F5 Networks Application Delivery Fundamentals Study Guide First Edition Philip

F5 Networks Application Delivery Fundamentals Study Guide First Edition Philip Jönsson & Steven Iveson Text and images copyright © Philip Jönsson & Steven Iveson 2014 All Rights Reserved Disclaimer This book is in no way affiliated, associated, authorized, endorsed by F5 Networks, Inc. or any of its subsidiaries or its affiliates. The official F5 Networks web site is available at https://www.f5.com. F5, Traffix, Signaling Delivery Controller, and SDC are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries. A full list of F5 Networks’ marks can be found at https://f5.com/about-us/policies/trademarks. Trademarks used with permission of F5 Networks, Inc. This book refers to various F5 marks. The use in this book of F5 trademarks and images is strictly for editorial purposes, and no commercial claim to their use, or suggestion of sponsorship or endorsement, is made by the authors or publisher. Permission Notice The F5 Certified logo used on the front cover of this book is a registered trademark of and is copyright F5 Networks, Inc. F5 Networks, Inc has granted this book’s authors permission to use the logo in this manner. Table of Contents Disclaimer Permission Notice Preface About The Authors Dedications Acknowledgements Feedback 1. Introduction The Book Series Who is This Book For? How This Book is Organized F5 Networks the Company F5 Terminology 2. The Application Delivery Fundamentals Exam The F5 Professional Certification Program Additional Resources 3. The OSI Reference Model Layer 1 – Physical Layer Layer 2 – The Data Link Layer Layer 3 – The Network Layer Layer 4 – The Transport Layer Layer 5 – The Session Layer Layer 6 – The Presentation Layer Layer 7 – The Application Layer Chapter Summary Chapter Review Chapter Review: Answers 4. The Data Link Layer in Detail Ethernet Access Method CSMA/CD Collision Domains MAC Addressing Broadcast Domains Address Resolution Protocol (ARP) VLANs & VLAN Tagging Link Aggregation Control Protocol (LACP) Chapter Summary Chapter Review Chapter Review: Answers 5. The Network Layer in Detail Understanding IP Addressing Converting Between Binary & Decimal Addresses Classes Private Addresses Classless Inter-Domain Routing (CIDR) Broadcast Addresses Fragmentation Time to Live (TTL) TCP/IPv6 Different IPv6 Addresses The Structure of an IPv6 Address Chapter Summary Chapter Exercises Chapter Exercises – Answers Chapter Review Chapter Review: Answers 6. The Transport Layer in Detail Transmission Control Protocol – TCP TCP Options The Three Way Handshake (3WHS) User Datagram Protocol – UDP TCP Device Communications Retransmission MTU & MSS Flow Control & Window Size Silly window Ports & Services TCP Reset Packets Delayed Binding Chapter Summary Chapter Review Chapter Review: Answers 7. Switching & Routing Switching Routing Dynamic Routing Protocols IP & MAC Address Changes Routing In Action Network Address Translation (NAT) Chapter Summary Chapter Review Chapter Review: Answers 8. The Application Layer in Detail Hypertext Transfer Protocol (HTTP) Domain Name System (DNS) Session Initiation Protocol (SIP) File Transfer Protocol (FTP) The Difference between Active FTP and Passive FTP Simple Mail Transfer Protocol (SMTP) Chapter Summary Chapter Review Chapter Review: Answers 9. F5 Solutions & Technology Access Policy Manager (APM) Application Security Manager (ASM) Local Traffic Manager (LTM) Global Traffic Manager (GTM) Enterprise Manager (EM) WebAccelerator (WAM) WAN Optimization Manager (WOM) Edge Gateway ARX iRules iApps iControl iHealth iQuery Full Application Proxy Packet Based Proxy/FastL4 High Availability (HA) Chapter Summary Chapter Review Chapter Review: Answers 10. Load Balancing Essentials What Is A Load Balancer? Load Balancing Methods Persistence OneConnect The Client & Server Chapter Summary Chapter Review Chapter Review: Answers 11. Security Positive & Negative Security Models Authentication and Authorization Virtual Private Networks (VPNs) Chapter Summary Chapter Review Chapter Review: Answers 12. Public Key Infrastructure (PKI) What is Public Key Infrastructure? The Basics of Encryption Symmetric Encryption Asymmetric Encryption The Hash Process Hash Algorithms Digital Signing Combining Asymmetric Signing & Hash Algorithms Certificate Chains and Certificate Authorities Certificate Revocation Lists (CRLs) Chapter Summary Chapter Review Chapter Review: Answers 13. Application Delivery Platforms BIG-IP Hardware BIG-IP Virtual Edition (VE) Virtual Edition vs. Hardware TCP Optimisation HTTP Pipelining HTTP Caching HTTP Compression Further Reading Chapter Summary Chapter Review Chapter Review: Answers Appendix A - How Does SAML Work? Appendix B – A History of Load Balancing Preface About The Authors Philip Philip Jönsson was born in Malmö City, Sweden 1988 where he still