F5 APM Training

Configuring BIG-IP APM: Access Policy Manager v12

APMCOURSE OBJECTIVE:

This course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.

DURATION:

3 Days

PREREQUISITES:

Sound Knowledge of the following Technologies

Hands-on experience with BIG-IP LTM

HTML, HTTP, HTTPS as well as some CSS and JavaScript

Telnet, SSH and TLS/SSL

VPN or tunnel encapsulation, Layer 4 NAT and Access Control Lists

COURSE SYLLABUS:

Chapter 1: Setting Up the BIG-IP System

Introducing the BIG-IP System

Initially Setting Up the BIG-IP System

Archiving the BIG-IP Configuration

Leveraging F5 Support Resources and Tools

Chapter 2: Web Application Access

Review of BIG-IP LTM

Introduction to the Access Policy

Web Access Application Configuration Overview

Web Application Access Configuration in Detail

Chapter 3: Access Policy

Navigating the Access Policy

Chapter 4: Managing BIG-IP APM

BIG-IP APM Sessions and Access Licenses

Session Variables and sessiondump

Session Cookies

Access Policy General Purpose Agents Lists

Chapter 5: Authentication

Introduction to Access Policy Authentication

Active Directory AAA Server

RADIUS

One-Time Password Local User Database

Chapter 6: Assignment Agents

List of Assignment Agents

Chapter 7: Portal Access

Introduction to Portal Access

Portal Access Configuration Overview

Portal Access Configuration

Portal Access in Action

Chapter 8: Network Access

Concurrent User Licensing

VPN Concepts

Network Access Configuration Overview

Network Access Configuration

Network Access in Action

Chapter 9: Macros and Logon

Access Policy Macros

Configuring Macros

An Access Policy is a Flowchart

Access Policy Logon Agents

Configuring Logon Agents

Chapter 10: Client-Side Checks

Client-Side Endpoint Security

Chapter 11: Server-Side Checks

Server-Side Endpoint Security Agents List

Server-Side and Client-Side Checks Differences

Chapter 12: Authorization

Active Directory Query

Active Directory Nested Groups

Configuration in Detail

Chapter 13: Application Access

Application Access

Remote Desktop

Network Access Optimized Tunnels

Landing Page Bookmarks

Remote Desktop

Network Access Optimized Tunnels

Landing Page Bookmarks

Chapter 14: Access Control Lists

Introduction to Access Control Lists

Configuration Overview

Dynamic ACLs

Portal Access ACLs

Chapter 15: Single Sign-On

Remote Desktop Single Sign-On

Portal Access Single Sign-On

Chapter 16: iRules and Advanced Access Policy Rules

iRules Introduction

Basic TCL Syntax

iRules and Advanced Access Policy Rules

Chapter 17: Customization

Customization Overview

BIG-IP Edge Client

Advanced Edit Mode Customization

Landing Page Sections

Chapter 18: SAML

SAML Conceptual Overview

SAML Configuration Overview

Chapter 19: Webtop and Wizards

Webtops

Wizards

Chapter 20: BIG-IP Edge Client and Components

BIG-IP Edge Client for Windows Installation

BIG-IP Edge Client in Action

Chapter 21: Configuration Project

 

Download Soft Copy Request Course Details