers helping resellers audit, design and deploy security solutions for their customers. To provide real expertise, they both focus their skills on a small set of products. He works with F5 products about 80% of his time.

DevCentral got an opportunity to chat with Stanislas about his work, life and if European organizations have unique security requirements.

DevCentral: You’ve been an active contributor to the DevCentral community and wondered what keeps you involved?

Stanislas Piron: When I started working with F5 products, I created my DevCentral account to search piece of iRules and write my own iRules according to customer’s needs.

As the needs grew, I had some unanswered questions. Searching DevCentral, I found another approaches to solving issues, helping me to solve my own challenges. Each time I find a better way to solve my problems, I try to share my code.

I often read question and try to solve them thinking, “This can solve an issue of a customer I didn’t think about before”

DevCentral is a place where every time you help someone, you learn something.

DC: Tell us a little about the areas of BIG-IP expertise you have.

SP: My favorite BIG-IP product is APM (LTM+APM mode), which covers almost everything about authentication. It’s also the product we must configure as simple as possible if we do not want the customer to have headaches reading the access policy.

I often deploy BIG-IP with multiple modules including LTM, APM, AFM, GTM and ASM to offer high datacenter security.

Most of my deployments use the local traffic policies for standard admin tasks, iRules for application compatibility, and the tcl codes in APM to assign variable boxes.

DC: You are a Security Engineer with Exiteam, a security consulting practice. Can you explain how DevCentral helps with your daily challenges? Where does BIG-IP fit in the services you offer or within your own infrastructure?

exiteam_logo.jpg

SP: iRules is a great tool to solve problems BIG-IP is not addressing, but iRules is nothing without the developer’s community. DevCentral experts share experience not only about tcl coding but protocol knowledge, iRule events orders, and working iRules. And on the other side, some IT admins ask about new needs that I may answer for the next customer.

Each time I have a new challenge, I first search on DevCentral to see if someone already solved it. If not, I’ll create my own iRule.

DC: I understand you are in France and wondered, what are some of the unique information security challenges for European organizations?

SP: Information security challenges are not unique for European organizations as security risks are the same for all countries.

DC: Describe one of your biggest challenges and how DevCentral helped in that situation.

SP: With Microsoft Forefront TMG End of sale, most of my customers migrated to F5 products.

One of my customers, a SAAS provider, with almost exclusively Microsoft products (TMG, Exchange, Sharepoint, etc.) and with more than 20K concurrent users was evaluating how to migrate to BIG-IP LTM, ASM, APM and AFM.

During POC (and then deployment) we worked to get the same behavior with APM as TMG with SharePoint about office editing documents. I found some question on DevCentral with parts of an answer, but not the full answer. I wrote an iRule optimized for such a deployment (20K users) answering all the customer needs and shared it. Some DevCentral experts, who had the same needs, commented on it to make it simpler, generic and optimized.

DC: Lastly, if you weren’t an IT admin – what would be your dream job? Or better, when you were a kid – what did you want to be when you grew up?

SP I don’t remember what I wanted to be when I was child and IT is not a dream job if you don’t evolve. What I expect in my job is to not do the same job as the day before, and I think I found it. Every day, I meet new customers, I have new challenges and I learn something increasing my knowledge.

DC: Thanks Stanislas and congratulations! You can find Stanislas on LinkedIn and also check out his DevCentral contributions.

Related:




Lightboard Lessons: Secure & Optimize VDI

Posted in security, big-ip, virtualization, silva, vmware, lightboard, vdi, devcentral, access by psilva on September 28th, 2016

Virtualization continues to impact the enterprise and how IT delivers services to meet business needs. Desktop Virtualization (VDI) offers employees anywhere, anytime, flexible access to their desktops whether they are at home, on the road, in the office or on a mobile device. In this edition of Lightboard Lessons, I show how BIG-IP can secure, optimize and consolidate your VMware Horizon View environment, providing a secure front end access layer for VMware’s VDI infrastructure.

ps

Related:

Watch Now:



Lock Down Your Login

Posted in Uncategorized, security, f5, big-ip, application security, silva, authentication, banking, malware, devcentral by psilva on September 27th, 2016

login.png

Last week we talked about WebSafe and how it can help protect against phishing attacks with a little piece of code. This is important since malware can steal credentials from every visited web application from an infected machine. This time we’re going to look at how to protect against credential grabbing on a BIG-IP APM login page with WebSafe encryption layer.

