Takaisin

F5 Configuring BIG-IP AFM: Advanced Firewall Manager v13

This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP Advanced Firewall Manager (AFM) system. Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed.

This course is intended for network operators, network administrators, network engineers, network architects, security administrators, and security architects responsible for installation, setup, configuration, and administration of the BIG-IP AFM system.

This course is organized in co-operation with Arrow ECS. Training materials and lectures are in English.

Prerequisites

Students must complete one of the following F5 prerequisites before attending this course:

  • Administering BIG-IP instructor-led course
  • F5 Certified BIG-IP Administrator


The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:

  • OSI model encapsulation
  • Routing and switching
  • Ethernet and ARP
  • TCP/IP concepts
  • IP addressing and subnetting
  • NAT and private IP addressing
  • Default gateway
  • Network firewalls
  • LAN vs. WAN

The following course-specific knowledge and experience is suggested before attending this course:

Hands-on experience with BIG-IP
Basic web application delivery (BIG-IP LTM)
HTML, HTTP, HTTPS as well as some CSS and JavaScript
Telnet, SSH and TLS/SSL
VPN or tunnel encapsulation, Layer 4 NAT and Access Control Lists

Virtual Classroom brings the classroom experience to you.
Choose training in the boardroom, the dining room or one of our many classrooms around the country, or even bridge the gap and learn with students in other countries.

A more efficient way to train

  • Choose to train at home, on your office, or ours
  • Save on travel and expenses
  • Reduce time out of the office and away from home
  • An interactive experience

Instructors use interactive smart boards offering real-time viewing to all students
High capacity network means no lag in viewing or hearing the instructor and other students
HD quality video and audio provides crystal clear sound without the need for a microphone
Students have full access to labs and participate in all practical activities
Chat function lets you ask questions to the whole class, or just the instructor
Learn with other students all around the country

Course Outline

Chapter 1: Setting up the BIG-IP System

Introducing the BIG-IP System
Initially Setting Up the BIG-IP System
Archiving the BIG-IP Configuration
Leveraging F5 Support Resources and Tools
Chapter Resources
BIG-IP System Setup Labs


Chapter 2: AFM Overview and Network Firewall

AFM Overview
AFM Release History
AFM Availability 
What do you see?
Terminology
Network Firewall
AFM Contexts
AFM Modes
AFM Packet Processing 
AFM Rules and Direction 
Rules Contexts and Processing 
Configuring Network Firewall
Network Firewall Rules
Geolocation 
Redundant and Conflicting Rules 
Stale Rules 
Lists and Schedules
Rule Lists
Address Lists
Port Lists
Schedules
Policies
Policy Status and Firewall Policy Management
Inline Rule Editor
Send to Virtual
Packet Tester

Chapter 3: Logs

Overview
Event Logs
Logging Profiles
Log Throttling
Logging and Logging Profiles
BIG-IP Logging Mechanisms
Publisher
Log Destination
Custom Search
Logging Global Rule Events
Log Configuration Changes
QKView and Log Files
SNMP MIB
SNMP Traps


Chapter 4: IP Intelligence

Overview
Feature 1 Dynamic Black and White Lists
Black List Categories
Feed Lists
IP Intelligence Policies 
IP Intelligence Log Profile
IP Intelligence Reporting
Troubleshooting IP Intelligence Lists
Feature 2 IP Intelligence Database
Licensing
Installation 
Configuration
Troubleshooting
IP Intelligence iRule


Chapter 5: Device DoS

Denial of Service and DoS Protection Overview
Device DoS
Configuring Device DoS
Variant 1
Variant 2
Auto-Threshold Configuration
Variant 3
Bad Actor and Blacklist Address
Device DoS Profiles
DoS Protection Profile
Dynamic Signatures
DoS iRules


Chapter 6: Reports

Reports
Reporting
General Reporting Facilities
Time Series Chart
Details
Report Export
DoS Screens
Dashboard
Analysis
Custom Page
Settings
Scheduled Reports
Troubleshooting Scheduled Reports
Overview
Summary
Widgets
Custom Widgets
Deleting and Restoring Widgets
Firewall Manager


Chapter 7: DoS White Lists

White Lists
Configuration
tmsh
Source Address List


Chapter 8: DoS Sweep Flood Protection

Sweep Flood
Configuration


Chapter 9: IP Intelligence Shun

IP Intelligence Shun
Manual Configuration
Dynamic Configuration
IP Intelligence Policy
tmsh
Extending the Shun Feature
Remotely Triggered Black Hole
Scrubber


Chapter 10: DNS Firewall

DNS Firewall
Configuration
DNS Query
DNS Opcodes
Logging
Troubleshooting


Chapter 11: DNS DoS

DNS DoS
Configuration
DoS Protection Profile
Device DoS


Chapter 12: SIP DoS

Session Initiation Protocol (SIP)
Transactions and Dialogs
SIP DoS Configuration
DoS Protection Profile
Device DoS
SIP iRules


Chapter 13: Network Firewall iRules

Network Firewall iRules
iRule Events
Configuration
Recommended Practice
More Information


Chapter 14: Port Misuse

Port Misuse
Port Misuse Policy
Attaching a Service Policy 
Log Profile

Näytä lisää Sulje
ArrowECS

ArrowECS vastaa kurssin järjestämisestä.

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.