Stay on the forefront of this new app economy.

The application environment is shifting: no longer simply tools for getting things done, apps are becoming the core of businesses across all industries. Learn what it takes to stay creative and innovative, while delivering apps that make your business successful.

Register now >

Breakouts

Breakout sessions at Agility focus on the latest technologies, applications, and architecture strategies. The technical breakout sessions at Agility range from beginner to advanced, enabling you to select classes that best meet your needs. Additionally, you can choose from sessions in multiple tracks or use the recommended learning paths to focus on specific areas that matter most to you.

Sample learning paths:

  • Application Security
  • Application Delivery
  • Access Management
  • Service Provider
  • Programmability
  • Cloud Solutions
  • Automation and Orchestration
  • Super-NetOps

Labs

We have added another four hours of labs, for a total of 24 hours of hands-on lab sessions. Our comprehensive 4- or 8-hour labs will address a wide variety of installation, troubleshooting, and networking technologies across a variety of environments. The instructor-led classes also provide an opportunity to gain valuable knowledge in preparation for F5 Certification exams.

NEW Self-paced Labs

New for 2018 all conference attendees who purchased labs will have the ability to drop in to learn more with one of our many self-paced labs that are shorter and/or more targeted. Team members will be on hand to help walk you through getting your lab started and answer any questions you may have. The self-paced lab room will be open during our lab and breakout session times on the agenda. All self-paced labs will be available on a first-come, first-served basis.

Lab Sessions

F5 Advanced Labs for Red Hat OpenShift Container Platform (OCP) (#169)

This advanced 4-hour Red Hat OpenShift Container Platform (OCP) lab dives into 3 hours of configuration features on just OCP and integration with F5. The focus of this lab is to build on what was covered in the F5 Intro Solutions for Container Ecosystems Labs. Covering in detail the Red Hat OpenShift architecture, installation and integration with BIG-IPs.

Prerequisites: Recommend attending the F5 intro to Container Ecosystems Class (Docker, K8s, CF, Mesos, OpenShift

F5 Architectures for Azure (#167)

An introduction to Azure and how to deploy F5 BIG-IP infrastructure within an Azure environment. Students will learn general Azure concepts and how F5 fits into their Azure journey. The labs will provide students the opportunity to deploy several different F5 architectures in Azure. We will be using the Azure Portal, CLI and automation tools to provide a view into how the real world deploys infrastructure into the public cloud.

Prerequisites: None

F5 Intro for Container Ecosystems (Docker, K8s, CF, Mesos, OpenShift) (#161)

In this introduction session you will learn about Docker and how F5 works with container ecosystem(s): We will cover multiple labs for open sourced Kubernetes, Red Hat OpenShift Container Platform (OCP)/Kubernetes, Pivotal Cloud Foundry, and Mesos management systems. In these labs you will be familiar enough to go do your own research and understand how F5 fits into all these ecosystems. You will learn the who, what, when, why, and where of containerization and how to use it with the current and future F5 roadmap.

Prerequisites: None

Protegiendo Aplicaciones Nativas de la Nube (#181)

En esta sesión veremos como proteger una Aplicación Nativa de la Nube que utiliza una arquitectura Serverless. Luego de una breve introducción, realizaremos un laboratorio Hands-On para configurar el BIG-IP WAF que estará protegiendo al AWS API Gateway.

Requisito Previo: Conocimiento básico de html

Public Cloud Architectures I: Deploying BIG-IP Virtual Edition in AWS (#163)

The tools and paradigms from the world of software development, along with the shift to a collaborative DevOps culture, can be employed to launch F5-powered application stacks to public cloud more consistently, faster, and safer than ever. Students will work in a real AWS Virtual Private Cloud while they skill-up to Super NetOps.

Prerequisites: None

Public Cloud Architectures II: F5 in AWS Advanced Use Cases Beyond Native Tools (#184)

You have a mandate to move some part of the business to AWS. What are the best practices to employ and gotchas to avoid? What are the regulatory compliance implications and why is F5 such a unique and effective enforcement tool? We'll explore some popular advanced use cases for F5 in AWS.

Prerequisites: Public Cloud Architectures I or equivalent AWS experience

Escalando Aplicaciones en AWS (Similar to Deploying BIG-IP Virtual Edition in AWS) (#180)

Asegure tiempos de respuestas y experiencia de usuario óptimos, a medida que nuevos servidores de aplicación o contenedores son agregados al pool de servicios, agreguelos automáticamente a un F5 BIG-IP. Para facilitar y lograr deployments repetibles, los deployments y la administración toman ventaja de los AWS Cloud Formation Templates (CFTs). Los estudiantes trabajarán sobre un entorno AWS Virtual Private Cloud real, mientras desarrollan sus capacidades de Super NetOps.

Requisito Previo: None

Secure BIG-IP and Application Deployments in AWS (#168)

Learn about the AWS Shared Security Model and how to achieve full-stack security for applications deployed using F5 BIG-IP. This class will have discussion and labs related to: Security of the BIG-IP deployment within AWS (Security Groups, Network ACLs, IAM), best practices for SSL (TLS, PFS, ECC), and Baseline L7 application security (Bot prevention, protocol compliance, credential security).

Prerequisites: None

Advanced Multi-Layer Firewall Protection (#320)

Learn advanced configuration of the BIG-IP for perimeter security leveraging Local Traffic Management (LTM) functionality and Advanced Firewall Manager (AFM) to secure modern data center perimeter networks. The BIG-IP firewall is capable of providing meaningful security policies to TLS/SSL encrypted traffic including those fronted by Content Delivery Networks (CDNs) on premises and within the cloud while providing visibility to other security solutions.

Prerequisites: Some knowledge of LTM and AFM is expected. Please attend the AFM 101 class 

AFM – The Data Center Firewall (#120)

Introduction to AFM, concepts, terminology, and basic configuration of AFM — the F5 way. Concepts include multi-tiered application firewalling, DoS detection/mitigation and BIG-IQ integration. This class will include common deployment methods, as well as AFM logging options. Attendees will have the opportunity to work through exercises that leverage our RESTful API to manage and test the AFM rule set.

