Configuring BIG-IP AFM: Advanced Firewall Manager
This page provides information on how to purchase training for this course. It includes a description of the course, suggested prework, any required prerequisites, and links to purchase based on modality.
Key Info
COURSE ID:
F5-TRG-BIG-AFM-CFG
PRODUCT FAMILY:
BIG-IP
TITLE:
Configuring BIG-IP AFM: Advanced Firewall Manager
COURSE LEVEL:
Core
MODALITY:
Self-Directed Training (SDT), Instructor-Led Training (ILT)
LENGTH (DAYS/HOUR):
ILT - 2 Days
SDT - 12 Hours
LANGUAGES:
ILT - English 
SDT - English
PRICE ($$/TU):
ILT - $2420 USD/44 TUs
 SDT - $550 USD/10 TUs
CONTAINS HANDS-ON LABS?:
Yes
SDT details
								
								This course uses a combination of narrated video and reading lectures with accompanying lab exercises to give participants experience in configuring the BIG-IP Advanced Firewall Manager system. Students are introduced to the AFM product and user interface, then step through the various functionality of the system which is divided into learning modules. The modules explain and illustrate the core functionality of Network Firewall, Denial of Service or DoS protection, and IP Intelligence. In addition, several other features of the AFM product are covered.
						This course is intended for system and network administrators responsible for the configuration and ongoing administration of a BIG-IP Advanced Firewall Manager (AFM) system.
ILT details
								
								Learn how to deploy and operate BIG-IP Advanced Firewall Manager to protect a data center against incoming threats that enter the network at layers 3 and 4 on common protocols including HTTP, SIP, SSH, SSL, and others. Using a mix of lectures and hands-on lab exploration, gain experience implementing comprehensive protection against attacks from rapidly changing IP addresses by applying the latest threat intelligence, and by anticipating, detecting, and responding to attacks before they hit data center targets. Practice using hardware-based DDoS mitigation that scales to prevent high-volume, targeted, network flood attacks—while allowing legitimate traffic to flow without compromising performance or degrading the user experience. Observe malicious network activity in real time as you assume the role of an attacker.
F5 recognizes the importance of visibility, analytics, and reporting regarding attack evolution, attack mitigation, and overall firewall health. Plenty of time is dedicated to analyzing reports. Learn how to retrieve clear, concise, and actionable information highlighting attacks and trends with detailed drill-down and page-view capabilities.
This course is intended for system and network administrators responsible for the configuration and ongoing administration of a BIG-IP Advanced Firewall Manager (AFM) system.
						F5 recognizes the importance of visibility, analytics, and reporting regarding attack evolution, attack mitigation, and overall firewall health. Plenty of time is dedicated to analyzing reports. Learn how to retrieve clear, concise, and actionable information highlighting attacks and trends with detailed drill-down and page-view capabilities.
This course is intended for system and network administrators responsible for the configuration and ongoing administration of a BIG-IP Advanced Firewall Manager (AFM) system.
																Chapter 1: Setting Up the BIG-IP System
Introducing the BIG-IP System
 Initially Setting Up the BIG-IP System
 Archiving the BIG-IP Configuration
 Leveraging F5 Support Resources and Tools 
Chapter 2: AFM Overview
AFM Overview
 AFM Availability
 AFM and the BIG-IP Security Menu 
Chapter 3: Network Firewall
AFM Firewalls
 Contexts
 Modes
 Packet Processing
 Rules and Direction
 Rules, Contexts, and Processing
 Inline Rule Editor
 Configuring Network Firewall
 Network Firewall Rules and Policies
 Network Firewall Rule Creation
 Identifying Traffic by Region with Geolocation
 Identifying Redundant and Conflicting Rules
 Identifying Stale Rules
 Prebuilding Firewall Rules with Lists and Schedules
 Rule Lists
 Address Lists
 Port Lists
 Schedules
 Network Firewall Policies
 Policy Status and Management
 Other Rule Actions
 Redirecting Traffic with Send to Virtual
 Checking Rule Processing with Packet Tester
 Examining Connections with Flow Inspector 
Chapter 4: Logs
Event Logs
 Logging Profiles
 Limiting Log Messages with Log Throttling
 Enabling Logging in Firewall Rules
 BIG-IP Logging Mechanisms
 Log Publisher
 Log Destination
 Logging Global Rule Events
 Log Configuration Changes
 QKView and Log Files
 SNMP MIB
 SNMP Traps 
Chapter 5: IP Intelligence
Overview
 IP Intelligence Policy
 Feature 1: Dynamic White and Blacklists
 Blacklist Categories
 Feed Lists
 Applying an IP Intelligence Policy
 IP Intelligence Log Profile
 IP Intelligence Reporting
 Troubleshooting IP Intelligence Lists
 Feature 2: IP Intelligence Database
 Licensing
 Installation
 Linking the Database to the IP Intelligence Policy
 Troubleshooting
 IP Intelligence iRules 
Chapter 6: DoS Protection
Denial of Service and DoS Protection Overview
 Device DoS Protection
 Configuring Device DoS Protection
 Variant 1 DoS Vectors
 Variant 2 DoS Vectors
 Automatic Configuration or Automatic Thresholds
 Variant 3 DoS Vectors
 Device DoS Profiles
 DoS Protection Profile
 Dynamic Signatures
 Dynamic Signatures Configuration
 DoS iRules 
Chapter 7: Reports
AFM Reporting Facilities Overview
 Examining the Status of Particular AFM Features
 Exporting the Data
 Managing the Reporting Settings
 Scheduling Reports
 Troubleshooting Scheduled Reports
 Examining AFM Status at High Level
 Mini Reporting Windows (Widgets)
 Building Custom Widgets
 Deleting and Restoring Widgets
 Dashboards 
Chapter 8: DoS White Lists
Bypassing DoS Checks with White Lists
 Configuring DoS White Lists
 tmsh options
 Per Profile Whitelist Address List 
Chapter 9: DoS Sweep Flood Protection
Isolating Bad Clients with Sweep Flood
 Configuring Sweep Flood 
Chapter 10: IP Intelligence Shun
Overview
 Manual Configuration
 Dynamic Configuration
 IP Intelligence Policy
 tmsh options
 Troubleshooting
 Extending the Shun Feature
 Route this Traffic to Nowhere - Remotely Triggered Black Hole
 Route this Traffic for Further Processing - Scrubber 
Chapter 11: DNS Firewall
Filtering DNS Traffic with DNS Firewall
 Configuring DNS Firewall
 DNS Query Types
 DNS Opcode Types
 Logging DNS Firewall Events
 Troubleshooting 
Chapter 12: DNS DoS
Overview
 DNS DoS
 Configuring DNS DoS
 DoS Protection Profile
 Device DoS and DNS 
Chapter 13: SIP DoS
Session Initiation Protocol (SIP)
 Transactions and Dialogs
 SIP DoS Configuration
 DoS Protection Profile
 Device DoS and SIP 
Chapter 14: Port Misuse
Overview
 Port Misuse and Service Policies
 Building a Port Misuse Policy
 Attaching a Service Policy
 Creating a Log Profile 
Chapter 15: Network Firewall iRules
Overview
 iRule Events
 Configuration
 When to use iRules
 More Information 
Chapter 16: Recap
BIG-IP Architecture and Traffic Flow
 AFM Packet Processing Overview 
Chapter 17: Additional Training and Certification
Getting Started Series Web-Based Training
 F5 Instructor Led Training Curriculum
 F5 Professional Certification Program 
							
