<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="17842" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/f5networks-trg-big-afm-cfg" lastchanged="2025-07-29T12:17:42+02:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Configuring BIG-IP AFM: Advanced Firewall Manager</title><productcode>TRG-BIG-AFM-CFG</productcode><vendorcode>F5</vendorcode><vendorname>F5 Networks</vendorname><fullproductcode>F5-TRG-BIG-AFM-CFG</fullproductcode><version>15.1</version><objective>&lt;ul&gt;
&lt;li&gt;Configure and manage an AFM system&lt;/li&gt;&lt;li&gt;Configure AFM Network Firewall in a positive or negative security model&lt;/li&gt;&lt;li&gt;Configure Network Firewall to allow or deny network traffic using rules based on protocol, source, destination, geography, and other predicate types&lt;/li&gt;&lt;li&gt;Prebuild firewall rules using lists and schedule components&lt;/li&gt;&lt;li&gt;Enforce firewall rules immediately or test them using policy staging&lt;/li&gt;&lt;li&gt;Use Packet Tester and Flow Inspector features to check network connections against your security configurations for Network Firewall, IP intelligence and DoS features&lt;/li&gt;&lt;li&gt;Configure various IP Intelligence features to identify, record, allow or deny access by IP address&lt;/li&gt;&lt;li&gt;Configure the Device DoS detection and mitigation feature to protect the BIG-IP device and all applications from multiple types of attack vectors&lt;/li&gt;&lt;li&gt;Configure DoS detection and mitigation on a per-profile basic to protect specific applications from attack&lt;/li&gt;&lt;li&gt;Use DoS Dynamic Signatures to automatically protect the system from DoS attacks based on long term traffic and resource load patterns&lt;/li&gt;&lt;li&gt;Configure and use the AFM local and remote log facilities&lt;/li&gt;&lt;li&gt;Configure and monitor AFM&amp;rsquo;s status with various reporting facilities&lt;/li&gt;&lt;li&gt;Export AFM system reports to your external monitoring system directly or via scheduled mail&lt;/li&gt;&lt;li&gt;Allow chosen traffic to bypass DoS checks using Whitelists&lt;/li&gt;&lt;li&gt;Isolate potentially bad clients from good using the Sweep Flood feature&lt;/li&gt;&lt;li&gt;Isolate and re-route potentially bad network traffic for further inspection using IP Intelligence Shun functionality&lt;/li&gt;&lt;li&gt;Restrict and report on certain types of DNS requests using DNS Firewall&lt;/li&gt;&lt;li&gt;Configure, mitigate, and report on DNS based DoS attacks with the DNS DoS facility&lt;/li&gt;&lt;li&gt;Configure, mitigate, and report on SIP based DoS attacks with the SIP DoS facility&lt;/li&gt;&lt;li&gt;Configure, block, and report on the misuse of system services and ports using the Port Misuse feature&lt;/li&gt;&lt;li&gt;Build and configure Network Firewall rules using BIG-IP iRules&lt;/li&gt;&lt;li&gt;Be able to monitor and do initial troubleshooting of various AFM functionality&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;Students must complete one of the following F5 prerequisites before attending this course:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/fr/course/f5networks-trg-big-op-admin&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Administering BIG-IP &lt;span class=&quot;fl-prod-pcode&quot;&gt;(TRG-BIG-OP-ADMIN)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; instructor-led course&lt;br/&gt;or&lt;/li&gt;&lt;li&gt;F5 Certified BIG-IP Administrator&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The following free web-based courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience. These courses are available at F5 University:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Getting Started with BIG-IP web-based training&lt;/li&gt;&lt;li&gt;Getting Started with BIG-IP Local Traffic Manager (LTM) web-based training&lt;/li&gt;&lt;li&gt;Getting