Prerequisites: None

API Protection (#221)

Application programming interfaces (APIs) have become all the rage nowadays, with enterprise developers now relying heavily on them to support the delivery of new products and services. However, with the rise of APIs comes the potential for more security holes, meaning that coders need to understand the risks in keeping corporate and customer data safe. The session will focus on API security in real-world scenarios with BIG-IP ASM, LTM and APM. We will be offering a hands-on lab and discussion around common customer needs and use cases including rate limiting, JSON and XML parsing, OAuth, granular authentication and API methods control.

Prerequisites: None

Cloud Security – Secure Azure Computing Architecture (#331) 

This class provides an introduction to the Secure Cloud Computing Architecture requirements, and how to meet them using a combination of F5 and Microsoft Azure. We will use an ARM (Azure Resource Manager) template to deploy a 4-VE-solution that incorporates: LTM, AFM, ASM and Reverse Web Proxy based Break & Inspect. We will demonstrate the functionality of ASM/AFM/B&I against live web servers running on Public IPs inside of Microsoft Azure.

Prerequisites: None

DDoS Attack Protection (#290)

Introduction to DDos Hybrid Defender (DHD). In this lab students will learn how to get started, setup, configure, and understand various DDoS attacks and mitigation techniques using F5 DHD. This class will cover the common deployment methods as well as how to interpret what DHD is telling you.

Prerequisites: None

Elevated WAF Security – Elevating ASM Protection (#241)

Take your ASM skills to the next level. Topics included: Bot Protection, Web Scraping, L7 DOS, CSRF Protection, HTTP Redirection Protection, Cookie Tampering Protection, Disallowed File Types, and Anti-Bot mobile SDK – NEW Feature! This class follows the "Elevated protection" section of Succeeding with Application Security.

Prerequisites: Working knowledge of ASM or ASM 141

Federation with F5 (#330)

This lab will provide attendees the opportunity to learn about and configure federation use cases with SAML Service & Identity Provider, OAuth & Open ID Connect (OIDC) frameworks. Attendees will also review key success criteria and troubleshooting techniques for each use case.

Prerequisites: Working knowledge of Access Policy Manger (APM), its features and functions. Knowledge of federation frameworks such as SAML, OAuth & Open ID Connect (OIDC) a plus

Good WAF Security – Getting started with ASM (#141)

Get started with ASM by learning about these topics: ASM Policies, Transparent Enforcement, IP Intelligence, Geolocation, Protocol Compliance, Layered Policies, Protection from evasion techniques, and Parameter exploits – Blacklisting. This class follows the "Good protection" section of Succeeding with Application Security.

Prerequisites: None

High and Maximum WAF Security – Maximizing ASM Protection (#341)

Take your ASM skills to the next level by learning about the following topics: Bot Protection, Web Scraping, L7 DOS, CSRF Protection, HTTP Redirection Protection, Cookie Tampering Protection, Disallowed File Types, Anti-Bot mobile SDK – NEW Feature! This class follows the "Elevated protection" section of Succeeding with Application Security.

Prerequisites: ASM 241 or in-depth understanding of ASM

Introduction to Universal Access (#130)

This lab will introduce you to basic APM concepts and will walk you through configuration steps for common use cases, including setting up remote access VPN services, web portals (Webtops) for publishing internal applications, using different authentication protocols, and Single-Sign-On (SSO) functionality.

Prerequisites: None

Mitigating Real World DDoS Attacks (#390)

In this lab students will use their skills with F5 DDoS Hybrid Defender to mitigate various known/unknown attacks. There will be minimal configuration guidance provided and students will apply the skills/knowledge they gained in the DDoS Attack Protection labs to mitigate real world attacks. You will be given real world scenarios and will need to defend your castle like a pro.

Prerequisites: Completion of DDoS Attack Protection Class/Labs. This is an Intermediate/Advanced level class so you need to be familiar with F5 DDoS Hybrid Defender setup, configuration and common mitigation techniques. Familiarity with various openly available attack tools is a plus.

Autenticación Multi-Factor y SSO para Aplicaciones en la Nube (#182)

Un crecimiento rápido en aplicaciones SaaS significa un desafio para administrar, compartir y segurizar identidades entre las aplicaciones basadas en la Nube. Esta sesión mostrará como implementar, de manera fácil, autenticación centralizada y de multiple-factor aprovechando las capacidades del F5 Access Policy Manager para administrar el acceso a multiples aplicaciones y federando la identidad de los usuarios para todas las aplicaciones sin importar donde residan – en el DC, nube, SaaS, etc.

Requisito Previo: Conocimiento básico de BIGIP APM y conceptos SAML

Protección Multi-Capa para DDoS (en sitio & nube) (#183)

En este laboratorio revisaremos la manera de configurar el BIG-IP para realizar protección contra distintos ataques de DoS en capa 4. También realizaremos la configuración para que el BIG-IP señalice automaticamente a Silverline para habilitar la protección contra ataques DDoS volumétricos.

Requisito Previo: Certificación 201 o experiencia similar en operación de un BIG-IP

Pwn like a Hacker; Defend like a Pro (#280)

In this lab, you will be introduced to a few standard tools used in identifying, testing, and mitigating exploits for web apps that live behind the BIG-IP platform. You will also test your skills at both running and patching exploits in a game of capture the flag.

Prerequisites: Basic understanding of Web Application Firewall technology, and working experience with F5 ASM

SSL Visibility and Orchestration (#190)

This session will show you how to optimize your SSL infrastructure, provide security solutions with visibility into SSL/TLS encrypted traffic, and maximize the use of your existing security investment with policy and context-based decryption and traffic steering to the security stack.

Prerequisites: None

Troubleshooting Universal Access (#230)

This lab will instruct you on how to troubleshoot common Access Policy Manager issues. Topics will include general troubleshooting, session reporting, working with session variables, authentication, and examining logs.

Prerequisites: None

WAF Programmability - Enhancing ASM Security and Manageability (#342)

Learn how to interface with the F5 REST API using pre-written Postman scripts, curl, and pre-written python scripts. Learn how tools like Ansible and BIG-IQ can be used to automate ASM. This class will give you the tools to get started in ASM automation and demonstrate the programmability to simplify ASM use cases. NOTE: Knowledge of coding is not required.

