F5 LTM (Local Traffic Manager)

Load balancing is a vital element of any network that is required to maintain high availability. The maintaining of the availability of the network is done while elegantly handling sudden spikes in traffic. The load balancers prevent the web, application, and database servers from becoming overloaded at the time of a sudden increase in traffic. 

The balancers distribute the traffic evenly across servers to prevent it from being loaded. In the situation of the web failure, the load balancers will divert any traffic away from that server and this will maintain the availability of the website and applications. The unique “predictive” algorithm is used and the traffic is routed to the most efficient server.

Using intelligent keepalives, all servers in the pool can be monitored effectively. In the event that a server or the application on the server fails, requests are automatically and seamlessly forwarded to other servers and the network availability of the network is maintained. F5 Networks will certainly provide the solutions that will make applications very secure, quick, and available for everyone, helping to radically progressing effectiveness and allow organizations to get the most out of their IT investment. 

At Nux SOFTWARE SOLUTIONS, you can get the job satisfaction as assist you in getting the secured job in different MNCs totally based on your skills.

Course Syllabus

Module 1

Architect an application Cognitive Complexity

Module 2

Given an expected traffic volume, determine the appropriate SNAT configuration U/A
Examples Explain when SNAT is required
Describe the benefit of using SNAT pools

Module 3

Given a scenario, determine the minimum profiles for an application U/A Examples
Explain security options available for the application
Explain how to use LTM as a service proxy
Describe how a given service is deployed on an LTM

Module 4

Given an application configuration, determine which functions can be offloaded to the LTM device
U/A
Examples Explain how to offload HTTP servers for SSL compression and caching
Objective 1.04 Given an application configuration, determine which functions can be
offloaded to the LTM device
U/A
Examples Explain how to create an HTTP configuration to handle an HTTP server error

Module 5

Given an application configuration, determine the appropriate profile and persistence options
A/E
Examples
Explain how to create an HTTP configuration for mobile clients
Explain how to create an HTTP configuration to optimize WAN connectivity
Determine when connection mirroring is required

Module 6

Explain the steps necessary to configure AVR U/A
Examples Explain the steps necessary to configure the AVR
Explain how to create an AVR profile and options

Module 7

Given a set of reporting requirements, determine the AVR metrics and entities to collect
U/A
Examples
Explain the sizing implications of AVR on the LTM device
Explain the logging and notifications options of AVR
Explain the uses of the collected metrics and entities

Module 8

Given a scenario, determine the appropriate monitor type and parameters to use

Module 9

Given a set of parameters, predict an outcome of a monitor status on other LTM device objects
A/E
Examples Determine the effect of a monitor on the virtual server status
Determine the effect of active versus inline monitors on the application status or on the LTM device

Module 10

Given a set of SSL requirements, determine the appropriate profile options to create or modify in the SSL profile
U/A
Examples Describe the difference between client and server SSL profiles
Describe the difference between client and server SSL processing

Module 11

Given a set of application requirements, describe the steps necessary to configure SSL
U/A
Examples Describe the process to update expired SSL certificates
Describe the steps to incorporate client authentication to the SSL process

Module 12

Given a set of application requirements, determine the appropriate virtual server type to use
U/A
Examples Describe the process to update expired SSL certificates
Describe the steps to incorporate client authentication to the SSL process

Module 13

Given a set of application requirements, determine the appropriate virtual server configuration settings
U/A
Examples
Describe which steps are necessary to complete prior to creating the virtual server
Describe the security options when creating a virtual server (i.e., VLAN limitation, route domains, packet filters, iRules)

Module 14

Explain the matching order of multiple virtual servers U/A

Module 15

Given a scenario, determine the appropriate load balancing method(s) U/A Examples
Identify the behavior of the application to be load balanced
Differentiate different load balancing methods
Explain how to perform outbound load balancing
Explain CARP persistence

Module 16

Objective 1.16
Explain the effect of LTM device configuration parameters on load balancing decisions U/A

