CONFIGURING BIG-IP LOCAL TRAFFIC MANAGER (LTM) (3-DAY COURSE) (ENG)Description Learn how to configure and manage BIG-IP Local Traffic Manager (LTM) as it is commonly deployed in an application delivery network to achieve operational efficiency and maintain critical business applications. Through a combination of lecture and hands-on labs, explore features and functionality to process and modify traffic behavior using profiles, persistence, caching, compression, and source network address translation (SNAT).https://clico.pl/trainings/templates/configuring-big-ip-local-traffic-manager-ltm-3-day-course-enghttps://clico.pl/logo.png
CONFIGURING BIG-IP LOCAL TRAFFIC MANAGER (LTM) (3-DAY COURSE) (ENG)
Description Learn how to configure and manage BIG-IP Local Traffic Manager (LTM) as it is commonly deployed in an application delivery network to achieve operational efficiency and maintain critical business applications. Through a combination of lecture and hands-on labs, explore features and functionality to process and modify traffic behavior using profiles, persistence, caching, compression, and source network address translation (SNAT).
CONFIGURING BIG-IP LOCAL TRAFFIC MANAGER (LTM) (3-DAY COURSE) (ENG)
F5
3
3 200,0
USD
no
yes
Monitor application health at layers 3, 4, and 7, and implement dynamic load balancing methods. Use traffic management shell (TMSH), the Configuration utility, and Linux commands to create traffic processing and monitoring objects, observe the resulting traffic statistics, and effectively operate the BIG-IP LTM system.
Customize application delivery with iRules, establish application security, and harden system security using BIG-IP LTM functionality.
10:00 - 17:00
Chapter 1: Setting Up the BIG-IP System
Introducing the BIG-IP System
Initially Setting Up the BIG-IP System
Archiving the BIG-IP Configuration
Leveraging F5 Support Resources and Tools
Chapter 2: Reviewing Local Traffic Configuration
Reviewing Nodes, Pools, and Virtual Servers
Reviewing Address Translation
Reviewing Routing Assumptions
Reviewing Application Health Monitoring
Reviewing Traffic Behavior Modification with Profiles
Reviewing the TMOS Shell (TMSH)
Reviewing Managing BIG-IP Configuration Data
Chapter 3: Load Balancing Traffic with LTM
Exploring Load Balancing Options
Using Priority Group Activation and Fallback Host
Comparing Member and Node Load Balancing
Chapter 4: Modifying Traffic Behavior with Persistence
Reviewing Persistence
Introducing Cookie Persistence
Specifying Default and Fallback Persistence
Introducing SSL Persistence
Introducing SIP Persistence
Introducing Universal Persistence
Introducing Destination Address Affinity Persistence
Using Match Across Options for Persistence
9:00 - 17:00
Chapter 5: Monitoring Application Health
Differentiating Monitor Types
Customizing the HTTP Monitor
Monitoring an Alias Address and Port
Monitoring a Path vs. Monitoring a Device
Managing Multiple Monitors
Using Application Check Monitors
Using Manual Resume and Advanced Monitor Timer Settings
Chapter 6: Processing Traffic with Virtual Servers
Understanding the Need for Other Virtual Server Types
Forwarding Traffic with a Virtual Server
Understanding Virtual Server Order of Precedence
Path Load Balancing
Chapter 7: Processing Traffic with SNATs
Overview of SNATs
Using SNAT Pools
SNATs as Listeners
SNAT Specificity
VIP Bounceback
Additional SNAT Options
Network Packet Processing Review
Chapter 8: Modifying Traffic Behavior with Profiles
Profiles Overview
TCP Express Optimization
TCP Profiles Overview
HTTP Profile Options
HTTP/2 Profile Options
OneConnect
Offloading HTTP Compression to BIG-IP
Web Acceleration Profile and HTTP Caching
Stream Profiles
F5 Acceleration Technologies
Chapter 9: Selected Topics
VLAN, VLAN Tagging, and Trunking
Restricting Network Access
SNMP Features
Segmenting Network Traffic with Route Domains
9:00 - 17:00
Chapter 10: Customizing Application Delivery with iRules
Getting Started with iRules
Understanding When iRules are Triggered
Deploying iRules
Constructing an iRule
Testing and Debugging iRules
Exploring iRules Documentation
Chapter 11: Customizing Application Delivery with Local Traffic Policies
Getting Started with Local Traffic Policies
Configuring and Managing Policy Rules
Chapter 12: Securing Application Delivery with LTM
Understanding Today’s Threat Landscape
Integrating LTM Into Your Security Strategy
Defending Your Environment Against SYN Flood Attacks
Defending Your Environment Against Other Volumetric Attacks
Addressing Application Vulnerabilities with iRules and Local Traffic Policies
Detecting and Mitigating Other Common HTTP Threats
Chapter 13: Final Lab Project
About the Final Lab Project
Chapter 14: Additional Training and Certification
Getting Started Series Web-Based Training
F5 Instructor Led Training Curriculum
F5 Professional Certification Program