Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
F5 Networks Developing iRules for BIG-IP
Description
F5 Networks Developing iRules for BIG-IP Introduction
Welcome to the F5 Networks Developing iRules for BIG-IP course. This program is tailored to empower system administrators, network administrators, and application developers with the essential skills and knowledge required for efficient iRules development on F5 BIG-IP systems.
In this course, you will delve into the intricacies of iRules, a powerful scripting language unique to the BIG-IP platform. The curriculum is structured to take you step-by-step through the critical aspects of iRules development, ensuring a comprehensive understanding. You’ll start with the fundamentals, learning about the architecture and operational environment of BIG-IP systems.
This foundational knowledge sets the stage for more complex topics, such as conditional logic, variable manipulation, and event-driven programming in the context of iRules. As you progress, you’ll explore how iRules interact with different BIG-IP modules, such as the Application Security Manager (ASM) and the Advanced Firewall Manager (AFM), providing you with a holistic view of the system’s capabilities.
The second part of the course shifts focus to real-world applications of iRules. Here, you’ll engage in hands-on projects and simulations that mimic actual scenarios faced by network administrators and developers. This practical approach is designed to enhance your problem-solving skills, enabling you to design and implement iRules that effectively manage traffic, security, and performance on the BIG-IP platform.
You will learn to troubleshoot and optimize iRules, ensuring they are efficient and resource-friendly. The course culminates with a project that challenges you to create a comprehensive iRules solution, addressing a specific network scenario. This project not only consolidates your learning but also gives you tangible experience that can be directly applied in your professional role.
By the end of this course, you will possess the skills and confidence to develop and deploy robust iRules solutions, making you an invaluable asset in the field of network and system administration.
Prerequisites
To maximize your learning experience in this course, participants should have prior knowledge and skills in the following areas:
- Administering BIG-IP or Configuring BIG-IP LTM: Local Traffic Manager
- Holding the F5 Certified BIG-IP Administrator certification
Audience
This course is intended for the following professionals:
- System Administrators
- Network Administrators
- Application Developers
- IT professionals responsible for customizing traffic flow through F5 BIG-IP systems.
F5 Networks Developing iRules for BIG-IP Course Outline
Setting Up the BIG-IP System
- Introduction to the BIG-IP System
- Initial Setup of the BIG-IP System
- Archiving BIG-IP System Configuration
- Leveraging F5 Support Resources and Tools
Getting Started with iRules
- Customizing Application Delivery with iRules
- Triggering iRules
- Utilizing the DevCentral Ecosystem
- Creating and Deploying iRules
Exploring iRule Elements
- Introduction to iRule Constructs
- Understanding iRule Events and Event Context
- Working with iRule Commands
- Logging from an iRule Using SYSLOG-NG (LOG Command)
- Handling User-Defined Variables
- Working with Operators and Data Types
- Using Conditional Control Structures (IF and SWITCH)
- Incorporating Best Practices in iRules
Developing and Troubleshooting iRules
- Mastering Whitespace and Special Symbols
- Grouping Strings
- Developing and Troubleshooting Tips
- Using Fiddler to Test and Troubleshoot iRules
Optimizing iRule Execution
- Understanding the Need for Efficiency
- Measuring iRule Runtime Efficiency Using Timing Statistics
- Modularizing iRules for Administrative Efficiency
- Using Procedures to Modularize Code
- Optimizing Logging
- Using Looping Control Structures (WHILE, FOR, FOREACH Commands)
Securing Web Applications with iRules
- Integrating iRules into Web Application Defense
- Mitigating HTTP Version Attacks
- Mitigating Path Traversal Attacks
- Using iRules to Defend Against Cross-Site Request Forgery (CSRF)
- Mitigating HTTP Method Vulnerabilities
- Securing HTTP Cookies with iRules
- Adding HTTP Security Headers
- Removing Undesirable HTTP Headers
Working with Numbers and Strings
- Understanding Number Forms and Notation
- Working with Strings (STRING and SCAN Commands)
- Combining Strings (Adjacent Variables, CONCAT, and APPEND Commands)
- Using iRule String Parsing Functions (FINDSTR, GETFIELD, and SUBSTR Commands)
Processing the HTTP Payload
- Reviewing HTTP Headers and Commands
- Accessing and Manipulating HTTP Headers (HTTP::header Commands)
- Other HTTP commands (HTTP::host, HTTP::status, HTTP::is_keepalive, HTTP::method, HTTP::version, HTTP::redirect, HTTP::respond, HTTP::uri)
- Parsing the HTTP URI (URI::path, URI::basename, URI::query)
- Parsing Cookies with HTTP::cookie
- Selectively Compressing HTTP Data (COMPRESS Command)
Working with iFiles and Data Groups
- Working with iFiles
- Introducing Data Groups
- Working with Old Format Data Groups (MATCHCLASS, FINDCLASS)
- Working with New Format Data Groups (CLASS MATCH, CLASS SEARCH)
Using iRules with Universal Persistence, Stream, and Statistics Profiles
- Implementing Universal Persistence (PERSIST UIE Command)
- Working with the Stream Profile (STREAM Command)
- Collecting Statistics Using a Statistics Profile (STATS Command)
- Collecting Statistics Using iStats (ISTATS Command)
Incorporating Advanced Variables
- Reviewing the Local Variable Namespace
- Working with Arrays (ARRAY Command)
- Using Static and Global Variables
- Using the Session Table (TABLE Command)
- Processing Session Table Subtables
Final Lab Project
$3465.00
|
3 Days Course |