Administering BIG-IP and Configuring BIG-IP LTM v.14.1: Local Traffic Manager Bundle (BIGIPAD-LTM-BDLE) – Outline

Detailed Course Outline

Administering BIG-IP v14.1

Chapter 1: Setting Up the BIG-IP System
  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Configuring the Management Interface
  • Activating the Software License
  • Provisioning Modules and Resources
  • Importing a Device Certificate
  • Specifying BIG-IP Platform Properties
  • Configuring the Network
  • Configuring Network Time Protocol (NTP) Servers
  • Configuring Domain Name System (DNS) Settings
  • Configuring High Availability Options
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools
Chapter 2: Traffic Processing Building Blocks
  • Identifying BIG-IP Traffic Processing Objects
  • Configuring Virtual Servers and Pools
  • Load Balancing Traffic
  • Viewing Module Statistics and Logs
  • Using the Traffic Management Shell (TMSH)
  • Understanding the TMSH Hierarchical Structure
  • Navigating the TMSH Hierarchy
  • Managing BIG-IP Configuration State and Files
  • BIG-IP System Configuration State
  • Loading and Saving the System Configuration
  • Shutting Down and Restarting the BIG-IP System
  • Saving and Replicating Configuration Data (UCS and SCF)
Chapter 3: Using NATs and SNATs
  • Address Translation on the BIG-IP System
  • Mapping IP Addresses with NATs
  • Solving Routing Issues with SNATs
  • Configuring SNAT Auto Map on a Virtual Server
  • Monitoring for and Mitigating Port Exhaustion
Chapter 4: Monitoring Application Health
  • Introducing Monitors
  • Types of Monitors
  • Monitor Interval and Timeout Settings
  • Configuring Monitors
  • Assigning Monitors to Resources
  • Managing Pool, Pool Member, and Node Status
  • Using the Network Map
Chapter 5: Modifying Traffic Behavior with Profiles
  • Introducing Profiles
  • Understanding Profile Types and Dependencies
  • Configuring and Assigning Profiles
  • Introducing SSL Offload and SSL ReEncryption
  • Managing Object State
Chapter 6: Modifying Traffic Behavior with Persistence
  • Understanding the Need for Persistence
  • Introducing Source Address Affinity Persistence
  • Managing Object State
Chapter 7: Administering the BIG-IP System
  • Configuring Logging
  • Legacy Remote Logging
  • Introducing High Speed Logging (HSL)
  • High-Speed Logging Filters
  • HSL Configuration Objects
  • Configuring High Speed Logging
  • Using TCPDUMP on the BIG-IP System
  • Leveraging the BIG-IP iHealth System
  • Viewing BIG-IP System Statistics
  • Defining User Roles and Administrative Partitions
  • Leveraging vCMP
Chapter 8: Configuring High Availability
  • Introducing Device Service Clustering (DSC)
  • Preparing to Deploy a DSC Configuration
  • Configuring DSC Communication Settings
  • Establishing Device Trust
  • Establishing a Sync-Failover Device Group
  • Synchronizing Configuration Data
  • Exploring Traffic Group Behavior
  • Understanding Failover Managers and Triggers
  • Achieving Stateful Failover with Mirroring

Configuring BIG-IP LTM v14.1: Local Traffic Manager

Chapter 1: Setting Up the BIG-IP System
  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools
Chapter 2: Reviewing Local Traffic Configuration
  • Reviewing Nodes, Pools, and Virtual Servers
  • Reviewing Address Translation
  • Reviewing Routing Assumptions
  • Reviewing Application Health Monitoring
  • Reviewing Traffic Behavior Modification with Profiles
  • Reviewing the TMOS Shell (TMSH)
  • Reviewing Managing BIG-IP Configuration Data
Chapter 3: Load Balancing Traffic with LTM
  • Exploring Load Balancing Options
  • Using Priority Group Activation and Fallback Host
  • Comparing Member and Node Load Balancing
Chapter 4: Modifying Traffic Behavior with Persistence
  • Reviewing Persistence
  • Introducing Cookie Persistence
  • Introducing SSL Persistence
  • Introducing SIP Persistence
  • Introducing Universal Persistence
  • Introducing Destination Address Affinity Persistence
  • Using Match Across Options for Persistence
Chapter 5: Monitoring Application Health
  • Differentiating Monitor Types
  • Customizing the HTTP Monitor
  • Monitoring an Alias Address and Port
  • Monitoring a Path vs. Monitoring a Device
  • Managing Multiple Monitors
  • Using Application Check Monitors
  • Using Manual Resume and Advanced Monitor Timer Settings
Chapter 6: Processing Traffic with Virtual Servers
  • Understanding the Need for Other Virtual Server Types
  • Forwarding Traffic with a Virtual Server
  • Understanding Virtual Server Order of Precedence
  • Path Load Balancing
Chapter 7: Processing Traffic with SNATs
  • Overview of SNATs
  • Using SNAT Pools
  • SNATs as Listeners
  • SNAT Specificity
  • VIP Bounceback
  • Additional SNAT Options
  • Network Packet Processing Review
Chapter 8: Modifying Traffic Behavior with Profiles
  • Profiles Overview
  • TCP Express Optimization
  • TCP Profiles Overview
  • HTTP Profile Options
  • OneConnect
  • Offloading HTTP Compression to BIG-IP
  • HTTP Caching
  • Stream Profiles
  • F5 Acceleration Technologies
Chapter 9: Selected Topics
  • VLAN, VLAN Tagging, and Trunking
  • Restricting Network Access
  • SNMP Features
  • Segmenting Network Traffic with Route Domains
Chapter 10: Deploying Application Services with iApps
  • Simplifying Application Deployment with iApps
  • Using iApps Templates
  • Deploying an Application Service
  • Leveraging the iApps Ecosystem on DevCentral
Chapter 11: Customizing Application Delivery with iRules and Local Traffic Policies
  • Getting Started with iRules
  • Triggering an iRule
  • Introducing iRule Constructs
  • Leveraging the DevCentral Ecosystem
  • Deploying and Testing iRules
  • Getting Started with Local Traffic Policies
  • What Can You Do with a Local Traffic Policy?
  • How Does a Local Traffic Policy Work?
  • Understanding Local Traffic Policy Workflow
  • Introducing the Elements of a Local Traffic Policy
  • Specifying the Matching Strategy
  • What Are Rules?
  • Understanding Requires and Controls
  • Configuring and Managing Policy Rules
  • Configuring a New Rule
  • Including Tcl in Certain Rule Settings
Chapter 12: Securing Application Delivery with LTM
  • Understanding Today’s Threat Landscape
  • Integrating LTM Into Your Security Strategy
  • Defending Your Environment Against SYN Flood Attacks
  • Defending Your Environment Against Other Volumetric Attacks
  • Addressing Application Vulnerabilities with iRules and Local Traffic Policies
Chapter 13: Final Lab Project
  • About the Final Lab Project
  • Possible Solution to Lab Project