This course go straight to the point and educate on the things you need to know to manage an F5 LTM device. This is an introductory level course; however, experienced load balancing engineers can also learn something new from this course as this course will touch on key knowledge areas on the LTM device to get your device up and running in no time whiles maintaining a comfort level navigating through the F5 LTM device like a boss. After completion of this course, you will:

– Understand what a load balancer is.
– Learn to speak the F5 lingo
– How to connect and license an F5 LTM device fresh out of the box
– Know how to assign IP address to the LTM device for network communication
– Be able to configure a Virtual server
– Configure a Pool
– Create Monitors
– Configure Nodes
– Configure Monitors
– How to Terminate SSL on the LTM using Profiles
– And how to configure a pair of LTM in Active – Standby
– How to upgrade LTM
– How to troubleshoot daily issue

Course Syllabus

  • Chapter 1: Setting Up the BIG-IP System
    • Introducing the BIG-IP System
    • Initially Setting Up the BIG-IP System
    • Archiving the BIG-IP Configuration
    • Leveraging F5 Support Resources and Tools
  • Chapter 2: Reviewing Local Traffic Configuration
    • Reviewing Nodes, Pools, and Virtual Servers
    • Reviewing Address Translation
    • Reviewing Routing Assumptions
    • Reviewing Application Health Monitoring
    • Reviewing Traffic Behavior Modification with Profiles
    • Reviewing the TMOS Shell (TMSH)
    • Reviewing Managing BIG-IP Configuration Data
  • Chapter 3: Load Balancing Traffic with LTM
    • Exploring Load Balancing Options
    • Using Priority Group Activation and Fallback Host
    • Comparing Member and Node Load Balancing


  • Chapter 4: Modifying Traffic Behavior with Persistence
    • Reviewing Persistence
    • Introducing Cookie Persistence
    • Introducing SSL Persistence
    • Introducing SIP Persistence
    • Introducing Universal Persistence
    • Introducing Destination Address Affinity Persistence
    • Using Match Across Options for Persistence


  • Chapter 5: Monitoring Application Health
    • Differentiating Monitor Types
    • Customizing the HTTP Monitor
    • Monitoring an Alias Address and Port
    • Monitoring a Path vs. Monitoring a Device
    • Managing Multiple Monitors
    • Using Application Check Monitors
    • Using Manual Resume and Advanced Monitor Timer Settings


  • Chapter 6: Processing Traffic with Virtual Servers
    • Understanding the Need for Other Virtual Server Types
    • Forwarding Traffic with a Virtual Server
    • Understanding Virtual Server Order of Precedence
    • Path Load Balancing


  • Chapter 7: Processing Traffic with SNATs
    • Overview of SNATs
    • Using SNAT Pools
    • SNATs as Listeners
    • SNAT Specificity
    • VIP Bounceback
    • Additional SNAT Options
    • Network Packet Processing Review


  • Chapter 8: Modifying Traffic Behavior with Profiles
    • Profiles Overview
    • TCP Express Optimization
    • TCP Profiles Overview
    • HTTP Profile Options
    • OneConnect
    • Offloading HTTP Compression to BIG-IP
    • HTTP Caching
    • Stream Profiles
    • F5 Acceleration Technologies
  • Chapter 9: Selected Topics
    • VLAN, VLAN Tagging, and Trunking
    • Restricting Network Access
    • SNMP Features
    • Segmenting Network Traffic with Route Domains


  • Chapter 10: Deploying Application Services with iApps
    • Simplifying Application Deployment with iApps
    • Using iApps Templates
    • Deploying an Application Service
    • Leveraging the iApps Ecosystem on DevCentral


  • Chapter 11: Customizing Application Delivery with iRules and Local Traffic Policies

    Getting Started with iRules

    • Triggering an iRule
    • Introducing iRule Constructs
    • Leveraging the DevCentral Ecosystem
    • Deploying and Testing iRules
    • Getting Started with Local Traffic Policies
    • What Can You Do with a Local Traffic Policy?
    • How Does a Local Traffic Policy Work?
    • Understanding Local Traffic Policy Workflow
    • Introducing the Elements of a Local Traffic Policy
    • Specifying the Matching Strategy
    • What Are Rules?
    • Understanding Requires and Controls
    • Configuring and Managing Policy Rules
    • Configuring a New Rule
    • Including Tcl in Certain Rule Settings


  • Chapter 12: Securing Application Delivery with LTM
    • Understanding Today’s Threat Landscape
    • Integrating LTM Into Your Security Strategy
    • Defending Your Environment Against SYN Flood Attacks
    • Defending Your Environment Against Other Volumetric Attacks
    • Addressing Application Vulnerabilities with iRules and Local Traffic Policies