Prerequisites: Working knowledge of ASM

DNS DDoS (Self-paced) 

This lab simulates real world DNS attacks using open source tools and covers mitigation using the BIG-IP. Attendees will launch attacks, configure mitigations, and see real-time logging and reporting from the protection that BIG-IP can offer.

Prerequisites: None

Privileged User Access (ILX and APM): MFA, SSH, RDP (Self-paced)

Utilize BIG-IP APM to provide ephemeral privileged user access to non-web-based applications, such as SSH and RDP.

Prerequisites: None

ADFS PIP (Self-paced)

In this lab you will learn how to replace the Microsoft ADFS WAP servers, allowing the use of BIG-IP APM to provide ADFS proxy services with ADFS-PIP support.

Prerequisites: None

F5 SAML IDP (Self-paced)

In this lab you will learn to configure BIG-IP APM as a SAML Identity Provider, providing authentication and federation services for SaaS services.

Prerequisites: None

BIG-IQ Access (Self-paced)

Utilize BIG-IQ Access to configure, edit, and deploy APM polices to a single or multiple APM devices. Use BIG-IQ Access to have a centralized location to view APM logs, dashboards, and statistics.

Prerequisites: None

VPE Guidance/AGC Guidance (Self-paced)

In this lab you will learn to utilize BIG-IP APM's new Access Guided Configurations to configure and deploy authentication services in a much simpler way.

Prerequisites: None

Secure Web Gateway (SWG) (Self-paced)

In this lab you will configure and deploy Secure Web Gateway to provide forward proxy capabilities for end user web browsing.

Prerequisites: None

AFM + Flowmon Integrated Out-of-path DDoS Solution (Self-paced)

F5 AFM + Flowmon integrated out-of-path DDoS solution lab provides customers a hands-on experience with configuring detection rules in Flowmon DDoS Defender, running SYN flood attacks against HTTP server and analyzing the aftermath of active traffic redirection and DDoS scrubbing in AFM.

Prerequisites: None

Intro to ASM Behavioral DoS to Build Dynamic DoS Protections (Self-paced)

Behavioral DoS provides analysis and machine learning of traffic flows to automatically discover and mitigate DoS attacks. In this lab you will learn to configure and deploy Behavioral DoS capabilities of BIG-IP ASM.

Prerequisites: None

Advanced Global Server Load Balancing (GSLB) Concepts Using BIG-IP DNS (#210)

Study advanced GSLB concepts including topology configuration and decision making, sync group architecture and diagnostics, health monitoring decisions, including diagnosing sync group issues with BIG-IQ. EDNS0 will also be configured and explained during this class.

Prerequisites: BIG-IP DNS familiarity, DNS protocol use, and awareness of GSLB concepts including topology and basic concepts

Beginning LTM Implementation (#102)

This lab will cover LTM fundamentals. These fundamentals include basic networking setup, load balancing/monitoring configuration, SSL offload, policy/iRule explanations, DSC overview, and a few bonus labs.

Prerequisites: None

Certification 101 (#CER101)

Join us for the F5 101 Exam Certification Prep. During the session, we will be covering all of the exam blueprints of the F5 101 exam. These blueprint points are the basis for the exam content and can be found on the F5 certification page of F5.com. This class is not a guarantee of a passing score on the exam, it is simply meant to be a review of the content contained in the exam. 

Prerequisites: Every attendee should take time to study the content of the study guide.

Certification 201 (#CER201)

Join us for the F5 201 Exam Certification Prep. During the session, we will be covering all of the exam blueprints of the F5 201 exam. These blueprint points are the basis for the exam content and can be found on the F5 certification page of F5.com. This class is not a guarantee of a passing score on the exam, it is simply meant to be a review of the content contained in the exam.

Prerequisites: It is recommended that every attendee has taken and passed the F5 101 exam and should take time to study the content of the study guide.

Certification 301 (#CER301)

The purpose of this training is to help the student prepare to for the F5 301a LTM Specialist – Architect, Setup, and Deploy (1.5 - 2 days) or as a final review prior to taking the test. This training is designed to augment the student’s own self-study curricula. This training will include both lectures and labs to reinforce concepts. Hands-on labs cover objectives in the 301a blueprint which have the U/A (Understand/Apply) or the A/E (Analyze/Evaluate) cognitive requirement.

A laptop is required to complete the labs.

Prerequisites: Prior to taking this course students should have downloaded and reviewed the 301 study guide. You should have an F5 DevCentral account as well as an iHeath account.

Data Center Availability Services Using BIG-IP DNS (#110)

This lab is an introduction to BIG-IP DNS, covering Global Server Load Balancing (GSLB) services the F5 way, including concepts, terminology, basic configuration, and load-balancing methods. This class will include common deployment methods and well as DNS logging options.

Prerequisites: None

Next Generation DNS Services and Security Using BIG-IP DNS (#111)

Introduction to some of the advanced features of BIG-IP DNS other than GSLB. We will talk about and configure features such as Hidden Master, Caching Resolver, DNS Express, RPZ Response Policy Zones, IP Intelligence Service, and URL Filtering. This class DOES NOT contain any Global Server Load Balancing configuration (the 110 class covers GSLB).

Prerequisites: Requires the 110 class, OR a general understanding of DNS and familiarity with BIG-IP DNS.

TCPDump and Wireshark Plugin (Self-paced)

In this lab you will learn how to setup the F5 Wireshark Plugin and then see what data is available from a TCPDump capture on the F5 and imported into Wireshark. You will also learn how to decrypt an SSL session using either the client or the F5. These skills will give you a head start when opening a case with support as you will already have the data they need to further troubleshoot.

Prerequisites: None

201 TMOS Administrator Lab (Self-paced)

This lab is designed to re-enforce the certification candidates' self-study of objectives that require hands-on experience to more completely understand the objective and enhance the candidates chances of passing the 201 exam. Candidates will perform a series of hands-on labs that will cover concepts, such as: TMOS and virtual server packet processing, the behavior of virtual server and pools and statuses, basic troubleshooting, support and analytics, BIG-IP management, support and analytics, high availability, and managing virtual servers and pools. Numerous questions are posted through the lab guide and an answer key is provided.