You’ll needtwo modules for this, BIG-IP APM andof course, WebSafe FraudProtection Service. The goal is to protect the laptop from any malware thatgrabs sensitive login credentials. In this case, the malware would beconfigured to grab the login page along with the username and passwordparameter fields. Command and control could also be set to retrieve anycredentials from the infected machine at certain intervals, like every 5minutes.

The first goal would be to encrypt the password. Within your BIG-IP admin GUI, you would navigate to Security>Fraud Protection Service> Anti-Fraud Profiles>URL List. APM’s logon page usually ends with ‘/my.policy’.

mfraudurl.jpg

Create then click that URL to open the configuration page and enable Application Layer Encryption.

mapplayerencrypt.jpg

And select the Parameters tab to configure the fields you want to protect. In this case it is password and username.

mparameters.jpg

In the screen grab, you can see ‘Obfuscate’ is selected and to both ‘Encrypt’ and‘Substitute Value’ for the password field.

Now when the user goes to the page, a bit a JavaScript is injected in the page to protect the specified fields. If you run a httpwatch or wire shark on the page, you’ll see that the values for those parameters are obfuscated. This makes it incredibly difficult for the bad actor to determine the correct value.

mobfuscape.jpg

And if the malware also grabs the password, since we set that to encrypt, all they get is useless information.

mpwuseless.jpg

At this point, the BIG-IP will decrypt the password and pass on the traffic to appropriate domain controller for verification. This is a great way to protect your login credentials with BIG-IP. If you’d like to see a demonstration of this, check out F5’s Security Specialist Matthieu Dierick’s demo video. Pretty cool.

ps




Lightboard Lessons: DNS Scalability & Security

Posted in security, f5, big-ip, silva, video, dnssec, lightboard, devcentral, dns by psilva on September 21st, 2016

The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup, loading complex sites necessitates hundreds of DNS queries.

DNS lookups has exploded in recent years with mobile, IoT and the applications to support the growth. It is also a vulnerable target. In my first Lightboard Lesson, I show you how to scale, secure and consolidate your DNS infrastructure.

ps

Related:

Watch Now:



750th Blog Spectacular - Lessons of the LightBoard

Posted in f5, big-ip, silva, application delivery, lightboard, devcentral by psilva on September 13th, 2016

IMG_3526.jpg

I recently built out a LightBoard Studio for my home office so I can start contributing to the awesome LightBoard Lessons on DevCentral. These are short, informative videos explaining various technologies and often, how to implement on a BIG-IP system. Instead of writing on a whiteboard and looking over your shoulder into the camera as you explain something, Lightboards allow you to draw on and look through the crystal clear glass (into the camera) while discussing technical concepts. A transparent whiteboard. The LEDs that surround the glass accompanied with neon markers make the images pop. It’s pretty darn cool.

So the story goes, a college professor was looking for a better way to deliver lessons to his students both on campus and online without a chalkboard. He called it the Learning Glass and now there are Lightboards all over the world, especially in universities. Incidentally, there is cool video of Picasso painting on glass from 1949.

He had the right idea.

IMG_3525.jpg

You may have read or watched Jason & John’s Lightboard Lessons: Behind the Scenes and I wanted to report on my own experiences. First, I followed Jason’s bill of materials (except the camera) and it provides most everything you need to get started. I initially thought about a 3’ x 5’ pane of glass due to my smaller venue but couldn’t find an appropriate frame for that size. Well, to be clear, there may have been one but it was way outside my budget. I looked at various saw horses, ladder frames and other apparatus thinking I could ‘make’ something that could properly hold the glass in place. No dice.

