Cisco Training Courses

Insoft has been serving IT community with official Cisco training offering since 2010. Find all the relevant information on Cisco training on this page.

View More

Cisco Certifications

Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.

View More

Cisco Training Catalogue

Explore a wide variety of the Cisco courses, across different countries as well as online courses.

Browse Catalogue

Cisco Learning Credits

Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.

Have CLCs and want to redeem them?

Cisco Continuing Education

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

View More

Cisco Digital Learning

Certified employees are VALUED assets. Explore Cisco official Digital Learning Library to educate yourself through recorded sessions.

Browse CDLL Catalogue

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

View More

Fortinet Technical Certifications

The Fortinet Network Security Expert (NSE) program is an eight-level training and certification program to teach engineers of their network security for Fortinet FW skills and experience.

View More

Fortinet Technical Courses

Insoft is recognised as Fortinet Authorized Training Center in selected locations across EMEA.

View More

Fortinet Training Catalogue

Explore the full Fortinet training catalogue. The program includes a wide range of self-paced and instructor-led courses.

Browse Catalogue

Official ATC Status

Check our ATC Status across selected countries in Europe.

View More

Fortinet Services Packages

Insoft Services has developed a specific solution to streamline and simplify the process of installing or migrating to Fortinet Products.

Browse Packages

Prepforce Bootcamp

The only comprehensive source available today to prepare for Fortinet NSE 8 certification globally.

View More

Microsoft Training

Insoft Services provides Microsoft training in EMEAR. We offer Microsoft technical training and certification courses that are led by world-class instructors.

View More

Technical Training

The evolution of Extreme Networks Technical Training provides a comprehensive progressive pathway from Associate to Professional accreditation.

View More

Technical Certification

We provide comprehensive curriculum of technical competency skills on the certification accomplishment.

View More

Courses Catalogue

Find all the Extreme Networks online and instructor led class room based calendar here.

View More

ATP Accreditation

As an authorised training partner (ATP), Insoft Services ensures that you receive the highest standards of education available.

View More

Consulting package

We provide innovative and advanced support for designing, implementing and optimising IT solutions. Our client-base includes some of the largest Telcos globally.

Solutions and services

Globally recognised team of certified experts helps you make a smoother transition with our pre-defined consultancy, installation and migration packages for a wide range of Fortinet products.

About Us

Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.

View More
  • +44 20 7131 0263
  • Troubleshooting BIG-IP v.16.1

    Duration
    2 days
    Delivery
    (Online and onsite)
    Price
    Price Upon Request

    Apply bottom-to-top techniques to troubleshoot BIG-IP systems. Review a variety of lower layer tools including ping, bigtop, netstat and tcpdump for manipulating different flags for viewing hex and ASCII.

     

    Analyze network protocols using Wireshark and a variety of capture file formats including pcap and tcpdump. Build filters and use different commands and expressions to capture data on different connections in hands-on lab scenarios. Use the Fiddler HTTP proxy to view and analyze different session elements including URL, Content-Type and other headers, bytes sent/received, response codes, and performance statistics. Explore various curl command options for testing endpoint availability and analyzing ingress and egress payloads in detail.

     

    Learn how to use KDiff to compare files from different BIG-IP devices for locating different traffic processing objects. Gain familiarity with using local and remote logging data, facilities, messaging, and levels for troubleshooting. See how iRules can be used for setting up message logging and logging levels. Finally, learn how to create an analytics profile to view traffic statistics, application visibility, and reporting.

     

    Audience

     

    This course is intended for network administrators responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network. This course presents the prerequisite knowledge for many of F5’s other BIG-IP instructor-led training courses.

    • Describe the role of the BIG-IP system as a full proxy device in an application delivery network
    • Set up, start/restart/stop, license, and provision the BIG-IP system
    • Create a basic network configuration on the BIG-IP system including VLANs and self IPs
    • Use the Configuration utility and TMOS Shell (tmsh) to manage BIG-IP resources and use as a resource when troubleshooting
    • Create, restore from, and manage BIG-IP archives
    • Understand and implement troubleshooting methodology to find and resolve issues
    • View resource status, availability, and statistical information and use this information to determine how the BIG-IP system is currently processing traffic
    • Use iApps to update BIG-IP configuration
    • Perform troubleshooting and problem determination activities including using the iHealth diagnostic tool, researching known issues and solutions on AskF5, submitting a problem ticket to F5 Technical Support, and view traffic flow using tcpdump
    • Understand the tools (ping, netstat, tcpdump, ssldump, WireShark, diff, Kdiff3, Fiddler, BIG-IP logs, etc.) available to use to identify BIG-IP and network issues from bottom to top
    • List log files available, understand log levels, and use the appropriate files, log levels, and filters for troubleshooting
    • Use High Speed Logging (HSL) and SNMP trap implementations to perform troubleshooting and problem determination activities
    • Describe the role of iRules in affecting traffic behavior and how to use them to aid with troubleshooting and problem determination

