Getting Started Series

    F5 Getting Started Series

Course Descriptions

Getting Started: Start Here

This course is the introductory module for the Getting Started series and explains the training opportunities available through F5 and authorized F5 Training Centers.

Getting Started with BIG-IP: Part 1 - Administration and Part 2 - Application Delivery

This course is divided into two modules. The Administration module focuses on basic administrative activities on the BIG-IP system. You’ll learn how to activate a new BIG-IP system for operation, including configuring the management port, licensing, provisioning, and basic network configuration. You’ll learn how to archive the BIG-IP configuration in support of data center backup and recovery activities.
The Application Delivery module focuses on the basic building blocks of BIG-IP configuration in support of application delivery including nodes, pools and pool members, virtual servers, monitors, and profiles. You’ll learn how to configure a basic web application that is delivered through the BIG-IP system, and includes round robin load balancing, HTTP application health monitoring, overcoming routing issues with SNATs, and SSL offload (client SSL termination). You’ll also learn how to review the flow of application traffic through the BIG-IP system using local traffic statistics.

Getting Started with Local Traffic Manager: Part 1 - HA and Traffic Processing and Part 2 - iRules and Accelerating Traffic

This course is divided into four modules that are presented in two separate WBTs. The topics presented are organized around a customer scenario that takes an organization’s globally expanding e-commerce site from a single server to multiple load balanced back end servers behind a pair of BIG-IP LTM systems.
You’ll learn how to implement the high availability feature to establish an active/standby device service cluster. You’ll learn how to load balance web application traffic across a pool of non- homogenous servers. You’ll learn how to use an iRule to customize traffic flow, selecting the appropriate pool of back end servers based on the client’s preferred content language. And finally, you’ll learn how to decrease existing server load reducing concurrent connections and connection rates using OneConnect.

Getting Started with BIG-IP DNS (formerly GTM)

The topics presented in this course are organized around a customer scenario involving a company that is expanding their network infrastructure globally, and wants to use BIG-IP DNS' intelligent DNS resolution capabilities to resolve DNS queries based on the geolocation of the query originator.
During the course, you’ll learn about BIG-IP DNS' role in the DNS resolution process, discover how to configure many aspects of global server load balancing (GSLB) including data centers, servers, virtual servers, wide IPs, and wide IP pools. You’ll learn how BIG-IP DNS uses iQuery to communicate with other BIG-IP systems. You’ll learn how to create topology records and apply topology load balancing to select a DNS query response based on geolocation information. Finally, you’ll learn how to set up a BIG-IP DNS sync group that spans multiple data centers.

Getting Started with Application Acceleration Manager (AAM) - Web Acceleration

This course is intended to help you get started using BIG-IP Application Acceleration Manager (AAM). You’ll learn about the need for accelerating web application delivery, especially in light of increasing demand for higher performing mobile services.
The course introduces you to some of the more common acceleration methods, then focuses on caching and image optimization. You’ll configure a web acceleration profile to cache content on the BIG-IP system, bringing that content closer to the client, and offloading work from your application servers. And you’ll deploy a web acceleration policy with rules that optimize JPEG images through compression, resampling, and excess header removal, reducing the size of the response to the client and, more importantly, the time it takes to get there.

Getting Started with Application Acceleration Manager (AAM) - Symmetric Optimization

This course is intended to help you get started using the Symmetric Optimization feature of BIG-IP Application Acceleration Manager (AAM) so that you can move large amounts of data across a WAN. You’ll learn about the various services that Symmetric Optimization provides, as well as how to apply those services.
The course introduces you to the various services that function together within AAM such as compression and decompression, application optimization, and data deduplication, among others. You will understand what configuration objects are necessary to carry out Symmetric Optimization, and how to configure those objects on both sides of the WAN.

Getting Started with Advanced Firewall Manager (AFM)

This course is designed to introduce you to the core features and functionality of BIG-IP Advanced Firewall Manager (AFM). You'll learn how to consolidate network firewall functionality onto a single application delivery platform using AFM.
The course begins with a high level look at where AFM is positioned in the F5 product suite and what it contributes to the F5 security solution offerings. Next, the course explains some of the core constituent modules of the AFM product, and shows you how to configure and implement a scheduled firewall policy, mitigate a DoS attack, utilize IP Intelligence to limit traffic using IP address information, and shows you where to find AFM logging and reporting.

Getting Started with F5 Advanced WAF: Concepts and Configuration

The topics presented in this course are organized around a simple customer scenario in which a web application is vulnerable to external threats.
You’ll learn how to identify common threats to such a web application, and then create and deploy a web application security policy to mitigate common threats.

Getting Started with F5 Advanced WAF: Guided Configuration for L7 DoS Protection

In this training module you will learn how to complete the Guided Configuration for protecting your server from Denial of Service using behavioral analytics.
Behavioral DoS mitigation measures normal traffic and server stress. When server stress occurs, F5 Advanced WAF can rate limit or drop those source IP addresses whose behavior has exceeded the thresholds for legitimate traffic. Behavioral DoS is fully automated and has no configuration other than the four modes of operation. There are no thresholds to configure, and there is no need to maintain or fine tune any settings.

