This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.
Prerequisites
Students must complete one of the following F5 prerequisites before attending this course:
- Administering BIG-IP instructor-led course or
- F5 Certified BIG-IP Administrator
Objectives
- Configure remote access methods Network Access, Portal Access and Application Access and understand the differences and use cases for each
- Configure APM and LTM to work together for advanced application delivery as well as understand the APM + LTM use case versus the remote access use case
- Configure advanced policies using the Visual Policy Editor with all of its features such as macros, branches and multiple endings
- Understand the role of iRules and how they work together with BIG-IP in general and APM in specific
- Understand the role of Federated Single Sign-On using SAML and deploy a basic configuration
- Configure multiple authentication methods and understand how they can work together in a single access policy
- Set up, license, and provision the BIG-IP system out-of-the-box
- Create, restore from, and manage BIG-IP archives
- Use profiles to manipulate the way the BIG-IP system processes traffic through a virtual server
Agenda
- Getting started with the BIG-IP system
- APM Traffic Processing and APM Configuration Wizards
- APM Access Policies, Access Profiles
- Visual Policy Editor, Branches and Endings
- APM Portal Access and Rewrite Profiles
- Single Sign-On and Credential Caching
- APM Network Access and BIG-IP Edge Client
- Layer 4 and Layer 7 Access Control Lists
- APM Application Access and Webtop Types
- Remote Desktop, Optimized Tunnels and Webtop Links
- LTM Concepts including Virtual Servers, Pools, Monitors and SNAT’ing
- APM + LTM Use Case for Web Applications
- Visual Policy Editor Macros
- AAA Servers and Authentication and Authorization with Active Directory and RADIUS
- Endpoint Security with Windows Process Checking, Protected Workspace and Firewalls
- iRules, Customization and SAML