F5 – LTM - Quantum-solution
×
  • +216 70 296 897
// Introduire

Course Objectives

  • BACK UP THE BIG-IP SYSTEM CONFIGURATION FOR SAFEKEEPING
  • CONFIGURE VIRTUAL SERVERS, POOLS, MONITORS, PROFILES, AND PERSISTENCE OBJECTS
  • TEST AND VERIFY APPLICATION DELIVERY THROUGH THE BIG-IP SYSTEM USING LOCAL TRAFFIC STATISTICS
  • CONFIGURE PRIORITY GROUP ACTIVATION ON A LOAD BALANCING POOL TO ALLOW SERVERS TO BE ACTIVATED ONLY AS NEEDED TO PROCESS TRAFFIC
  • COMPARE AND CONTRAST MEMBER-BASED AND NODE-BASED DYNAMIC LOAD BALANCING METHODS
  • CONFIGURE CONNECTION LIMITS TO PLACE A THRESHOLD ON TRAFFIC VOLUME TO PARTICULAR POOL MEMBERS AND NODES
  • DIFFERENTIATE BETWEEN COOKIE, SSL, SIP, UNIVERSAL, AND DESTINATION ADDRESS AFFINITY PERSISTENCE, AND DESCRIBE USE CASES FOR EACH
  • DESCRIBE THE THREE MATCH ACROSS SERVICES PERSISTENCE OPTIONS AND USE CASES FOR EACH
  • CONFIGURE HEALTH MONITORS TO APPROPRIATELY MONITOR APPLICATION DELIVERY THROUGH A BIG-IP SYSTEM
  • CONFIGURE DIFFERENT TYPES OF VIRTUAL SERVICES TO SUPPORT DIFFERENT TYPES OF TRAFFIC PROCESSING THROUGH A BIG-IP SYSTEM
  • CONFIGURE DIFFERENT TYPES OF SNATS TO SUPPORT ROUTING OF TRAFFIC THROUGH A BIG-IP SYSTEM
  • CONFIGURE VLAN TAGGING AND TRUNKING
  • CONFIGURE SNMP ALERTS AND TRAPS IN SUPPORT OF REMOTE MONITORING OF THE BIG-IP SYSTEM
  • CONFIGURER LES ALERTES ET LES INTERRUPTIONS SNMP POUR PRENDRE EN CHARGE LA SURVEILLANCE À DISTANCE DU SYSTÈME BIG-IP
  • USE IRULES AND LOCAL TRAFFIC POLICIES APPROPRIATELY TO CUSTOMIZE APPLICATION DELIVERY THROUGH THE BIG-IP SYSTEM
  • CONFIGURE THE BIG-IP TO DETECT AND MITIGATE SOME COMMON ATTACKS AT THE NETWORK AND APPLICATION LAYERS USING LTM FEATURES SUCH AS SYN CHECK, EVICTION POLICIES, IRULES AND LOCAL TRAFFIC POLICIES