So I decided to go a little larger with the 4’ x 6’ size since there is a frame specifically built for this purpose. Rahm is correct about ordering the frame first since you’ll need to carefully measure the mounting holes so the glass can be drilled perfectly. It also takes a few weeks to order and have the glass delivered - at least in my area. This was fine since it allowed me to set up the other equipment like the lights, back drop and camera location. In addition, make sure you have the delivery folks help you place it on the frame…depending on the size, this is not a pick up and install yourself deal. The glass is large, heavy and certainly needs a few people to carry and properly align with the holes.

IMG_3524.jpg

Once the glass is installed (and cleaned) you can wrap the LEDs around the edge. There are a couple ways to go with this step. You could use large binder clips to hold the lights at the edge or, like Jason, I got 3/8” shower u-channels to go around the glass and hold the lights in place. Instead of silicon to hold the u-channel, I used clamp clips to hold the outer metal. This allows me to easily change and adjust the LEDs if needed.

The Expo Neon markers do make a greasy mess and I’ve got the same Sprayway glass cleaner. I also got one of those magic erasers to help clean and old hotel room keys work well on dried ink. It’s not that difficult to have a clean slate but any smudges will certainly appear if it’s not sparkle-city.e binder clips to hold the lights at the edge or, like Jason, I got 3/8” shower u-channels to go around the glass and hold the lights in place. Instead of silicon to hold the u-channel, I used clamp clips to hold the outer metal. This allows me to easily change and adjust the LEDs if needed.

This week I’ll be moving around the lights and doing some test shots for audio and visual screen tests and look forward to publishing my first LightBoard Lesson very soon. Shooting for next week if all tests go well. I’m excited.

It’s always been a dream of mine to have a home studio. Some guys want a man-cave, some want a game room, others a high end home theatre or a rack of computer equipment. Me? A studio.

And for my 750th DevCentral article I wanted to say: Thanks Gang!!

ps




Q/A with Secure-24’s Josh Becigneul - DevCentral’s Featured Member for September

Posted in f5, big-ip, adc, interview, silva, application delivery, devcentral by psilva on September 6th, 2016

Josh.jpg

Josh Becigneul is the ADC Engineer for Secure-24 and DevCentral’s Featured Member for September!

Josh has been working in the IT industry in various positions for a little over 10 years. He’s moved through various disciplines including MS server administration, Linux, Networking, and now has been working primarily with F5 BIG-IPs. For the past 3 years he has focused on F5’s products and growing a team of engineers to manage them. Secure-24 delivers managed IT operations, application hosting and managed cloud services to enterprises worldwide.

DevCentral got an opportunity to talk with Josh about his work, life and the importance of being F5 Certified.

DevCentral: You’ve been an active contributor to the DevCentral community and wondered what keeps you involved?

Josh Becigneul: DevCentral has helped me greatly over the years as I’ve worked with F5 products, so I feel like it’s worth some of my time to spend both reading posts and helping others in the community. When I started off it helped to be able to explain a need and have someone create a basic iRule, or point me towards documentation explaining something. Now that my skills have grown, I want to pay it forward.

DC: Tell us a little about the areas of BIG-IP expertise you have.

JB: I started off on just BIG-IP LTM but over the years have grown into managing APM, GTM, ASM, and sometimes a mix of each. I’ve worked with 1500’s, 1600s, 3600’s, 3900’s and VIPRION. As well as Enterprise Manager and now BIG-IQ too.

DC: You are an ADC Engineer with Secure-24, an application hosting and cloud services organization. Can you explain how DevCentral helps with your daily challenges? Where does BIG-IP fit in the services you offer or within your own infrastructure?

secure24.jpg

JB: At Secure-24, BIG-IP has grown into an essential product for many portions of our organization, along with many of our customers utilizing its services to deliver their applications. We’ve got a large number of LTM customers, APM customers and we’ve been growing into ASM. GTM provides advanced DNS services for many of our customers around the globe. Most deployments using BIG-IP are custom tailored to suit the needs of the particular customer. These can vary from basic load balancing to advanced content steering, or small deployments of a few virtual services to large ones comprised of hundreds.

