Skip to Scheduled Dates
Course Overview
This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.
Who Should Attend
This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager.
Course Outline
1 - Setting Up the BIG-IP System
- Introducing the BIG-IP System
- Initially Setting Up the BIG-IP System
- Archiving the BIG-IP Configuration
- Leveraging F5 Support Resources and Tools
2 - Configuring Web Application Access
- Review of BIG-IP LTM
- Introduction to the Access Policy
- Web Access Application Configuration Overview
- Web Application Access Configuration in Detail
3 - Exploring the Access Policy
- Navigating the Access Policy
4 - Managing BIG-IP APM
- BIG-IP APM Sessions and Access Licenses
- Session Variables and sessiondump
- Session Cookies
- Access Policy General Purpose Agents List
5 - Using Authentication
- Introduction to Access Policy Authentication
- Active Directory AAA Server
- RADIUS
- One-Time Password
- Local User Database
6 - Understanding Assignment Agents
- List of Assignment Agents
7 - Configuring Portal Access
- Introduction to Portal Access
- Portal Access Configuration Overview
- Portal Access Configuration
- Portal Access in Action
8 - Configuring Network Access
- Concurrent User Licensing
- VPN Concepts
- Network Access Configuration Overview
- Network Access Configuration
- Network Access in Action
9 - Deploying Macros
- Access Policy Macros
- Configuring Macros
- An Access Policy is a Flowchart
- Access Policy Logon Agents
- Configuring Logon Agents
10 - Exploring Client-Side Checks
- Client-Side Endpoint Security
11 - Exploring Server-Side Checks
- Server-Side Endpoint Security Agents List
- Server-Side and Client-Side Checks Differences
12 - Using Authorization
- Active Directory Query
- Active Directory Nested Groups
- Configuration in Detail
13 - Configuring App Tunnels
- Application Access
- Remote Desktop
- Network Access Optimized Tunnels
- Landing Page Bookmarks
14 - Deploying Access Control Lists
- Introduction to Access Control Lists
- Configuration Overview
- Dynamic ACLs
- Portal Access ACLs
15 - Signing On with SSO
- Remote Desktop Single Sign-On
- Portal Access Single Sign-On
16 - Using iRules
- iRules Introduction
- Basic TCL Syntax
- iRules and Advanced Access Policy Rules
17 - Customizing BIG-IP APM
- Customization Overview
- BIG-IP Edge Client
- Advanced Edit Mode Customization
- Landing Page Sections
18 - Deploying SAML
- SAML Conceptual Overview
- SAML Configuration Overview
19 - Exploring Webtops and Wizards
20 - Using BIG-IP Edge Client
- BIG-IP Edge Client for Windows Installation
- BIG-IP Edge Client in Action
21 - Configuration Project