Need help? Call Customer Support | 800-301-3894

Configuring BIG-IP APM: Access Policy Manager v13

  • Days: 3 Days
  • Price: $2995

Course Details

This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons.  In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers.  Building on that, in lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC.  Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization.

Course Prerequisites

Students must complete one of the following F5 prerequisites before attending this course:

  • Administering BIG-IP instructor-led course
    or
  • F5 Certified BIG-IP Administrator

The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:

  • OSI model encapsulation
  • Routing and switching
  • Ethernet and ARP
  • TCP/IP concepts
  • IP addressing and subnetting
  • NAT and private IP addressing
  • Default gateway
  • Network firewalls
  • LAN vs. WAN

The following course-specific knowledge and experience is suggested before attending this course:

  • Hands-on experience with BIG-IP
  • Basic web application delivery (BIG-IP LTM)
  • HTML, HTTP, HTTPS as well as some CSS and JavaScript
  • Telnet, SSH and TLS/SSL
  • VPN or tunnel encapsulation, Layer 4 NAT and Access Control Lists

Course Agenda

Topics covered in this course include:

   v13 Course Topics

  • Getting started with the BIG-IP system
  • APM Traffic Processing and APM Configuration Wizards
  • APM Access Policies, Access Profiles
  • Visual Policy Editor, Branches and Endings
  • APM Portal Access and Rewrite Profiles
  • Single Sign-On and Credential Caching
  • APM Network Access and BIG-IP Edge Client
  • Layer 4 and Layer 7 Access Control Lists
  • APM Application Access and Webtop Types
  • Remote Desktop, Optimized Tunnels and Webtop Links
  • LTM Concepts including Virtual Servers, Pools, Monitors and SNAT’ing
  • APM + LTM Use Case for Web Applications
  • Visual Policy Editor Macros
  • AAA Servers and Authentication and Authorization with Active Directory and RADIUS
  • Endpoint Security with Windows Process Checking, Protected Workspace and Firewalls
  • iRules, Customization and SAML
Details Options
  • Date: 03/26/18 - 03/28/18
  • Location: Chicago, IL (map)
  • Date: 03/26/18 - 03/28/18
  • Location: Instructor Led Online Course
  • Date: 04/09/18 - 04/11/18
  • Location: Cincinnati, OH (map)
  • Date: 04/09/18 - 04/18/18
  • Location: Instructor Led Online Course
  • Date: 05/07/18 - 05/09/18
  • Location: Chicago, IL (map)
  • Date: 05/07/18 - 05/09/18
  • Location: Instructor Led Online Course
  • Date: 06/18/18 - 06/20/18
  • Location: Chicago, IL (map)
  • Date: 06/18/18 - 06/20/18
  • Location: Instructor Led Online Course