Configuring BIG-IP APM: Access Policy Manager v.13.1

Course

In London

Price on request

Description

  • Type

    Course

  • Location

    London

  • Duration

    3 Days

This course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings.
The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed.
The course includes lecture, hands-on labs, interactive demonstrations, and discussions.

Facilities

Location

Start date

London
See map
Arrow Ecs Training, 56433

Start date

On request

About this course


• Getting started with the BIG-IP system
• APM Traffic Processing and APM Configuration Wizards
• APM Access Policies, Access Profiles
• Visual Policy Editor, Branches and Endings
• APM Portal Access and Rewrite Profiles
• Single Sign-On and Credential Caching
• APM Network Access and BIG-IP Edge Client
• Layer 4 and Layer 7 Access Control Lists
• APM Application Access and Webtop Types
• Remote Desktop, Optimized Tunnels and Webtop Links
• LTM Concepts including Virtual Servers, Pools, Monitors and SNAT’ing
• APM + LTM Use Case for Web Applications
• Visual Policy Editor Macros
• AAA Servers and Authentication and Authorization with Active Directory and RADIUS
• Endpoint Security with Windows Process Checking, Protected Workspace and Firewalls
• iRules, Customization and SAML



This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager.

Students are required to complete one of the following F5 prerequisites before attending this course:
• Administering BIG-IP instructor-led course
- or -
• F5 Certified BIG-IP Administrator
The following free web-based training courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience. These courses are available at F5 University (
• Getting Started with BIG-IP
• Getting Started with BIG-IP Access Policy Manager erience with BIG-IP
• Basic web application delivery (BIG-IP LTM)
• HTML, HTTP, HTTPS as...

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Network Training
  • IP
  • Web
  • Active Directory
  • Network
  • Server
  • Access

Course programme

Chapter 1: Setting Up the BIG-IP System

• Introducing the BIG-IP System
• Initially Setting Up the BIG-IP System
• Archiving the BIG-IP Configuration
• Leveraging F5 Support Resources and Tools

Chapter 2: Configuring Web Application Access

• Review of BIG-IP LTM
• Introduction to the Access Policy
• Web Access Application Configuration Overview
• Web Application Access Configuration in Detail

Chapter 3: Exploring the Access Policy

• Navigating the Access Policy

Chapter 4: Managing BIG-IP APM

• BIG-IP APM Sessions and Access Licenses
• Session Variables and sessiondump
• Session Cookies
• Access Policy General Purpose Agents List

Chapter 5: Using Authentication

• Introduction to Access Policy Authentication
• Active Directory AAA Server
• RADIUS
• One-Time Password
• Local User Database

Chapter 6: Understanding Assignment Agents

• List of Assignment Agents

Chapter 7: Configuring Portal Access

• Introduction to Portal Access
• Portal Access Configuration Overview
• Portal Access Configuration
• Portal Access in Action

Chapter 8: Configuring Network Access

• Concurrent User Licensing
• VPN Concepts
• Network Access Configuration Overview
• Network Access Configuration
• Network Access in Action

Chapter 9: Deploying Macros

• Access Policy Macros
• Configuring Macros
• An Access Policy is a Flowchart
• Access Policy Logon Agents
• Configuring Logon Agents

Chapter 10: Exploring Client-Side Checks

• Client-Side Endpoint Security

Chapter 11: Exploring Server-Side Checks

• Server-Side Endpoint Security Agents List
• Server-Side and Client-Side Checks Differences

Chapter 12: Using Authorization

• Active Directory Query
• Active Directory Nested Groups
• Configuration in Detail

Chapter 13: Configuring AppTunnels

• Application Access
• Remote Desktop
• Network Access Optimized Tunnels
• Landing Page Bookmarks

Chapter 14: Deploying Access Control Lists

• Introduction to Access Control Lists
• Configuration Overview
• Dynamic ACLs
• Portal Access ACLs

Chapter 15: Signing On with SSO

• Remote Desktop Single Sign-On
• Portal Access Single Sign-On

Chapter 16: Using iRules

• iRules Introduction
• Basic TCL Syntax
• iRules and Advanced Access Policy Rules

Chapter 17: Customizing BIG-IP APM

• Customization Overview
• BIG-IP Edge Client
• Advanced Edit Mode Customization
• Landing Page Sections

Chapter 18: Deploying SAML

• SAML Conceptual Overview
• SAML Configuration Overview

Chapter 19: Exploring Webtops and Wizards

• Webtops
• Wizards

Chapter 20: Using BIG-IP Edge Client

• BIG-IP Edge Client for Windows Installation
• BIG-IP Edge Client in Action

Chapter 21: Configuration Project

Configuring BIG-IP APM: Access Policy Manager v.13.1

Price on request