<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="26236" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/f5networks-sslo" lastchanged="2025-09-10T08:17:00+02:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Configuring F5 SSL Orchestrator</title><productcode>SSLO</productcode><vendorcode>F5</vendorcode><vendorname>F5 Networks</vendorname><fullproductcode>F5-SSLO</fullproductcode><version>1.0</version><objective>&lt;ul&gt;
&lt;li&gt;Understand basic use cases for decryption and re-encryption of inbound and outbound SSL/TLS network traffic&lt;/li&gt;&lt;li&gt;Create dynamic service chains of multiple security services&lt;/li&gt;&lt;li&gt;Configure security policies to enable policy-based traffic steering&lt;/li&gt;&lt;li&gt;Add SSL visibility to existing applications&lt;/li&gt;&lt;li&gt;Deploy SSL Orchestrator configurations based on topology templates&lt;/li&gt;&lt;li&gt;Troubleshoot an SSL Orchestrator deployment&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;OSI model encapsulation&lt;/li&gt;&lt;li&gt;Routing and switching&lt;/li&gt;&lt;li&gt;Ethernet and ARP&lt;/li&gt;&lt;li&gt;TCP/IP concepts&lt;/li&gt;&lt;li&gt;IP addressing and subnetting&lt;/li&gt;&lt;li&gt;NAT and private IP addressing&lt;/li&gt;&lt;li&gt;Default gateway&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The following course-specific knowledge and experience is suggested before attending this course:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;HTTP, HTTPS protocols&lt;/li&gt;&lt;li&gt;TLS/SSL&lt;/li&gt;&lt;li&gt;Security services such as malware detection, data loss/leak prevention (DLP), next-generation firewalls (NGFW), intrusion prevention systems (IPS), and Internet Content Adaptation Protocol (ICAP)&lt;/li&gt;&lt;/ul&gt;</essentials><contents>&lt;ul&gt;
&lt;li&gt;Compare F5 SSL Orchestration to manual &amp;ldquo;daisy chaining&amp;rdquo; of security services&lt;/li&gt;&lt;li&gt;Learn essentials of PKI and certificates, how to create a certificate signing request, and how to import certificates and private keys into BIG-IP&lt;/li&gt;&lt;li&gt;Implement certificate forging in an SSL Forward Proxy deployment&lt;/li&gt;&lt;li&gt;Understand HTTP, ICAP, L3/L2, and TAP security services&lt;/li&gt;&lt;li&gt;Configure traffic classification and URL bypass within a security policy&lt;/li&gt;&lt;li&gt;Define security services to include in a dynamic service chain&lt;/li&gt;&lt;li&gt;Use the Guided Configuration to deploy an outbound Layer 3 transparent forward proxy&lt;/li&gt;&lt;li&gt;Use the Guided Configuration to deploy an outbound Layer 3 explicit forward proxy&lt;/li&gt;&lt;li&gt;Use the Guided Configuration to deploy an inbound Layer 3 reverse proxy&lt;/li&gt;&lt;li&gt;Use the Guided Configuration to deploy an SSL Orchestration for an existing application&lt;/li&gt;&lt;li&gt;Configure High Availability for SSLO devices&lt;/li&gt;&lt;li&gt;Troubleshoot SSLO and traffic flow issues&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Chapter 1: Introducing SSL Orchestrator  &lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Why is SSL Visibility Needed?&lt;/li&gt;&lt;li&gt;SSL Visibility without SSL Orchestrator&lt;/li&gt;&lt;li&gt;The SSL Orchestrator Solution&lt;/li&gt;&lt;li&gt;SSLO Placement on the Network&lt;/li&gt;&lt;li&gt;Platform and Licensing Requirements&lt;/li&gt;&lt;li&gt;Leveraging F5 Support Resources and Tools&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 2: Reviewing Local Traffic Configuration&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Reviewing Nodes, Pools, and Virtual Servers&lt;/li&gt;&lt;li&gt;Reviewing Address and Port Translation&lt;/li&gt;&lt;li&gt;Reviewing Routing Assumptions&lt;/li&gt;&lt;li&gt;Reviewing Application Health Monitoring&lt;/li&gt;&lt;li&gt;Reviewing Traffic Behavior Modification with Profiles&lt;/li&gt;&lt;li&gt;Reviewing