Hi,
This profile is used for the implementation of service chaining.
It was based on VIP chaining where traffic ingress from client is accepted an incoming VIP, steered to one or more intermediate VIPs functioning as surrogates to one of several types of network devices (tap, ICAP, L2/L3 inline). The last service VIP then egress traffic to server.
Here is an example for using this profile to connect Access Policy Manager with another F5 Module, in this case, to allow for credential protection using DataSafe in access policies:
https://techdocs.f5.com/en-us/bigip-14-1-0/big-ip-access-policy-manager-credential-protection-14-1-0/configuring-credential-protection.html
I hope this helps.