Prerequisites: None

F5 Analytics (Self-paced)

In this lab session, you will be introduced to a few different ways to gather, visualize, and analyze traffic information available on a BIG-IP platform.

Prerequisites: None

Administrating F5 with Ansible (Self-paced)

Ansible is a great automation tool for administrating everything from switches, routers, firewalls and F5 to various OSs and software packages. It is the one automation tool you can use for your entire environment AND it does not require any agents on managed devices. The playbooks you will learn to create will not only serve as your golden configurations but will also serve as your documentation in a simple human readable format. Come learn how to fully manage your F5s from first boot to full configuration and how to automate periodic operational tasks with Ansible. You will learn how to save time and be more productive as well as eliminate repetitive tasks and make fewer configuration mistakes and errors. Come be part of the Super Net-Ops revolution!

Prerequisites: None

Automate w/F5 API Services GW & App Services 3.0

Venafi is the cybersecurity market leader in machine identity protection, securing all machine-to-machine connections and communications. Venafi protects all machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, mobile, code-signing, and SSH. Venafi provides global visibility of all machine identities and the risks associated with them for the extended enterprise—on premise, mobile, virtual, cloud and IoT — at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.

Prerequisites: None

 F5 Automation with Terraform and Puppet (#222)

Terraform and Puppet are two popular automation tools you need to master if you are about to get into Super NetOps and DevOps. In this introductory hands-on lab, we will go over: The Basics of Puppet and Terraform; How to deploy BIG-IP HA leveraging Model-driven automation with Puppet; Creating WAF policies using iApps and Terraform.

Prerequisites: None

Accelerate F5 BIG-IP and ACI Deployments with Ansible and Cisco CloudCenter (#170)

Receive hands-on training on how Ansible can be used to automate a network stitch (L2-L3 Layer) between BIG-IP and ACI, and how Cloud Center can be used to deploy an application using iApps. Master the usage of the latest iApps (App services iApp V3) to deploy a number of use cases using the declarative model. Learn how easy it is to convert 50+ manual tasks to deploy an entire workflow (network + application) using programmable tasks. Gain insight on F5’s SuperNetOps concepts and apply them during the lab to automate your BIG-IP. 

Prerequisites: F5 Super-NetOps training is highly recommended

BIG-IQ Centralized Management – Up and Running (#164)

This session will focus on the fundamental concepts and functions of BIG-IQ Centralized Management, with focus on the exciting new features of the latest release of BIG-IQ CM, and cover come basic workflows for managing BIG-IP Device, Security and other most common deployment scenarios.

Prerequisites: None

BIG-IQ – Infrastructure and Application Owners Reunite! Automation and Visibility into Your App.  (#162)

This session will go beyond the basics of BIG-IQ. The basic set up tasks will be completed and you will dive right into application templating and deployment scenarios with BIG-IQ. This class with focus on the exciting new features of the latest release of BIG-IQ and cover the more advanced topics of deployment scenarios. We will also focus on application analytics and reporting functions within BIG-IQ.

Prerequisites: None

Cooking with iRules – HTTP (#101)

This class is designed to get the student comfortable with programming TCL based iRules for HTTP use cases.

Prerequisites: Basic programming concepts and an understanding of basic TCL – Intro to TCL self-paced lab

Cooking with iRules – iRulesLX (#202)

Introduction to iRules-LX concepts. You will learn why F5 chose Node.JS and its modules to extend the capabilities of iRules. You will learn how to integrate Node.JS modules with the BIG-IP dataplane. You will also get an intoduction to Node.JS.

Prerequisites: Some programming capability is necessary.  Basic understanding of Node.JS and Javascript is recommended. 

Cooking with iRules – Security/SSL (#201)

Security vulnerabilities are on the rise. In 2017, we saw over 14,500 security CVEs released, which accounted for roughly 40 new open vulnerabilities per day in 2017. F5 iRules can often “fix” things that are missing or hard to solve in the existing application stack. F5 iRules will give you the power and flexibility to fill those gaps so that you can defend and protect against malicious activity in your enterprise.

Prerequisites: TCL programming or basic understanding. Basic understanding in HTTP and TLS-SSL

F5 Architectures with Ansible (#166)

Deploy, configure, and manage application services on F5 with Ansible. Learn how to create consistent, repeatable deployments with Ansible Playbooks. The class will include onboarding BIG-IP with Ansible and using the F5 Ansible Modules to deploy and manage application services.

Prerequisites: None

Programmability Class 1: Intro to F5 Automation (#160)

Intro to F5 Automation is the first stop in a three-part series of classes designed to equip IT staff with the skills necessary to programmatically deploy and manage services on the F5 platform. In this class students will learn the fundamental concepts and tools used to effectively automate and orchestrate the F5 platform using the iControl REST API, iApps, iWorkflow and Postman Workflows.

Prerequisites: None

Programmability Class 2: DevOps and Continuous Integration (#165)

Programmability Class 2 DevOps and Continuous Integration, is the second stop in a three-part series of the F5 Programmability Training (F5.com/SuperNetOps), designed to equip IT staff with the skills necessary to programmatically deploy and manage services on the F5 platform. In this class students will utilize and explore Methodologies that are cornerstones to DevOps, Collaboration, Infrastructure as Code, Pipelines, and Toolkits.

Prerequisites: Programmability Class 1 Intro to F5 Automation, or a deeper understanding of Software Terms and Lifecycles

Programmability Class 3: SecDevOps (#269)

Leveraging programmability to deploy security policies and/or adhere to best practices during an application’s lifecycle reduces the operational (e.g. time and money) cost of a defense in-depth strategy. Programmatic workflows can be developed and deployed for specific security use cases, and integrated into the SDLC process, allowing for the protection of an application to iterate in parallel with the development of the application.

Prerequisites: Programmability Class 1: Introduction to Automation & Orchestration and Class 2: Building Continuous Delivery Pipelines

Single Call Security iControl LX REST API (#220)

Get an overview of iControlLX capabilities, with a lab to demonstrate creation and use of an iControlLX extension on the BIG-IP to orchestrate security policy changes using a single REST call. iControlLX extensions can be used to substantially simplify API calls issued by DevOps tools, making CI/CD adoption easier.