the TMOS Shell (TMSH)&lt;/li&gt;&lt;li&gt;Reviewing Managing BIG-IP Configuration Data&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 3: Certificate Fundamentals&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview of Internet Security Model&lt;/li&gt;&lt;li&gt;Understanding how Certificates are Used&lt;/li&gt;&lt;li&gt;Using a Certificate in Profiles&lt;/li&gt;&lt;li&gt;SSL Forward Proxy&lt;/li&gt;&lt;li&gt;SSLdump&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 4: SSLO Traffic Flow&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;SSL Orchestration is more than Visibility&lt;/li&gt;&lt;li&gt;Inbound/Outbound Inspection&lt;/li&gt;&lt;li&gt;Flow Support and Cipher Diversity&lt;/li&gt;&lt;li&gt;Broad Topology and Device Support&lt;/li&gt;&lt;li&gt;Dynamic Service Chaining and Policy-based Traffic Steering&lt;/li&gt;&lt;li&gt;Advanced Monitoring&lt;/li&gt;&lt;li&gt;Dynamic Scaling&lt;/li&gt;&lt;li&gt;Dynamic Evaluation&lt;/li&gt;&lt;li&gt;Selecting the Appropriate Topology&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 5: Using SSLO Guided Configuration&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introducing Guided Configuration&lt;/li&gt;&lt;li&gt;Reviewing the Landing Page&lt;/li&gt;&lt;li&gt;Differentiating Topologies&lt;/li&gt;&lt;li&gt;SSL Configuration&lt;/li&gt;&lt;li&gt;Services and Service Handling&lt;/li&gt;&lt;li&gt;Constructing Service Chains&lt;/li&gt;&lt;li&gt;Creating a Security Policy&lt;/li&gt;&lt;li&gt;Defining an Interception Rule&lt;/li&gt;&lt;li&gt;Examining Egress&lt;/li&gt;&lt;li&gt;Applying Log Settings&lt;/li&gt;&lt;li&gt;Summary page and Deployment&lt;/li&gt;&lt;li&gt;Exploring the Dashboard&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 6: SSLO Deployment Scenarios&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Transparent Forward Proxy&lt;/li&gt;&lt;li&gt;Explicit Forward Proxy&lt;/li&gt;&lt;li&gt;Classroom Lab Environment&lt;/li&gt;&lt;li&gt;Gateway Reverse Proxy (L3 Inbound)&lt;/li&gt;&lt;li&gt;Existing Application&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 7: Managing the SSLO Security Policy&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Review creating Security Policies&lt;/li&gt;&lt;li&gt;View Security Policies&lt;/li&gt;&lt;li&gt;Viewing Per-Request Policies&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 8: Troubleshooting SSLO&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Solving Traffic Flow Issues&lt;/li&gt;&lt;li&gt;Solving Guided Configration(UI) and iAppLX issues&lt;/li&gt;&lt;li&gt;Determining SSLO Version&lt;/li&gt;&lt;li&gt;Troubleshooting using cURL&lt;/li&gt;&lt;li&gt;Viewing Log Files&lt;/li&gt;&lt;li&gt;Capturing Traffic using tcpdump&lt;/li&gt;&lt;li&gt;Backing up SSLO&lt;/li&gt;&lt;li&gt;Deleting a SSLO Configuration&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 9: SSLO High Availability&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Deploying BIG-IP Systems to Achieve High Availability&lt;/li&gt;&lt;li&gt;Establishing Device Trust&lt;/li&gt;&lt;li&gt;Establishing a Sync-Failover Device Group&lt;/li&gt;&lt;li&gt;Synchronizing Configuration Data&lt;/li&gt;&lt;li&gt;SSLO High Availability (HA) Requirements&lt;/li&gt;&lt;li&gt;Installation and Upgrade Cautions&lt;/li&gt;&lt;li&gt;Troubleshooting HA&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Understand basic use cases for decryption and re-encryption of inbound and outbound SSL/TLS network traffic
- Create dynamic service chains of multiple security services
- Configure security policies to enable policy-based traffic steering
- Add SSL visibility to existing applications
- Deploy SSL Orchestrator configurations based on topology templates
- Troubleshoot an SSL Orchestrator deployment</objective_plain><essentials_plain>The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:


