Course Overview
This course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.
Who should attend
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP Access Policy Manager.
Prerequisites
Students must complete one of the following F5 prerequisites before attending this course:
- Administering BIG-IP instructor-led course
- F5 Certified BIG-IP Administrator
The following free web-based courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience:
- Getting Started with BIG-IP web-based training
- Getting Started with BIG-IP Local Traffic Manager (LTM) web-based training
- Getting Started with BIG-IP Access Policy Manager (APM) web-based training
The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:
- OSI model encapsulation
- Routing and switching
- Ethernet and ARP
- TCP/IP concepts
- IP addressing and subnetting
- NAT and private IP addressing
- Default gateway
- Network firewalls
- LAN vs. WAN
The following course-specific knowledge and experience is suggested before attending this course:
- Hands-on experience with BIG-IP
- Basic web application delivery (BIG-IP LTM)
- HTML, HTTP, HTTPS as well as some CSS and JavaScript
- Telnet, SSH and TLS/SSL
- VPN or tunnel encapsulation, Layer 4 NAT and Access Control Lists
Course Content
- Getting Started with the BIG-IP System
- APM Traffic Processing and APM Configuration Wizards
- APM Access Policies, Access Profiles
- Visual Policy Editor, Branches and Endings
- APM Portal Access and Rewrite Profiles
- Single Sign-On and Credential Caching
- APM Network Access and BIG-IP Edge Client
- Layer 4 and Layer 7 Access Control Lists
- APM Application Access and Webtop Types
- Remote Desktop, Optimized Tunnels and Webtop Links
- LTM Concepts including Virtual Servers, Pools, Monitors and SNAT’ing
- APM + LTM Use Case for Web Applications
- Visual Policy Editor Macros
- AAA Servers and Authentication and Authorization with Active Directory and RADIUS
- Endpoint Security with Windows Process Checking, Protected Workspace and Firewalls
- iRules, Customization and SAML