F5 Networks Configuring BIG-IP APM: Access Policy Manager Training in Denmark

  • Learn via: Classroom
  • Duration: 3 Days
  • Level: Intermediate
  • Price: From €2,983+VAT
We can host this training at your preferred location. Contact us!

This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons. In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers.

Building on that, in lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC.

Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization.

This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager.

The following course-specific knowledge and experience is suggested before attending this course:

  • Hands-on experience with BIG-IP
  • Basic web application delivery (BIG-IP LTM)
  • HTML, HTTP, HTTPS as well as some CSS and JavaScript
  • Telnet, SSH and TLS/SSL
  • VPN or tunnel encapsulation, Layer 4 NAT and Access Control Lists

  • Getting started with the BIG-IP system
  • APM Traffic Processing and APM Configuration Wizards
  • APM Access Policies, Access Profiles
  • Visual Policy Editor, Branches and Endings
  • APM Portal Access and Rewrite Profiles
  • Single Sign-On and Credential Caching
  • APM Network Access and BIG-IP Edge Client
  • Layer 4 and Layer 7 Access Control Lists
  • APM Application Access and Webtop Types
  • Remote Desktop, Optimized Tunnels and Webtop Links
  • LTM Concepts including Virtual Servers, Pools, Monitors and SNAT’ing
  • APM + LTM Use Case for Web Applications
  • Visual Policy Editor Macros
  • AAA Servers and Authentication and Authorization with Active Directory and RADIUS
  • Endpoint Security with Windows Process Checking, Protected Workspace and Firewalls
  • iRules, Customization and SAML

Chapter 1: Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

Chapter 2: Configuring Web Application Access

  • Review of BIG-IP LTM
  • Introduction to the Access Policy
  • Web Access Application Configuration Overview
  • Web Application Access Configuration in Detail

Chapter 3: Exploring the Access Policy

  • Navigating the Access Policy

Chapter 4: Managing BIG-IP APM

  • BIG-IP APM Sessions and Access Licenses
  • Session Variables and sessiondump
  • Session Cookies
  • Access Policy General Purpose Agents List

Chapter 5: Using Authentication

  • Introduction to Access Policy Authentication
  • Active Directory AAA Server
  • RADIUS
  • One-Time Password
  • Local User Database

Chapter 6: Understanding Assignment Agents

  • List of Assignment Agents

Chapter 7: Configuring Portal Access

  • Introduction to Portal Access
  • Portal Access Configuration Overview
  • Portal Access Configuration
  • Portal Access in Action

Chapter 8: Configuring Network Access

  • Concurrent User Licensing
  • VPN Concepts
  • Network Access Configuration Overview
  • Network Access Configuration
  • Network Access in Action

Chapter 9: Deploying Macros

  • Access Policy Macros
  • Configuring Macros
  • An Access Policy is a Flowchart
  • Access Policy Logon Agents
  • Configuring Logon Agents

Chapter 10: Exploring Client-Side Checks

  • Client-Side Endpoint Security

Chapter 11: Exploring Server-Side Checks

  • Server-Side Endpoint Security Agents List
  • Server-Side and Client-Side Checks Differences

Chapter 12: Using Authorization

  • Active Directory Query
  • Active Directory Nested Groups
  • Configuration in Detail

Chapter 13: Configuring AppTunnels

  • Application Access
  • Remote Desktop
  • Network Access Optimized Tunnels
  • Landing Page Bookmarks

Chapter 14: Deploying Access Control Lists

  • Introduction to Access Control Lists
  • Configuration Overview
  • Dynamic ACLs
  • Portal Access ACLs

Chapter 15: Signing On with SSO

  • Remote Desktop Single Sign-On
  • Portal Access Single Sign-On

Chapter 16: Using iRules

  • iRules Introduction
  • Basic TCL Syntax
  • iRules and Advanced Access Policy Rules

Chapter 17: Customizing BIG-IP APM

  • Customization Overview
  • BIG-IP Edge Client
  • Advanced Edit Mode Customization
  • Landing Page Sections

Chapter 18: Deploying SAML

  • SAML Conceptual Overview
  • SAML Configuration Overview

Chapter 19: Exploring Webtops and Wizards

  • Webtops
  • Wizards

Chapter 20: Using BIG-IP Edge Client

  • BIG-IP Edge Client for Windows Installation
  • BIG-IP Edge Client in Action

Chapter 21: Configuration Project

Chapter 22: Additional Training and Certification

  • Getting Started Series Web-Based Training
  • F5 Instructor Led Training Curriculum
  • F5 Professional Certification Program
  • F5 Instructor Led Training Curriculum
  • F5 Professional Certification Program


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Denmark facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
22 november 2024
Kopenhag, Aarhus, Odense
3 Days
Classroom / Virtual Classroom
23 november 2024
Kopenhag, Aarhus, Odense
3 Days
Classroom / Virtual Classroom
04 december 2024
Kopenhag, Aarhus, Odense
€2,983 +VAT Book Now
Classroom / Virtual Classroom
22 november 2024
Kopenhag, Aarhus, Odense
3 Days
Classroom / Virtual Classroom
23 november 2024
Kopenhag, Aarhus, Odense
3 Days
Classroom / Virtual Classroom
04 december 2024
Kopenhag, Aarhus, Odense
€2,983 +VAT Book Now
Classroom / Virtual Classroom
16 januar 2025
Kopenhag, Aarhus, Odense
3 Days
Classroom / Virtual Classroom
21 januar 2025
Kopenhag, Aarhus, Odense
3 Days
F5 Networks Configuring BIG-IP APM: Access Policy Manager Training Course in Denmark

Denmark is a constitutionally unitary state that is in Northern Europe. The population of the country is 5.91 million and 800,000 of them live in the capital and largest city, Copenhagen. And Danish is the official language. Denmark is a part of Scandinavia, like Norway and Sweden. The country experiences changeable weather, since it's located in the meeting point of diverse air masses. The coldest month of Denmark is February while July is the warmest month.

The most popular tourist attractions are Tivoli Gardens, Nyhavn, Kronborg Slot and Viking Ship Museum. Tivoli is considered as the inspiration behind the Disney theme parks, which also contains roller coasters, puppet theaters, restaurants and food pavilions. And the reason why Kronborg Slot attracts tourists is because the castle is the setting of Shakespeare's Hamlet, and also a UNESCO World Heritage Site.

With a focus on meeting the unique requirements of Denmark, Bilginç IT Academy integrates advanced training methodologies into our diverse range of Certification Exam preparation courses and accredited corporate training programs. Prepare to revolutionize your perception of IT training with us.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.