Troubleshooting BIG-IP LTM (TRG-BIG-TRBL-INT2) – Outline

Detailed Course Outline

Chapter 1: Setting Up the BIG-IP System
  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP System Configuration
Chapter 2: Reviewing Local Traffic Configuration
  • Reviewing Nodes, Pools, and Virtual Servers
  • Reviewing Address Translation
  • Reviewing Routing Assumptions
  • Reviewing Application Health Monitoring
  • Reviewing Traffic Behavior Modification with Profiles
  • Reviewing the TMOS Shell (TMSH)
  • Reviewing Managing BIG-IP Configuration Data
  • Reviewing High Availability (HA)
Chapter 3: Troubleshooting Methodology
  • Step-By-Step Process
  • Step 1: State the Problem
  • Step 2: Specify the Problem
  • Step 3: Map the System
  • Step 4: Develop Possible Causes
  • Step 5: Test Theories
  • Step 6: Iterate Until Root Cause Identified
  • Documenting a Problem
  • Putting Troubleshooting Steps to Use
Chapter 4: Working with F5 Support
  • Leveraging F5 Support Resources
  • AskF5.com
  • DevCentral
  • iHealth
  • Leveraging F5 Labs
  • Working with F5 Technical Support
  • Running End User Diagnostics (EUD) - Hardware Only
  • New Platform Diagnostic Tools
  • Always-On Management (AOM) Subsystem
  • Requesting Return Materials Authorization
  • F5’s Software Version Policy
  • Managing the BIG-IP License for Upgrades
  • Managing BIG-IP Disk Space
  • Upgrading BIG-IP Software
Chapter 5: Troubleshooting – Bottom to Top
  • Introducing Differences between BIG-IP and LINUX Tools
  • Troubleshooting with Layer 1/Layer 2 Tools
  • Troubleshooting with Layer 2/Layer 3 Tools
  • Troubleshooting with Layer 3 Tools
  • Troubleshooting Network Communication
  • Troubleshooting Memory and CPU
  • Troubleshooting with watch
  • Troubleshooting with Additional tmsh commands
Chapter 6: Troubleshooting Tools
  • tcpdump
  • Wireshark
  • ssldump
  • Fiddler
  • diff
  • KDiff3
  • cURL
Chapter 7: Using System Logs
  • Configuring Logging
  • Log Files
  • Understanding BIG-IP Daemons Functions
  • Triggering an iRule
  • Deploying and Testing iRules
  • Application Visibility and Reporting
Chapter 8: Troubleshooting Lab Projects
  • Network Configurations for Project