Midhunit.com
 

F5 LOAD BALENCER

Start Date Class Timing Duration Mode of Training Trainer Profile
26-Sep 9 PM 45 days Onsite

    Why Choose Midhunit

    MIDHUNIT ONLINE TRAINING FEATURES

  • Real-Time Expert Trainers (more than 10 years experience in particular
  • technology)
  • Flexible timings
  • Do not worry about your timings because we are always with your timings.
  • Industry Specific Scenarios
  • Students are provided with all the Real-Time and Relevant Scenarios. With Real time workshops
  • live online Training courses
  • Industry Specific Scenarios
  • Video Recording Sessions
  • Soft Copy of Materials
  • Resume Preparation for interviews
  • Interview Preparation Tips
  • 100 %Free job assistance

    Online Training Features

    1. Real-Time Expert Trainers

    We believe to provide our students the Best interactive experience as part of their learning

    Flexible timings

    Do not worry about your timings because we are always with your timings.

    Industry Specific Scenarios

    Students are provided with all the Real-Time and Relevant Scenarios.  With Real time workshops

    • Live online Training courses
    • Real-Time Expert Trainers
    • Industry Specific Scenarios
    • Video Recording Sessions
    • Soft Copy of Materials
    • Resume Preparion for interviews
    • Interview Preparation Tips interviews
    • 100 %Free job assistance

Who can do this course

This course is also suitable for graduation of (UG and PG) university and as well as who is having passion in system knowledge, Business and would like to enter this course.

Keywords: AWS training, CCNA training, DEVOPS training, Linux training, Kali Linux training, Ethical Hacking training, Phython training, Soft Skills training, Midhunit AWS training, Midhunit CCNA training, Midhunit DEVOPS training, Midhunit Ethical Hacking training, Midhunit Linux training, Midhunit Kali Linux training, Midhunit Phython training, Midhunit Soft Skills training

What does it covers

After course completion

  • Explain and use the basic functions of technology
  • Make the necessary settings for consumption-based planning
  • Utilize procurement optimization techniques
  • Release procedures
  • Process invoices and manage discrepancies
  • Enter goods movements in the system and make the relevant settings for special function.

Job Opportunities

  • (After passing the certification exam)
  • Business Process Owner
  • Team Lead
  • Power User and End User

Certification Exam

  • This course will lead you towards the following certification
  • Associate Level
  • 80 questions for the exam
  • 3 Hours duration
  • Passing Score is 80%

Course Content

     

    F5 BIGIP LTM administration      

    • Course content & Lab exercise for each chapter

     

    Course Objectives

    • Describe the role of the BIG-IP system as a full proxy device in an application delivery network
    • Set up, start/restart/stop, license, and provision the BIG-IP system out-of-the-box
    • Create a basic network configuration on the BIG-IP system including VLANs and self IPs
    • Use the Configuration utility and TMSH to manage BIG-IP resources such as virtual servers, pools, pool members, nodes, profiles, and monitors
    • Create, restore from, and manage BIG-IP archives
    • View resource status, availability, and statistical information and use this information to determine how the BIG-IP system is currently processing traffic
    • Use profiles to manipulate the way the BIG-IP system processes traffic through a virtual server
    • Perform basic troubleshooting and problem determination activities including using the iHealth diagnostic tool
    • Support, and view traffic flow using TCPDUMP
    • Understand and manage user roles and partitions
    • Configure and manage a sync-failover device group with more than two members
    • Configure stateful failover using connection mirroring and persistence mirroring

    Course Topics

    • Getting started with the BIG-IP system
    • Traffic processing with BIG-IP Local Traffic Manager (LTM)
    • Using TMSH (TMOS Shell) command line interface
    • Using NATs and SNATs
    • Monitoring application health and managing object status
    • Modifying traffic behavior with profiles, including SSL offload and re-encryption
    • Modifying traffic behavior with persistence, including source address affinity and cookie persistence
    • Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote
    • logging), and using TCPDUMP
    • User roles and administrative partitions
    • vCMP concepts
    • Configuring high availability (including active/standby and connection and persistence mirroring)

     

    Configuring BIG-IP LTM: Local Traffic Manager          

    • Course content & Lab exercise for each chapter

     

    Course Objectives

    • Back up the BIG-IP system configuration for safekeeping
    • Configure virtual servers, pools, monitors, profiles, and persistence objects
    • Test and verify application delivery through the BIG-IP system using local traffic statistics
    • Configure priority group activation on a load balancing pool to allow servers to be activated only as needed to process traffic
    • Compare and contrast member-based and node-based dynamic load balancing methods
    • Configure connection limits to place a threshold on traffic volume to particular pool members and nodes
    • Differentiate between cookie, SSL, SIP, universal, and destination address affinity persistence, and describe use cases for each
    • Describe the three Match Across Services persistence options and use cases for each
    • Configure health monitors to appropriately monitor application delivery through a BIG-IP system
    • Configure different types of virtual services to support different types of traffic processing through a BIG-IP system
    • Configure different types of SNATs to support routing of traffic through a BIG-IP system
    • Configure VLAN tagging and trunking
    • Restrict administrative and application traffic through the BIG-IP system using packet filters, port lockdown, and virtual server settings
    • Configure SNMP alerts and traps in support of remote monitoring of the BIG-IP system
    • Use an F5-supplied iApp template to deploy and manage a website application service
    • Use iRules and local traffic policies appropriately to customize application delivery through the BIG-IP system
    • Configure the BIG-IP to detect and mitigate some common attacks at the network and application layers using LTM features such as SYN check, eviction policies, iRules and Local Traffic Policies

     

    Course Topics

    • BIG-IP initial setup (licensing, provisioning, and network configuration)
    • A review of BIG-IP local traffic configuration objects
    • Using dynamic load balancing methods
    • Modifying traffic behavior with persistence (including SSL, SIP, universal, and destination address affinity persistence)
    • Monitoring application health with Layer 3, Layer 4, and Layer 7 monitors (including transparent, scripted, and external monitors)
    • Processing traffic with virtual servers (including network, forwarding, and reject virtual servers)
    • Processing traffic with SNATs (including SNAT pools and SNATs as listeners)
    • Modifying traffic behavior with profiles (including TCP profiles, advanced HTTP profile options, caching, compression, and OneConnect profiles)
    • Advanced BIG-IP LTM configuration options (including VLAN tagging and trunking, SNMP features, packet filters, and route domains)
    • Deploying application services with iApps
    • Customizing application delivery with iRules and local traffic policies
    • Securing application delivery using BIG-IP LTM