CODE: F5N_BIGIPAD_LTM_BDLE
LENGTH: 40 Hours (5 days)
PRICE: kr39 800,00
Delta på Administering BIG-IP och Configuring BIG-IP LTM: Local Traffic Manager under samma vecka och spara pengar på kurspriset!
Paketpris: 39.800SEK (ord pris båda kurserna: 46.000SEK)
Attend both Administering BIG-IP and Configuring BIG-IP LTM: Local Traffic Manager in the same week and save money!
Bundle: 39.800SEK both courses (list price both courses: 46.000SEK)
Administering BIG-IP v14.1
This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.
Configuring BIG-IP LTM v14.1: Local Traffic Manager
This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps students build the well-rounded skill set needed to manage BIGIP LTM systems as part of a flexible and high- performance application delivery network.
*Please note that this offer is not to be used in conjunction with any other discount structure or promotion. Please quote F5N_BIGIPAD_LTM_BDLE when booking.
Administering BIG-IP v14.1
• Getting started with the BIG-IP system
• Traffic processing with BIG-IP Local Traffic Manager (LTM)
• Using the TMSH (TMOS Shell) command line interface
• Using NATs and SNATs
• Monitoring application health and managing object status
• Modifying traffic behavior with profiles, including SSL offload and re-encryption
• Modifying traffic behavior with persistence, including source address affinity and cookie persistence
• Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote logging), and using tcpdump
• User roles and administrative partitions
• vCMP concepts
• Customizing application delivery with iRules
Configuring BIG-IP LTM v14.1: Local Traffic Manager
• BIG-IP initial setup (licensing, provisioning, and network configuration)
• A review of BIG-IP local traffic configuration objects
• Using dynamic load balancing methods
• Modifying traffic behavior with persistence (including SSL, SIP, universal, and destination address affinity persistence)
• Monitoring application health with Layer 3, Layer 4, and Layer 7 monitors (including transparent, scripted, and external monitors)
• Processing traffic with virtual servers (including network, forwarding, and reject virtual servers)
• Processing traffic with SNATs (including SNAT pools and SNATs as listeners)
• Modifying traffic behavior with profiles (including TCP profiles, advanced HTTP profile options, caching, compression, and OneConnect profiles)
• Advanced BIG-IP LTM configuration options (including VLAN tagging and trunking, SNMP features, packet filters, and route domains)
• Deploying application services with iApps
• Customizing application delivery with iRules and local traffic policies
• Securing application delivery using BIG-IP LTM
This course is intended for system and network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network, and installation, setup, configuration, and administration of the BIG-IP LTM system.
The following free web-based training courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience.
These courses are available at F5 University (http://university.f5.com):
▪ Getting Started with BIG-IP
▪ Getting Started with BIG-IP Local Traffic Manager (LTM) web-based training
The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:
▪ OSI model encapsulation
▪ Routing and switching
▪ Ethernet and ARP
▪ TCP/IP concepts
▪ IP addressing and subnetting
▪ NAT and private IP addressing
▪ Default gateway
▪ Network firewalls
▪ LAN vs. WAN
The following course-specific knowledge and experience is suggested before attending this course:
▪ Web application delivery
▪ HTTP, HTTPS, FTP and SSH protocols
▪ TLS/SSL
Administering BIG-IP v14.1
Chapter 1: Setting Up the BIG-IP System
▪ Introducing the BIG-IP System
▪ Initially Setting Up the BIG-IP System
▪ Configuring the Management Interface
▪ Activating the Software License
▪ Provisioning Modules and Resources
▪ Importing a Device Certificate
▪ Specifying BIG-IP Platform Properties
▪ Configuring the Network
▪ Configuring Network Time Protocol (NTP) Servers
▪ Configuring Domain Name System (DNS) Settings
▪ Configuring High Availability Options
▪ Archiving the BIG-IP Configuration
▪ Leveraging F5 Support Resources and Tools
Chapter 2: Traffic Processing Building Blocks
▪ Identifying BIG-IP Traffic Processing Objects
▪ Configuring Virtual Servers and Pools
▪ Load Balancing Traffic
▪ Viewing Module Statistics and Logs
▪ Using the Traffic Management Shell (TMSH)
▪ Understanding the TMSH Hierarchical Structure
▪ Navigating the TMSH Hierarchy
▪ Managing BIG-IP Configuration State and Files
▪ BIG-IP System Configuration State
▪ Loading and Saving the System Configuration
▪ Shutting Down and Restarting the BIG-IP System
▪ Saving and Replicating Configuration Data (UCS and SCF)
Chapter 3: Using NATs and SNATs
▪ Address Translation on the BIG-IP System
▪ Mapping IP Addresses with NATs
▪ Solving Routing Issues with SNATs
▪ Configuring SNAT Auto Map on a Virtual Server
▪ Monitoring for and Mitigating Port Exhaustion
Chapter 4: Monitoring Application Health
▪ Introducing Monitors
▪ Types of Monitors
