| Topic | Details |
| Topic 1 | - List which log files could be used to find events and
- or hardware issues: This section teaches identification of key log files (
- var
- log
- ltm, secure, audit), understanding event severity levels, and interpreting log messages.
|
| Topic 2 | - Apply procedural concepts required to create, manage, and restore a UCS archive: This domain covers UCS backup and restore procedures, understanding backup use cases, proper storage practices, and UCS file contents including private keys.
|
| Topic 3 | - Identify and report current device status: This domain covers monitoring BIG-IP operational status through LCD panels, dashboards, Network Map, GUI
- TMSH commands, and checking high availability states.
|
| Topic 4 | - Identify management connectivity configurations: This section focuses on understanding management access configurations, including management IP addresses, port lockdown settings, remote connectivity verification, and troubleshooting access issues.
|
| Topic 5 | - Given a scenario, determine device upgrade eligibility: This domain covers determining appropriate timing for software and platform upgrades and strategies to minimize downtime during upgrades.
|
| Topic 6 | - Explain config sync: This section focuses on configuration synchronization procedures, identifying sync errors, determining sync necessity, checking sync status, and comparing configuration timestamps.
|
| Topic 7 | - Explain authentication methods: This section focuses on user management including creating
- modifying users, configuring remote authentication providers, and implementing group-based access control.
|
| Topic 8 | - Apply procedural concepts required to manage the state of a high availability pair: This domain covers controlling and monitoring failover states in high availability pairs, including forcing standby
- offline modes, reporting failover status, and verifying device trust.
|