F5 Networks Configuring BIG-IP APM: Access Policy Manager Training in United Kingdom

  • Learn via: Classroom
  • Duration: 3 Days
  • Level: Intermediate
  • Price: From €2,983+VAT
We can host this training at your preferred location. Contact us!

This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons. In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers.

Building on that, in lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC.

Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization.

This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager.

The following course-specific knowledge and experience is suggested before attending this course:

  • Hands-on experience with BIG-IP
  • Basic web application delivery (BIG-IP LTM)
  • HTML, HTTP, HTTPS as well as some CSS and JavaScript
  • Telnet, SSH and TLS/SSL
  • VPN or tunnel encapsulation, Layer 4 NAT and Access Control Lists

  • Getting started with the BIG-IP system
  • APM Traffic Processing and APM Configuration Wizards
  • APM Access Policies, Access Profiles
  • Visual Policy Editor, Branches and Endings
  • APM Portal Access and Rewrite Profiles
  • Single Sign-On and Credential Caching
  • APM Network Access and BIG-IP Edge Client
  • Layer 4 and Layer 7 Access Control Lists
  • APM Application Access and Webtop Types
  • Remote Desktop, Optimized Tunnels and Webtop Links
  • LTM Concepts including Virtual Servers, Pools, Monitors and SNAT’ing
  • APM + LTM Use Case for Web Applications
  • Visual Policy Editor Macros
  • AAA Servers and Authentication and Authorization with Active Directory and RADIUS
  • Endpoint Security with Windows Process Checking, Protected Workspace and Firewalls
  • iRules, Customization and SAML

Chapter 1: Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

Chapter 2: Configuring Web Application Access

  • Review of BIG-IP LTM
  • Introduction to the Access Policy
  • Web Access Application Configuration Overview
  • Web Application Access Configuration in Detail

Chapter 3: Exploring the Access Policy

  • Navigating the Access Policy

Chapter 4: Managing BIG-IP APM

  • BIG-IP APM Sessions and Access Licenses
  • Session Variables and sessiondump
  • Session Cookies
  • Access Policy General Purpose Agents List

Chapter 5: Using Authentication

  • Introduction to Access Policy Authentication
  • Active Directory AAA Server
  • RADIUS
  • One-Time Password
  • Local User Database

Chapter 6: Understanding Assignment Agents

  • List of Assignment Agents

Chapter 7: Configuring Portal Access

  • Introduction to Portal Access
  • Portal Access Configuration Overview
  • Portal Access Configuration
  • Portal Access in Action

Chapter 8: Configuring Network Access

  • Concurrent User Licensing
  • VPN Concepts
  • Network Access Configuration Overview
  • Network Access Configuration
  • Network Access in Action

Chapter 9: Deploying Macros

  • Access Policy Macros
  • Configuring Macros
  • An Access Policy is a Flowchart
  • Access Policy Logon Agents
  • Configuring Logon Agents

Chapter 10: Exploring Client-Side Checks

  • Client-Side Endpoint Security

Chapter 11: Exploring Server-Side Checks

  • Server-Side Endpoint Security Agents List
  • Server-Side and Client-Side Checks Differences

Chapter 12: Using Authorization

  • Active Directory Query
  • Active Directory Nested Groups
  • Configuration in Detail

Chapter 13: Configuring AppTunnels

  • Application Access
  • Remote Desktop
  • Network Access Optimized Tunnels
  • Landing Page Bookmarks

Chapter 14: Deploying Access Control Lists

  • Introduction to Access Control Lists
  • Configuration Overview
  • Dynamic ACLs
  • Portal Access ACLs

Chapter 15: Signing On with SSO

  • Remote Desktop Single Sign-On
  • Portal Access Single Sign-On

Chapter 16: Using iRules

  • iRules Introduction
  • Basic TCL Syntax
  • iRules and Advanced Access Policy Rules

Chapter 17: Customizing BIG-IP APM

  • Customization Overview
  • BIG-IP Edge Client
  • Advanced Edit Mode Customization
  • Landing Page Sections

Chapter 18: Deploying SAML

  • SAML Conceptual Overview
  • SAML Configuration Overview

Chapter 19: Exploring Webtops and Wizards

  • Webtops
  • Wizards

Chapter 20: Using BIG-IP Edge Client

  • BIG-IP Edge Client for Windows Installation
  • BIG-IP Edge Client in Action

Chapter 21: Configuration Project

Chapter 22: Additional Training and Certification

  • Getting Started Series Web-Based Training
  • F5 Instructor Led Training Curriculum
  • F5 Professional Certification Program
  • F5 Instructor Led Training Curriculum
  • F5 Professional Certification Program


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our United Kingdom facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

16 January 2025 (3 Days)
London, Manchester, Birmingham
Classroom / Virtual Classroom
21 January 2025 (3 Days)
London, Manchester, Birmingham
Classroom / Virtual Classroom
09 February 2025 (3 Days)
London, Manchester, Birmingham
Classroom / Virtual Classroom
16 January 2025 (3 Days)
London, Manchester, Birmingham
Classroom / Virtual Classroom
21 January 2025 (3 Days)
London, Manchester, Birmingham
Classroom / Virtual Classroom
23 February 2025 (3 Days)
London, Manchester, Birmingham
Classroom / Virtual Classroom
26 February 2025 (3 Days)
London, Manchester, Birmingham
Classroom / Virtual Classroom
€2,983 +VAT
Book Now
09 February 2025 (3 Days)
London, Manchester, Birmingham
Classroom / Virtual Classroom
F5 Networks Configuring BIG-IP APM: Access Policy Manager Training Course in the United Kingdom

The United Kingdom (Britain) is situated in north-western Europe. The UK is made up of England, Scotland, Wales and Northern Ireland. The United Kingdom is a constitutional monarchy with a unitary parliamentary democracy, as Queen Elizabeth II has been the monarch since 1952. The country's capital and largest metropolis is London.

The United Kingdom has always been one of the most popular tourist destinations in Europe. People from all around the world come to see the diverse scenery and rich cultural background of Britain. Some of the most popular places to visit in the UK are London (with Tower Bridge, River Thames, Big Ben, Parliament Buildings, Westminster Abbey…), Scotland's Capital Edinburgh, Roman-Era Bath, Stonehenge (one of the best-known prehistoric monument in Europe), Windsor Castle and Loch Ness.

Empower yourself with our extensive selection of IT courses, covering programming, data analytics, software development, business skills, cloud computing, cybersecurity, project management. Experience personalized training and expert guidance from our instructors, who will come to your chosen training venue anywhere in United Kingdom.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.