See how Insoft Services is responding to COVID-19

F5 BIG-IP Edge Gateway – Access Policy Manager (APM)


Ota yhteyttä

Voit olla meihin yhteydessä ja tiedustella koulutuksistamme täydentämällä yhteystietosi ja koulutuksen nimen oheen.

Tilaa uutiskirje

Haluan tarjouksia ja tietoa koulutuksista sähköpostiini.

Tietosuojalauseke ja yksityisyys

Annan Insoft Services Ltd:lle oikeuden olla minuun yhteydessä. Annan Insoft Servicelle oikeuden käsitellä, kerätä ja tallentaa tietojani. Kaikki annetut tiedot käsitellään tietoturvallisesti tietosuojalausekkeen mukaisesti.

Tulevat päivämäärät

Oct 19 - Oct 21, 2021
09:00 - 17:00 (EET)

  • F5 BIG-IP Edge Gateway – Access Policy Manager (APM)
    3 days  (Instructor Led Online)  |  Network Management/Design

    Course Details


    This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system. The course includes lectures, labs, and discussions.


    • Traffic Processing
    • Policies and Profiles
    • Portal Access
    • Network Access
    • Access Control Lists
    • Application Access & Webtops
    • Web Application Access for LTM
    • Macros and Authentication
    • Client side checks & Actions
    • Advanced Topics
    • Authentication Domains
    • Maintaining BIG-IP APM
    • Customization

    By the end of this course, the student should be able to perform an initial configuration using the Setup Utility and build many common configurations using the Graphical User Interface (browser-based). In addition, the student should be able to monitor and manage common tasks concerning traffic processed through the BIG-IP APM system.


    Chapter 1: Setting Up the BIG-IP System

    • Introducing the BIG-IP System
    • Initially Deploying the BIG-IP System
    • Creating a Backup of the BIG-IP System
    • F5 Support Resources and Tools
    • Chapter Resources
    • BIG-IP System Setup Labs

    Chapter 2: APM Traffic Processing

    • Virtual Servers and Access Profiles
    • APM Configuration Wizards
    • Logging
    • Sessions

    Chapter 3: APM Access Policies and Profiles

    • Access Policies Overview
    • Access Policy Branches
    • Access Policy Endings
    • Configuring Access Policies and Profiles
    • Using Webtops
    • Exporting and importing access profiles

    Chapter 4: APM Portal Access

    • Portal Access Overview
    • Configuring Portal Access
    • Rewrite Profiles
    • SSO and Credential Caching

    Chapter 5: APM Network Access

    • Network Access Overview
    • Configuring Network Access
    • BIG-IP Edge Client

    Chapter 6: APM Access Control Lists

    • Access Control of Resources Overview
    • Access Control Lists

    Chapter 7: APM Application Access Webtops

    • Application Access Webtops Overview
    • Application Access
    • Configuring Remote Desktop Access
    • Configuring Webtops

    Chapter 8: BIG-IP LTM Concepts

    • LTM Pools and Virtual Servers
    • Monitor Concepts and Configuration
    • Secure Network Address Translation (SNAT)

    Chapter 9: Web Application Access for LTM

    • Web Applications Access for LTM
    • Configuring APM and LTM together
    • Profiles
    • Profile Types and Dependencies
    • Configuring and Using Profiles
    • SSL Termination/Initiation
    • SSL Profile Configuration

    Chapter 10: APM Macros and Authentication Servers

    • Access Policy Macros
    • Configuring Access Policy Macros
    • Authentication with Access Policy Manager
    • Radius Server Authentication
    • LDAP Server Authentication
    • Active Directory Server Authentication

    Chapter 11: Client-Side Endpoint Security

    • Overview of Client-Side Endpoint Security
    • Client-Side Endpoint Security Part 1
    • Client-Side Endpoint Security Part 2

    Chapter 12: APM Advanced Topics

    • Server Side Checks
    • General Purpose Actions
    • Dynamic ACLs
    • One-Time Passwords

    Chapter 13: Session Variables and iRules

    • Session Variables
    • Introducing Tcl
    • Access iRules Events
    • Typical APM iRule Use Case
    • Configuring Access iRules

    Chapter 14: APM Authentication Domains

    • Authentication Domain Concepts

    Chapter 15: SAML and Customization

    • SAML Overview
    • Customization Overview
    • Big-IP EDGE Client
    • Advanced Edit Mode Customization

    Chapter 16: APM Configuration Project

    • Configuration Project Overview


    This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP APM System.


    Students should understand:

    • Common Network terminology
    • TCP/IP Addressing, Routing and Internetworking concepts
    • DNS Methodology

    Students should be familiar with:

    • Common Authentication mechanisms such as: Active Directory, LDAP, Radius
    • HTTP, HTML, and common webserver technologies and products (IIS, Apache, JavaScript for example)

    In addition, students should be proficient in:

    • Basic PC operation and application skills, including MS Windows
    • Basic Web browser operation (Internet Explorer is used in class)