Detailed Course Outline
Administering BIG-IP v14.1
Chapter 1: Setting Up the BIG-IP System
- Introducing the BIG-IP System
- Initially Setting Up the BIG-IP System
- Configuring the Management Interface
- Activating the Software License
- Provisioning Modules and Resources
- Importing a Device Certificate
- Specifying BIG-IP Platform Properties
- Configuring the Network
- Configuring Network Time Protocol (NTP) Servers
- Configuring Domain Name System (DNS) Settings
- Configuring High Availability Options
- Archiving the BIG-IP Configuration
- Leveraging F5 Support Resources and Tools
Chapter 2: Traffic Processing Building Blocks
- Identifying BIG-IP Traffic Processing Objects
- Configuring Virtual Servers and Pools
- Load Balancing Traffic
- Viewing Module Statistics and Logs
- Using the Traffic Management Shell (TMSH)
- Understanding the TMSH Hierarchical Structure
- Navigating the TMSH Hierarchy
- Managing BIG-IP Configuration State and Files
- BIG-IP System Configuration State
- Loading and Saving the System Configuration
- Shutting Down and Restarting the BIG-IP System
- Saving and Replicating Configuration Data (UCS and SCF)
Chapter 3: Using NATs and SNATs
- Address Translation on the BIG-IP System
- Mapping IP Addresses with NATs
- Solving Routing Issues with SNATs
- Configuring SNAT Auto Map on a Virtual Server
- Monitoring for and Mitigating Port Exhaustion
Chapter 4: Monitoring Application Health
- Introducing Monitors
- Types of Monitors
- Monitor Interval and Timeout Settings
- Configuring Monitors
- Assigning Monitors to Resources
- Managing Pool, Pool Member, and Node Status
- Using the Network Map
Chapter 5: Modifying Traffic Behavior with Profiles
- Introducing Profiles
- Understanding Profile Types and Dependencies
- Configuring and Assigning Profiles
- Introducing SSL Offload and SSL ReEncryption
- Managing Object State
Chapter 6: Modifying Traffic Behavior with Persistence
- Understanding the Need for Persistence
- Introducing Source Address Affinity Persistence
- Managing Object State
Chapter 7: Administering the BIG-IP System
- Configuring Logging
- Legacy Remote Logging
- Introducing High Speed Logging (HSL)
- High-Speed Logging Filters
- HSL Configuration Objects
- Configuring High Speed Logging
- Using TCPDUMP on the BIG-IP System
- Leveraging the BIG-IP iHealth System
- Viewing BIG-IP System Statistics
- Defining User Roles and Administrative Partitions
- Leveraging vCMP
Chapter 8: Configuring High Availability
- Introducing Device Service Clustering (DSC)
- Preparing to Deploy a DSC Configuration
- Configuring DSC Communication Settings
- Establishing Device Trust
- Establishing a Sync-Failover Device Group
- Synchronizing Configuration Data
- Exploring Traffic Group Behavior
- Understanding Failover Managers and Triggers
- Achieving Stateful Failover with Mirroring
Configuring BIG-IP LTM v14.1: Local Traffic Manager
Chapter 1: Setting Up the BIG-IP System
- Introducing the BIG-IP System
- Initially Setting Up the BIG-IP System
- Archiving the BIG-IP Configuration
- Leveraging F5 Support Resources and Tools
Chapter 2: Reviewing Local Traffic Configuration
- Reviewing Nodes, Pools, and Virtual Servers
- Reviewing Address Translation
- Reviewing Routing Assumptions
- Reviewing Application Health Monitoring
- Reviewing Traffic Behavior Modification with Profiles
- Reviewing the TMOS Shell (TMSH)
- Reviewing Managing BIG-IP Configuration Data
Chapter 3: Load Balancing Traffic with LTM
- Exploring Load Balancing Options
- Using Priority Group Activation and Fallback Host
- Comparing Member and Node Load Balancing
Chapter 4: Modifying Traffic Behavior with Persistence
- Reviewing Persistence
- Introducing Cookie Persistence
- Introducing SSL Persistence
- Introducing SIP Persistence
- Introducing Universal Persistence
- Introducing Destination Address Affinity Persistence
- Using Match Across Options for Persistence
Chapter 5: Monitoring Application Health
- Differentiating Monitor Types
- Customizing the HTTP Monitor
- Monitoring an Alias Address and Port
- Monitoring a Path vs. Monitoring a Device
- Managing Multiple Monitors
- Using Application Check Monitors
- Using Manual Resume and Advanced Monitor Timer Settings
Chapter 6: Processing Traffic with Virtual Servers
- Understanding the Need for Other Virtual Server Types
- Forwarding Traffic with a Virtual Server
- Understanding Virtual Server Order of Precedence
- Path Load Balancing
Chapter 7: Processing Traffic with SNATs
- Overview of SNATs
- Using SNAT Pools
- SNATs as Listeners
- SNAT Specificity
- VIP Bounceback
- Additional SNAT Options
- Network Packet Processing Review
Chapter 8: Modifying Traffic Behavior with Profiles
- Profiles Overview
- TCP Express Optimization
- TCP Profiles Overview
- HTTP Profile Options
- OneConnect
- Offloading HTTP Compression to BIG-IP
- HTTP Caching
- Stream Profiles
- F5 Acceleration Technologies
Chapter 9: Selected Topics
- VLAN, VLAN Tagging, and Trunking
- Restricting Network Access
- SNMP Features
- Segmenting Network Traffic with Route Domains
Chapter 10: Deploying Application Services with iApps
- Simplifying Application Deployment with iApps
- Using iApps Templates
- Deploying an Application Service
- Leveraging the iApps Ecosystem on DevCentral
Chapter 11: Customizing Application Delivery with iRules and Local Traffic Policies
- Getting Started with iRules
- Triggering an iRule
- Introducing iRule Constructs
- Leveraging the DevCentral Ecosystem
- Deploying and Testing iRules
- Getting Started with Local Traffic Policies
- What Can You Do with a Local Traffic Policy?
- How Does a Local Traffic Policy Work?
- Understanding Local Traffic Policy Workflow
- Introducing the Elements of a Local Traffic Policy
- Specifying the Matching Strategy
- What Are Rules?
- Understanding Requires and Controls
- Configuring and Managing Policy Rules
- Configuring a New Rule
- Including Tcl in Certain Rule Settings
Chapter 12: Securing Application Delivery with LTM
- Understanding Today’s Threat Landscape
- Integrating LTM Into Your Security Strategy
- Defending Your Environment Against SYN Flood Attacks
- Defending Your Environment Against Other Volumetric Attacks
- Addressing Application Vulnerabilities with iRules and Local Traffic Policies
Chapter 13: Final Lab Project
- About the Final Lab Project
- Possible Solution to Lab Project