Arrow Electronics, Inc.

Configuring BIG-IP AFM: Advanced Firewall Manager v16.1

Kód: F5N_BIG-AFM

DÉLKA: 2 (den)

CENA: Kč 46 000,00

Popis

This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP Advanced Firewall Manager (AFM) system.

Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks.

Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed.

Cíle

Course Topics
◾Configuration and management of the BIG-IP AFM system
◾AFM Network Firewall concepts
◾Network firewall options and modes
◾Network firewall rules, policies, address/port lists, rule lists and schedules
◾IP Intelligence facilities of dynamic black and white lists, IP reputation database and dynamic IP shunning.
◾Detection and mitigation of DoS attacks
◾Event logging of firewall rules and DoS attacks
◾Reporting and notification facilities
◾DoS Whitelists
◾DoS Sweep/Flood
◾DNS Firewall and DNS DoS
◾SIP DoS
◾Port Misuse
◾Network Firewall iRules
◾Various AFM component troubleshooting commands

Major Course Changes since v13

The Configuring AFM v14 course broadly follows the chapter structure of the previous version of this course, with edits for changes in creating and editing network firewall rules and configuring DoS detection and protection. The Intrusion Protection System chapter has been removed awaiting feature changes in a future release.

Určeno pro

This course is intended for system and network administrators responsible for the configuration and ongoing administration of a BIG-IP Advanced Firewall Manager (AFM) system.

Vstupní znalosti

Students must complete one of the following F5 prerequisites before attending this course:
◾Administering BIG-IP instructor-led course

or
◾F5 Certified BIG-IP Administrator

The following free web-based courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience. These courses are available at F5 University:

Getting Started with BIG-IP web-based training

Getting Started with BIG-IP Local Traffic Manager (LTM) web-based training

Getting Started with BIG-IP Advanced Firewall Manager (AFM) web-based training

The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:

◾OSI model encapsulation
◾Routing and switching
◾Ethernet and ARP
◾TCP/IP concepts
◾IP addressing and subnetting
◾NAT and private IP addressing
◾Default gateway
◾Network firewalls
◾LAN vs. WAN

The following course-specific knowledge and experience is suggested before attending this course:
◾HTTP and DNS protocols

 

Program

Chapter 1: Setting up the BIG-IP System
Introducing the BIG-IP System
Initially Setting Up the BIG-IP System
Archiving the BIG-IP System Configuration
Leveraging F5 Support Resources and Tools

Chapter 2: AFM Overview and Network Firewall
AFM Overview
AFM Availability
AFM and the BIG-IP Security Menu
Explaining F5 Terminology
Network Firewall
Contexts
Modes
Packet Processing
Rules and Direction
Rules Contexts and Processing
Inline Rule Editor
Configuring Network Firewall
Network Firewall Rules and Policies
Network Firewall Rule Creation
Identifying Traffic by Region with Geolocation
Identifying Redundant and Conflicting Rules
Identifying Stale Rules
Prebuilding Firewall Rules with Lists and Schedules
Rule Lists
Address Lists
Port Lists
Schedules
Network Firewall Policies
Policy Status and Management
Other Rule Actions
Redirecting Traffic with Send to Virtual
Checking Rule Processing with Packet Tester
Examining Connections with Flow Inspector

Chapter 3: Logs
Event Logs
Logging Profiles
Limiting Log Messages with Log Throttling
Enabling Logging in Firewall Rules
BIG-IP Logging Mechanisms
Log Publisher
Log Destination
Filtering Logs with the Custom Search Facility
Logging Global Rule Events
Log Configuration Changes
QKView and Log Files
SNMP MIB
SNMP Traps

Chapter 4: IP Intelligence
Overview
Feature 1 Dynamic White and Black Lists
Black List Categories
Feed Lists
IP Intelligence Policies
IP Intelligence Log Profile
IP Intelligence Reporting
Troubleshooting IP Intelligence Lists
Feature 2 IP Intelligence Database
Licensing
Installation
Configuration
Troubleshooting
IP Intelligence iRule

Chapter 5: DoS Protection
Denial of Service and DoS Protection Overview
Device DoS Protection
Configuring Device DoS Protection
Variant 1 DoS Vectors
Variant 2 DoS Vectors
Automatic Threshold Configuration
Variant 3 DoS Vectors
Device DoS Profiles
DoS Protection Profile
Dynamic Signatures
Dynamic Signatures Configuration
DoS iRules

Chapter 6: Reports
AFM Reporting Facilities Overview
Examining the Status of Particular AFM Features
Exporting the Data
Managing the Reporting Settings
Scheduling Reports
Examining AFM Status at High Level
Mini Reporting Windows (Widgets)
Building Custom Widgets
Deleting and Restoring Widgets
Dashboards

Chapter 7: DoS White Lists
Bypassing DoS Checks with White Lists
Configuring DoS White Lists
tmsh options
Per Profile Whitelist Address List

Chapter 8: DoS Sweep Flood Protection
Isolating Bad Clients with Sweep Flood
Configuring Sweep Flood

Chapter 9: IP Intelligence Shun
Overview
Manual Configuration
Dynamic Configuration
IP Intelligence Policy
tmsh options
Extending the Shun Feature
Route this Traffic to Nowhere - Remotely Triggered Black Hole
Route this Traffic for Further Processing - Scrubber

Chapter 10: DNS Firewall
Filtering DNS Traffic with DNS Firewall
Configuring DNS Firewall
DNS Query Types
DNS Opcode Types
Logging DNS Firewall Events
Troubleshooting

Chapter 11: DNS DoS
Overview
DNS DoS
Configuring DNS DoS
DoS Protection Profile
Device DoS and DNS

Chapter 12: SIP DoS
Session Initiation Protocol (SIP)
Transactions and Dialogs
SIP DoS Configuration
DoS Protection Profile
Device DoS and SIP

Chapter 13: Port Misuse
Overview
Port Misuse and Service Policies
Building a Port Misuse Policy
Attaching a Service Policy
Creating a Log Profile

Chapter 14: Network Firewall iRules
Overview
iRule Events
Configuration
When to use iRules
More Information

Termíny školení

Další termíny školení Arrow v Evropě, včetně virtuálních.