Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help
ProServ

Overview

F5 BIG-IP Initial Configuration Implementation will include:

  • Launch Instance: Deploy the F5 BIG-IP VE instance from the AWS Marketplace.
  • Instance Type: Select an appropriate instance type based on your performance and resource requirements.
  • VPC Configuration: Ensure the instance is launched within the desired Virtual Private Cloud (VPC).
  • Subnet: Choose the appropriate subnet and availability zone for deployment.
  • Security Groups: Configure security groups to control inbound and outbound traffic.
  • Elastic IP: Assign an Elastic IP address to ensure a static public IP for the BIG-IP VE instance.
  • SSH Key Pair: Use an SSH key pair for remote access to the instance.
  • Self IP Addresses: Assign self IP addresses to BIG-IP VE interfaces to enable communication.
  • Default Gateway: Configure the default gateway to ensure outbound connectivity.
  • Route Table: Add route table entries for proper routing of traffic.
  • Network Interfaces: Verify and configure network interfaces as needed for your specific deployment.

F5 BIG-IP Local Traffic Manager (LTM) Implementation will include:

  • Create and configure virtual servers to handle incoming application traffic.
  • Implement various load balancing algorithms, including round robin, least connections, and others.
  • Terminate SSL/TLS traffic at the BIG-IP for improved performance.
  • Configure persistence profiles for maintaining user sessions.
  • Route traffic based on content or request type.
  • Control the rate of incoming and outgoing traffic.
  • Monitor the health of applications and servers.

High Availability:

  • Set up high availability configurations for redundancy.
  • Configure synchronized traffic management across multiple BIG-IP devices.
  • Mirror connection states to ensure seamless failover.

F5 BIG-IP Advanced Web Application Firewall (AWAF) Implementation will include:

  • Configure security policies to define rules and settings for application protection.
  • Protect against common web application threats, including SQL injection, cross-site scripting (XSS), and more.
  • Detect and mitigate automated bot traffic to prevent misuse of web applications.
  • Extend WAF protection to RESTful APIs, ensuring API security against attacks.
  • Implement geolocation-based access controls to block or allow traffic from specific regions.
  • Inspect encrypted traffic for threats using SSL/TLS decryption and inspection.
  • Integrate with Security Information and Event Management (SIEM) systems for centralized security monitoring.
  • Defend against application layer DDoS attacks that target web applications.
  • Utilize IP intelligence for reputation-based security policies.
  • Align with industry-specific compliance standards, such as PCI DSS and OWASP Top Ten.

F5 BIG-IP Access Policy Manager (APM) Implementation will include:

  • Basic configuration of network settings to integrate APM with existing network infrastructure.
  • Developing comprehensive access policies based on organizational requirements and security policies.
  • Utilizing the visual policy editor to create and manage authentication, authorization, and auditing policies.
  • Configuring BIG-IP APM to publish and manage access to enterprise applications such as Remote Desktop Protocol (RDP) links and Virtual Desktop Infrastructure (VDI) through HTTP links. This includes setting up secure, context-aware access controls and ensuring optimized connectivity for end-users.
  • Configuring advanced authentication methods, such as multi-factor authentication (MFA).
  • Enabling and configuring SSL VPN for secure remote access.
  • Implementing endpoint inspection scripts to verify the security posture of devices before granting access.
  • Designing customized login pages to match corporate branding and user experience guidelines.
  • Configuring session settings and timeout policies tailored to user roles and security requirements.
Sold by Zebra Technologies
Categories
Fulfillment method Professional Services

Pricing Information

This service is priced based on the scope of your request. Please contact seller for pricing details.

Support