With the variety of F5 products in use, having a resource like DevCentral is invaluable to our team. From being able to ask my peers questions about things, or utilizing the codeshare and wiki to learn more about iRules and iControl, I couldn’t imagine it not being available.

DC: Describe one of your biggest BIG-IP challenges and how DevCentral helped in that situation.

JB: One of the most useful things iRules allow us to do is virtual hosting; running many services behind a virtual service. Coupling this with APM allowed us to greatly simplify remote access for us and our customers. For several customers, we used APM to migrate them away from MS Forefront.

DC: I understand you are an F5 Certified Professional. Can you tell us about that and why you feel it is beneficial?

JB: Yes, I first became F5 Certified in 2015 with my 201 Certified BIG-IP Administrator, and followed that up at 2016’s F5 Agility conference by obtaining my 304 APM Specialist. I feel it is beneficial because it helps to reinforce what I’ve learned over the years, and (hopefully) lets my customers feel like they are in good hands. (DC: Josh also recently passed the 302 GTM Exam!)

DC: Lastly, if you weren’t an IT admin – what would be your dream job? Or better, when you were a kid – what did you want to be when you grew up?

JB: I’d probably be a roadie, and tour the world doing lights and sound for a huge band!

DC: Thanks Josh and get us backstage passes! Check out all of Josh’s DevCentral contributions, connect on LinkedIn and follow both Josh @vsnine and @secure_24.

And if you'd like to nominate someone to be the DevCentral Featured Member, please send your suggestions to the DevCentral Team!




The Intruders of Things

Posted in f5, big-ip, cloud computing, silva, application delivery, privacy, devcentral, iot by psilva on August 23rd, 2016

Gartner predicts that by 2020, IoT security will make up 20 percent of annual securitybudgets.

New-Year-2020-Calender-by-Danilo-Rizzuti

2020seems to be an important milestone for the Internet of Things. That’s the yearthat Ciscosays there will be 50 billion connected devices and also the year Gartner notes that over 50%of major new business processes and systems will incorporate some elementof the Internet of Things.

That’s the good news.

A recent SymantecInternet Security Threat Report says there are 25 connected devices per 100inhabitants in the US. Minimum 25 entry points to your personal information,not counting your front door, personal computers, compromised ATMs and otherdata sources. As your connected devices grow, so will your exposure. And with noclear methods of identifying and authenticating connected devices,enterprises will have a challenging time getting a handle on how many employeeshirts, shoes, fitness trackers, and smartwatches are connected to thecorporate network. And more importantly, what do they have access to?

The sneaky spreadsheet macro malware will soon be a spoofed critical alertrequiring instant attention.

Healthcare is a prime target for IoT attacks and researchers have alreadycompromised several devices revealing personal info and worse, causing thedevices to malfunction. ‘Hey, why isn’t my heart beating any……

The chaos on the feature first consumer side can be frustrating but nothingcompared to industrial and manufacturing.

The Industrial Internet of Things (IIoT) focuses on industrial controlsystems, device to network access and all the other connective sensorcapabilities. These attacks are less frequent, at least today, butthe consequences can be huge – taking out industrial plants, buildings,tractors, and even entire cities.

List-of-640-IoT-projects-min.png

If you think data protection and privacy are hot now, just wait until 2020.Like BYOD, security pros need to be ready for the inevitable not just thepotential of a breach. While the gadgets get all the interest, it’ll be theback end data center infrastructure that will take the brunt of the traffic –good and bad.

Organizations need an infrastructure that can both withstand the trafficgrowth and defend against attacks. Over on F5’s Newsroom, Lori MacVittie talks about the 3Things the Network Must Provide for IoT – delivery, security andvisibility. Things that can communicate securely with back-end apps, ADC’s thatcan understand the languages of things (like MQTT) and the ability to see whatis going on with the things.

Accordingto TechTarget, ensuring high availability of the IoT services will rely onboosting traffic management and monitoring. This will both mitigate businesscontinuity risks, and prevent potential losses. From a project planningstandpoint, organizations need to do capacity planning and watch the growthrate of the network so that the increased demand for the required bandwidth canbe met.

iot_keys.jpg

If you already have BIG-IP inyour back yard, you’re well on your way to being IoTready. You got the networksecurity to protect against inbound attacks; you can offload SSL to improvethe performance of the IoT application servers; you can extend your datacenters to the cloud tosupport IoT deployments; scale IoT applications beyond the data center whenrequired and both encrypt and accelerate IoT connections to the cloud.