- OSI model encapsulation
- Routing and switching
- Ethernet and ARP
- TCP/IP concepts
- IP addressing and subnetting
- NAT and private IP addressing
- Default gateway
The following course-specific knowledge and experience is suggested before attending this course:


- HTTP, HTTPS protocols
- TLS/SSL
- Security services such as malware detection, data loss/leak prevention (DLP), next-generation firewalls (NGFW), intrusion prevention systems (IPS), and Internet Content Adaptation Protocol (ICAP)</essentials_plain><contents_plain>- Compare F5 SSL Orchestration to manual “daisy chaining” of security services
- Learn essentials of PKI and certificates, how to create a certificate signing request, and how to import certificates and private keys into BIG-IP
- Implement certificate forging in an SSL Forward Proxy deployment
- Understand HTTP, ICAP, L3/L2, and TAP security services
- Configure traffic classification and URL bypass within a security policy
- Define security services to include in a dynamic service chain
- Use the Guided Configuration to deploy an outbound Layer 3 transparent forward proxy
- Use the Guided Configuration to deploy an outbound Layer 3 explicit forward proxy
- Use the Guided Configuration to deploy an inbound Layer 3 reverse proxy
- Use the Guided Configuration to deploy an SSL Orchestration for an existing application
- Configure High Availability for SSLO devices
- Troubleshoot SSLO and traffic flow issues</contents_plain><outline_plain>Chapter 1: Introducing SSL Orchestrator  


- Why is SSL Visibility Needed?
- SSL Visibility without SSL Orchestrator
- The SSL Orchestrator Solution
- SSLO Placement on the Network
- Platform and Licensing Requirements
- Leveraging F5 Support Resources and Tools
Chapter 2: Reviewing Local Traffic Configuration


- Reviewing Nodes, Pools, and Virtual Servers
- Reviewing Address and Port Translation
- Reviewing Routing Assumptions
- Reviewing Application Health Monitoring
- Reviewing Traffic Behavior Modification with Profiles
- Reviewing the TMOS Shell (TMSH)
- Reviewing Managing BIG-IP Configuration Data
Chapter 3: Certificate Fundamentals


- Overview of Internet Security Model
- Understanding how Certificates are Used
- Using a Certificate in Profiles
- SSL Forward Proxy
- SSLdump
Chapter 4: SSLO Traffic Flow


- SSL Orchestration is more than Visibility
- Inbound/Outbound Inspection
- Flow Support and Cipher Diversity
- Broad Topology and Device Support
- Dynamic Service Chaining and Policy-based Traffic Steering
- Advanced Monitoring
- Dynamic Scaling
- Dynamic Evaluation
- Selecting the Appropriate Topology
Chapter 5: Using SSLO Guided Configuration


- Introducing Guided Configuration
- Reviewing the Landing Page
- Differentiating Topologies
- SSL Configuration
- Services and Service Handling
- Constructing Service Chains
- Creating a Security Policy
- Defining an Interception Rule
- Examining Egress
- Applying Log Settings
- Summary page and Deployment
- Exploring the Dashboard
Chapter 6: SSLO Deployment Scenarios


- Transparent Forward Proxy
- Explicit Forward Proxy
- Classroom Lab Environment
- Gateway Reverse Proxy (L3 Inbound)
- Existing Application
Chapter 7: Managing the SSLO Security Policy


- Review creating Security Policies
- View Security Policies
- Viewing Per-Request Policies
Chapter 8: Troubleshooting SSLO


- Solving Traffic Flow Issues
- Solving Guided Configration(UI) and iAppLX issues
- Determining SSLO Version
- Troubleshooting using cURL
- Viewing Log Files
- Capturing Traffic using tcpdump
- Backing up SSLO
- Deleting a SSLO Configuration
Chapter 9: SSLO High Availability


- Deploying BIG-IP Systems to Achieve High Availability
- Establishing Device Trust
- Establishing a Sync-Failover Device Group
- Synchronizing Configuration Data
- SSLO High Availability (HA) Requirements
- Installation and Upgrade Cautions
- Troubleshooting HA</outline_plain><duration unit="d" days="2">2 jours</duration><pricelist><price country="NL" currency="EUR">1900.00</price><price country="BE" currency="EUR">1900.00</price><price country="IT" currency="EUR">1900.00</price><price country="FR" currency="EUR">1900.00</price><price country="GB" currency="USD">2200.00</price><price country="SI" currency="USD">2420.00</price><price country="DE" currency="USD">2640.00</price><price country="CH" currency="USD">2640.00</price><price country="AT" currency="USD">2640.00</price></pricelist><miles/></course>