						Prior Knowledge
					Students must complete one of the following F5 prerequisites before attending this course:
Administering BIG-IP (instructor-led training)
 F5 Certified BIG-IP Administrator
 Administering BIG-IP Equivalency Assessment 
The following free Self-Directed Training (SDT) courses, although optional, are helpful for any student with limited BIG-IP administration and configuration experience:Getting Started with BIG-IP
 Getting Started with Local Traffic Manager (LTM)
 Getting Started with BIG-IP Advanced Firewall Manager (AFM) 
The following premium Self-Directed Training (SDT) course, although optional, is also recommended before taking this course:Administering BIG-IP (SDT) 
General network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course, including OSI model encapsulation, routing and switching, Ethernet and ARP, TCP/IP concepts, IP addressing and subnetting, NAT and private IP addressing, NAT and private IP addressing, default gateway, network firewalls, and LAN vs. WAN. 
The following free Self-Directed Training (SDT) courses, although optional, are helpful for any student with limited BIG-IP administration and configuration experience:
The following premium Self-Directed Training (SDT) course, although optional, is also recommended before taking this course:
General network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course, including OSI model encapsulation, routing and switching, Ethernet and ARP, TCP/IP concepts, IP addressing and subnetting, NAT and private IP addressing, NAT and private IP addressing, default gateway, network firewalls, and LAN vs. WAN.
Register for your course
To view and/or purchase the SDT Course click here: View SDT Please find below the current active sessions for the ILT. If there are no sessions listed below and you would like to register your interest in attending the ILT version of this course please email: support@mail.education.f5.com Configuring BIG-IP Advanced Firewall Manager (AFM) - US Virtual (Dec 8, 2025): View ILT Configuring BIG-IP Advanced Firewall Manager (AFM) - UK Virtual (Feb 25, 2026): View ILT

