Steps Once you’ve made your design decisions, implementing the F5 system just takes a few steps. 1. Install F5 devices. Deploy F5 appliances in the environments you need them. You’ll find F5 in most cloud marketplaces and in hardware versions that’ll scale to suit your requirements. Installation is wizard-driven, easy, and fast. 2. Test basic connectivity. Now, get your network environment configured. You’ll need to configure routing, cloud network configuration, and so on. Once the devices can communicate with each other and the networks they need to, it’s time to test. 3. Test high availability. Make sure you can retain access if things go wrong! 4. Create optimized link. You can use the iApp to create optimized, encrypted links on a per application basis. It’s a templated deployment that will set you up with a best practice connection and allow you to easily redeploy as often as you need to. 5. Test your app. Speed, security, availability—you should be getting it all. Result A securely optimized interconnected compute environment. Data is strictly controlled.