Configuring BIG-IP APM: Access Policy Manager v12
COURSE OBJECTIVE:
This course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.
DURATION:
3 Days
PREREQUISITES:
Sound Knowledge of the following Technologies
Hands-on experience with BIG-IP LTM
HTML, HTTP, HTTPS as well as some CSS and JavaScript
Telnet, SSH and TLS/SSL
VPN or tunnel encapsulation, Layer 4 NAT and Access Control Lists
COURSE SYLLABUS:
Chapter 1: Setting Up the BIG-IP System
Introducing the BIG-IP System
Initially Setting Up the BIG-IP System
Archiving the BIG-IP Configuration
Leveraging F5 Support Resources and Tools
Chapter 2: Web Application Access
Review of BIG-IP LTM
Introduction to the Access Policy
Web Access Application Configuration Overview
Web Application Access Configuration in Detail
Chapter 3: Access Policy
Navigating the Access Policy
Chapter 4: Managing BIG-IP APM
BIG-IP APM Sessions and Access Licenses
Session Variables and sessiondump
Session Cookies
Access Policy General Purpose Agents Lists
Chapter 5: Authentication
Introduction to Access Policy Authentication
Active Directory AAA Server
RADIUS
One-Time Password Local User Database
Chapter 6: Assignment Agents
List of Assignment Agents
Chapter 7: Portal Access
Introduction to Portal Access
Portal Access Configuration Overview
Portal Access Configuration
Portal Access in Action
Chapter 8: Network Access
Concurrent User Licensing
VPN Concepts
Network Access Configuration Overview
Network Access Configuration
Network Access in Action
Chapter 9: Macros and Logon
Access Policy Macros
Configuring Macros
An Access Policy is a Flowchart
Access Policy Logon Agents
Configuring Logon Agents
Chapter 10: Client-Side Checks
Client-Side Endpoint Security
Chapter 11: Server-Side Checks
Server-Side Endpoint Security Agents List
Server-Side and Client-Side Checks Differences
Chapter 12: Authorization
Active Directory Query
Active Directory Nested Groups
Configuration in Detail
Chapter 13: Application Access
Application Access
Remote Desktop
Network Access Optimized Tunnels
Landing Page Bookmarks
Remote Desktop
Network Access Optimized Tunnels
Landing Page Bookmarks
Chapter 14: Access Control Lists
Introduction to Access Control Lists
Configuration Overview
Dynamic ACLs
Portal Access ACLs
Chapter 15: Single Sign-On
Remote Desktop Single Sign-On
Portal Access Single Sign-On
Chapter 16: iRules and Advanced Access Policy Rules
iRules Introduction
Basic TCL Syntax
iRules and Advanced Access Policy Rules
Chapter 17: Customization
Customization Overview
BIG-IP Edge Client
Advanced Edit Mode Customization
Landing Page Sections
Chapter 18: SAML
SAML Conceptual Overview
SAML Configuration Overview
Chapter 19: Webtop and Wizards
Webtops
Wizards
Chapter 20: BIG-IP Edge Client and Components
BIG-IP Edge Client for Windows Installation
BIG-IP Edge Client in Action
Chapter 21: Configuration Project