CODE |
FEE |
DAYS |
ITS-019 |
$2900 |
3 days |
Course Description
This course provides a functional understanding of BIG-IP Local Traffic Manager, introducing students an advanced BIG-IP LTM features and functionality. It gives students the skills to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network.
Course Objective
By the end of this course, the student will learn the following:
- Back up the BIG-IP system configuration for safekeeping
- Test and verify application delivery through the BIG-IP system using local traffic statistics
- Configure virtual servers, pools, monitors, profiles, and persistence objects
- Configure priority group activation on a load balancing pool to allow servers to be activated only as needed to process traffic
- Compare and contrast member-based and node-based dynamic load balancing methods
- Differentiate between cookie, SSL, SIP, universal, and destination address affinity persistence, and describe use cases for each
- Configure connection limits to place a threshold on traffic volume to particular pool members and nodes
- Describe the three Match Across Services persistence options and use cases for each
- Configure health monitors to appropriately monitor application delivery through a BIG-IP system
- Configure different types of virtual services to support different types of traffic processing through a BIG-IP system
- Configure different types of SNATs to support routing of traffic through a BIG-IP system
- Configure VLAN tagging and trunking
- Restrict administrative and application traffic through the BIG-IP system using packet filters, port lockdown, and virtual server settings
- Configure SNMP alerts and traps in support of remote monitoring of the BIG-IP system
- Use an F5-supplied iApp template to deploy and manage a website application service
- Use iRules and local traffic policies appropriately to customize application delivery through the BIG-IP system
- Configure the BIG-IP to detect and mitigate some common attacks at the network and application layers using LTM features such as SYN check, eviction policies, iRules and Local Traffic Policies
Who Should Attend?
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP LTM system.
Course Schedule
Day-1 BIG-IP safekeeping and virtual server Configuration
- Back up the BIG-IP system configuration for safekeeping
- Configure virtual servers, pools, monitors, profiles, and persistence objects
- Configure priority group activation on a load balancing pool to allow servers to be activated only as needed to process traffic
- Test and verify application delivery through the BIG-IP system using local traffic statistics
- Compare and contrast member-based and node-based dynamic load balancing methods
- Differentiate between cookie, SSL, SIP, universal, and destination address affinity persistence, and describe use cases for each
- Configure connection limits to place a threshold on traffic volume to particular pool members and nodes
Day-2 Health Monitor and Traffic Processing Types
- Describe the three Match Across Services persistence options and use cases for each
- Configure health monitors to appropriately monitor application delivery through a BIG-IP system
- Configure different types of virtual services to support different types of traffic processing through a BIG-IP system
- Configure different types of SNATs to support routing of traffic through a BIG-IP system
Day-3 BIG-IP Networking and Security
- Configure VLAN tagging and trunking
- Restrict administrative and application traffic through the BIG-IP system using packet filters, port lockdown, and virtual server settings
- Configure SNMP alerts and traps in support of remote monitoring of the BIG-IP system
- Use an F5-supplied iApp template to deploy and manage a website application service
- Use iRules and local traffic policies appropriately to customize application delivery through the BIG-IP system
- Configure the BIG-IP to detect and mitigate some common attacks at the network and application layers using LTM features such as SYN check, eviction policies, iRules and Local Traffic Policies