A pair of BIG-IPs in the DMZ terminates the connection. They, in turn, intelligentlydistribute the client request to a pool (multiple) of IoT application servers,which then query the database servers for the appropriate content. Each tierhas redundant servers so in the event of a server outage, the others take theload and the system stays available.

The BIG-IP tuning may vary but it is still all about nodes, hosts, members,pools, virtual servers and the profiles and services applied. The BIG-IPplatform is application and location agnostic, meaning the type of applicationor where the application lives does not matter. As long as you tell the BIG-IPwhere to find the IoT application, the BIG-IP platform will deliver it.

ps

Related:




I’m Sorry Sir, You’re Obsolete

Is the rate of obsolescence proportionate to the rate of technologyadvances?

ihome.jpg

Afew years ago, those little iHome alarm clocksstarted to appear in hotel rooms. Cool gadgets that you could mount your mobilephone to battery charge or play the music on the device. We also had a few in ourhome. They worked perfectly for the iPhone4 since the connector was that 1 inchprotruding plug. When I got the iPhone6, those clocks instantly became useless.Obsolete. At least the phone connector part lost its value.

I’ve been thinking about this for a while.

The rate of obsolescence. The state when an object,technology, service or practice is no longer needed or wanted…even though itstill may be in good working order. E-waste is the fastestgrowing segment of the waste stream. With the technological advances, notonly are we buying the latest and greatest electronics but we’re also dumpingperfectly good, working devices at silly rates. There was even a story about a CentralPark mugger who rejected a flip phone during a heist.

Sure, the new gadget is shiny, faster, better or does stuff the other onecouldn’t. All commercial things have the typical emerging, growth, maturity anddecline model and I started wondering if the rate of obsolescence isproportionate to the rate of technology advances.

Moore’s Law and Wright’s Law are generally regarded as the bestformulas for predicting how rapidly technology will advance. They offerapproximations of the pace of technological progress. Moore’s Law (1965)describes the rate of improvement in the power of computer chips –essentially, the number of components doubles every 18 months. Generally,the principle can be applied to any technology and says that, depending on thetechnology, the rate of improvement will increase exponentially over time.

Wright’s Law (1936),says that progress increases with experience. Meaning that each percentincrease in cumulative production (in a given industry) results in a fixedpercentage improvement in production efficiency.

A simple web search of ‘rate of technological advancement’returns scores of images that show a huge ramp going up.

rate_of_advancement.jpg

But is there the same rapid decline chart for ‘out of date, lostfreshness’ technologies gone by?

Nothing with a laptop falling off a cliff but there are certainly chartsshowing the rate of e-waste.

e-waste-management-17-728.jpg

The climb is not as dramatic as technology advances (yet) but itis still growing rapidly.

So there doesn’t seem to be (or I simply can’t find it) a direct correlationor chart that incorporates both technology advances and resulting obsoleteness.There are plenty of articles that do cover thingsthat will be obsolete in the next few years (DVD players, landlines, clockradios); the jobsthat will be obsolete (travel agent, taxi driver); and the things thatbecame obsoleteover the last decade.

There is a patent, US7949581B2, which describes a method of determining an obsolescence rate of atechnology yet that looks more at the life of a technology patent and itseventual decay and depreciation rate. Less citations over the years means patentdecay. This is more about the depreciation of a specific patent rather than howsociety embraces and then ultimately tosses the technology.

The funny thing is that nowadays vintage items and antiquesseem to be hot markets. Nostalgia is a big seller. Longing for the simplertimes I guess.

