Sold by: Zebra Technologies
Zebra Technologies is a F5 Networks CPSP (Certified Professional Services Partner) specializing in the AWS cloud environment.
Our AWS Certified Cloud Architects will help you assess, design, and implement your F5 BIG-IP VE.
Sold by: Zebra Technologies
Overview
F5 BIG-IP Initial Configuration Implementation will include:
- Launch Instance: Deploy the F5 BIG-IP VE instance from the AWS Marketplace.
- Instance Type: Select an appropriate instance type based on your performance and resource requirements.
- VPC Configuration: Ensure the instance is launched within the desired Virtual Private Cloud (VPC).
- Subnet: Choose the appropriate subnet and availability zone for deployment.
- Security Groups: Configure security groups to control inbound and outbound traffic.
- Elastic IP: Assign an Elastic IP address to ensure a static public IP for the BIG-IP VE instance.
- SSH Key Pair: Use an SSH key pair for remote access to the instance.
- Self IP Addresses: Assign self IP addresses to BIG-IP VE interfaces to enable communication.
- Default Gateway: Configure the default gateway to ensure outbound connectivity.
- Route Table: Add route table entries for proper routing of traffic.
- Network Interfaces: Verify and configure network interfaces as needed for your specific deployment.
F5 BIG-IP Local Traffic Manager (LTM) Implementation will include:
- Create and configure virtual servers to handle incoming application traffic.
- Implement various load balancing algorithms, including round robin, least connections, and others.
- Terminate SSL/TLS traffic at the BIG-IP for improved performance.
- Configure persistence profiles for maintaining user sessions.
- Route traffic based on content or request type.
- Control the rate of incoming and outgoing traffic.
- Monitor the health of applications and servers.
High Availability:
- Set up high availability configurations for redundancy.
- Configure synchronized traffic management across multiple BIG-IP devices.
- Mirror connection states to ensure seamless failover.
F5 BIG-IP Advanced Web Application Firewall (AWAF) Implementation will include:
- Configure security policies to define rules and settings for application protection.
- Protect against common web application threats, including SQL injection, cross-site scripting (XSS), and more.
- Detect and mitigate automated bot traffic to prevent misuse of web applications.
- Extend WAF protection to RESTful APIs, ensuring API security against attacks.
- Implement geolocation-based access controls to block or allow traffic from specific regions.
- Inspect encrypted traffic for threats using SSL/TLS decryption and inspection.
- Integrate with Security Information and Event Management (SIEM) systems for centralized security monitoring.
- Defend against application layer DDoS attacks that target web applications.
- Utilize IP intelligence for reputation-based security policies.
- Align with industry-specific compliance standards, such as PCI DSS and OWASP Top Ten.
F5 BIG-IP Access Policy Manager (APM) Implementation will include:
- Basic configuration of network settings to integrate APM with existing network infrastructure.
- Developing comprehensive access policies based on organizational requirements and security policies.
- Utilizing the visual policy editor to create and manage authentication, authorization, and auditing policies.
- Configuring BIG-IP APM to publish and manage access to enterprise applications such as Remote Desktop Protocol (RDP) links and Virtual Desktop Infrastructure (VDI) through HTTP links. This includes setting up secure, context-aware access controls and ensuring optimized connectivity for end-users.
- Configuring advanced authentication methods, such as multi-factor authentication (MFA).
- Enabling and configuring SSL VPN for secure remote access.
- Implementing endpoint inspection scripts to verify the security posture of devices before granting access.
- Designing customized login pages to match corporate branding and user experience guidelines.
- Configuring session settings and timeout policies tailored to user roles and security requirements.
Highlights
- Implement Tenable security solutions into your AWS enable your organization to see, predict and act on cyber risks
- Work with our certified cloud security professionals all along the implementation process
- Have your team trained and involved in the process for future management hand-off.
Details
Pricing
Custom pricing options
Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.
Legal
Content disclaimer
Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.
Support
Vendor support
Please See Support Terms @:
Software associated with this service
The BIG-IP Virtual Edition (VE) is the industry's most trusted and comprehensive app delivery and security solution. Providing everything from intelligent traffic management and visibility, to app security, access, and optimization, BIG-IP VE ensures all of your apps are fast, available, and secure.
The BIG-IP Virtual Edition (VE) is the industry's most trusted and comprehensive app delivery and security solution. Providing everything from intelligent traffic management and visibility, to app security, access, and optimization, BIG-IP VE ensures all of your apps are fast, available, and secure.
F5 Advanced WAF (AWF) is an industry leading Web Application Firewall (WAF) that delivers the most innovative capabilities for application protection. Key features include anti-bot, DDoS Mitigation, Behavioral App Protection, Application Vulnerability Protection, and more.
F5 Advanced WAF (AWF) is an industry leading Web Application Firewall (WAF) that delivers the most innovative capabilities for application protection. Key features include anti-bot, DDoS Mitigation, Behavioral App Protection, Application Vulnerability Protection, and more.