Started with BIG-IP Advanced Firewall Manager (AFM) web-based training&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;OSI model encapsulation&lt;/li&gt;&lt;li&gt;Routing and switching&lt;/li&gt;&lt;li&gt;Ethernet and ARP&lt;/li&gt;&lt;li&gt;TCP/IP concepts&lt;/li&gt;&lt;li&gt;IP addressing and subnetting&lt;/li&gt;&lt;li&gt;NAT and private IP addressing&lt;/li&gt;&lt;li&gt;Default gateway&lt;/li&gt;&lt;li&gt;Network firewalls&lt;/li&gt;&lt;li&gt;LAN vs. WAN&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The following course-specific knowledge and experience is suggested before attending this course:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;HTTP and DNS protocols&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This course is intended for network operators, network administrators, network engineers, network architects, security administrators, and security architects responsible for installation, setup, configuration, and administration of the BIG-IP AFM system.&lt;/p&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Setting up the BIG-IP System&lt;/li&gt;&lt;li&gt;AFM Overview&lt;/li&gt;&lt;li&gt;Network Firewall&lt;/li&gt;&lt;li&gt;Logs&lt;/li&gt;&lt;li&gt;IP Intelligence&lt;/li&gt;&lt;li&gt;DoS Protection&lt;/li&gt;&lt;li&gt;Reports&lt;/li&gt;&lt;li&gt;DoS White Lists&lt;/li&gt;&lt;li&gt;DoS Sweep Flood Protection&lt;/li&gt;&lt;li&gt;IP Intelligence Shun&lt;/li&gt;&lt;li&gt;DNS Firewall&lt;/li&gt;&lt;li&gt;DNS DoS&lt;/li&gt;&lt;li&gt;SIP DoS&lt;/li&gt;&lt;li&gt;Port Misuse&lt;/li&gt;&lt;li&gt;Network Firewall iRules&lt;/li&gt;&lt;li&gt;Recap&lt;/li&gt;&lt;li&gt;Additional Training and Certification&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Chapter 1: Setting up the BIG-IP System&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introducing the BIG-IP System&lt;/li&gt;&lt;li&gt;Initially Setting Up the BIG-IP System&lt;/li&gt;&lt;li&gt;Archiving the BIG-IP System Configuration&lt;/li&gt;&lt;li&gt;Leveraging F5 Support Resources and Tools&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 2: AFM Overview&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;AFM Overview&lt;/li&gt;&lt;li&gt;AFM Availability&lt;/li&gt;&lt;li&gt;AFM and the BIG-IP Security Menu&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 3: Network Firewall&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;AFM Firewalls&lt;/li&gt;&lt;li&gt;Contexts&lt;/li&gt;&lt;li&gt;Modes&lt;/li&gt;&lt;li&gt;Packet Processing&lt;/li&gt;&lt;li&gt;Rules and Direction&lt;/li&gt;&lt;li&gt;Rules Contexts and Processing&lt;/li&gt;&lt;li&gt;Inline Rule Editor&lt;/li&gt;&lt;li&gt;Configuring Network Firewall&lt;/li&gt;&lt;li&gt;Network Firewall Rules and Policies&lt;/li&gt;&lt;li&gt;Network Firewall Rule Creation&lt;/li&gt;&lt;li&gt;Identifying Traffic by Region with Geolocation&lt;/li&gt;&lt;li&gt;Identifying Redundant and Conflicting Rules&lt;/li&gt;&lt;li&gt;Identifying Stale Rules&lt;/li&gt;&lt;li&gt;Prebuilding Firewall Rules with Lists and Schedules&lt;/li&gt;&lt;li&gt;Rule Lists&lt;/li&gt;&lt;li&gt;Address Lists&lt;/li&gt;&lt;li&gt;Port Lists&lt;/li&gt;&lt;li&gt;Schedules&lt;/li&gt;&lt;li&gt;Network Firewall Policies&lt;/li&gt;&lt;li&gt;Policy Status and Management&lt;/li&gt;&lt;li&gt;Other Rule Actions&lt;/li&gt;&lt;li&gt;Redirecting Traffic with Send to Virtual&lt;/li&gt;&lt;li&gt;Checking Rule Processing with Packet Tester&lt;/li&gt;&lt;li&gt;Examining Connections with Flow Inspector&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 4: Logs&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Event Logs&lt;/li&gt;&lt;li&gt;Logging Profiles&lt;/li&gt;&lt;li&gt;Limiting Log Messages with Log Throttling&lt;/li&gt;&lt;li&gt;Enabling Logging in Firewall Rules&lt;/li&gt;&lt;li&gt;BIG-IP Logging Mechanisms&lt;/li&gt;&lt;li&gt;Log Publisher&lt;/li&gt;&lt;li&gt;Log