Forum Discussion

buulam's avatar
buulam
Icon for Admin rankAdmin
Jul 11, 2022

Next Community Lab Day - Vote on what you'd like to see!

Hey everyone, we hope those of you that participated had fun with JRahm 's DevCentral Connects hosts Capture the Flag! 

We'd like to give the option for everyone to select what our next hands-on event will be.

Below are 3 options. All you need to do is click Kudos (make sure you're logged in) on the lab that you'd like to see us put on. Nothing is stopping you from Kudo'ing multple labs if you want to boost 2 of them.

If you don't like any of these labs, drop a comment and let us know what you'd rather see!

We'll leave this poll open for a bit to give everyone a chance to see it.

Cheers,

Buu

 

  • Add a Kudo's to this reply if you'd like to do this lab:

    A&O Toolchain 212: A&O Toolchain - Application Deployments with BIG-IP and Application Services (AS3)

7 Replies

  • Add a Kudo's to this reply if you'd like to do this lab:

    A&O Toolchain 212: A&O Toolchain - Application Deployments with BIG-IP and Application Services (AS3)

  • Add a Kudo's to this reply if you'd like to do this lab:

    BIG-IP 101: BIG-IP HA Failover – Do It the Proper Way

    Time and time again, we have seen customers setting up a basic HA setup. Customer expectations were, that in case of a failover, the event would be seamless. They were surprised that the failover had production traffic impacts, and were cautious what to expect in the future.

    In this lab, we will create a BIG-IP Active/Standby pair with best practices. The result is a failover configuration that allows minimal impact in case of a failover event.

    In order to achieve this, we will address the following BIG-IP topics:

    1. Architecture
    2. Network setup
    3. Layer 2 Link Failure Detection
    4. HA Basics
    5. MAC Masquerade
    6. High-Avalability (HA) Groups
    7. Gateway Pool
    8. Connection Mirroring
    9. Persistence Mirroring
  • Add a Kudo's to this reply if you'd like to do this lab:

    Access Foundation 201: Zero Trust: Identity Aware Proxy 

    The latest Zero Trust Architecture shifts many of the objects that would exist in a per-session policy to the per-request policy thereby creating a more secure authentication and authorization scheme. The authenticity of each request is further enhanced through the use of F5’s Access Guard agent installed on a client. This agent provides a PKI signed report of the posture assessment performed on the client real-time rather than the historical way plug-ins reported status. Previously, after a user connected to an application they would experience a delay in access as the agent performed the posture assessment to provide an unsigned report to the BIG-IP.

    Topics Covered

    • Real-time Posture Assessments
    • Per-Request Frameworks
    • Contextual Access
    • HTTP Connector
  • Thanks to everyone who voted! I know this is several months late but I'm getting back to this. We're going to proceeed with A&O Toolchain 212 and kick things off on December 13th. The lab will remain open for 72 hours from when we get things started.

    This is just a heads up for everyone who was part of this thread. We will announce this shortly via the usual DevCentral channels and start registration!