Prerequisites: Familiarity with BIG-IP LTM/ASM and awareness of iControl API

VDI the F5 Way (#171)

This lab demonstrates how F5 technologies can integrate with industry leading virtual desktop infrastructures (VDI) namely, VMWare Horizon View, Citrix XenDesktop and Microsoft RDS. This lab takes the student through the migration process of current deployment to a simplified and more secure topology with F5 BIG-IP.

Prerequisites: Understanding of the roles and functions of various VDI components (such as Connection Servers, Desktop Controller, etc.)

Embarking on the F5 Automation Journey: Operationalizing Automation with Ansible

Learn what it takes to operationalize F5 automation and gain hands-on experience with using Ansible Tower for automating common F5 operational workflows such as reserving IPs, deploying application containers, and programmatically building F5 configurations. This lab lays the foundation to enable traditional F5 administrators to consume popular automation tools to empower their teams and application owners by streamlining the F5 configuration process.

Prerequisites: None

Breakouts

Public Cloud 101: Introduction to F5 Products and Tools

TBD

Learn about the nuts and bolts of deployments in Azure, Google, AWS, and more. Topics include where to start, achieving smooth migrations, and cloud templates. Ideal for customers who are exploring public cloud deployments and for current cloud consumers to learn about F5 products and services.  

Public Cloud 201: Advanced Deployment Demos

Nojan Moshiri and Daniel Wright

Get a deep-dive with cloud deployment automation demos and learn how to automate deployments using CloudFormation Templates, autoscaling BIG-IP Local Traffic Manager and WAF, and more.  

Public Cloud 301: Securing Your Cloud

Alex Applebaum

Review advanced concepts around the application stack, development and deployment needs. Using the concept of "guardrails, not gates," this session focuses on how IT can add value when keeping up with the application stack and productivity demands.  

F5 Sneak-Peek Session

Ryan Jeffs

This session will provide a sneak preview into self-service cloud services for ADC/Security for protecting public cloud workload deployments.

Auto-Escalando y Asegurando Apps en AWS (Spanish Session)

Hugo Tovar and Ariel Santa Cruz

Asegure máximo tiempo de respuesta y experiencia de usuario, a medida que nuevos servidores de aplicación o contenedores son agregados al pool de servicios, agréguelos automáticamente a un F5 BIG-IP. Auto-Escalar significa también poder incrementar ó decrementar la cantidad de instancias virtuales BIG-IP basado en parametrización.

Manage Risk and Compliance in the Cloud

Gary Newe

This session attempts to cover ever-changing security regulations, including GDPR and information security frameworks like ISO, what public cloud providers can do for you, and what security gaps still remain that you must address.  

Multifactor de Auth y SSO para Apps en Nube (Spanish Session)

Oscar Sanchez Mercado and Ariel Santa Cruz

El rápido crecimiento en SaaS significa un desafío para administrar, compartir y segurizar las identidades en las apps basadas en la nube. Utilizando una metodología de autenticación en un solo punto y multiples factores de autenticación logramos mantener la seguridad, simplificar la administración y cumplir con normas como PCI. Realizaremos una demostración en vivo.

Protegiendo Apps Nativas de la Nube (Spanish Session)

Eduardo Saito and Ariel Santa Cruz

Las nuevas arquitecturas sin servidores, se basan en llamadas API hacia un API gateway provistos por un Proveedor de Nube, y dado el modelo de responsabilidad compartida de estos proveedores, la seguridad de la aplicación es responsabiliad de las compañias. F5 Web Application Firewall protege todas las llamadas al API Gateway antes que estas lleguen a la aplicación. Realizaremos una demo en vivo. 

Simplify Private Cloud Deployments

Mark Dittmer and David Garrison

This session will show you how F5 simplifies application deployment and security in private cloud environments with a series of integrated solution offerings.

Per-App Services With F5 BIG-IP Cloud Edition

Henry Tam and Ronnie Dockery

App teams are demanding faster speed and simple to use, self-serve app services from IT. Learn how BIG-IP Cloud Edition delivers dedicated and right-sized F5 application services for all apps, with automated deployment, enhanced visibility, and manageability.

BIG-IP Cloud Edition: Auto-Scaling App Services with BIG-IQ

Ronnie Dockery and JC Ferguson

This session will take you through the auto-scaling setup in BIG-IP Cloud Edition with BIG-IQ and BIG-IP Per-App VEs. You’ll see some practical examples and a live demo.

BIG-IP Cloud Edition: Enabling Self-Service For Application Owners with BIG-IQ

Kyle Oliver and Jim McCarron

Get an overview of the BIG-IP Cloud Edition application-owner view while learning about the new capabilities of BIG-IQ, including analytics, network mapping, troubleshooting, and RBAC.

BIG-IP Cloud Edition – Leveraging Per App VEs to Protect Every App Deployed in the Cloud (Partner Session)

Tai Tran

See how you can increase customer's business agility while providing dedicated, cost-efficient, and right-sized F5 Services with BIG-IP Cloud Edition.

Putting F5 into Your Cloud Practice (Partner Session)

Jeff Strathos

F5 products provide the freedom to deploy any application, anywhere with consistent services and security in any environment. Learn how it's done in this session.

Application Delivery and Security in AWS – Best Practices for Deploying F5 in the AWS Cloud (Partner Session)

Heath Parrott

In this session we will cover the relevant F5 technologies in AWS, use cases and best practices. You will learn about how F5 LTM and F5 DNS enhance application delivery in the cloud delivering significant value for organizations as well as how to use F5 ASM and F5 AFM to deliver greater security and control. We will discuss sizing, deployment options as well as example use cases.

Best Practices in Azure (Partner Session)

Gary Lu and Jeff Stathatos

This session will highlight the benefits of Azure solution templates for use within your public cloud architectural design. We will cover common use cases such as HA, Auto-scaling, and WAF.

F5: The Cornerstone Technology to Enable in Your Multi-cloud Journey (Partner Session)

Gregory Coward and Patrick Merrick

Enterprises are increasingly adopting multi-cloud strategies, allowing application services to land in the home best suited for each. While the promise of choice brings value, managing/securing multiple Public (Azure, AWS, GCP…) clouds, Private clouds, and SaaS applications can be daunting task. Attend this session to find out how F5 provides solutions to enable a consistent, easy to manage, multi-cloud infrastructure.