Destination&lt;/li&gt;&lt;li&gt;Filtering Logs with the Custom Search Facility&lt;/li&gt;&lt;li&gt;Logging Global Rule Events&lt;/li&gt;&lt;li&gt;Log Configuration Changes&lt;/li&gt;&lt;li&gt;QKView and Log Files&lt;/li&gt;&lt;li&gt;SNMP MIB&lt;/li&gt;&lt;li&gt;SNMP Traps&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 5: IP Intelligence&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview&lt;/li&gt;&lt;li&gt;IP Intelligence Policy&lt;/li&gt;&lt;li&gt;Feature 1 Dynamic White and Blacklists&lt;/li&gt;&lt;li&gt;Black List Categories&lt;/li&gt;&lt;li&gt;Feed Lists&lt;/li&gt;&lt;li&gt;Applying an IP Intelligence Policy&lt;/li&gt;&lt;li&gt;IP Intelligence Log Profile&lt;/li&gt;&lt;li&gt;IP Intelligence Reporting&lt;/li&gt;&lt;li&gt;Troubleshooting IP Intelligence Lists&lt;/li&gt;&lt;li&gt;Feature 2 IP Intelligence Database&lt;/li&gt;&lt;li&gt;Licensing&lt;/li&gt;&lt;li&gt;Installation&lt;/li&gt;&lt;li&gt;Linking the Database to the P Intelligence Policy&lt;/li&gt;&lt;li&gt;Troubleshooting&lt;/li&gt;&lt;li&gt;IP Intelligence iRule&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 6: DoS Protection&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Denial of Service and DoS Protection Overview&lt;/li&gt;&lt;li&gt;Device DoS Protection&lt;/li&gt;&lt;li&gt;Configuring Device DoS Protection&lt;/li&gt;&lt;li&gt;Variant 1 DoS Vectors&lt;/li&gt;&lt;li&gt;Variant 2 DoS Vectors&lt;/li&gt;&lt;li&gt;Automatic Configuration or Automatic Thresholds&lt;/li&gt;&lt;li&gt;Variant 3 DoS Vectors&lt;/li&gt;&lt;li&gt;Device DoS Profiles&lt;/li&gt;&lt;li&gt;DoS Protection Profile&lt;/li&gt;&lt;li&gt;Dynamic Signatures&lt;/li&gt;&lt;li&gt;Dynamic Signatures Configuration&lt;/li&gt;&lt;li&gt;DoS iRules&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 7: Reports&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;AFM Reporting Facilities Overview&lt;/li&gt;&lt;li&gt;Examining the Status of Particular AFM Features&lt;/li&gt;&lt;li&gt;Exporting the Data&lt;/li&gt;&lt;li&gt;Managing the Reporting Settings&lt;/li&gt;&lt;li&gt;Scheduling Reports&lt;/li&gt;&lt;li&gt;Troubleshooting Scheduled Reports&lt;/li&gt;&lt;li&gt;Examining AFM Status at High Level&lt;/li&gt;&lt;li&gt;Mini Reporting Windows (Widgets)&lt;/li&gt;&lt;li&gt;Building Custom Widgets&lt;/li&gt;&lt;li&gt;Deleting and Restoring Widgets&lt;/li&gt;&lt;li&gt;Dashboards&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 8: DoS White Lists&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Bypassing DoS Checks with White Lists&lt;/li&gt;&lt;li&gt;Configuring DoS White Lists&lt;/li&gt;&lt;li&gt;tmsh options&lt;/li&gt;&lt;li&gt;Per Profile Whitelist Address List&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 9: DoS Sweep Flood Protection&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Isolating Bad Clients with Sweep Flood&lt;/li&gt;&lt;li&gt;Configuring Sweep Flood&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 10: IP Intelligence Shun&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview&lt;/li&gt;&lt;li&gt;Manual Configuration&lt;/li&gt;&lt;li&gt;Dynamic Configuration&lt;/li&gt;&lt;li&gt;IP Intelligence Policy&lt;/li&gt;&lt;li&gt;tmsh options&lt;/li&gt;&lt;li&gt;Troubleshooting&lt;/li&gt;&lt;li&gt;Extending the Shun Feature&lt;/li&gt;&lt;li&gt;Route this Traffic to Nowhere - Remotely Triggered Black Hole&lt;/li&gt;&lt;li&gt;Route this Traffic for Further Processing - Scrubber&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 11: DNS Firewall&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Filtering DNS Traffic with DNS Firewall&lt;/li&gt;&lt;li&gt;Configuring DNS Firewall&lt;/li&gt;&lt;li&gt;DNS Query Types&lt;/li&gt;&lt;li&gt;DNS Opcode Types&lt;/li&gt;&lt;li&gt;Logging DNS Firewall Events&lt;/li&gt;&lt;li&gt;Troubleshooting&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 12: DNS