-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Local traffic manager v11

I just took a four days training nearby Brussels, Belgium and am really excited by the capabilities of F5’s local traffic manager.

The training was given by Westcon Security and was really intensive. Problem is, the v11 itself and related training books just went out. Meaning that I am one of the first being given the training and the trainer was one of the first being trained to it. This leaded to some small problems, such as the documentation not really accurate by some aspects, some typos, and labs not working if you strictly follow the training book (small details missing that blocks the rest). What was embarrassing for us and the trainer is the lack of real world experience with some functionalities available on F5 viprion products, like the nice vCMP (virtual clusterd multiprocessing) functionnality.

Anyway, the training was capivating as LTM is not a simple load balancer, but a full proxy permitting many many things I am not able to do with an IPVS based system; And I’m not talking about the SSL dedicated chips, iAPPS other fancy stuff like this.

Course outline:

  • Installation and Licensing
  • Virtual Servers and Pools and Load Balancing
  • Profiles
  • iRules
  • Persistence
  • Health Monitors
  • SSL Termination and Certificate Management
  • NATs and SNATs
  • Highly Available Redundant System configurations
  • tmsh (TM Shell) command line, SNMP and Logging
  • BIG-IP Admin topics such as Clustered Multi-Processing (CMP), VLAN Management, and Administrative Domains
  • A new v11 feature called iApps
  • F5 big-ip LTM v11
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=+JJ0
-----END PGP SIGNATURE-----

Hint: To validate signature, please view page source and copy html code between BEGIN PGP Signed message and END PGP Signature anchors.

Created the 2012-02-18

Share this


Resources

10 last articles

blog comments powered by Disqus