    Chapter 1: Setting Up the BIG-IP System

    • Introducing the BIG-IP System
    • Initially Setting Up the BIG-IP System
    • Archiving the BIG-IP System Configuration

     

    Chapter 2: Reviewing Local Traffic Configuration

    • Reviewing Nodes, Pools, and Virtual Servers
    • Reviewing Address Translation
    • Reviewing Routing Assumptions
    • Reviewing Application Health Monitoring
    • Reviewing Traffic Behavior Modification with Profiles
    • Reviewing the TMOS Shell (TMSH)
    • Reviewing Managing BIG-IP Configuration Data
    • Reviewing High Availability (HA)

     

    Chapter 3: Troubleshooting Methodology

    • Step-By-Step Process
    • Documenting a Problem
    • Putting Troubleshooting Steps to Use

     

    Chapter 4: Working with F5 Support

    • Leveraging F5 Support Resources
    • Leveraging F5 Labs
    • Working with F5 Technical Support
    • Running End User Diagnostics (EUD) – Hardware Only
    • New Platform Diagnostic Tools
    • Always-On Management (AOM) Subsystem
    • Requesting Return Materials Authorization
    • F5’s Software Version Policy
    • Managing the BIG-IP License for Upgrades
    • Managing BIG-IP Disk Space
    • Upgrading BIG-IP Software

     

    Chapter 5: Troubleshooting – Bottom to Top

    • Introducing Differences between BIG-IP and LINUX Tools
    • Troubleshooting with Layer 1/Layer 2 Tools
    • Troubleshooting with Layer 2/Layer 3 Tools
    • Troubleshooting with Layer 3 Tools
    • Troubleshooting Network Communication
    • Troubleshooting Memory and CPU
    • Troubleshooting with watch
    • Troubleshooting with Additional tmsh commands

     

    Chapter 6: Troubleshooting Tools

    • tcpdump
    • Wireshark
    • SSL/TLS
    • Fiddler
    • diff
    • KDiff3
    • cURL

     

    Chapter 7: Using System Logs

    • Configuring Logging
    • Log Files
    • Understanding BIG-IP Daemons Functions
    • Triggering an iRule
    • Deploying and Testing iRules
    • Application Visibility and Reporting

     

    Chapter 8: Troubleshooting Lab Projects

    • Network Configurations for Project

     

    Chapter 9: Additional Training and Certification

    • Getting Started Series Web-Based Training
    • F5 Instructor Led Training Curriculum
    • F5 Professional Certification Program

    This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network.

     

    This course presents the prerequisite knowledge for many of F5’s other BIG-IP instructor-led training courses.

    Students must complete one of the following F5 prerequisites before attending this course:

    • Administering BIG-IP instructor-led course

    -or-

    • F5 Certified BIG-IP Administrator

     

    The following free web-based training courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience.

    • Getting Started with BIG-IP web-based training
    • Getting Started with Local Traffic Manager (LTM) web-based training

     

    The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:

    • OSI model encapsulation
    • Routing and switching
    • Ethernet and ARP
    • TCP/IP concepts
    • IP addressing and subnetting
    • NAT and private IP addressing
    • Default gateway
    • Network firewalls
    • LAN vs. WAN

     

    The following course-specific knowledge and experience is suggested before attending this course:

    • Web application delivery
    • HTTP, HTTPS, FTP and SSH protocols
    • TLS/SSL

    Apply bottom-to-top techniques to troubleshoot BIG-IP systems. Review a variety of lower layer tools including ping, bigtop, netstat and tcpdump for manipulating different flags for viewing hex and ASCII.

     

    Analyze network protocols using Wireshark and a variety of capture file formats including pcap and tcpdump. Build filters and use different commands and expressions to capture data on different connections in hands-on lab scenarios. Use the Fiddler HTTP proxy to view and analyze different session elements including URL, Content-Type and other headers, bytes sent/received, response codes, and performance statistics. Explore various curl command options for testing endpoint availability and analyzing ingress and egress payloads in detail.

     

    Learn how to use KDiff to compare files from different BIG-IP devices for locating different traffic processing objects. Gain familiarity with using local and remote logging data, facilities, messaging, and levels for troubleshooting. See how iRules can be used for setting up message logging and logging levels. Finally, learn how to create an analytics profile to view traffic statistics, application visibility, and reporting.

     

    Audience

     

    This course is intended for network administrators responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network. This course presents the prerequisite knowledge for many of F5’s other BIG-IP instructor-led training courses.