lives with his wife. He gained interest in technology at an early age. When he was eight years old the family got a home PC which was the first step in his career. Since Philip had a big interest in technology, choosing an education was easy. His IT-studies started at NTI (The Nordic Technical Institute) where he studied the basics of computer technology and eventually focused on network technology. Later on he studied IT-security at Academedia Masters. Philip’s first job in the IT business was at a home electronics company in Sweden. He worked at the IT-department and was responsible for managing and troubleshooting the sales equipment in the different stores and managing the IT- infrastructure within the organization. This is where Philip first encountered a BIG-IP controller. Philip eventually started working in a NOC (Network Operations Center) department at an IT security company that works with some of the largest companies in Sweden and as of this book’s printing he’s still there. For about 2 years his responsibility has been to troubleshoot and handle incidents and problems. Now he’s working with changes and implementations where F5 plays a big part. Steve Steven Iveson, the last of four children of the seventies, was born in London and was never too far from a shooting, bombing or riot. He's now grateful to live in a small town in East Yorkshire in the north east of England with his wife Sam and their four children. He's worked in the IT industry for over 15 years in a variety of roles, predominantly in data centre environments. Steve first encountered a BIG-IP Controller in 2004 and has been working with TMOS and LTM since 2005. Steve’s iRules have been featured in two DevCentral 20 Lines or Less articles, he’s made over 3000 posts on the DevCentral forums and he’s been F5 certified since 2010. Dedications Philip I would like to dedicate this book to my wife Helena and my family for their support throughout the writing of this book. A lot of late nights and spare time has gone into this book but she has never complained. Steve For Linda Iveson; her strength and bravery facing and overcoming so many great obstacles, for so long, still inspires me. The capacity for love, resilience and tenacity you’ve passed to my siblings and I is beyond compare. Acknowledgements Philip First off I would like to thank Holger Yström for making this eBook possible. With his help, the original study guide was acknowledged by many F5 representatives and made it all the way to the corporate headquarters in Seattle. Without his help the original Study Guide would not have become this big and I’m forever grateful. I would also like to thank my bosses Mathias Åberg and Mats Borgström for giving me the opportunity to widen my knowledge and experience of F5 products. Thanks to my department for the encouragement and support throughout the writing of this eBook. A special thanks to Sharon McGlinn for helping me proof my material and making sure that my material does not contain any grammar or spelling mistakes. Hopefully we haven’t missed anything! Thanks to the Designerz who created the cover and the design of the eBook, you did a great job! Thanks to F5 for making this possible and for all the help we’ve got in making this eBook. Two honourable mentions are Kenneth Salchow and Suzanna Litwin. You have both been great to work with and have always provided us with great input and assistance. Finally I would like to thank Steven Iveson for wanting to participate in this collaboration. Your contribution to this eBook has truly raised its value and it has been a pleasure working with you. Steve Most of the information found in this book is available elsewhere, I’ve mostly just searched for it, gathered it up, put the pieces together and presented it in what I hope is a useful format and organised structure. That being the case, I’m keen to acknowledge those that have produced the materials which have formed the basis of this book. Thanks to the many who’ve taken the time to contribute to DevCentral (DC) to inform, educate and assist others, myself included. A special mention to the following F5 staff members and DC contributors: Colin Walker, an iRules guru, Joe Pruitt (username: Joe) who created DevCentral and now manages F5’s Facebook pages amongst other things, Aaron Hooley (username: hoolio) who’s made over 12 thousand posts on DC, Nitass Sutaveephamochanon (username: nitass) and Kevin Stewart. Finally, thanks to Philip for making this book happen in the first place. Feedback Philip If you have any comments, corrections or feedback regarding this book, feel free to send me an email on Philip.r.jonsson@gmail.com. You’re also very uploads/Geographie/ f5-troubleshoot-guide.pdf

  • 27
  • 0
  • 0
Afficher les détails des licences
Licence et utilisation
Gratuit pour un usage personnel Attribution requise
Partager