Clouds on the Horizon: Security for your Network Now and for a Multi-Cloud Future (Ingram Breakout)

Speakers: Tom Norman, CPP/PSPS, Ingram and Mike Giambonco, Director, Ingram Micro Cloud Sales

Come learn from the experts. Tom Norman, industry leading security expert, on the state of security, what your customers should be worried about. Ingram Micro's Infrastructure As A Service experts will show you how Ingram Micro can help you stay relevant with your customers and make more money with IaaS.

Level of Difficulty: Intermediate

Practical WAF Strategies: 7 Easy Steps to App Security

David Remington

This session provides direct and concrete guidance to getting the most from your WAF investment with practical WAF implementation, including technical, operational, and organizational guidance. 

OWASP Top 10

John Wagnon

This course is intended to precede the "Practical WAF Strategies" breakout session. You’ll get a background on the OWASP Top Ten threats (injection, authentication, etc.) and a review of application security basics. 

Blocking Common DDoS Attacks with F5

Brandon Frelich

Learn how F5 solutions like DDoS Hybrid Defender can help you thwart attacks from bad actors.

Intro to Advanced WAF

Benn Alp

Learn how F5’s Advanced WAF can help protect your applications against the ever-increasingly sophisticated techniques leveraged by adversaries, and support companies’ growing requirements to do more (and faster) with less.

Cipher Suites: Best Practices and Pitfalls

MegaZone

With the growth of SSL/TLS, as well as regulatory compliance requirements such as PCI-DSS, selecting the right cipher suite configuration is increasingly an issue for administrators.  We'll try to demystify them so you can better use their power for good.

Cryptography and Encryption Basics

Dale McCoon

Get a grasp on the basics of cryptography and encryption, and why they’re important. You’ll gain a foundational knowledge of SSL, TLS, PFS, ECDHE, and more.

DevCentral Basics: Security

John Wagnon

This pre-101 DevCentral Basics course takes a high-level look at F5's security solutions and modules.

Application-Centric Approach To Secure Critical Data

Preston Hogue

Applications are the gateway to your data. 86% of breaches start with application attacks, or identity attacks that collect credentials and give attackers access to applications. Learn how F5 helps you manage risk and secure your data with an application-centric approach to security.

Defensa Multicapa para DDoS (DC y Nube) (Spanish Session)

Eduardo Casseano and Ariel Santa Cruz

Las defensas en sitio son efectivas para bloquear localmente la mayoría de los ataques DDoS. Sin embargo para mitigar ataques volumétricos de gran escala es necesario contar con una protección en la nube. Para completar la protección debemos contar con un sistema que interprete la aplicación y pueda manejar tráfico cifrado SSL. Realizaremos una demo en vivo.

F5 Security Incident Response Team and You

MegaZone

Application threats are always evolving. Your security plan should be, too. Learn about the F5 Security Incident Response Team (SIRT) and how they can help you when security breaches occur.

F5 SIRT Ayuda Ante Incidentes de Seguridad (Spanish Session)

Luis Berbesi, Eduardo Casseano, and Ariel Santa Cruz

F5 dispone de un area llamada Equipo de Respuesta ante Incidentes de Seguridad (SIRT) la cual puede ser contactada durante el transcurso de un ataque para que analicen y brinden una sugerencia de configuración del BIG-IP que logre mitigar el ataque.

Protección Vulnerabilidades en Apps Web (Spanish Session)

Carlos Hernandez and Ariel Santa Cruz

El desarrollo Web es dinámico. Cuando el foco está puesto en las características y en los tiempos, los errores ocurren. A esto debemos sumarles las amenazas de seguridad web, que los firewall tradicionales no pueden mitigar incluso cuando el tráfico no está encriptado. Realizaremos una demostración en vivo.

BIG-IP SSL Capabilities

Kevin Stewart and John Clark

Learn about both the current and near-future state of F5's SSL capabilities, including cryptographic support and updates to SSL Orchestrator.

Be Prepared with F5’s IoT Solution

Ravi Prasad and Justin Shattuck

Learn about F5’s IoT solution and how it can benefit your applications. This session will cover use case scenarios across market verticals. 

Troubleshooting and WAF

Joe Martin

Troubleshooting when a web application firewall (WAF) is in the equation: learn how to manage new software deployments when a WAF is a factor.

Architecting the F5 DDoS Protection Solution

David Remington and Sergey Starzhinskiy

Learn how to leverage F5 technologies and technology partners to build robust on-premises solutions for DDoS mitigation.  

Blackops 2018: Advanced Crypto Attacks

David Holmes

Longtime SSL/TLS developer and researcher David Holmes breaks down 2017's five (!) SSL protocol attacks.   

DDoS Mitigation Within 24 Hours

Scott Altman

Learn about cloud-based DDoS solutions and how they build a faster path to mitigating attacks.  

DNS Security

Dave Doucette and Greg Robinson

This intermediate-level DNS course covers topology, iRules, and attack mitigation with DNS firewall.   

Protect the Network: Threat Intelligence

Madhusudhan Reddy

Learn how to use threat intelligence to protect your network from malicious traffic, such as botnet infections, application attacks, DoS attacks, brute force attacks, and system exploits.  

TLSv1.3: Minor Version, Major Changes

MegaZone and Don Laursen

TLSv1.3 support was introduced in 14.0 and, despite the deceptively minor version bump from v1.2, there are major changes in the protocol. Learn about the changes and how they might affect you.  

Understanding Access Policy Manager

TBD

Learn how BIG-IP APM can help you go beyond passwords for proper authentication in a post-credential stuffing world, ensuring a well-defined security posture across multiple resources.   

Expediting Incident Response Through Security Orchestration

Tyler Hatton

As the number of security incidents organizations face increases, the need for a means to automate the deployment of mitigating measures becomes a high priority. This breakout demonstrates how World Wide Technology is using security orchestration tools such as Phantom Cyber to automate repetitive mitigation tasks in platforms such as F5 BIG-IP to create a more effective security operations center.  

