Listing Thumbnail

    Zebra Technologies F5 PS Implementation for AWS

     Info
    Zebra Technologies is a F5 Networks CPSP (Certified Professional Services Partner) specializing in the AWS cloud environment. Our AWS Certified Cloud Architects will help you assess, design, and implement your F5 BIG-IP VE.
    Listing Thumbnail

    Zebra Technologies F5 PS Implementation for AWS

     Info

    Overview

    F5 BIG-IP Initial Configuration Implementation will include:

    • Launch Instance: Deploy the F5 BIG-IP VE instance from the AWS Marketplace.
    • Instance Type: Select an appropriate instance type based on your performance and resource requirements.
    • VPC Configuration: Ensure the instance is launched within the desired Virtual Private Cloud (VPC).
    • Subnet: Choose the appropriate subnet and availability zone for deployment.
    • Security Groups: Configure security groups to control inbound and outbound traffic.
    • Elastic IP: Assign an Elastic IP address to ensure a static public IP for the BIG-IP VE instance.
    • SSH Key Pair: Use an SSH key pair for remote access to the instance.
    • Self IP Addresses: Assign self IP addresses to BIG-IP VE interfaces to enable communication.
    • Default Gateway: Configure the default gateway to ensure outbound connectivity.
    • Route Table: Add route table entries for proper routing of traffic.
    • Network Interfaces: Verify and configure network interfaces as needed for your specific deployment.

    F5 BIG-IP Local Traffic Manager (LTM) Implementation will include:

    • Create and configure virtual servers to handle incoming application traffic.
    • Implement various load balancing algorithms, including round robin, least connections, and others.
    • Terminate SSL/TLS traffic at the BIG-IP for improved performance.
    • Configure persistence profiles for maintaining user sessions.
    • Route traffic based on content or request type.
    • Control the rate of incoming and outgoing traffic.
    • Monitor the health of applications and servers.

    High Availability:

    • Set up high availability configurations for redundancy.
    • Configure synchronized traffic management across multiple BIG-IP devices.
    • Mirror connection states to ensure seamless failover.

    F5 BIG-IP Advanced Web Application Firewall (AWAF) Implementation will include:

    • Configure security policies to define rules and settings for application protection.
    • Protect against common web application threats, including SQL injection, cross-site scripting (XSS), and more.
    • Detect and mitigate automated bot traffic to prevent misuse of web applications.
    • Extend WAF protection to RESTful APIs, ensuring API security against attacks.
    • Implement geolocation-based access controls to block or allow traffic from specific regions.
    • Inspect encrypted traffic for threats using SSL/TLS decryption and inspection.
    • Integrate with Security Information and Event Management (SIEM) systems for centralized security monitoring.
    • Defend against application layer DDoS attacks that target web applications.
    • Utilize IP intelligence for reputation-based security policies.
    • Align with industry-specific compliance standards, such as PCI DSS and OWASP Top Ten.

    F5 BIG-IP Access Policy Manager (APM) Implementation will include:

    • Basic configuration of network settings to integrate APM with existing network infrastructure.
    • Developing comprehensive access policies based on organizational requirements and security policies.
    • Utilizing the visual policy editor to create and manage authentication, authorization, and auditing policies.
    • Configuring BIG-IP APM to publish and manage access to enterprise applications such as Remote Desktop Protocol (RDP) links and Virtual Desktop Infrastructure (VDI) through HTTP links. This includes setting up secure, context-aware access controls and ensuring optimized connectivity for end-users.
    • Configuring advanced authentication methods, such as multi-factor authentication (MFA).
    • Enabling and configuring SSL VPN for secure remote access.
    • Implementing endpoint inspection scripts to verify the security posture of devices before granting access.
    • Designing customized login pages to match corporate branding and user experience guidelines.
    • Configuring session settings and timeout policies tailored to user roles and security requirements.

    Highlights

    • Implement Tenable security solutions into your AWS enable your organization to see, predict and act on cyber risks
    • Work with our certified cloud security professionals all along the implementation process
    • Have your team trained and involved in the process for future management hand-off.

    Details

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Please See Support Terms @:

    Software associated with this service