F5 Networks Configuring BIG-IP AFM v13: Advanced Firewall Manager

Master the art of protecting your network against cyber threats with F5 Networks' BIG-IP AFM v13, designed specifically for network and security professionals seeking advanced firewall management skills.

Course Thumbnail

Essential Skills Gained

Checkmark

Configure the BIG-IP Advanced Firewall Manager for optimal network security.

Checkmark

Implement defense strategies against Denial of Service attacks.

Checkmark

Utilize reporting and logging tools for comprehensive network analysis.

Checkmark

Manage firewall rules and policies effectively to secure network traffic.

Format

  • Instructor-led
  • 2 days with lectures and hands-on labs.

Audience

  • Network operators
  • Network administrators
  • Security administrators
  • Network engineers

Description

This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP Advanced Firewall Manager (AFM) system. Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed.

Calendar icon

Upcoming Course Dates

No upcoming dates. Please check back later.

Course Outline

Download PDF

Lesson 1 : Setting up the BIG-IP System

  1. Introducing the BIG-IP System

  2. Initially Setting Up the BIG-IP System

  3. Archiving the BIG-IP Configuration

  4. Leveraging F5 Support Resources and Tools

  5. Chapter Resources

  6. BIG-IP System Setup Labs

Lesson 2 : AFM Overview and Network Firewall

  1. AFM Overview

  2. AFM Release History

  3. AFM Availability

  4. What do you see?

  5. Terminology

  6. Network Firewall

  7. AFM Contexts

  8. AFM Modes

  9. AFM Packet Processing

  10. AFM Rules and Direction

  11. Rules Contexts and Processing

  12. Configuring Network Firewall

  13. Network Firewall Rules

  14. Geolocation

  15. Redundant and Conflicting Rules

  16. Stale Rules

  17. Lists and Schedules

  18. Rule Lists

  19. Address Lists

  20. Port Lists

  21. Schedules

  22. Policies

  23. Policy Status and Firewall Policy Management

  24. Inline Rule Editor

  25. Send to Virtual

  26. Packet Tester

Lesson 3 : Logs

  1. Overview

  2. Event Logs

  3. Logging Profiles

  4. Log Throttling

  5. Logging and Logging Profiles

  6. BIG-IP Logging Mechanisms

  7. Publisher

  8. Log Destination

  9. Custom Search

  10. Logging Global Rule Events

  11. Log Configuration Changes

  12. QKView and Log Files

  13. SNMP MIB

  14. SNMP Traps

Lesson 4 : IP Intelligence

  1. Overview

  2. Feature 1 Dynamic Black and White Lists

  3. Black List Categories

  4. Feed Lists

  5. IP Intelligence Policies

  6. IP Intelligence Log Profile

  7. IP Intelligence Reporting

  8. Troubleshooting IP Intelligence Lists

  9. Feature 2 IP Intelligence Database

  10. Licensing

  11. Installation

  12. Configuration

  13. Troubleshooting

  14. IP Intelligence iRule

Lesson 5 : Device DoS

  1. Denial of Service and DoS Protection Overview

  2. Device DoS

  3. Configuring Device DoS

  4. Variant 1

  5. Variant 2

  6. Auto-Threshold Configuration

  7. Variant 3

  8. Bad Actor and Blacklist Address

  9. Device DoS Profiles

  10. DoS Protection Profile

  11. Dynamic Signatures

  12. DoS iRules

Lesson 6 : Reports

  1. Reports

  2. Reporting

  3. General Reporting Facilities

  4. Time Series Chart

  5. Details

  6. Report Export

  7. DoS Screens

  8. Dashboard

  9. Analysis

  10. Custom Page

  11. Settings

  12. Scheduled Reports

  13. Troubleshooting Scheduled Reports

  14. Overview

  15. Summary

  16. Widgets

  17. Custom Widgets

  18. Deleting and Restoring Widgets

  19. Firewall Manager

Lesson 7 : DoS White Lists

  1. White Lists

  2. Configuration

  3. tmsh

  4. Source Address List

Lesson 8 : DoS Sweep Flood Protection

  1. Sweep Flood

  2. Configuration

Lesson 9 : IP Intelligence Shun

  1. IP Intelligence Shun

  2. Manual Configuration

  3. Dynamic Configuration

  4. IP Intelligence Policy

  5. tmsh

  6. Extending the Shun Feature

  7. Remotely Triggered Black Hole

  8. Scrubber

Lesson 10 : DNS Firewall

  1. DNS Firewall

  2. Configuration

  3. DNS Query

  4. DNS Opcodes

  5. Logging

  6. Troubleshooting

Lesson 11 : DNS DoS

  1. DNS DoS

  2. Configuration

  3. DoS Protection Profile

  4. Device DoS

Lesson 12 : SIP DoS

  1. Session Initiation Protocol (SIP)

  2. Transactions and Dialogs

  3. SIP DoS Configuration

  4. DoS Protection Profile

  5. Device DoS

  6. SIP iRules

Lesson 13 : Network Firewall iRules

  1. Network Firewall iRules

  2. iRule Events

  3. Configuration

  4. Recommended Practice

  5. More Information

Lesson 14 : Port Misuse

  1. Port Misuse

  2. Port Misuse Policy

  3. Attaching a Service Policy

  4. Log Profile

Lesson 15 : Additional Training and Certification

  1. Getting Started Series Web-Based Training

  2. F5 Instructor Led Training Curriculum

  3. F5 Professional Certification Program

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.