Course Topics
- BIG-IP initial setup (licensing, provisioning, and network configuration)
- A review of BIG-IP local traffic configuration objects
- Using dynamic load balancing methods
- Modifying traffic behavior with persistence (including SSL, SIP, universal, and destination address affinity persistence)
- Monitoring application health with Layer 3, Layer 4, and Layer 7 monitors (including transparent, scripted, and external monitors)
- Processing traffic with virtual servers (including network, forwarding, and reject virtual servers)
- Processing traffic with SNATs (including SNAT pools and SNATs as listeners)
- Modifying traffic behavior with profiles (including TCP profiles, advanced HTTP profile options, caching, compression, and OneConnect profiles)
- Advanced BIG-IP LTM configuration options (including VLAN tagging and trunking, SNMP features, packet filters, and route domains)
- Deploying application services with iApps
- Customizing application delivery with iRules and local traffic policies
- Securing application delivery using BIG-IP LTM
Course Outline
Setting Up the BIG-IP System
- Introducing the BIG-IP System
- Initially Setting Up the BIG-IP System
- Archiving the BIG-IP Configuration
- Leveraging F5 Support Resources and Tools
Reviewing Local Traffic Configuration
- Reviewing Nodes, Pools, and Virtual Servers
- Reviewing Address Translation
- Reviewing Routing Assumptions
- Reviewing Application Health Monitoring
- Reviewing Traffic Behavior Modification with Profiles
- Reviewing the TMOS Shell (TMSH)
- Reviewing Managing BIG-IP Configuration Data
Load Balancing Traffic with LTM
- Exploring Load Balancing Options
- Using Priority Group Activation and Fallback Host
- Comparing Member and Node Load Balancing
Modifying Traffic Behavior with Persistence
- Reviewing persistence
- Introducing Cookie Persistence
- Introducing SSL Persistence
- Introducing SIP Persistence
- Introducing Universal Persistence
- Introducing Destination Address Affinity Persistence
- Using Match Across Options for Persistence
Monitoring Application Health
- Differentiating Monitor Types
- Customizing the HTTP Monitor
- Monitoring an Alias Address and Port
- Monitoring a Path vs. Monitoring a Device
- Managing Multiple Monitors
- Using Application Check Monitors
- Using Manual Resume and Advanced Monitor Timer Settings
Processing Traffic with Virtual Servers
- Understanding the Need for Other Virtual Server Types
- Forwarding Traffic with a Virtual Server
- Understanding Virtual Server Order of Precedence
- Path Load Balancing
Processing Traffic with SNATs
- Overview of SNATs
- Using SNAT Pools
- SNATs as Listeners
- SNAT Specificity
- VIP Bounceback
- Additional SNAT Options
- Network Packet Processing Review
Modifying Traffic Behavior with Profiles
- Profiles Overview
- TCP Express Optimization
- TCP Profiles Overview
- HTTP Profile Options
- OneConnect
- Offloading HTTP Compression to BIG-IP
- HTTP Caching
- Stream Profiles
- F5 Acceleration Technologies
Selected Topics
- VLAN, VLAN Tagging, and Trunking
- Restricting Network Access
- SNMP Features
- Segmenting Network Traffic with Route Domains
Deploying Application Services with iApps
- Simplifying Application Deployment with iApps
- Using iApps Templates
- Deploying an Application Service
- Leveraging the iApps Ecosystem on DevCentral
Customizing Application Delivery with iRules and Local Traffic Policies
- Getting Started with iRules
- Triggering an iRule
- Introducing iRule Constructs
- Leveraging the DevCentral Ecosystem
- Deploying and Testing iRules
- Getting Started with Local Traffic Policies
- What Can You Do with a Local Traffic Policy?
- How Does a Local Traffic Policy Work?
- Understanding Local Traffic Policy Workflow
- Introducing the Elements of a Local Traffic Policy
- Specifying the Matching Strategy
- What Are Rules?
- Understanding Requires and Controls
- Configuring and Managing Policy Rules
- Configuring a New Rule
- Including Tcl in Certain Rule Settings
Securing Application Delivery with LTM
- Understanding Today’s Threat Landscape
- Integrating LTM Into Your Security Strategy
- Defending Your Environment Against SYN Flood Attacks
- Defending Your Environment Against Other Volumetric Attacks
- Addressing Application Vulnerabilities with iRules and Local Traffic Policies
Final Lab Project
- About the Final Lab Project
- Possible Solution to Lab 13.1