Manage External Partner Remote Access with APM

Nicolas Destor

Managing access of external partners can be difficult when there are a large number of them. With APM, we have developed a rich, secure and easy to administrate IAM solution for solve the problem.  

Empower Your Customers to Secure Their Critical Data (Partner Session)

Preston Hogue

In this session, we will recap how F5 helps customers manage risk and secure their data with an application-centric approach to security, and will enable our partners to operationalize this strategy within their business to realize impactful results.  

Thinking Inside the Box

Don Flinspach

Learn how to deploy, manage, and orchestrate BIG-IP solutions using included elements. This session will focus on rarely used configuration elements, synchronization parameters, and health monitoring.  

DevCentral Basics: Application Delivery Services

Jason Rahm

This pre-101 DevCentral Basics course takes a high-level look at F5 core application delivery competencies and related modules.  

DevCentral Basics: Understanding your BIG-IP Stack

Chase Abbott

This pre-101 DevCentral Basics course takes a high-level look at the BIG-IP platform and where it sits. Discuss architecture concerns and ideas, and walk through a few scenarios from on-premises to cloud deployments.  

F5 Solutions for VMware Workspace One

Matt Mabis

Learn how F5 and VMware worked together to integrate the BIG-IP Access Policy Manager and BIG-IP Local Traffic Manager product lines with Workspace One, delivering a fully vetted customer solution. 

Aspen Mesh: Enterprise Service Mesh

Shawn Wormke and Andrew Jenkins

See how F5’s enterprise service mesh, built on open source, enables customers to run containers at scale in production by providing visibility, analytics, security, and network services in Kubernetes.

Workshop Your Future Architecture

Colin Hayes

Learn how F5 Solution Definition Workshops have helped customers build the right application delivery architecture to support business initiatives, including cloud migration, automation, microservices architectures, and more. 

Future of Application Services

Kara Sprague

Get an overview of F5’s State of Application Delivery 2018 report. Topics include changes in how orgs develop, deploy, and deliver applications; cloud adoption with flexibility, scale, and security; and how per-app services support application teams. 

Future-Proof Your Hardware Investment

Ankita Bhalla and Greg Gordon

Learn about the BIG-IP iSeries and VIPRION platforms. This session covers TurboFlex FPGA technology and enhanced SSL capabilities, as well as newly released platforms and strategies to future-proof your investments.

F5 in the Federal Government Space

Juned Shaikh (DevCentral member)

See how the federal government can use F5 to gain compliance with FISMA, NIST, and DHS directives without requiring app developers to completely re-code to match emerging requirements.

Dynamic App Services in Containers

David Garrison and Jonathan George

Organizations are migrating AppDev to container environments and have tested or deployed containerized applications. Learn how F5 Container Connector provides self-service selection in orchestration and automates configurations of BIG-IP application delivery in containerized environments.

The Future of F5's User Experience

Zac Bedell

Learn about F5's development of a new, cloud-native product, which allows for a design systems approach to graphic user interface design and delivery, resulting in a radically modernized user experience.

The Not-So-Great Eight of Microservices

Shawn Wormke

Review the eight types of problems you’ll encounter as you deploy a large-scale microservice architecture—and the various techniques and technologies you can use to address them.

BIG-IP Migration and Troubleshooting

Robby Stahl

Learn about configuration migration options between hardware and software platforms using the BIG-IP Migration Assistant Tool. We will also discuss proper configuration and usage of the Always-On Management subsystem and other remote diagnostic tools. 

BIG-IQ 101: Centrally Manage Your F5 Environment

Kyle Oliver and Jim McCarron

Managing access of external partners can be difficult when there are a large number of them. With BIG-IP APM, we have developed a rich, secure and easy-to-administrate IAM solution to solve the problem.

BIG-IQ: Auto-Scaling Apps w/ Per-App VE

Ronnie Dockery and JC Ferguson

This session will take you through the auto-scaling setup in BIG-IQ with BIG-IP Per-App VE. You’ll see some practical examples and a live demo.

Certification Prep: Planning to Succeed

KJ (Ken) Salchow, Jr., DBA

Prepare for F5 Certified professional certification exams. Rather than focusing on specific content, you’ll get a road map for incorporating both official F5 and third-party resources to prepare to become F5 Certified.  

Automate with F5 API Services GW and App Services 3.0

TBD

Learn about declarative application deployment using the extensible container-based F5 API Services Gateway and App Services 3.0 Extension.

Enabling Self-Service For Application Owners

Kyle Oliver and Jim McCarron

Get an overview of the application-owner view while learning about the capabilities of the new functionality, including analytics, network mapping, troubleshooting, and RBAC.  

F5 and Ansible

Tim Rupp and Thomas McGonagle

This demo-heavy session will cover basic and advanced F5 product administration with Ansible, including debugging of common Ansible problems as they relate to F5 products.    

Write Fast iRules—Fast

Jibin Han

Learn how to write high-performance iRules with iRules Tracer and Profiler, including iRules event firing sequencing, command execution trace, TCL VM execution, and TCL variable update.  

What's in My Packets? sFlow Knows!

Richard Shuford

What's in your network's packets? If you know, you can troubleshoot effectively and worry less about security. Supported in BIG-IP and in many other products, sFlow technology can show you.    

So You Think You Can Scale...Containers?

Lori Mac Vittie

Traditional models of scale aren’t going to be able to keep up with the velocity of scale and fail in large-scale containerized environments. In this session, we’ll explore how we scale today, why we need a new model to deal with microservices and containers, and what that looks like.  

BIG-IP: The Universal Gateway

Matt Kucherawy

Though largely regarded as a traditional ADC, the BIG-IP platform is the most advanced L2-7 gateway available for LAN, DC, Cloud, and SP. See what's possible when it flexes its muscles!  

Decrease Your Workload With Transparency

Patrik Jonsson (DevCentral MVP)

Agile organizations need information from all areas, and they need it now. This presentation will show ways of giving colleagues the information they need, when they need it.    

Enterprise HTTP/RDP Services without VPN Based on APM/LTM/iRules

Kevin Davies (DevCentral MVP)

Get a 3-stage plan for using BIG-IP LTM solutions to solve for enterprise HTTP/RDP services without VPN. Techniques will include LTM virtual servers, SSL certificates, iRules, AES crypto and data classes.  

