F5 – Configuring BIG-IP Access Policy Manager Training (APM) v12x

F5 - Configuring BIG-IP Access Policy Manager Training (APM) v12x


F5 Configuring BIG-IP Access Policy Manager Training (APM) v12 Course Hands-on

Learn how to perform an initial configuration of the BIG-IP and access policies using GUI-based Visual Policy Editor (VPE) with F5 Configuring BIG-IP Access Policy Manager Training (APM) v12.

This F5 Configuring BIG-IP Access Policy Manager Training (APM) v12 course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. In this F5 Configuring BIG-IP Access Policy Manager Training (APM) v12 course, you will learn about BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The F5 Configuring BIG-IP Access Policy Manager Training (APM) v12 course includes lecture, hands-on labs, interactive demonstrations, and discussions.

F5 - Configuring BIG-IP Access Policy Manager Training (APM) v12xRelated Courses:

Duration:3 days

Skills Gained:

• APM Traffic Processing and APM Configuration Wizards
• APM Access Policies, Access Profiles
• Visual Policy Editor, Branches, and Endings
• APM Portal Access and Rewrite Profiles
• Single Sign-On and Credential Caching
• APM Network Access and BIG-IP Edge Client
• Layer 4 and Layer 7 Access Control Lists
• APM Application Access and Webtop Types
• Remote Desktop, Optimized Tunnels, and Webtop Links
• LTM Concepts including Virtual Servers, Pools, Monitors, and SNAT’ing
• APM + LTM Use Case for Web Applications
• Visual Policy Editor Macros
• AAA Servers and Authentication and Authorization with Active Directory and RADIUS
• Endpoint Security with Windows Process Checking, Protected Workspace, and Firewalls
• iRules, Customization, and SAML

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Course Content:

1. Setting Up the BIG-IP System

Introducing the BIG-IP System
Initially Setting Up the BIG-IP System
Archiving the BIG-IP Configuration
Leveraging F5 Support Resources and Tools

2. Web Application Access

Review of BIG-IP LTM
Introduction to the Access Policy
Web Access Application Configuration Overview
Web Application Access Configuration in Detail

3. Access Policy

Navigating the Access Policy

4. Managing BIG-IP APM

BIG-IP APM Sessions and Access Licenses
Session Variables and sessiondump
Session Cookies
Access Policy General Purpose Agents Lists

5. Authentication

Introduction to Access Policy Authentication
Active Directory AAA Server
One-Time Password Local User Database

6. Assignment Agents

List of Assignment Agents

7. Portal Access

Introduction to Portal Access
Portal Access Configuration Overview
Portal Access Configuration
Portal Access in Action

8. Network Access

Concurrent User Licensing
VPN Concepts
Network Access Configuration Overview
Network Access Configuration
Network Access in Action

9. Macros and Logon

Access Policy Macros
Configuring Macros
An Access Policy is a Flowchart
Access Policy Logon Agents
Configuring Logon Agents

10. Client-Side Checks

Client-Side Endpoint Security

11. Server-Side Checks

Server-Side Endpoint Security Agents List
Server-Side and Client-Side Checks Differences

12. Authorization

Active Directory Query
Active Directory Nested Groups
Configuration in Detail

13. Application Access

Application Access
Remote Desktop
Network Access Optimized Tunnels
Landing Page Bookmarks
Remote Desktop
Network Access Optimized Tunnels
Landing Page Bookmarks

14. Access Control Lists

Introduction to Access Control Lists
Configuration Overview
Dynamic ACLs
Portal Access ACLs

15. Single Sign-On

Remote Desktop Single Sign-On
Portal Access Single Sign-On

16. iRules and Advanced Access Policy Rules

iRules Introduction
Basic TCL Syntax
iRules and Advanced Access Policy Rules

17. Customization

Customization Overview
BIG-IP Edge Client
Advanced Edit Mode Customization
Landing Page Sections

18. SAML

SAML Conceptual Overview
SAML Configuration Overview

19. Webtop and Wizards


20. BIG-IP Edge Client and Components

BIG-IP Edge Client for Windows Installation
BIG-IP Edge Client in Action

21. Configuration Project

22. Additional Training and Certification

Getting Started Series Web-Based Training
F5 Instructor Led Training Curriculum
F5 Professional Certification Program


Whether you are looking for general information or have a specific question, we want to help

Request More Information

Time Frame: 0-3 Months4-12 Months

Print Friendly, PDF & Email

No Comments Yet.

Leave a comment