F5 Troubleshooting BIG-IP v17.1

Application Security & Traffic Management

COURSE OVERVIEW


Apply bottom-to-top techniques to troubleshoot BIG-IP systems. Review a variety of lower-layer tools, including ping, bigtop, netstat, and tcpdump, for manipulating different flags for viewing hex and ASCII. Analyze network protocols using Wireshark and a variety of capture file formats, including pcap and tcpdump. Build filters and use different commands and expressions to capture data on different connections in hands-on lab scenarios. Use the Fiddler HTTP proxy to view and analyze different session elements, including URL, Content-Type, and other headers, bytes sent/received, response codes, and performance statistics. Explore various curl command options for testing endpoint availability and analyzing ingress and egress payloads in detail. Learn how to use KDi to compare files from different BIG-IP devices for locating different traffic processing objects. Gain familiarity with using local and remote logging data, facilities, messaging, and levels for troubleshooting. See how iRules can be used for setting up message logging and logging levels. Finally, learn how to create an analytics profile to view traffic IC statistics, application visibility, and reporting.


INTENDED AUDIENCE


This course is intended for network administrators responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network.


Duration: 2 Days / 16 Hours

Delivery Method: Classroom-based, Virtual Instructor Led Training

COURSE OUTLINE


Chapter 1: Setting Up the BIG-IP System

·      Introducing the BIG-IP System

·      Initially Setting Up the BIG-IP System

·      Archiving the BIG-IP System Configuration


Chapter 2: Reviewing Local Traffic Configuration

·      Reviewing Nodes, Pools, and Virtual Servers

·      Reviewing Address Translation

·      Reviewing Routing Assumptions

·      Reviewing Application Health Monitoring

·      Reviewing Traffic Behavior Modification with Profiles

·      Reviewing the TMOS Shell (TMSH

·      Reviewing Managing BIG-IP Configuration Data

·      Reviewing High Availability (HA)


Chapter 3: Troubleshooting Methodology

·      Step-By-Step Process

·      Documenting a Problem

·      Putting Troubleshooting Steps to Use


Chapter 4: Working with F5 Support

·      Leveraging F5 Support Resources

·      Leveraging F5 Labs

·      Working with F5 Technical Support

·      Running End User Diagnostics (EUD) - Hardware Only

·      New Platform Diagnostic Tools

·      Always-On Management (AOM) Subsystem

·      Requesting Return Materials Authorization

·      F5’s Software Version Policy

·      Managing the BIG-IP License for Upgrades

·      Managing BIG-IP Disk Space

·      Upgrading BIG-IP Software


Chapter 5: Troubleshooting – Bottom to Top

·      Introducing Differences between BIG-IP and LINUX Tools

·      Troubleshooting with Layer 1/Layer 2 Tools

·      Troubleshooting with Layer 2/Layer 3 Tools

·      Troubleshooting with Layer 3 Tools

·      Troubleshooting Network Communication

·      Troubleshooting Memory and CPU

·      Troubleshooting with watch

·      Troubleshooting with Additional tmsh commands


Chapter 6: Troubleshooting Tools

·      tcpdump

·      Wireshark

·      SSL/TLS

·      Fiddler diff KDiff3 cURL


Chapter 7: Using System Logs

·      Configuring Logging

·      Log Files

·      Understanding BIG-IP Daemons Functions

·      Triggering an iRule

·      Deploying and Testing iRules

·      Application Visibility and Reporting


Chapter 8: Troubleshooting Lab Projects

·      Network Configurations for Project


Chapter 9: Additional Training and Certification

·      Getting Started Series

·      Web-Based Training

·      F5 Instructor Led Training Curriculum

·      F5 Professional Certification Program



REGISTER NOW

Learning Experience Survey

Learning Experience Survey

Learning Experience Survey