Skip to content

We would like to inform you that both our Computer Pride Nairobi and Mombasa offices will be closed completely from Wednesday, 19th July 2023 to Thursday, 27th July 2023. We will resume our regular operations on Friday, 28th July 2023.

This closure is in observance of the special Ashara Mubaraka prayers. In case of any urgent inquiries or assistance, please feel free to contact us at info@computer-pride.co.ke.

Search...

Troubleshooting BIG-IP v.17.1

Courses Overview

This 2-day course provides network administrators, operators, and engineers with a working understanding of the BIG-IP system as it is commonly used in application delivery networks.

Students will learn about BIG-IP configuration objects, traffic processing, and core administrative tasks through a mix of lectures, hands-on labs, demos, and discussions.

Course Topics

  • Configuration Project

  • Troubleshooting Methodology

  • F5 Support

  • Troubleshooting: Bottom to Top

  • Troubleshooting Tools

  • Using System Logs

Designed for network administrators, operators, and engineers responsible for the day-to-day operation and administration of BIG-IP in an application delivery network. This course also provides the foundational knowledge required for advanced F5 BIG-IP training.

By the end of this course, participants will be able to:

  • Explain the role of the BIG-IP system as a full proxy in an application delivery network.

  • Set up, license, provision, start, stop, and restart the BIG-IP system.

  • Configure basic networking, including VLANs and Self IPs.

  • Use the Configuration Utility and TMOS Shell (tmsh) to manage and troubleshoot BIG-IP resources.

  • Create, restore, and manage BIG-IP archives.

  • Apply a structured troubleshooting methodology to identify and resolve issues.

  • Monitor system status, availability, and traffic statistics to assess performance.

  • Use iApps to update BIG-IP configurations.

  • Perform troubleshooting using tools like iHealth, AskF5, and tcpdump.

  • Leverage additional tools (ping, netstat, ssldump, Wireshark, diff, Kdiff3, Fiddler, BIG-IP logs) for issue identification.

  • Understand log files, log levels, and filters for effective troubleshooting.

  • Use High-Speed Logging (HSL) and SNMP traps for diagnostics.

  • Describe the role of iRules in traffic behavior and apply them to troubleshooting scenarios.

Chapter 1: Setting Up the BIG-IP System

• Introducing the BIG-IP System

• Initially Setting Up the BIG-IP System

• Archiving the BIG-IP System Configuration

Chapter 2: Reviewing Local Traffic Configuration

• Reviewing Nodes, Pools, and Virtual Servers

• Reviewing Address Translation

• Reviewing Routing Assumptions

• Reviewing Application Health Monitoring

• Reviewing Traffic Behavior Modification with Profiles

• Reviewing the TMOS Shell (TMSH)

• Reviewing Managing BIG-IP Configuration Data

• Reviewing High Availability (HA)

Chapter 3: Troubleshooting Methodology

• Step-By-Step Process

• Documenting a Problem

• Putting Troubleshooting Steps to Use

Chapter 4: Working with F5 Support

• Leveraging F5 Support Resources

• Leveraging F5 Labs

• Working with F5 Technical Support

• Running End User Diagnostics (EUD) – Hardware Only

• New Platform Diagnostic Tools

• Always-On Management (AOM) Subsystem

• Requesting Return Materials Authorization

• F5’s Software Version Policy

• Managing the BIG-IP License for Upgrades

• Managing BIG-IP Disk Space

• Upgrading BIG-IP Software

Chapter 5: Troubleshooting – Bottom to Top

• Introducing Differences between BIG-IP and LINUX Tools

• Troubleshooting with Layer 1/Layer 2 Tools

• Troubleshooting with Layer 2/Layer 3 Tools

• Troubleshooting with Layer 3 Tools

• Troubleshooting Network Communication

• Troubleshooting Memory and CPU

• Troubleshooting with watch

• Troubleshooting with Additional tmsh commands

Chapter 6: Troubleshooting Tools

• tcpdump

• Wireshark

• SSL/TLS

• Fiddler

• diff

• KDiff3

• cURL

Chapter 7: Using System Logs

• Configuring Logging

• Log Files

• Understanding BIG-IP Daemons Functions

• Triggering an iRule

• Deploying and Testing iRules

• Application Visibility and Reporting

Chapter 8: Troubleshooting Lab Projects

• Network Configurations for Project

Chapter 9: Additional Training and Certification

• Getting Started Series Web-Based Training

• F5 Instructor Led Training Curriculum

• F5 Professional Certification Program

Students are required to complete one of the following F5 prerequisites before attending this course:

• Administering BIG-IP instructor-led course -Or-

• F5 Certified BIG-IP Administrator

The following free web-based courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience.

• Getting Started with BIG-IP web-based training

• Getting Started with BIG-IP Local Traffic Manager (LTM) web-based training

The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:

• OSI model encapsulation

• Routing and switching

• Ethernet and ARP

• TCP/IP concepts

• IP addressing and subnetting

• NAT and private IP addressing

• Default gateway

• Network firewalls

• LAN vs. WAN

The following course-specific knowledge and experience is suggested before attending this course:

• HTTP, HTTPS, FTP and SSH protocols

  • Configuring BIG-IP LTM: Local Traffic Manager v.16.1
  • Configuring BIG-IP DNS (formerly GTM) v.16.1
  • Configuring F5 Advanced WAF (previously licensed as ASM) v16.1
  • Configuring BIG-IP APM: Access Policy Manager v.16.1
  • Configuring BIG-IP AFM: Advanced Firewall Manager v.16.1
  • Developing iRules for BIG-IP v.16.1