F5 LTM Training

Duration 6 Weeks | Fee 10K+GST 18%

Best Seller

Bangalore and Noida Campus

F5 LTM Training

Course Fee

$350

Course Duration

40 Hours

Course Mode

Classroom     Online

This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager (LTM) by introducing students to both commonly used and advanced LTM features. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps you build the well-rounded skill set needed to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network. 

Chapter 1: Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

Chapter 2: Reviewing Local Traffic Configuration

  • Reviewing Nodes, Pools, and Virtual Servers
  • Reviewing Address Translation
  • Reviewing Routing Assumptions
  • Reviewing Application Health Monitoring
  • Reviewing Traffic Behavior Modification with Profiles
  • Reviewing the TMOS Shell (TMSH)
  • Reviewing Managing BIG-IP Configuration Data

Chapter 3: Load Balancing Traffic with LTM

  • Exploring Load Balancing Options
  • Using Priority Group Activation and Fallback Host
  • Comparing Member and Node Load Balancing

Chapter 4: Modifying Traffic Behavior with Persistence

  • Reviewing Persistence
  • Introducing SSL Persistence 
  • Introducing SIP Persistence 
  • Introducing Universal Persistence
  • Introducing Destination Address Affinity Persistence
  • Using Match Across Options for Persistence

Chapter 5: Monitoring Application Health

  • Differentiating Monitor Types
  • Customizing the HTTP Monitor
  • Monitoring an Alias Address and Port
  • Monitoring a Path vs. Monitoring a Device
  • Managing Multiple Monitors
  • Using Application Check Monitors
  • Using Manual Resume and Advanced Monitor Timer Settings

Chapter 6: Processing Traffic with Virtual Servers

  • Understanding the Need for Other Virtual Server Types
  • Forwarding Traffic with a Virtual Server
  • Understanding Virtual Server Order of Precedence
  • Path Load Balancing

Chapter 7: Processing Traffic with SNATs

  • Overview of SNATs
  • Using SNAT Pools
  • SNATs as Listeners
  • SNAT Specificity
  • VIP Bounceback
  • Additional SNAT Options
  • Network Packet Processing

Chapter 8: Configuring High Availability

  • Introducing Device Service Clustering (DSC)
  • Preparing to Deploy a DSC Configuration
  • Configuring DSC Communication Settings
  • Establishing Device Trust
  • Establishing a Sync-Failover Device Group
  • Synchronizing Configuration Data
  • Exploring Traffic Group Behavior
  • Understanding Failover Managers and Triggers
  • Achieving Stateful Failover with Mirroring

Chapter 9: Modifying Traffic Behavior with Profiles

  • Profiles Overview
  • TCP Profile Settings
  • TCP Express Optimization
  • Performance Improvements
  • Configuring and Using Profiles
  • HTTP Profile Options
  • OneConnect
  • Offloading HTTP Compression to BIG-IP
  • HTTP Caching
  • Stream Profiles
  • F5 Acceleration Technologies

Chapter 10: Selected Topics

  • VLAN, VLAN Tagging, and Trunking
  • Restricting Network Access
  • SNMP Features

Chapter 11: Deploying Application Services with iApps

  • Simplifying Application Deployment with iApps
  • Using iApps Templates
  • Deploying an Application Service
  • Reconfiguring an Application Service
  • Leveraging the iApps Ecosystem on DevCentral

Chapter 12: Customizing Application Delivery with iRules and Local Traffic Policies

  • Getting Started with iRules
  • Triggering an iRule
  • Introducing iRule Constructs
  • Leveraging the DevCentral Ecosystem
  • Deploying and Testing iRules
  • Getting Started with Local Traffic Policies
  • What Can You Do with a Local Traffic Policy?
  • How Does a Local Traffic Policy Work?
  • Understanding Local Traffic Policy Workflow
  • Introducing the Elements of a Local Traffic Policy
  • Specifying the Matching Strategy
  • What Are Rules?
  • Understanding Requires and Controls
  • Configuring and Managing Policy Rules
  • Configuring a New Rule
  • Including Tcl in Certain Rule Settings

Chapter 13: Final Lab Project

  • About the Final Lab Project
  • Possible Solution to Lab 13.1

Chapter 14: Additional Training and Certification

  • Getting Started Series Web-Based Training
  • F5 Instructor Led Training Curriculum
  • F5 Professional Certification Program

Detailed Syllabus Covered

Students will be able to learn below topic after completion of the course

  • Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box
  • Use the Configuration utility and TMOS Shell (tmsh) to configure and manage BIG-IP resources such as virtual servers, pools, pool members, nodes, profiles, and monitors;
  • Create, restore from, and manage BIG-IP archives;
  • View resource status, availability, and statistical information and use this information to determine how the BIG-IP system is currently processing traffic
  • Explain the role of profiles in modifying traffic behaviour including SSL offload and persistence;
  • Perform basic troubleshooting and problem determination activities including using informational and diagnostic tools such as logs, SNMP traps/alerts, statistics, and iHealth, researching known issues and solutions on AskF5, submitting a problem ticket to F5 Technical Support, and viewing traffic flow using tcpdump;
  • Understand and manage disk space, software versions, boot locations, and user roles;
  • Provide administrative multi-tenancy on a single BIG-IP system through use of partitions
  • Use an iApp to deploy an application service;
  • Describe the role of Enterprise Manager and BIG-IQ in BIG-IP system administration and operation
  • Describe the role of iRules in customizing traffic behavior
  • Course Content
  • Setting Up the BIG-IP System
  • Traffic Processing with Local Traffic Manager (LTM)
  • Using NATs and SNATs
  • Using the Traffic Management Shell (TMSH)
  • Monitoring Application Health
  • Modifying Traffic Behavior with Profiles
  • Modifying Traffic Behavior with Persistence
  • Deploying Application Services with iApps
  • Troubleshooting the BIG-IP System
  • Administering the BIG-IP System
  • Customizing Application Delivery with iRules