F5 Networks Configuring BIG-IP AFM v12: Advanced Firewall Manager

Master the advanced capabilities of F5 Networks' BIG-IP AFM v12 to safeguard enterprise networks from sophisticated firewall and DoS threats in this comprehensive training for network security professionals.

Course Thumbnail

Essential Skills Gained

Checkmark

Configure network firewalls to enhance security posture

Checkmark

Understand and implement DoS protection techniques

Checkmark

Utilize AFM user interface for effective network management

Checkmark

Analyze and interpret comprehensive firewall and DoS logs

Format

  • Instructor-led
  • 2 days with lectures and hands-on labs.

Audience

  • Network operator
  • Network administrator
  • Network engineer
  • Security administrator

Description

Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed.

Calendar icon

Upcoming Course Dates

No upcoming dates. Please check back later.

Course Outline

Download PDF

Lesson 1: Setting Up the BIG-IP System

  1. Introducing the BIG-IP System

  2. Initially Setting Up the BIG-IP System

  3. Archiving the BIG-IP Configuration

  4. Leveraging F5 Support Resources and Tools

Lesson 2: AFM Overview and Network Firewall

  1. AFM Overview

  2. AFM Release History

  3. AFM Availability

  4. What do you see?

  5. Terminology

  6. Network Firewall

  7. AFM Contexts

  8. AFM Modes

  9. AFM Packet Processing

  10. AFM Rules and Direction

  11. Rules Contexts and Processing

  12. Configuring Network Firewall

  13. Network Firewall Rules

  14. Geolocation

  15. Redundant and Conflicting Rules

  16. Stale Rules

  17. Lists and Schedules

  18. Rule Lists

  19. Address Lists

  20. Port Lists

  21. Schedules

  22. Policies

  23. Policy Status and Firewall Policy Management

  24. Inline Rule Editor

Lesson 3: Logs

  1. Event Logs

  2. Logging Profiles

  3. Log Throttling

  4. Traffic Flow Statistics

  5. Logging and Logging Profiles

  6. BIG-IP Logging Mechanisms

  7. Publisher

  8. Log Destination

  9. Custom Search

  10. Logging Global Rule Events

  11. Log Configuration Changes

  12. QKView

  13. Other Log Files

  14. SNMP MIB

  15. SNMP Traps

Lesson 4: IP Intelligence

  1. Overview

  2. Architecture

  3. Feature 1 Dynamic Black and White Lists

  4. Black List Categories

  5. Feed Lists

  6. IP Intelligence Policies

  7. IP Intelligence Log Profile

  8. IP Intelligence Reporting

  9. Troubleshooting IP Intelligence Lists

  10. Feature 2 IP Intelligence Database

  11. Licensing

  12. Installation

  13. Configuration

  14. Troubleshooting

  15. IP Intelligence

Lesson 5: Device DoS

  1. Policies

  2. Policy Status and Firewall Policy Management

  3. Inline Rule Editor

Lesson 6: Reports

  1. Reports

  2. Reporting

  3. General Reporting Facilities

  4. Charts

  5. Details

  6. Report Export

  7. Network Screens

  8. DoS Screens

  9. Settings

  10. Overview

  11. Summary

  12. Widgets

  13. Time Periods, Settings, Export, and Delete Options

  14. Firewall Manager

Lesson 7: DoS White Lists

  1. White Lists

  2. Configuration

  3. tmsh

Lesson 8: DoS Sweep Flood Protection

  1. Sweep Flood

  2. Configuration

Lesson 9: IP Intelligence Shun

  1. IP Intelligence Shun

  2. Manual

  3. Dynamic

  4. IP Intelligence Policy

  5. tmsh

  6. Troubleshooting

Lesson 10: DNS Firewall

  1. DNS Firewall

  2. DNS Query

  3. DNS Opcodes

  4. Troubleshooting

Lesson 11: DNS DoS

  1. DNS DoS

  2. DoS Protection Profile

  3. Device DoS

Lesson 12: SIP DoS

  1. Session Initiation Protocol (SIP)

  2. Transactions and Dialogs

  3. SIP DoS

  4. DoS Protection Profile

  5. Device DoS

  6. SIP iRules

Lesson 13: Network Firewall iRules

  1. Network Firewall iRules

  2. iRule Events

  3. Use Cases

  4. Recommended Practice

  5. More Information

Lesson 14: DoS iRules

  1. DoS iRules

  2. iRule Events

  3. Use Cases

  4. More Information

Lesson 15: Additional Training and Certification

  1. Getting Started Series Web-Based Training

  2. F5 Instructor Led Training Curriculum

  3. F5 Professional Certification Program

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.