And lastly, the rate of WorldIQ over time. Is there a connection with technology?

world_IQ_over_time.png

If you feel your infrastructure is becoming obsolete with all thatcloudy talk, F5 cancertainly help by providing the critical application delivery servicesconsistently across all your data centers - private clouds, publicclouds, and hybrid deployments - so you can enjoy the same availability,security and performance you've come to expect.

ps

Related:

 

E-waste image courtesy: www.slideshare.net/SuharshHarsha

World IQ image courtesy: http://uhaweb.hartford.edu/BRBAKER/




I Am an Application Delivery Fundamentalist!

Posted in f5, big-ip, silva, application delivery, devcentral, infrastructure, certification by psilva on August 9th, 2016

Fun and a little mental.

certrockstar.jpg

If you’ve been following along the DevCentral team’s journey toward F5 Certification, then you may be aware that we were in Chicago last week for F5’s Agility 2016 conference and took our 101 Application Delivery Fundamentals exam. I am happy to report that all of us, Jason, John, Chase and I, passed our exams. I gotta tell you, it’s a relief since I didn’t want to title this article, 'Two Out of Three Ain’t Bad.' Good song but wanted to avoid that.

We started this excursion back in April (me in March) with the team deciding to create a study group. Each week we’d tackle a topic with the guidance of Eric Mitchell’s excellent Study Guide. We worked through the sections and decided to test our luck with the Certification Team’s mobile testing center...with the pressure of passing during an F5 event. Imagine the slight pre-test anxiety going through our minds if we didn’t pass. ‘How long have you been at F5?’ the questions would have started. My mouth covering, embarrassing, face-palming, muffled response of, ’12 years,’ would not have been sufficient.

As Ken told us on the way into the exam room, ‘I tell people it is either pass or fail…so don’t worry about your overall score.’ But he also added specifically to me, ‘You know if you fail, I will give you grief.’ No Pressure.

Well, we were prepared and we all passed!

IMG_3439.jpg

Jason, John and I took the exam Tuesday morning. After registering and scheduling with Pearson Vue, we arrived at the mobile test center. You need to sign in and present two forms of ID, one with your picture. Even though the Certification team knew all of us, we still needed to follow the procedure, no exceptions. We liked that we had no special treatment – other than the ‘hello’ hugs – and had to process and pass fair and square.

We were seated in different areas since the exam room was fairly full when we entered. The moderator helped each of us get to the proper test associated with our registration and the timer started. For the 101, you have 90 minutes to answer 80 questions. At 23 minutes in, Jason got up and was finished. ‘Wa?!?’ as I look up seeing him walk by, ‘I’m only on question 28!’ I lamented. At least John was still there and I kept an eye on my time and question count the rest of the way. But I also told myself, ‘I’m in no hurry and if I need the full 90 minutes, I’ll take it to the last tick.’

John finished about a 40 minutes later and I was left for the last 30 to myself. With 10 minutes left, I was done but took that remaining time to review my answers. One tip: you can flag questions for review during the test or make comments for yourself as you move along. Close out the ones you know and go back for the more challenging questions. In the end I think I changed 3 answers. No idea if it swayed the results either way.

IMG_3442.jpg

When you are done, you walk back to the registration room and your preliminary results are already waiting. I felt a quiver when Heidi glanced at my results and gave that ‘I’m sorry,’ look. But that was soon turned to glee as I read, ‘you have Passed.’ We were 3 for 3. Chase took the test on Wednesday and also passed.

I feel it was a very fair test to determine one’s basic application delivery knowledge. Some networking, some security, some infrastructure. And although we did prepare, it was still a challenging test. These exams are not supposed to be cake-walks but a good way to measure your knowledge around a certain topic.

me_hats.jpg

While we passed and may be certifiable in our own right, we are not ‘officially’ F5 Certified. That comes with the 201 exam. The 201-TMOS Administration exam is the second exam required to achieve Certified F5 BIG-IP Administrator status. Candidates must have passed the 101-Application Delivery Fundamentals exam in order to be eligible for the 201 exam.

And wouldn’t you know it, we’re all now shooting for the 201. We plan on doing the team study again but we’ll also need to dig into some on box time for this one. I plan on keeping you posted for the 201 but for now, I’ll just bask in my 101 glory.

Phew!

ps

Related:





« Older episodes · Newer episodes »