Configuring BIG-IP Access Policy Manager (APM) v12

This course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.

Duration: 3 Days

Audience

This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager.

Prerequisites

Students must complete one of the following F5 prerequisites before attending this course: Administering BIG-IP instructor-led course F5 Certified BIG-IP Administrator The following web-based courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience: Getting Started with BIG-IP web-based training Getting Started with BIG-IP Local Traffic Manager (LTM) web-based training Getting Started with BIG-IP Access Policy Manager (APM) web-based training The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course: OSI model encapsulation Routing and switching Ethernet and ARP TCP/IP concepts IP addressing and subnetting NAT and private IP addressing Default gateway Network firewalls LAN vs. WAN The following course-specific knowledge and experience is suggested before attending this course: Hands-on experience with BIG-IP Basic web application delivery (BIG-IP LTM) HTML, HTTP, HTTPS as well as some CSS and JavaScript Telnet, SSH and TLS/SSL VPN or tunnel encapsulation, Layer 4 NAT and Access Control Lists

Topics Covered

  • APM Traffic Processing and APM Configuration Wizards
  • APM Access Policies, Access Profiles
  • Visual Policy Editor, Branches and Endings
  • APM Portal Access and Rewrite Profiles
  • Single Sign-On and Cedential Caching
  • APM Netrowk Access and BIG-IP Edge Client
  • Layer 4 and Layer 7 Access Control Lists
  • APM Application Access and Webtop Types
  • Remote Desktop, Optimized Tunnels and Webtop Links
  • LTM Concepts including Virtual Servers, Pools, Monitors and SNAT’ing
  • APM + LTM Use Case for Web Applications
  • Visual Policy Editor Macros
  • AAA Servers and Authentication and Authorisation with Active Directory and RADIUS
  • Endpoint Security with Windows Process Checking, Protected Workspace and Firewalls
  • iRules, Customisation and SAML