    • Describe the role of the BIG-IP system as a full proxy device in an application delivery network
    • Set up, start/restart/stop, license, and provision the BIG-IP system
    • Create a basic network configuration on the BIG-IP system including VLANs and self IPs
    • Use the Configuration utility and TMOS Shell (tmsh) to manage BIG-IP resources and use as a resource when troubleshooting
    • Create, restore from, and manage BIG-IP archives
    • Understand and implement troubleshooting methodology to find and resolve issues
    • View resource status, availability, and statistical information and use this information to determine how the BIG-IP system is currently processing traffic
    • Use iApps to update BIG-IP configuration
    • Perform troubleshooting and problem determination activities including using the iHealth diagnostic tool, researching known issues and solutions on AskF5, submitting a problem ticket to F5 Technical Support, and view traffic flow using tcpdump
    • Understand the tools (ping, netstat, tcpdump, ssldump, WireShark, diff, Kdiff3, Fiddler, BIG-IP logs, etc.) available to use to identify BIG-IP and network issues from bottom to top
    • List log files available, understand log levels, and use the appropriate files, log levels, and filters for troubleshooting
    • Use High Speed Logging (HSL) and SNMP trap implementations to perform troubleshooting and problem determination activities
    • Describe the role of iRules in affecting traffic behavior and how to use them to aid with troubleshooting and problem determination

    Chapter 1: Setting Up the BIG-IP System

    • Introducing the BIG-IP System
    • Initially Setting Up the BIG-IP System
    • Archiving the BIG-IP System Configuration

     

    Chapter 2: Reviewing Local Traffic Configuration

    • Reviewing Nodes, Pools, and Virtual Servers
    • Reviewing Address Translation
    • Reviewing Routing Assumptions
    • Reviewing Application Health Monitoring
    • Reviewing Traffic Behavior Modification with Profiles
    • Reviewing the TMOS Shell (TMSH)
    • Reviewing Managing BIG-IP Configuration Data
    • Reviewing High Availability (HA)

     

    Chapter 3: Troubleshooting Methodology

    • Step-By-Step Process
    • Documenting a Problem
    • Putting Troubleshooting Steps to Use

     

    Chapter 4: Working with F5 Support

    • Leveraging F5 Support Resources
    • Leveraging F5 Labs
    • Working with F5 Technical Support
    • Running End User Diagnostics (EUD) – Hardware Only
    • New Platform Diagnostic Tools
    • Always-On Management (AOM) Subsystem
    • Requesting Return Materials Authorization
    • F5’s Software Version Policy
    • Managing the BIG-IP License for Upgrades
    • Managing BIG-IP Disk Space
    • Upgrading BIG-IP Software

     

    Chapter 5: Troubleshooting – Bottom to Top

    • Introducing Differences between BIG-IP and LINUX Tools
    • Troubleshooting with Layer 1/Layer 2 Tools
    • Troubleshooting with Layer 2/Layer 3 Tools
    • Troubleshooting with Layer 3 Tools
    • Troubleshooting Network Communication
    • Troubleshooting Memory and CPU
    • Troubleshooting with watch
    • Troubleshooting with Additional tmsh commands

     

    Chapter 6: Troubleshooting Tools

    • tcpdump
    • Wireshark
    • SSL/TLS
    • Fiddler
    • diff
    • KDiff3
    • cURL

     

    Chapter 7: Using System Logs

    • Configuring Logging
    • Log Files
    • Understanding BIG-IP Daemons Functions
    • Triggering an iRule
    • Deploying and Testing iRules
    • Application Visibility and Reporting

     

    Chapter 8: Troubleshooting Lab Projects

    • Network Configurations for Project

     

    Chapter 9: Additional Training and Certification

    • Getting Started Series Web-Based Training
    • F5 Instructor Led Training Curriculum
    • F5 Professional Certification Program

    This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network.

     

    This course presents the prerequisite knowledge for many of F5’s other BIG-IP instructor-led training courses.

    Students must complete one of the following F5 prerequisites before attending this course:

    • Administering BIG-IP instructor-led course

    -or-

    • F5 Certified BIG-IP Administrator

     

    The following free web-based training courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience.

    • Getting Started with BIG-IP web-based training
    • Getting Started with Local Traffic Manager (LTM) web-based training

     

    The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:

    • OSI model encapsulation
    • Routing and switching
    • Ethernet and ARP
    • TCP/IP concepts
    • IP addressing and subnetting
    • NAT and private IP addressing
    • Default gateway
    • Network firewalls
    • LAN vs. WAN

     

    The following course-specific knowledge and experience is suggested before attending this course:

    • Web application delivery
    • HTTP, HTTPS, FTP and SSH protocols
    • TLS/SSL
      Upcoming Dates
      Date on Request

    Follow Up Courses

    Filter
    • 3 days
      Date on Request
      Price on Request
      Book Now
    • 3 days
      Date on Request
      Price on Request
      Book Now
    • 5 days
      Date on Request
      Price on Request
      Book Now
    • 5 days
      Date on Request
      Price on Request
      Book Now
    • 3 days
      Date on Request
      Price on Request
      Book Now
    • 4 days
      Date on Request
      Price on Request
      Book Now
    • 5 days
      Date on Request
      Price on Request
      Book Now
    • 5 days
      Date on Request
      Price on Request
      Book Now
    • 4 days
      Date on Request
      Price on Request
      Book Now
    • 2 days
      Date on Request
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.