Module 17

Set-up, administer, and secure LTM devices Cognitive Complexity

Objective 2.01
Distinguish between the management interface configuration and application traffic interface configuration U/A Examples
Explain the requirements for management of the LTM devices
Explain the requirements for the application traffic traversing the LTM devices
Explain how to configure management connectivity options: AOM, serial console, USB & Management Ethernet Port

Objective 2.02
Given a network diagram, determine the appropriate network and system settings (i.e., VLANs, selfIPs, trunks, routes, NTP servers, DNS servers, SNMP receivers and syslog servers) U/A Examples
Explain the requirements for self IPs (including port lockdown)
Explain routing requirements for management and application traffic (including route domains and IPv6)
Explain the effect of system time on LTM devices

Module 18

Objective 2.03
Given a network diagram, determine the appropriate physical connectivity U/A Examples Explain physical network connectivity options of LTM devices

Objective 2.04
Explain how to configure remote authentication and multiple administration roles on the LTM device U/A Examples
Explain the relationship between route domains, user roles and administrative partitions
Explain the mapping between remote users and remote role groups
Explain the options for partition access and terminal access

Objective 2.05
Given a scenario, determine an appropriate high availability configuration (i.e., failsafe, failover and timers) U/A Examples
Explain the relationship between route domains, user roles and administrative partitions
Explain the mapping between remote users and remote role groups
Explain the options for partition access and terminal access

Module 19

Objective 2.06
Given a scenario, describe the steps necessary to set up a device group, traffic group and HA group U/A Examples
Explain how to set up sync-only and sync-failover device service cluster
Explain how to configure HA groups
Explain how to assign virtual servers to traffic groups

Objective 2.07
Predict the behavior of an LTM device group or traffic groups in a given failure scenario A/E

Objective 2.08
Determine the effect of LTM features and/or modules on LTM device performance and/or memory

Objective 2.09
Determine the effect of traffic flow on LTM device performance and/or utilization R
Examples Explain how to use traffic groups to maximize capacity

Objective 2.10
Determine the effect of virtual server settings on LTM device performance and/or utilization U/A
Examples Determine the effect of connection mirroring on performance

Objective 2.11
Describe how to deploy vCMP guests and how the resources are distributed R Examples
Identify platforms that support vCMP
Identify the limitations of vCMP
Describe the effect of licensing and/or provisioning on the vCMP host and vCMP guest
Describe how to deploy vCMP guests
Explain how resources are assigned to vCMP guests (e.g., SSL, memory, CPU, disk)

Objective 2.12 Determine the appropriate LTM device security configuration to protect against a security threat U/A Examples
Explain the implications of SNAT and NAT on network promiscuity
Explain the implications of forwarding virtual servers on the environment security
Describe how to disable services
Describe how to disable ARP
Explain how to set up logging for security events on the LTM device
Explain how route domains can be used to enforce network segmentation

Module 20

Section 3:
Deploy applications Cognitive Complexity

Objective 3.01
Describe how to deploy and modify applications using existing and/or updated iApp application templates

Objective 3.02
Given application requirements, determine the appropriate profiles and profile settings to use U/A Examples
Describe the connections between profiles and virtual servers
Describe profile inheritance
Explain how to configure the different SSL profile settings
Explain the effect of changing protocol settings
Explain the use cases for the fast protocols (e.g. fastL4, fastHTTP)
Explain the persistence overrides
Describe the use of HTTP classes and profiles
Describe the link between iRules and statistics, iRules and stream, and iRule events and profiles
Describe the link between iRules and persistence
Describe hashing persistence methods
Describe the cookie persistence options
Determine which profiles are appropriate for a given application
Determine when an iRule is preferred over a profile or vice versa
Explain how to manipulate the packet contents using profiles

Objective 3.03
Determine the effect of traffic flow on LTM device performance and/or utilization Examples
Describe the effect of priority groups on load balancing
Explain the effects of SNAT settings on pools
Explain how persistence settings can override connection limits
Describe the relationship between monitors and state
Describe the functionality of Action On Service Down
Describe the functionality of Priority Group Activation
Describe the persistence across pools and services (e.g., Match Across Services, Match Across vs Match Across Pools)
Describe how connection limits are affected by node, pool and virtual server settings
Describe how priority groups are affected by connection limits

× Chat Us