DATE

TBD

LOCATION

Instructor Led Online (CT)

OPTIONS

This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.

Prerequisites

Students must complete one of the following F5 prerequisites before attending this course:

  • Administering BIG-IP instructor-led course or
  • F5 Certified BIG-IP Administrator

 

Objectives

  • Configure remote access methods Network Access, Portal Access and Application Access and understand the differences and use cases for each
  • Configure APM and LTM to work together for advanced application delivery as well as understand the APM + LTM use case versus the remote access use case
  • Configure advanced policies using the Visual Policy Editor with all of its features such as macros, branches and multiple endings
  • Understand the role of iRules and how they work together with BIG-IP in general and APM in specific
  • Understand the role of Federated Single Sign-On using SAML and deploy a basic configuration
  • Configure multiple authentication methods and understand how they can work together in a single access policy
  • Set up, license, and provision the BIG-IP system out-of-the-box
  • Create, restore from, and manage BIG-IP archives
  • Use profiles to manipulate the way the BIG-IP system processes traffic through a virtual server

 

Agenda

  • Getting started with the BIG-IP system
  • APM Traffic Processing and APM Configuration Wizards
  • APM Access Policies, Access Profiles
  • Visual Policy Editor, Branches and Endings
  • APM Portal Access and Rewrite Profiles
  • Single Sign-On and Credential Caching
  • APM Network Access and BIG-IP Edge Client
  • Layer 4 and Layer 7 Access Control Lists
  • APM Application Access and Webtop Types
  • Remote Desktop, Optimized Tunnels and Webtop Links
  • LTM Concepts including Virtual Servers, Pools, Monitors and SNAT’ing
  • APM + LTM Use Case for Web Applications
  • Visual Policy Editor Macros
  • AAA Servers and Authentication and Authorization with Active Directory and RADIUS
  • Endpoint Security with Windows Process Checking, Protected Workspace and Firewalls
  • iRules, Customization and SAML