DoS&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview&lt;/li&gt;&lt;li&gt;DNS DoS&lt;/li&gt;&lt;li&gt;Configuring DNS DoS&lt;/li&gt;&lt;li&gt;DoS Protection Profile&lt;/li&gt;&lt;li&gt;Device DoS and DNS&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 13: SIP DoS&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Session Initiation Protocol (SIP)&lt;/li&gt;&lt;li&gt;Transactions and Dialogs&lt;/li&gt;&lt;li&gt;SIP DoS Configuration&lt;/li&gt;&lt;li&gt;DoS Protection Profile&lt;/li&gt;&lt;li&gt;Device DoS and SIP&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 14: Port Misuse&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview&lt;/li&gt;&lt;li&gt;Port Misuse and Service Policies&lt;/li&gt;&lt;li&gt;Building a Port Misuse Policy&lt;/li&gt;&lt;li&gt;Attaching a Service Policy&lt;/li&gt;&lt;li&gt;Creating a Log Profile&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 15: Network Firewall iRules&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview&lt;/li&gt;&lt;li&gt;iRule Events&lt;/li&gt;&lt;li&gt;Configuration&lt;/li&gt;&lt;li&gt;When to use iRules&lt;/li&gt;&lt;li&gt;More Information&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 16: Recap&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;BIG-IP Architecture and Traffic Flow&lt;/li&gt;&lt;li&gt;AFM Packet Processing Overview&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 17: Additional Training and Certification&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Getting Started Series Web-Based Training&lt;/li&gt;&lt;li&gt;F5 Instructor Led Training Curriculum&lt;/li&gt;&lt;li&gt;F5 Professional Certification Program&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Configure and manage an AFM system
- Configure AFM Network Firewall in a positive or negative security model
- Configure Network Firewall to allow or deny network traffic using rules based on protocol, source, destination, geography, and other predicate types
- Prebuild firewall rules using lists and schedule components
- Enforce firewall rules immediately or test them using policy staging
- Use Packet Tester and Flow Inspector features to check network connections against your security configurations for Network Firewall, IP intelligence and DoS features
- Configure various IP Intelligence features to identify, record, allow or deny access by IP address
- Configure the Device DoS detection and mitigation feature to protect the BIG-IP device and all applications from multiple types of attack vectors
- Configure DoS detection and mitigation on a per-profile basic to protect specific applications from attack
- Use DoS Dynamic Signatures to automatically protect the system from DoS attacks based on long term traffic and resource load patterns
- Configure and use the AFM local and remote log facilities
- Configure and monitor AFM’s status with various reporting facilities
- Export AFM system reports to your external monitoring system directly or via scheduled mail
- Allow chosen traffic to bypass DoS checks using Whitelists
- Isolate potentially bad clients from good using the Sweep Flood feature
- Isolate and re-route potentially bad network traffic for further inspection using IP Intelligence Shun functionality
- Restrict and report on certain types of DNS requests using DNS Firewall
- Configure, mitigate, and report on DNS based DoS attacks with the DNS DoS facility
- Configure, mitigate, and report on SIP based DoS attacks with the SIP DoS facility
- Configure, block, and report on the misuse of system services and ports using the Port Misuse feature
- Build and configure Network Firewall rules using BIG-IP iRules
- Be able to monitor and do initial troubleshooting of various AFM functionality</objective_plain><essentials_plain>Students must complete one of the following F5 prerequisites before attending this course:


- Administering BIG-IP (TRG-BIG-OP-ADMIN) instructor-led course
or
- F5 Certified BIG-IP Administrator
The following free web-based courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience. These courses are available at F5 University:


- Getting Started with BIG-IP web-based training
- Getting Started with BIG-IP Local Traffic Manager (LTM) web-based training
- Getting Started with BIG-IP Advanced Firewall Manager (AFM) web-based training
The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:


- OSI model encapsulation
- Routing and switching
- Ethernet and ARP
- TCP/IP concepts
- IP addressing and subnetting
- NAT and private IP addressing
- Default gateway
- Network firewalls
- LAN vs. WAN
The following course-specific knowledge and experience is suggested before attending this course:


- HTTP and DNS protocols</essentials_plain><audience_plain>This course is intended for network operators, network administrators, network engineers, network architects, security administrators, and security architects responsible for installation, setup, configuration, and administration of the BIG-IP AFM system.</audience_plain><contents_plain>- Setting up the BIG-IP System
- AFM Overview
- Network Firewall
- Logs
- IP Intelligence
- DoS Protection
- Reports
- DoS White Lists
- DoS Sweep Flood Protection
- IP Intelligence Shun
- DNS Firewall
- DNS DoS
- SIP DoS
- Port Misuse
- Network Firewall iRules
- Recap
- Additional Training and Certification</contents_plain><outline_plain>Chapter 1: Setting up the BIG-IP System


- Introducing the BIG-IP System
- Initially Setting Up the BIG-IP System
- Archiving the BIG-IP System Configuration
- Leveraging F5 Support Resources and Tools
Chapter 2: AFM Overview



- AFM Overview
- AFM Availability
- AFM and the BIG-IP Security Menu
Chapter 3: Network Firewall


- AFM Firewalls
- Contexts
- Modes
- Packet Processing
- Rules and Direction
- Rules Contexts and Processing
- Inline Rule Editor
- Configuring Network Firewall
- Network Firewall Rules and Policies
- Network Firewall Rule Creation
- Identifying Traffic by Region with Geolocation
- Identifying Redundant and Conflicting Rules
- Identifying Stale Rules
- Prebuilding Firewall Rules with Lists and Schedules
- Rule Lists
- Address Lists
- Port Lists
- Schedules
- Network Firewall Policies
- Policy Status and Management
- Other Rule Actions
- Redirecting Traffic with Send to Virtual
- Checking Rule Processing with Packet Tester
- Examining Connections with Flow Inspector
Chapter 4: Logs


