Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Configuring F5 SSL Orchestrator

( Duration: 2 Days )

The Configuring F5 SSL Orchestrator training course, provides a functional understanding of how to deploy, test and maintain F5 SSL Orchestrator to optimize the SSL infrastructure, provide security devices with visibility of SSL/TLS encrypted traffic, and maximize efficient use of that existing security investment.

The course includes lecture, hands-on labs, and discussion about the importance of SSL visability, how F5 SSL Orchestrator supports policy-based management, steering of traffic flows to existing security devices and centralizes the SSL decrypt/encrypt function through multi-layered security, dynamic service chaining, topology selections and security policies.

By attending Configuring F5 SSL Orchestrator workshop, delegates will learn to:

  • Understand basic use cases for decryption and re-encryption of inbound and outbound SSL/TLS network traffic
  • Create dynamic service chains of multiple security services
  • Configure security policies to enable policy-based traffic steering
  • Add SSL visibility to existing applications
  • Deploy SSL Orchestrator configurations based on topology templates
  • Troubleshoot an SSL Orchestrator deployment

The following general network technology knowledge and experience are recommended before attending any F5 Global training Services instructor-led course:

  • OSI model encapsulation
  • Routing and switching
  • Ethernet and ARP
  • TCP/IP concepts
  • IP addressing and subnetting
  • NAT and private IP addressing
  • Default gateway
The following course-specific knowledge and experience is suggested before attending this course:
  • HTTP, HTTPS protocols
  • TLS/SSL
  • Security services such as malware detection, data loss/leak prevention (DLP), next-generation firewalls (NGFW), intrusion prevention systems (IPS), and Internet Content Adaptation Protocol (ICAP)

The Configuring F5 SSL Orchestrator class is ideal for:

  • Network administrators and Security Operations responsible for installation, setup, configuration, and administration of the F5 SSL Orchestrator system.

COURSE AGENDA

1

Introducing SSL Orchestrator

  • Why is SSL Visibility Needed?
  • SSL Visibility without SSL Orchestrator
  • The SSL Orchestrator Solution
  • SSLO Placement on the Network
  • Platform and Licensing Requirements
  • Leveraging F5 Support Resources and Tools
2

Reviewing Local Traffic Configuration

  • Reviewing Nodes, Pools, and Virtual Servers
  • Reviewing Address and Port Translation
  • Reviewing Routing Assumptions
  • Reviewing Application Health Monitoring
  • Reviewing Traffic Behavior Modification with Profiles
  • Reviewing the TMOS Shell (TMSH)
  • Reviewing Managing BIG-IP Configuration Data
3

Certificate Fundamentals

  • Overview of Internet Security Model
  • Understanding how Certificates are Used
  • Using a Certificate in Profiles
  • SSL Forward Proxy
  • SSLdump
4

SSLO Traffic Flow

  • SSL Orchestration is more than Visibility
  • Inbound/Outbound Inspection
  • Flow Support and Cipher Diversity
  • Broad Topology and Device Support
  • Dynamic Service Chaining and Policy-based Traffic Steering
  • Advanced Monitoring
  • Dynamic Scaling
  • Dynamic Evaluation
  • Selecting the Appropriate Topology
5

Using SSLO Guided Configuration

  • Introducing Guided Configuration
  • Reviewing the Landing Page
  • Differentiating Topologies
  • SSL Configuration
  • Services and Service Handling
  • Constructing Service Chains
  • Creating a Security Policy
  • Defining an Interception Rule
  • Examining Egress
  • Applying Log Settings
  • Summary page and Deployment
  • Exploring the Dashboard
6

SSLO Deployment Scenarios

  • Transparent Forward Proxy
  • Explicit Forward Proxy
  • Classroom Lab Environment
  • Gateway Reverse Proxy (L3 Inbound)
  • Existing Application
7

Managing the SSLO Security Policy

  • Review creating Security Policies
  • View Security Policies
  • Viewing Per-Request Policies
8

Troubleshooting SSLO

  • Solving Traffic Flow Issues
  • Solving Guided Configration(UI) and iAppLX issues
  • Determining SSLO Version
  • Troubleshooting using cURL
  • Viewing Log Files
  • Capturing Traffic using tcpdump
  • Backing up SSLO
  • Deleting a SSLO Configuration
9

SSLO High Availability

  • Deploying BIG-IP Systems to Achieve High Availability
  • Establishing Device Trust
  • Establishing a Sync-Failover Device Group
  • Synchronizing Configuration Data
  • SSLO High Availability (HA) Requirements
  • Installation and Upgrade Cautions
  • Troubleshooting HA

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X