Skip links

Training

Configuring BIG-IP APM : Access Policy Manager (BIG-APM)

Duration

3 days

Educational means:
  • Knowledge Verification Pre-Training Quiz (if applicable)
  • Training by a trainer
  • Realizable face-to-face or distancial training
  • Provision of remote labs/lab platform for each participant (if applicable to training)
  • Distribution of official English course materials for each participant
    • It is necessary to have a knowledge of technical English written for the understanding of course materials
Assessment:
  • Knowledge Verification Pre-Training Quiz (if applicable)
  • Formative evaluations during the training, through the practical work done on the labs at the end of each module, QCM, situation...
  • Completion by each participant of a questionnaire and/or upstream positioning questionnaire and at the end of the training for validation of skills acquisition

Network administrators responsible for installing, setting, setting and administering the BIG-IP Access Policy Manager module.

Participants should be aware of the F5 BIG-IP product suite and, in particular, the setting and configuration procedures of a BIG-IP LTM system, including virtual servers, pools, profiles, VLAN networks and addresses « self-IP ». This training does not require prerequisites. However, people who are not familiar with the BIG-IP system are strongly advised to follow the training « Administering BIG-IP » in advance.

This training will enable network administrators, operators and engineers to gain a functional understanding of the BIG-IP Access Policy Manager module, as it is commonly deployed in DNA (Application Delivery Network) and remote access settings. It presents the BIG-IP Access Policy Manager (APM) module, its configuration objects, current deployment mode and how standard administrative and operational tasks are executed. This training consists of theoretical courses, practical work, interactive demonstrations and discussions.

The training covers the following topics:

  • BIG-IP system ownership
  • Traffic processing using APM and APM configuration assistants
  • APM Access Policies and Profiles
  • Visual editor of policies, branches and terminals
  • Access to the APM portal and associated rewriting profiles
  • Single Sign-On authentication and cached identification information
  • APM network access and BIG-IP Edge Client solution
  • Access checklists for layers 4 and 7
  • Access to applications and types of webtops available in APM
  • Remote desk, optimized tunnels and webtop links
  • LTM concepts such as virtual servers, pools, monitors and translation of SNAT addresses
  • Study of a case of combined use of APM and LTM for Web applications
  • Policy Visual Editor Macros
  • AAA servers, authentication and authorization with Active Directory and RADIUS
  • Security of terminals with firewalls, protected workspace and Windows process verification function
  • iRules, Customization and SAML
This website uses cookies to improve your web experience.
EnglishenEnglishEnglish
0
Explore
Drag