Navigate to Access > Webtops > Webtop Lists: Createįrom the drop down select Full for the type of Webtop you will be deploying, provide a name and select Finished. Now that we have validated the provisioning of APM, lets begin the deployment! If it is not, check the box, configure resources to be provisioned and click Submit. In order to begin the deployment and configuring the Webtop, let us validate APM has been provisioned.įrom the traffic management user interface, navigate to System > Resource Provisioning.Įnsure there is a check box enabling APM as shown in the screenshot below. The use case we are going to complete is deploying a network access solution using the F5 Webtop. Now that we have gone over a few details around the F5 network access solution, let us get started deploying it. All other traffic not destined to the network where the application resides is then routed directly to the public internet rather than the users corporate or internal network.
Whereas the split tunnel VPN is forwarding only traffic that has been defined using an application which is often times deployed using the F5 Webtop. The use of a full access VPN simply means you are forcing all network traffic through a single network tunnel. The difference between the two is pretty straight forward. With that, let’s talk about two network access features provided by F5 full access and split tunnel VPN's. Some of you may be familiar with F5’s Webtop to provide links to common applications, though did you know you could also use that same Webtop to implement a network access solution? On the other hand, if you wanted an always on solution or a client on a workstation you could also use F5’s edge client.
So, what is network access? Using your F5 BIG-IP, it is a way to provide your users secure access to internal applications and data.
As we continue our discussions into additional use cases for your BIG-IP, I wanted to provide some details and a guide on how to implement a SSL VPN using F5.