F5 BIG-IP SSL Orchestrator Training Lab > All SSL Orchestrator Lab Guides Source | Edit on
SSLO 101: Introduction to SSL Visibility with SSL Orchestrator (AppWorld 2026 | 2 hours)ΒΆ
Note
This lab relies on UDF Blueprint: AppWorld 2026 - SSL Orchestrator 101
Developed and tested with BIG-IP 21.0 / SSL Orchestrator 13.0.
Insecurity through obscurity! Today, nearly all Internet traffic is protected with TLS/SSL encryption for privacy, confidentiality, and compliance reasons. However, how do you know if there are security threats hidden within this encrypted traffic? Cyber criminals are also using TLS encrypted channels to cover up their activities. Botnets and malware are establishing encrypted command and control connections and exfiltrating data without detection. Data breaches are now very common news headlines.
The F5 BIG-IP SSL Orchestrator solution ensures encrypted traffic can be decrypted, inspected by security controls, then re-encrypted at scale to deliver enhanced visibility and mitigate threats traversing the network. As a result, organizations maximize their investment in security tooling such as anti-malware, data loss prevention (DLP), ransomware detection, and next-generation firewalls (NGFW).
SSL Orchestrator helps to mitigate inbound and outbound threats including exploitation, callback, and data exfiltration. Policy-based traffic steering and dynamic service chaining enable organizations to intelligently manage encrypted traffic flows across the entire security chain with optimal availability.
This lab provides a hands-on introduction to the F5 BIG-IP SSL Orchestrator solution.
Expected time to complete: 90 minutes (excluding lab instructor presentations)
Pre-requisites: None.
CONTENTS
- 1. SSL Orchestrator Overview
- 2. Lab Environment
- 3. Lab 1: Deploy an Outbound Transparent Forward Proxy
- 3.1. Lab Overview
- 3.2. Review Pre-configured Settings
- 3.3. SSL Orchestrator Initial Setup
- 3.4. Deploying a Basic L3 Outbound Proxy Topology
- 3.5. Create SSL Configurations
- 3.6. User Authentication
- 3.7. Create Services
- 3.8. Create Service Chains
- 3.9. Create Security Policy
- 3.10. Create Interception Rule
- 3.11. Create Egress Settings
- 3.12. Create Log Settings
- 3.13. Deploy Topology
- 3.14. Testing the Deployment
- 4. Lab 2: Enable Selective Decryption and Inspection
- 5. Lab 3: Configure Additional Inspection Services
- 6. Conclusion
- 7. Explore More SSL Orchestrator Labs
- 8. Contributors
- 9. Revision History
- 10. Lab Guide Repository (GitHub)
- 11. Appendices