F5 LTM Design, Deployment, Configuration and Management

Learning F5 LTM Common Design Topologies, Deployment LTM from scratch, Application Configuration and Management

In this course, we will cover the following topics:

What you’ll learn

  • Understanding F5 LTM Design Topologies and Common Use Cases.
  • F5 LTM Design Information Requirements; and Provisioning new F5 LTM with VLANs, Interfaces, Self-IPs and Common Services and Routing.
  • Configure Applications including Nodes, Pools, Load Balancing, VIPs, NAT, Persistent Profiles, SSL/TLS certificates, Irules and IP Forwarding.
  • Operate F5 LTM Platform Including Managing Node, Pool Members, VIP Status, Logs, Statistics and Platform Performance.
  • Maintain F5 LTM Platform Including Backup & Restore System Configuration, System Upgrade and Rollback.
  • Design and Implement HA Active-Standby Cluster.

Course Content

  • Introduction –> 1 lecture • 1min.
  • F5 LTM Design –> 1 lecture • 20min.
  • F5 LTM Deployment –> 1 lecture • 19min.
  • Applications Configuration –> 1 lecture • 40min.
  • Management and Monitor –> 1 lecture • 18min.
  • High Availability Cluster ( Active-Standby) –> 1 lecture • 15min.

F5 LTM Design, Deployment, Configuration and Management


  • No F5 LTM experience needed. The only requirement from you to bring to this course is a “What-If” mindset.

In this course, we will cover the following topics:

  1. F5 Common Design TopologiesInline ( Two-Arm)

    One Arm ( One VLAN or link)

    One Arm ( Two VLANs or 2 Links)


    Comparation of pros and cons among these topologies and their use cases


  2. F5 DeploymentRequirements:  Cabling design, VLANs,  IP Address scheme allocation and Common services  details

    Initial setup: Licensing, resource provisioning, Implement network, interfaces and configure Common services like DNS, NTP, Syslog, SNMP for monitoring

    Routing:   requirement of routing for client facing, server facing and inline network.


  3. Applications ConfigurationConfigure Nodes, different type of health monitors to appropriately monitor applications,

    Configure Pools and pool members for different services,

    Apply Load Balancing methods and verify its function via end user application access,

    Configure different VIPs for applications,

    Automap (NAT) use cases,

    Import SSL/TLS certificates and configure SSL/TLS profiles,

    Configure iRules to redirect application from non-secure access to secured access


  4. Management and MonitorMonitor System performance including CPU usage, Memory utilization, Active connection, connection rate and throughput

    View Logs to identify administrator’s activities as well as application events

    Nodes, Pools, VIPs status and Statistics

    Configure Backup of system and  Restore backup configuration

    Demonstrate of System Upgrade  the platform to a new version and Rollback to previous version

    Design HA Active/Standby cluster

    Configure ConfigSync, Failover network, Mirroring

    Verify configuration synced between active and standby