Course Catalog
F5 Networks Configuring BIG-IP APM: Access Policy Manager
Code: F5 Networks Confi
Duration: 3 Day
$3465 USD

OVERVIEW

This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.

DELIVERY FORMAT

This course is available in the following formats:

Virtual Classroom

Duration: 3 Day
Classroom

Duration: 3 Day

CLASS SCHEDULE

Delivery Format: Virtual Classroom
Date: Apr 29 2024 - May 01 2024 | 09:00 - 17:00 EST
Location: Online
Course Length: 3 Day

$ 3465

Delivery Format: Virtual Classroom
Date: Jun 17 2024 - Jun 19 2024 | 09:00 - 17:00 EST
Location: Online
Course Length: 3 Day

$ 3465

GOALS

Administering BIG-IP; basic familiarity with authentication mechanisms (e.g. LDAP, Active Directory) and webserver technologies (e.g. HTTP, HTML).

OUTLINE

Module 1: Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

Module 2: Configuring Web Application Access

  • Review of BIG-IP LTM
  • Introduction to the Access Policy
  • Web Access Application Configuration Overview
  • Web Application Access Configuration in Detail

Module 3: Exploring the Access Policy

  • Navigating the Access Policy

Module 4: Managing BIG-IP APM

  • BIG-IP APM Sessions and Access Licenses
  • Session Variables and session dump
  • Session Cookies
  • Access Policy General Purpose Agents List

Module 5: Using Authentication

  • Introduction to Access Policy Authentication
  • Active Directory AAA Server
  • RADIUS
  • One-Time Password
  • Local User Database

Module 6: Understanding Assignment Agents

  • List of Assignment Agents

Module 7: Configuring Portal Access

  • Introduction to Portal Access
  • Portal Access Configuration Overview
  • Portal Access Configuration
  • Portal Access in Action

Module 8: Configuring Network Access

  • Concurrent User Licensing
  • VPN Concepts
  • Network Access Configuration Overview
  • Network Access Configuration
  • Network Access in Action

Module 9: Deploying Macros

  • Access Policy Macros
  • Configuring Macros
  • An Access Policy is a Flowchart
  • Access Policy Logon Agents
  • Configuring Logon Agents

Module 10: Exploring Client-Side Checks

  • Client-Side Endpoint Security

Module 11: Exploring Server-Side Checks

  • Server-Side Endpoint Security Agents List
  • Server-Side and Client-Side Checks Differences

Module 12: Using Authorization

  • Active Directory Query
  • Active Directory Nested Groups
  • Configuration in Detail

Module 13: Configuring App Tunnels

• Application Access
• Remote Desktop
• Network Access Optimized Tunnels
• Landing Page Bookmarks

Module 14: Deploying Access Control Lists

  • Introduction to Access Control Lists
  • Configuration Overview
  • Dynamic ACLs
  • Portal Access ACLs

Module 15: Signing On with SSO

  • Remote Desktop Single Sign-On
  • Portal Access Single Sign-On

Module 16: Using iRules

  • iRules Introduction
  • Basic TCL Syntax
  • iRules and Advanced Access Policy Rules

Module 17: Customizing BIG-IP APM

  • Customization Overview
  • BIG-IP Edge Client
  • Advanced Edit Mode Customization
  • Landing Page Sections

Module 18: Deploying SAML

  • SAML Conceptual Overview
  • SAML Configuration Overview

Module 19: Exploring Webtops and Wizards

  • Webtops
  • Wizards

Module 20: Using BIG-IP Edge Client

  • BIG-IP Edge Client for Windows Installation
  • BIG-IP Edge Client in Action

Module 21: Configuration Project

Module 1: Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

Module 2: Configuring Web Application Access

  • Review of BIG-IP LTM
  • Introduction to the Access Policy
  • Web Access Application Configuration Overview
  • Web Application Access Configuration in Detail

Module 3: Exploring the Access Policy

  • Navigating the Access Policy

Module 4: Managing BIG-IP APM

  • BIG-IP APM Sessions and Access Licenses
  • Session Variables and session dump
  • Session Cookies
  • Access Policy General Purpose Agents List

Module 5: Using Authentication

  • Introduction to Access Policy Authentication
  • Active Directory AAA Server
  • RADIUS
  • One-Time Password
  • Local User Database

Module 6: Understanding Assignment Agents

  • List of Assignment Agents

Module 7: Configuring Portal Access

  • Introduction to Portal Access
  • Portal Access Configuration Overview
  • Portal Access Configuration
  • Portal Access in Action

Module 8: Configuring Network Access

  • Concurrent User Licensing
  • VPN Concepts
  • Network Access Configuration Overview
  • Network Access Configuration
  • Network Access in Action

Module 9: Deploying Macros

  • Access Policy Macros
  • Configuring Macros
  • An Access Policy is a Flowchart
  • Access Policy Logon Agents
  • Configuring Logon Agents

Module 10: Exploring Client-Side Checks

  • Client-Side Endpoint Security

Module 11: Exploring Server-Side Checks

  • Server-Side Endpoint Security Agents List
  • Server-Side and Client-Side Checks Differences

Module 12: Using Authorization

  • Active Directory Query
  • Active Directory Nested Groups
  • Configuration in Detail

Module 13: Configuring App Tunnels

• Application Access
• Remote Desktop
• Network Access Optimized Tunnels
• Landing Page Bookmarks

Module 14: Deploying Access Control Lists

  • Introduction to Access Control Lists
  • Configuration Overview
  • Dynamic ACLs
  • Portal Access ACLs

Module 15: Signing On with SSO

  • Remote Desktop Single Sign-On
  • Portal Access Single Sign-On

Module 16: Using iRules

  • iRules Introduction
  • Basic TCL Syntax
  • iRules and Advanced Access Policy Rules

Module 17: Customizing BIG-IP APM

  • Customization Overview
  • BIG-IP Edge Client
  • Advanced Edit Mode Customization
  • Landing Page Sections

Module 18: Deploying SAML

  • SAML Conceptual Overview
  • SAML Configuration Overview

Module 19: Exploring Webtops and Wizards

  • Webtops
  • Wizards

Module 20: Using BIG-IP Edge Client

  • BIG-IP Edge Client for Windows Installation
  • BIG-IP Edge Client in Action

Module 21: Configuration Project

LABS

Will Be Updated Soon!
Will Be Updated Soon!
WHO SHOULD ATTEND

This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager.

PREREQUISITES

Administering BIG-IP; basic familiarity with authentication mechanisms (e.g. LDAP, Active Directory) and webserver technologies (e.g. HTTP, HTML).