A Little Help For Software Upgrades

Leonardo Souza (DevCentral MVP)

Computers are good at comparing things, especially zeros and ones. Why not use that for software upgrades? This presentation will show a script that can help you compare services after the upgrade.  

El Futuro de los Application Services (Spanish Session)

Roberto Ricossa

Presentaremos un resumen del reporte F5’s State of Application Delivery 2018. Abordaremos los cambios en como las organizaciones desarrollan despliegan y entregan aplicaciones; la adopción del cloud con flexibilidad, escalabilidad y seguridad: y como los servicios per-app soportan a los equipos de desarrollo.  

iRules LX Show and Tell

Tyler Hatton

iRules LX is a commonly overlooked feature within the F5 BIG-IP platform that expands upon the programmability capabilities of traditional TCL iRules by integrating the use of the Node.js run-time environment. This breakout session will cover at a high level how iRules LX work, demonstrate how World Wide Technology has used iRules LX for unique use cases such as canary deployments, and explore how an administrator can get started if they are interested in iRules LX.  

SSO via SAML Okta and Custom JSON Token

Jason Wing

See how BIG-IP APM and iRules bridged a portal hosted by Episerver (IaaS), authentication services hosted by Okta (SaaS), and the on-premises implementation of Guideware insurance policy suite.  

F5 Elite – Partner Pre-Sales Engineering Program (Partner Session)

Paul Szczepan

Learn about F5's new Partner SE program, F5 Elite.  A program designed by Pre-Sales Engineers for Pre-Sales Engineers.   

F5’s Subscription and ELA Licensing Program – Business and Implementation (Partner Session)

Damir Vrankic and JC Ferguson

Learn about F5’s subscription and enterprise license agreement programs from a business, customer implementation, and technical point of view. At this session, you’ll hear it direct from the experts – the Product Manager and the Software Architect responsible for bring this program to our customers.  

The What and Why of Super-NetOps

Nathan Pearce and Hitesh Patel

Get a high-level introduction to F5's Super-NetOps program, which is designed to equip our customers with the skills needed to adopt agile, DevOps practices for infrastructure. 

Deception as Defense and Super-NetOps 

Hitesh Patel and Justin Shattuck

Learn how to apply Super-NetOps philosophies and practices to create a shim between bad actors and a backend application stack. We’ll divert identified traffic to a sandbox, tear down and redeploy apps for each actor, and provide a feedback loop in which bad actors are segregated from legit users.

DevOps Workshop: Speed and Reliability

Thomas McGonagle and Dr. David Yates

This session covers the knowledge, skills, and attitudes necessary to deliver software in a modern DevOps fashion, with an emphasis on improving production with speed and reliability. 

iRules LX and Node.js

John Alam and Robert Haynes

Learn how to extend the power of iRules to Integrate BIG-IP modules with most major platforms, while leveraging the ubiquity of JavaScript. Learn ways to manage asynchronous execution. A basic understanding of iRules is needed to get the most from this session.

Super-NetOps: Configuration as Code

Nathan Pearce

Learn the art of treating device configuration as software, as well as the immediate benefits of version control, configuration comparisons, access control, and a configuration audit trail.

Super-NetOps Source of Truth

Joel King

Learn about techniques used to define and implement an F5 BIG-IP deployment with multiple "sources of truth," from CSV and YAML files to SQL and NoSQL databases.

Soluciones de Señalización en Redes 3G y 4G (Spanish Session)

Irineu Ribeiro Costato, Emilio Torres Cid de Leon, and Ariel Santa Cruz

Las redes Móviles se basan en protocolos de señalización claves como ser DNS, GTP, Diameter, SIP y otros. Inicialmente la mayoría de estos protocolos no fueron diseñados pensando en la seguridad, por lo tanto son vulnerables. Realizaremos una demo en vivo sobre como F5 puede ayudar a protegerlos.

Carrier-Grade NAT PBA Deep-Dive

Peter Wang

Get the nuts and bolts of Port Block Allocation (PBA), highlighting the experience of a large service provider who was able to reduce logging translations by 90% without loss of essential information.

Soluciones Gi LAN para Operadores Móviles (Spanish Session)

Emilio Torres Cid de Leon, Irineu Ribeiro Costato, and Ariel Santa Cruz

Con la expansión de la virtualización en el EPC, los Operadores de Redes Móviles están buscando no solo reducir costos, sino más importante simplificar sus operaciones automatizando las tareas del día-a-día. La llegada de la IoT ha aumentado la urgencia por tener redes más flexibles y dinámicas, capaces de adaptarse a condiciones variables en breves períodos de tiempo.

SP Protocols: Overview and Use Cases

Vernon Wells

Learn how the BIG-IP platform can be used to inspect, modify, and route Diameter, GTP, and SIP traffic in a customizable way. See how F5's DNS solution can direct traffic to gateway and proxy nodes based on relative load.

Understanding Carrier Security Solutions

Brian van Lieu and Fred Wittenberg

Discover BIG-IP solutions for carrier-class security in high-traffic data centers and S/Gi data paths, including advanced firewall, DoS detection and mitigation, protocol inspection and security, and application classification and reporting.

What Can Policy Enforcement Manager Do For Me?

Vernon Wells

Find out how F5 Policy Enforcement Manager can improve traffic visibility and control for wireless and wireline operators, helping you provide the ultimate customer QoE.

5G and Multi-Access Edge Computing

Mark Rosche

Learn about 5G wireless tech trends and multi-access edge computing (MEC) architectures enabling local break-out for low-latency gaming, COTS acceleration with FPGA technology, and TCP optimization and zombie device detection at the edge. 

2018 F5 Service Provider Invitational Forum – Virtualizing Modern Carrier Infrastructure

Dr. Edward G. Amoroso

Discussion and interactive workshop led by guest Dr. Edward G. Amoroso, Former AT&T CSO. How virtualization cost-effectively enables new services, and the challenges and opportunities that come with it. This session is invitation only.

"Learned so much in a few days—thanks!"
– 2017 Agility Attendee

Register Now >