Getting Started with Access Policy Manager (APM)

This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons.
In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers. Building on that, in lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC. Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization.

Getting Started with Application Security Manager (ASM)

This course offers an introduction of ASM by examining web application vulnerabilities and the benefits of deploying ASM.
This course offers a high-level overview of ASM and its capabilities, and also walks through the steps for creating and rapidly deploying a security policy and an overview of the policy tuning process.

Getting Started with BIG-IP Cloud Edition

This course provides an overview of the BIG-IP Cloud Edition and how it offers a per-app model to deploy traffic management and security services to every app. The BIG-IP Cloud Edition also promotes self-service for application developers.
The course introduces the BIG-IP Cloud Edition by presenting four use cases. Next, the course explains the system architecture and identifies key components. After that, the course covers how BIG-IP Cloud Edition offers the logical separation of roles that control how users view and manage the applications through a centralized dashboard.

Getting Started with BIG-IQ

This course provides an overview of the BIG-IQ system and how it manages multiple BIG-IP devices. The course introduces the Data Collection Device (DCD) and explains how it enables BIG-IQ to monitor key metrics and reporting of the managed BIG-IP devices.
The course begins with an introduction of the BIG-IQ system and explains the system architecture. Next, the high level steps required to setup a BIG-IQ system are presented. After that, we look at the functional components of the system. This is followed by brief demonstrations of discovering a BIG-IP device, adding a DCD, and exploring the BIG-IQ dashboard.

Getting Started with Carrier-Grade NAT (CGNAT)

This course introduces you to network address translation at service-provider scale.
After a brief introduction to network address translation concepts, this course focuses on understanding and configuring just two fundamental capabilities of CGNAT: NAT44 which involves translating private IPv4 source addresses assigned to subscribers into public IPv4 addresses, and application layer gateways (ALGs), that enable common protocols such as FTP to work with translated addresses.

Getting Started with iHealth

This course is intended to help you get started using BIG-IP iHealth as an online diagnostic tool.
You’ll learn how to leverage this tool to proactively maintain and more quickly troubleshoot your BIG-IP systems.

Getting Started with MyF5 Portal

This course demonstrates how to use the MyF5 Portal to manage your subscription products, request additional products, and view and manage your registration keys.

Getting Started with Policy Enforcement Manager (PEM)

After a brief introduction to BIG-IP Policy Enforcement Manager in lesson one, lesson two describes “subscriber awareness”: how PEM associates data flows with subscribers to enable service providers to monitor data flows and provide subscribers with customized service offerings.
Lesson three discusses enforcement policies—what they are, why they are useful, and how to create and apply them. In the final lesson, you go through the entire process of creating a new enforcement policy to implement a new service offering in a hands-on simulation.

Getting Started with Programmability

This course discusses Programmability within the context of BIG-IP and specifically the new technology, iControl REST.
You will be introduced to foundational technologies, JSON and REST, and then experience a series of increasingly more complex examples that allow you to explore how iControl REST is used to program BIG-IP. Finally, you will have the opportunity to perform several exercises that allow you to program a basic configuration on your lab BIG-IP.

Getting Started with Secure Web Gateway

This course is divided into two parts. Part 1 begins with an Introduction to Secure Web Gateway (SWG) and is intended for all audiences.
The remainder of the course takes you through the step-by-step implementation of a basic, but complete SWG solution. Part 1 covers SSL Profiles, Certificates, and Forward Proxy and Forwarding Virtual Servers. Part 2 discusses Captive Portal Access Policy, IP Intelligence URL Filtering, and SSL Proxy Bypass.

Getting Started with Silverline Services

This course defines what F5 Silverline is and what it does.
You will be introduced to F5 Silverline services in the context of a user scenario in which a data center is under DDoS attack. After course completion, you will be able to differentiate between DDoS and other web application vulnerabilities, and explain how F5 Silverline can mitigate them. Additionally, you will be prepared to discuss requirements and gather scoping information in the event that you need to reach out to an F5 Silverline security specialist.

Getting Started with VIPRION

The topics presented in this course are organized around a customer scenario involving a company that is delivering their web applications through a BIG-IP platform and wishes to dramatically scale up their throughput capabilities.
The customer has chosen to replace their BIG-IP ADC with a VIPRION platform. During the course, you’ll learn how to identify various VIPRION chassis and hardware options, compare and contrast VIPRION setup in Clustered Multiprocessing (CMP) mode with Virtualized Clustered Multiprocessing (vCMP) mode. You will discover how to remove and replace a hot-swappable blade and add a blade to the system.

Getting Started with WebSafe

The topics presented in this course are organized around a simple scenario: You are a WebSafe administrator and are configuring malware protection for the login and transaction pages for a banking application.
The course is divided into five lessons. In lesson one, you will be introduced to various malware types and why many web applications are vulnerable. In lesson 2, you will learn how to activate your license, and how to configure a pool for your alert server. In lesson three you will learn how to configure custom profiles for your virtual server and why this task is sometimes necessary. In lesson four you will configure your first Anti-Fraud Profile using basic malware protection settings. In lesson five, you will create and configure a virtual server and apply your Anti-Fraud Profile to it. The course is based on user-centered simulations and will take 22 minutes to complete.
  User Links