- Event Logs
- Logging Profiles
- Limiting Log Messages with Log Throttling
- Enabling Logging in Firewall Rules
- BIG-IP Logging Mechanisms
- Log Publisher
- Log Destination
- Filtering Logs with the Custom Search Facility
- Logging Global Rule Events
- Log Configuration Changes
- QKView and Log Files
- SNMP MIB
- SNMP Traps
Chapter 5: IP Intelligence


- Overview
- IP Intelligence Policy
- Feature 1 Dynamic White and Blacklists
- Black List Categories
- Feed Lists
- Applying an IP Intelligence Policy
- IP Intelligence Log Profile
- IP Intelligence Reporting
- Troubleshooting IP Intelligence Lists
- Feature 2 IP Intelligence Database
- Licensing
- Installation
- Linking the Database to the P Intelligence Policy
- Troubleshooting
- IP Intelligence iRule
Chapter 6: DoS Protection


- Denial of Service and DoS Protection Overview
- Device DoS Protection
- Configuring Device DoS Protection
- Variant 1 DoS Vectors
- Variant 2 DoS Vectors
- Automatic Configuration or Automatic Thresholds
- Variant 3 DoS Vectors
- Device DoS Profiles
- DoS Protection Profile
- Dynamic Signatures
- Dynamic Signatures Configuration
- DoS iRules
Chapter 7: Reports


- AFM Reporting Facilities Overview
- Examining the Status of Particular AFM Features
- Exporting the Data
- Managing the Reporting Settings
- Scheduling Reports
- Troubleshooting Scheduled Reports
- Examining AFM Status at High Level
- Mini Reporting Windows (Widgets)
- Building Custom Widgets
- Deleting and Restoring Widgets
- Dashboards
Chapter 8: DoS White Lists


- Bypassing DoS Checks with White Lists
- Configuring DoS White Lists
- tmsh options
- Per Profile Whitelist Address List
Chapter 9: DoS Sweep Flood Protection


- Isolating Bad Clients with Sweep Flood
- Configuring Sweep Flood
Chapter 10: IP Intelligence Shun


- Overview
- Manual Configuration
- Dynamic Configuration
- IP Intelligence Policy
- tmsh options
- Troubleshooting
- Extending the Shun Feature
- Route this Traffic to Nowhere - Remotely Triggered Black Hole
- Route this Traffic for Further Processing - Scrubber
Chapter 11: DNS Firewall


- Filtering DNS Traffic with DNS Firewall
- Configuring DNS Firewall
- DNS Query Types
- DNS Opcode Types
- Logging DNS Firewall Events
- Troubleshooting
Chapter 12: DNS DoS


- Overview
- DNS DoS
- Configuring DNS DoS
- DoS Protection Profile
- Device DoS and DNS
Chapter 13: SIP DoS


- Session Initiation Protocol (SIP)
- Transactions and Dialogs
- SIP DoS Configuration
- DoS Protection Profile
- Device DoS and SIP
Chapter 14: Port Misuse


- Overview
- Port Misuse and Service Policies
- Building a Port Misuse Policy
- Attaching a Service Policy
- Creating a Log Profile
Chapter 15: Network Firewall iRules


- Overview
- iRule Events
- Configuration
- When to use iRules
- More Information
Chapter 16: Recap


- BIG-IP Architecture and Traffic Flow
- AFM Packet Processing Overview
Chapter 17: Additional Training and Certification


- Getting Started Series Web-Based Training
- F5 Instructor Led Training Curriculum
- F5 Professional Certification Program</outline_plain><duration unit="d" days="2">2 jours</duration><pricelist><price country="AE" currency="USD">1995.00</price><price country="NL" currency="EUR">1900.00</price><price country="BE" currency="EUR">1900.00</price><price country="IT" currency="EUR">1900.00</price><price country="GB" currency="GBP">1640.00</price><price country="FR" currency="EUR">1900.00</price><price country="DE" currency="USD">2640.00</price><price country="CH" currency="USD">2640.00</price><price country="AT" currency="USD">2640.00</price></pricelist><miles/></course>