########################################################################################### S1 OSI OSI layers, Data Link Layer, network layer, transport layer, application layer The OSI Model The Application Layer The Presentation Layer The Session Layer The Transport Layer The Network Layer The Data Link Layer The Physical Layer Differentiate between the OSI layers OSI layers functional Data Link Layer Forwarding Database ARP MAC Addresses Broadcast Domain, How to Restrict BD? Virtual Local Area Network (VLAN) Are VLANs required? When do I need a VLAN? Why not just subnet my network? How can devices on different VLAN’s communicate? What do VLAN’s offer? Introducing trunks link aggregation LACP Network layer Understanding IP Addresses Network Masks Math Example Route Tables Network destination Gateway Metric Routing Protocols Dynamic Fragmentation Why does fragmentation occur? How are the packets reassembled? Fragmenting a Packet TTL Packet Traversing a Topology IPv6 Unicast Multicast Anycast Address Dissection Transport layer MTU MSS About TCP and MSS Protocol Ports UDP TCP TCP Three-way handshake TCP Timeout and Retransmission What are TCP RST Packets? TCP Options TCP Checksum Detecting Transmission Errors Using Checksums TCP Error Correction Flow Control Congestion control Delayed Binding Application layer HTTP Protocol HTTP versions Structure of HTTP Transactions Initial Response Line (Status Line) status codes HTTP Methods HEAD Method POST Method HTTP Keep-alives HTTP Headers HTTP Cookies How do Web sites use cookies? URL - Uniform Resource Locator DNS Name Resolution Process SIP FTP Active FTP vs. Passive FTP SMTP ############################################################################################ S2 F5 Solutions and Technology F5 products APM LTM ASM GTM AAM AFM iRules What is an iRule? How does an iRule work? When would I use an iRule? When would I not use an iRule iApps What’s an iApp? iApp Templates When do you use an iApp? Proxy and Packet forwarding full proxy architecture Full proxy architecture - What do they mean? full-proxy data center architecture Proxies Forward Proxies Reverse Proxies Half Proxies Full Proxies Packet Forwarding Packet-based Design What is a packet-based design? What is a proxy-based design (full proxy)? Redefining the Solution High availability (HA) Single device Redundant devices What is failover? active/active, Understanding active-active redundancy active/standby, Understanding active-standby redundancy and failover in active/standby mode ############################################################################################ S3 Load Balancing Essentials Distribution of Load Local Traffic Manager load balancing methods Round Robin Ratio (member) Ratio (node) Dynamic Ratio (member) Dynamic Ratio (node) Fastest (node) Fastest (application) Least Connections (member) Least Connections (node) Weighted Least Connections (member) Weighted Least Connections (node) Observed (member) Observed (node) Predictive (member) Predictive (node) Least Sessions Ratio Least Connections Persistent and Persistence Persistent Persistence Client and Server Client Server ############################################################################################ S4 Security Positive Security Model, Benefits Negative Security Model, Benefits Non-Blueprint Positive & Negative Security model What Does “Good” Security Cost? Positive vs. Negative Application Security Factors of an Effective Applied Security Model The Effect of Content Variability Rule Specificity Order of Precedence Best Practices Signing, Purpose Encryption, Topic Certificates and Certificate Chains private/public keys Private Key Encryption Public Key Encryption Symmetric Encryption Asymmetric Encryption Authentication single sign on Password Authentication Single Sign On Authentication Multi-factor Authentication Authentication, Authorization, and Accounting (AAA) SAML Authentication IPsec and SSL VPN IPsec - IP Security Why should you use IPsec? Replacing IPsec SSL VPN Why you should transition to SSL VPN SSL VPN vs IPSec ############################################################################################ S5 Application Delivery Platforms Hardware vs. Software Hardware Advantages Challenges Virtual Hardware Advantages Challenges Hardware (SSL card, compression card) Appliance Hardware Editions Viprion Hardware Editions TCP optimization Optimizing TCP General TCP Optimizations Decreasing Server-side TCP Connections Increasing Client-side TCP Connections HTTP Protocol and Web Application Optimizations Caching Compression Pipelining HTTP pipelining ###########################################################################################