See this article https://support.f5.com/csp/article/K14783
[Below content copied from above article]
The Request setting is often used in conjunction with iRules to provide selective access depending on the certificate presented.
For example, this option is useful if you want to allow clients who present a certificate from the configured trusted CA to gain access to the application, while redirecting clients who do not provide the required certificate are to a page that details the access requirements.
However, if you are not using iRules to enforce a different outcome, depending on the certificate details, there is no functional benefit to using the Request setting instead of the default Ignore setting. In both cases, the system establishes an SSL session, regardless of the certificate presented, and it proxies the connection to the default pool.
Hope this helps!