Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
F5 Networks Configuring BIG-IP APM: Access Policy Manager
Description
F5 Networks Configuring BIG-IP APM Introduction:
Welcome to the F5 Networks Configuring BIG-IP APM course, an essential training program designed for network administrators, operators, engineers, and security professionals.
This course offers a deep dive into the BIG-IP Access Policy Manager (APM), focusing on equipping participants with the necessary skills for effective configuration and management in a variety of application delivery and remote access contexts. Beginning with the foundational aspects of setting up the BIG-IP System, learners will be guided through the crucial steps of installation and initial configuration, ensuring a solid base for advanced learning.
Throughout this course, students will engage in detailed study and hands-on practice, encompassing the creation and management of access policies, implementation of robust authentication methods, and configuration of both portal and network access.
The curriculum also covers advanced topics such as deploying macros, understanding client-side and server-side checks, and utilizing iRules for tailored traffic management. Emphasizing practical application, the course culminates in a Configuration Project, allowing participants to apply their skills in real-world scenarios, thereby preparing them for immediate professional application in configuring and managing BIG-IP APM systems effectively.
Course Objectives
- Master the setup and management of the BIG-IP System.
- Configure and secure web application access using BIG-IP APM.
- Develop proficiency in creating and managing access policies.
- Implement effective authentication methods and assignment agents.
- Gain expertise in configuring portal and network access.
- Understand and deploy client-side and server-side checks.
- Utilize iRules for customized traffic management and deploy SSO for streamlined authentication.
- Customize BIG-IP APM, including deploying SAML and exploring Webtops and Wizards.
Prerequisites
This course assumes that participants have a foundational knowledge of networking concepts, protocols, and security principles. To fully benefit from this training, it is recommended that attendees possess the following prerequisites:
- Familiarity with the OSI model.
- Understanding of TCP/IP addressing and routing.
- Knowledge of WAN and LAN environments.
- Basic awareness of server redundancy concepts.
Audience
The F5 Networks Configuring BIG-IP APM course is ideally suited for a diverse range of professionals who play a role in network administration, security, and access management. The target audience includes:
- Network Administrators and Operators responsible for daily network operations and security.
- Network Engineers seeking to enhance their expertise in configuring and managing BIG-IP APM.
- Security Professionals looking to bolster their knowledge of access policy management.
- System Architects interested in implementing and optimizing remote access solutions.
- IT and Network Managers responsible for overseeing access policies and security measures.
- Any professionals looking to deepen their understanding of BIG-IP APM for application delivery and remote access scenarios.
F5 Networks Configuring BIG-IP APM Outline
Setting Up the BIG-IP System
- Introducing the BIG-IP System
- Initially Setting Up the BIG-IP System
- Archiving the BIG-IP Configuration
- Leveraging F5 Support Resources and Tools
Configuring Web Application Access
- Review of BIG-IP LTM
- Introduction to the Access Policy
- Web Access Application Configuration Overview
- Web Application Access Configuration in Detail
Exploring the Access Policy
- Navigating the Access Policy
Managing BIG-IP APM
- BIG-IP APM Sessions and Access Licenses
- Session Variables and sessiondump
- Session Cookies
- Access Policy General Purpose Agents List
Using Authentication
- Introduction to Access Policy Authentication
- Active Directory AAA Server
- RADIUS
- One-Time Password
- Local User Database
Understanding Assignment Agents
- List of Assignment Agents
Configuring Portal Access
- Introduction to Portal Access
- Portal Access Configuration Overview
- Portal Access Configuration
- Portal Access in Action
Configuring Network Access
- Concurrent User Licensing
- VPN Concepts
- Network Access Configuration Overview
- Network Access Configuration
- Network Access in Action
Deploying Macros
- Access Policy Macros
- Configuring Macros
- An Access Policy is a Flowchart
- Access Policy Logon Agents
- Configuring Logon Agents
Exploring Client-Side Checks
- Client-Side Endpoint Security
Exploring Server-Side Checks
- Server-Side Endpoint Security Agents List
- Server-Side and Client-Side Checks Differences
Using Authorization
- Active Directory Query
- Active Directory Nested Groups
- Configuration in Detail
Configuring App Tunnels
- Application Access
- Remote Desktop
- Network Access Optimized Tunnels
- Landing Page Bookmarks
Deploying Access Control Lists
- Introduction to Access Control Lists
- Configuration Overview
- Dynamic ACLs
- Portal Access ACLs
Signing On with SSO
- Remote Desktop Single Sign-On
- Portal Access Single Sign-On
Using iRules
- iRules Introduction
- Basic TCL Syntax
- iRules and Advanced Access Policy Rules
Customizing BIG-IP APM
- Customization Overview
- BIG-IP Edge Client
- Advanced Edit Mode Customization
- Landing Page Sections
Deploying SAML
- SAML Conceptual Overview
- SAML Configuration Overview
Exploring Webtops and Wizards
- Webtops
- Wizards
Using BIG-IP Edge Client
- BIG-IP Edge Client for Windows Installation
- BIG-IP Edge Client in Action
Configuration Project
$3465.00
|
3 Days Course |