▪ Monitor Interval and Timeout Settings
▪ Configuring Monitors
▪ Assigning Monitors to Resources
▪ Managing Pool, Pool Member, and Node Status
▪ Using the Network Map
Chapter 5: Modifying Traffic Behavior with Profiles
▪ Introducing Profiles
▪ Understanding Profile Types and Dependencies
▪ Configuring and Assigning Profiles
▪ Introducing SSL Offload and SSL ReEncryption
▪ Managing Object State
Chapter 6: Modifying Traffic Behavior with Persistence
▪ Understanding the Need for Persistence
▪ Introducing Source Address Affinity Persistence
▪ Managing Object State
Chapter 7: Administering the BIG-IP System
▪ Configuring Logging
▪ Legacy Remote Logging
▪ Introducing High Speed Logging (HSL)
▪ High-Speed Logging Filters
▪ HSL Configuration Objects
▪ Configuring High Speed Logging
▪ Using TCPDUMP on the BIG-IP System
▪ Leveraging the BIG-IP iHealth System
▪ Viewing BIG-IP System Statistics
▪ Defining User Roles and Administrative Partitions
▪ Leveraging vCMP
Chapter 8: Configuring High Availability
▪ Introducing Device Service Clustering (DSC)
▪ Preparing to Deploy a DSC Configuration
▪ Configuring DSC Communication Settings
▪ Establishing Device Trust
▪ Establishing a Sync-Failover Device Group
▪ Synchronizing Configuration Data
▪ Exploring Traffic Group Behavior
▪ Understanding Failover Managers and Triggers
▪ Achieving Stateful Failover with Mirroring
Configuring BIG-IP LTM v14.1: Local Traffic Manager
Chapter 1: Setting Up the BIG-IP System
▪ Introducing the BIG-IP System
▪ Initially Setting Up the BIG-IP System
▪ Archiving the BIG-IP Configuration
▪ Leveraging F5 Support Resources and Tools
Chapter 2: Reviewing Local Traffic Configuration
▪ Reviewing Nodes, Pools, and Virtual Servers
▪ Reviewing Address Translation
▪ Reviewing Routing Assumptions
▪ Reviewing Application Health Monitoring
▪ Reviewing Traffic Behavior Modification with Profiles
▪ Reviewing the TMOS Shell (TMSH)
▪ Reviewing Managing BIG-IP Configuration Data
Chapter 3: Load Balancing Traffic with LTM
▪ Exploring Load Balancing Options
▪ Using Priority Group Activation and Fallback Host
▪ Comparing Member and Node Load Balancing
Chapter 4: Modifying Traffic Behavior with Persistence
▪ Reviewing Persistence
▪ Introducing Cookie Persistence
▪ Introducing SSL Persistence
▪ Introducing SIP Persistence
▪ Introducing Universal Persistence
▪ Introducing Destination Address Affinity Persistence
▪ Using Match Across Options for Persistence
Chapter 5: Monitoring Application Health
▪ Differentiating Monitor Types
▪ Customizing the HTTP Monitor
▪ Monitoring an Alias Address and Port
▪ Monitoring a Path vs. Monitoring a Device
▪ Managing Multiple Monitors
▪ Using Application Check Monitors
▪ Using Manual Resume and Advanced Monitor Timer Settings
Chapter 6: Processing Traffic with Virtual Servers
▪ Understanding the Need for Other Virtual Server Types
▪ Forwarding Traffic with a Virtual Server
▪ Understanding Virtual Server Order of Precedence
▪ Path Load Balancing
Chapter 7: Processing Traffic with SNATs
▪ Overview of SNATs
▪ Using SNAT Pools
▪ SNATs as Listeners
▪ SNAT Specificity
▪ VIP Bounceback
▪ Additional SNAT Options
▪ Network Packet Processing Review
Chapter 8: Modifying Traffic Behavior with Profiles
▪ Profiles Overview
▪ TCP Express Optimization
▪ TCP Profiles Overview
▪ HTTP Profile Options
▪ OneConnect
▪ Offloading HTTP Compression to BIG-IP
▪ HTTP Caching
▪ Stream Profiles
▪ F5 Acceleration Technologies
Chapter 9: Selected Topics
▪ VLAN, VLAN Tagging, and Trunking
▪ Restricting Network Access
▪ SNMP Features
▪ Segmenting Network Traffic with Route Domains
Chapter 10: Deploying Application Services with iApps
▪ Simplifying Application Deployment with iApps
▪ Using iApps Templates
▪ Deploying an Application Service
▪ Leveraging the iApps Ecosystem on DevCentral
Chapter 11: Customizing Application Delivery with iRules and Local Traffic Policies
▪ Getting Started with iRules
▪ Triggering an iRule
▪ Introducing iRule Constructs
▪ Leveraging the DevCentral Ecosystem
▪ Deploying and Testing iRules
▪ Getting Started with Local Traffic Policies
▪ What Can You Do with a Local Traffic Policy?
▪ How Does a Local Traffic Policy Work?
▪ Understanding Local Traffic Policy Workflow
▪ Introducing the Elements of a Local Traffic Policy
▪ Specifying the Matching Strategy
▪ What Are Rules?
▪ Understanding Requires and Controls
▪ Configuring and Managing Policy Rules
▪ Configuring a New Rule
▪ Including Tcl in Certain Rule Settings
Chapter 12: Securing Application Delivery with LTM
▪ Understanding Today’s Threat Landscape
▪ Integrating LTM Into Your Security Strategy
▪ Defending Your Environment Against SYN Flood Attacks
▪ Defending Your Environment Against Other Volumetric Attacks
▪ Addressing Application Vulnerabilities with iRules and Local Traffic Policies
Chapter 13: Final Lab Project
▪ About the Final Lab Project
▪ Possible Solution to La
“*Vänligen notera att detta erbjudande inte kan kombineras med andra rabatter eller prissänkningar”
”*Please not that this offer can not be combined with any other discount structures or promotions”