Course

Configuring BIG-IP SSL Orchestrator (SSLO)

Course details


Cost Training Units Course number Points Time Modules
$550.00 10 F5-TRG-BIG-SSLO-SDT 0 12 hours 25 minutes 22

Total Progress

0%

Course description

This course gives participants a functional understanding of how to deploy, tune and operate SSL Orchestrator. This includes learning about multiple security device deployments in varying topologies that incorporate interception rules and context-based policies allowing for different traffic flows. The course includes lecture, labs, and discussion for different SSL Orchestrator functions like visibility into encrypted traffic and dynamic service chaining and features such as dynamic security device support, dynamic scaling and cipher diversity.
 
Topics covered in this course include:

  • Compare F5 SSL Orchestration to manual “daisy chaining” of security services
  • Learn essentials of PKI and certificates and how to import certificates and private keys
  • Understand HTTP, ICAP, L3/L2, and TAP security services and how to assign them to a Security Chain
  • Select the appropriate topology for a given scenario
  • Learn key components created by Guided Configuration deployments
  • Configure traffic classification and URL bypass within a security policy
  • Use Guided Configuration to deploy multiple configurations including: Outbound L3 Transparent Forward Proxy, Inbound L3 Reverse Proxy, an Existing Application, and more
  • Configure High Availability for SSL Orchestrator
  • Troubleshoot SSL Orchestrator traffic flow

Audience
This course is intended for network administrators and Security Operations responsible for setup, configuration, and administration of the SSL Orchestrator system.
 
Course Objectives
By the end of this course you will be able to:

  • Understand basic use cases for decryption and re-encryption of inbound and outbound SSL/TLS network traffic
  • Create dynamic service chains of multiple security services
  • Configure security policies to enable policy-based traffic steering
  • Add SSL visibility to existing applications
  • Deploy SSL Orchestrator configurations based on topology templates
  • Troubleshoot an SSL Orchestrator deployment
  • Configure a SSL Orchestrator High Availability device group

Course access

Please login to access course materials.