My main use case for F5 BIG-IP Virtual Edition is that I used it for LTM, ASM, and GTM modules. I used F5 LTM to load balance customer application traffic, and I used ASM to protect and safeguard customer applications from various cyber threats, attacks, and day-to-day emerging vulnerabilities. We also had DNS and Global Traffic Manager services for multiple client applications, so I have hands-on experience with all these technologies of F5 BIG-IP Virtual Edition including LTM, GTM, and ASM.
In my previous organization, we had a data center virtualized environment using VMware ESXi hosts. We had bare metal ESXi hosts where we installed VMware vSphere and NSX virtualization software. To perform customer application load balancing and enable application security, we installed F5 BIG-IP Virtual Edition VMs, which can protect the application from various cyber attacks and perform seamless application load balancing for traffic sharing between application nodes. We purchased licenses for VMs based on the requirement of LTM, GTM, and various security features and deployed the VMs on VMware vSphere and the VMware NSX environment. I also had work experience deploying F5 BIG-IP Virtual Edition in public clouds such as GCP and OCI from the marketplace images, enabling seamless network connectivity and performance for customer applications via F5 BIG-IP Virtual Edition VMs.
With the specific use case of load balancing and protecting against various threats, I use F5 LTM to perform load balancing for major production applications. One of our customers had only a single application server serving all application traffic of the entire production application and reported a performance issue. Following the management architecture review of the application, they identified the need for enabling load sharing for the application. We suggested implementing F5 LTM load balancer, which could provide load sharing between multiple application nodes. We recommended hosting the application on multiple servers instead of a single server, configured it via F5 LTM, and ultimately load balanced the application traffic for three additional nodes. The client achieved seamless traffic load balancing between the multiple application nodes, and the application performance increased, eliminating the slowness issue. In terms of LTM features, we can offload SSL certificates on LTM, conduct SSL encryption and decryption, and implement numerous traffic redirection rules, multiple LTM policies, and iRules that affect application traffic. Regarding ASM, we have used it to protect client applications from DDoS attacks, major OWASP Top 10 attacks, SQL injection attacks, script injection attacks, and many botnet attacks. For instance, one of our clients experienced a DDoS attack on a major live application, and we enabled ASM policies with DDoS protection, setting TPS count values based on geolocation IPs. Using those DDoS protection policies, we prevented many DDoS attacks. The WAF ASM signature has helped us mitigate various cyber threats for clients, utilizing automated policy learning and traffic learning to avoid manual intervention in creating and hardening security rules.