Szkolenia F5 Networks

Cel szkolenia szkolenie zdalne - dlearning

This course gives network administrators, network operators, and network engineers a functional understanding of commonly used Authentication methods in application delivery networks on BIG-IP Access Policy Manager. The course introduces students to BIG-IP Access Policy Manager with Kerberos and SAML authentication, its configuration objects, and how typical administrative and operational activities are performed. The course format is a workshop including lectures followed by hands-on labs and discussions. It should be added to the standard 3-day APM course.

This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager.

Plan szkolenia Rozwiń listę

  1. Setting Up the BIG-IP System
    • Initially Setting Up the BIG-IP System
    • Archiving the BIG-IP Configuration
    • LAB
  2. Web Application Access
    • Web Application Access Configuration
    • LAB
  3. Authentication and Authorization
    • Active Directory AAA Server Configuration
    • Active Directory Query Configuration
    • Session Variables and sessiondump
    • LAB
  4. Single Sign-On
    • Portal Access Single Sign-On Configuration
    • LAB
Pobierz konspekt szkolenia w formacie PDF

Dodatkowe informacje

Wymagania wstępne

Students are required to complete all of the following F5 prerequisites before attending this course:

The following web-based courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience:

Students should understand:

  • TMOS administration
  • Authentication methods and SSO
  • Students should have working accounts for the following websites.

Poziom trudności
Czas trwania 2 dni

The participants will obtain certificates signed by F5 Networks (course completion).


Certified F5 Networks Trainer.

Pozostałe szkolenia F5 Networks | Access Policy Manager (APM)

Szkolenia powiązane tematycznie

Sieci komputerowe

Bezpieczeństwo Sieci

Bezpieczeństwo IT