F5 Networks Configuring BIG-IP APM: Access Policy Manager Training in South Africa

  • Learn via: Classroom
  • Duration: 3 Days
  • Level: Intermediate
  • Price: From €2,983+VAT
We can host this training at your preferred location. Contact us!

This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons. In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers.

Building on that, in lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC.

Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization.

This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager.

The following course-specific knowledge and experience is suggested before attending this course:

  • Hands-on experience with BIG-IP
  • Basic web application delivery (BIG-IP LTM)
  • HTML, HTTP, HTTPS as well as some CSS and JavaScript
  • Telnet, SSH and TLS/SSL
  • VPN or tunnel encapsulation, Layer 4 NAT and Access Control Lists

  • Getting started with the BIG-IP system
  • APM Traffic Processing and APM Configuration Wizards
  • APM Access Policies, Access Profiles
  • Visual Policy Editor, Branches and Endings
  • APM Portal Access and Rewrite Profiles
  • Single Sign-On and Credential Caching
  • APM Network Access and BIG-IP Edge Client
  • Layer 4 and Layer 7 Access Control Lists
  • APM Application Access and Webtop Types
  • Remote Desktop, Optimized Tunnels and Webtop Links
  • LTM Concepts including Virtual Servers, Pools, Monitors and SNAT’ing
  • APM + LTM Use Case for Web Applications
  • Visual Policy Editor Macros
  • AAA Servers and Authentication and Authorization with Active Directory and RADIUS
  • Endpoint Security with Windows Process Checking, Protected Workspace and Firewalls
  • iRules, Customization and SAML

Chapter 1: Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

Chapter 2: Configuring Web Application Access

  • Review of BIG-IP LTM
  • Introduction to the Access Policy
  • Web Access Application Configuration Overview
  • Web Application Access Configuration in Detail

Chapter 3: Exploring the Access Policy

  • Navigating the Access Policy

Chapter 4: Managing BIG-IP APM

  • BIG-IP APM Sessions and Access Licenses
  • Session Variables and sessiondump
  • Session Cookies
  • Access Policy General Purpose Agents List

Chapter 5: Using Authentication

  • Introduction to Access Policy Authentication
  • Active Directory AAA Server
  • RADIUS
  • One-Time Password
  • Local User Database

Chapter 6: Understanding Assignment Agents

  • List of Assignment Agents

Chapter 7: Configuring Portal Access

  • Introduction to Portal Access
  • Portal Access Configuration Overview
  • Portal Access Configuration
  • Portal Access in Action

Chapter 8: Configuring Network Access

  • Concurrent User Licensing
  • VPN Concepts
  • Network Access Configuration Overview
  • Network Access Configuration
  • Network Access in Action

Chapter 9: Deploying Macros

  • Access Policy Macros
  • Configuring Macros
  • An Access Policy is a Flowchart
  • Access Policy Logon Agents
  • Configuring Logon Agents

Chapter 10: Exploring Client-Side Checks

  • Client-Side Endpoint Security

Chapter 11: Exploring Server-Side Checks

  • Server-Side Endpoint Security Agents List
  • Server-Side and Client-Side Checks Differences

Chapter 12: Using Authorization

  • Active Directory Query
  • Active Directory Nested Groups
  • Configuration in Detail

Chapter 13: Configuring AppTunnels

  • Application Access
  • Remote Desktop
  • Network Access Optimized Tunnels
  • Landing Page Bookmarks

Chapter 14: Deploying Access Control Lists

  • Introduction to Access Control Lists
  • Configuration Overview
  • Dynamic ACLs
  • Portal Access ACLs

Chapter 15: Signing On with SSO

  • Remote Desktop Single Sign-On
  • Portal Access Single Sign-On

Chapter 16: Using iRules

  • iRules Introduction
  • Basic TCL Syntax
  • iRules and Advanced Access Policy Rules

Chapter 17: Customizing BIG-IP APM

  • Customization Overview
  • BIG-IP Edge Client
  • Advanced Edit Mode Customization
  • Landing Page Sections

Chapter 18: Deploying SAML

  • SAML Conceptual Overview
  • SAML Configuration Overview

Chapter 19: Exploring Webtops and Wizards

  • Webtops
  • Wizards

Chapter 20: Using BIG-IP Edge Client

  • BIG-IP Edge Client for Windows Installation
  • BIG-IP Edge Client in Action

Chapter 21: Configuration Project

Chapter 22: Additional Training and Certification

  • Getting Started Series Web-Based Training
  • F5 Instructor Led Training Curriculum
  • F5 Professional Certification Program
  • F5 Instructor Led Training Curriculum
  • F5 Professional Certification Program


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our South Africa facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

16 January 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
21 January 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
09 February 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
16 January 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
21 January 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
23 February 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
26 February 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
€2,983 +VAT
Book Now
09 February 2025 (3 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
F5 Networks Configuring BIG-IP APM: Access Policy Manager Training Course in South Africa

Formerly known as Union of South Africa, now officially known as Republic of South Africa is the Southernmost country in Africa. South Africa's population is over 60 million people, which makes the country the world's 23rd-most populous nation. South Africa has three capital cities: executive Pretoria, judicial Bloemfontein and legislative Cape Town, while the largest city is Johannesburg. The official languages of South Africa are Afrikaans, English, Ndebele, Pedi, Sotho, Swati, Tsonga, Tswana, Venda, Xhosa and Zulu.

South Africa can be rainy from November to February, so the best time to visit South Africa is from May to September. Despite the rainy season South Africa is a year-round destination, with varying regional climates. Blyde River Canyon, Durban, Drakensberg, Kruger National Park and of course, Cape Town are the tourist attractions of the country.

Expand your IT knowledge with our comprehensive range of courses, including programming, software development, business skills, data science, cybersecurity, cloud computing and virtualization. Our skilled instructors will facilitate hands-on training and share practical insights, all conveniently conducted at your preferred location within South Africa.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.