Application Delivery Controllers Features

Read what people say are the most valuable features of the solutions they use.
Richard Hussain says in a Citrix NetScaler ADC review
Solutions Architect, Virtualization
As an architect, I have deployed it in so many areas. Some like to use the SSL portion of it, others, they use the load-balancing. It does a lot more than what people use it for. The one feature that works really well is the SSL VPN. It's very easy to set up and you can go very granular with it. You can define what user groups get what kind of access and the management overhead is very low. View full review »
Rehan Ghayyur Khan says in a F5 BIG-IP review
Technical Product Manager at IIPL
It has so many features. First of all, it has a full proxy architecture, it has multiple modules. The best feature is the WAF, the web application firewall module. It also has cashing type capabilities. It has all kinds of load-balancing algorithms based on your IT requirements. So the WAF and load balancing. Both are core features of BIG-IP. In every environment, you have a Web application firewall, you have internet firewalls. Then, traffic comes into your datacenter so that you have datacenter firewalls. F5 has everything. It provides first-tier firewalling, for you application. And it provides server load-balancing, it provides optimization, and it provides a proxy feature, where your users cannot directly access your server. It acts as a fully proxy architecture. It has client-side and server-side connections, both, and they're separate. It also has an AVR feature: application, visibility, and recording. It's good for customers looking for what is actually happening in their network and where the latency is. If I'm using iDirect, the bank branch is connecting to my core banking application, but if the clients are finding that the application is slow, it has TCP LAN and WAN optimization features. It has has caching. View full review »
Jared Bates says in a HAProxy review
DevOps Engineer at a media company with 501-1,000 employees
The ease of use of the configuration, and great documentation, are the most valuable features for us. The VRRP redundancy is also a mission-critical feature that works seamlessly. I can bring down a server live with minimal downtime because of this. View full review »
Systems Team Leader at a tech vendor with 51-200 employees
We chose this solution in the first place because it has access to Layer 7. I can control the requests and the content, which I can access on my network if I want to even if it's forbidden access to other external resources. If I want to monitor, for example, traffic, and apply this rule on Layer 7, I can do so. This was our main goal when implementing this application. We wanted to take advantage of the Gateway capabilities. View full review »
Amita Mahajan says in an A10 Networks Thunder ADC review
Network Analyst at Alamo Colleges
The features we have used are basically for load balancing. The round-robin feature, the persistent cookies, the source IPs, source mapping, we use all of that in our situation. They also have a feature I use frequently. We have two appliances and I'm able to move my application from one appliance to another. I don't have to move my whole A10 to be active on the other side or to be passive on the other side. If an application is having a problem, I can just move it using a command. That is really interesting and very appropriate for our environment. It's very easy to use. The commands are easy to use. I have used a couple of other load balancers and I find A10 to be the easiest one. The language and the commands are easier, as is the layout. Even the technology behind it all just links together, so it's pretty easy to use. You just follow the steps and you're good. Within load balancing, we use some of the security features as well, such as the source mapping. We make sure that everything goes in and out from A10 itself. That makes the messages more secure too. We know what's going in and what's going out. It captures their source IP addresses if we want it to. The VRRP solution is also good. It has automatic failover. It also has a Virtual Chassis System, although we don't use it. But we do have the option of creating virtual chassis, so that gives it a bit more security. If we find an application which is not going to play well in the main pool, we can easily create a virtual chassis and have that application in that virtual chassis. With the virtual chassis we can also create system partitions and have a test system for test applications and have the others elsewhere. View full review »
Himanshu Rastogi says in an A10 Networks Thunder ADC review
IT Head at Medi Assist
I use SSL, TSL, and additional offloading. With additional offloading, this is where I can put my certificate on A10, as servers don't have the capability. It has allowed us to smooth out our traffic. View full review »
SeniorNe57cd says in an A10 Networks Thunder ADC review
Senior Network Engineer at a recreational facilities and services company with 1,001-5,000 employees
The Global Server Load Balancing (GSLB) is simple to use. View full review »
Chris Cummings says in an A10 Networks Thunder ADC review
Director of Information Technology at Klein Independent School District
With the Thunder SSLi, we're better protected. We can stop use of VPN and proxies. We are better protected against dirty traffic coming back to our schools. Having a secure decrypt zone with the equipment lowers the chances that our security infrastructure could possibly miss an attack. It gives us insight into the actual traffic that a student is following. What's the value of identifying possible risks or possible intent based on unencrypted traffic where you have insight to what the student's intent may be? E.g., anonymous bully reporting. It's invaluable to be able to leverage that insight and data to maybe bring help or avert a possible bad circumstance. It's something that's very important to us that this type of system gives us insight into that. For terms of ease of use, it's fairly simple. My analysts tell me that they don't mind getting in there. It was something new that we had to throw on their plate. Every time you add a new element and a new level of complexity, your analysts will look at you like you're crazy, Our plan was originally to use our native firewalls to do the decryption. Unfortunately, that was a feature set which was added on afterward. It just ended up bogging down our system. That is the reason why we had to add the extra hardware. Once the team understood that, the UI was intuitive and a huge help. We use the solution’s Harmony analytics and visibility controller. We have been able to proactively engage and deescalate situations with it. We love Harmony’s traffic management capabilities because it is centralized management. It has a rich analytics capability. This allows us insight into the aggregate performance of all the boxes. so we can possibly leverage any resources available to enhance the environment. We love the single pane of glass traffic management. Single pane of glass is huge, centralized logging. It is the buzzword that everyone is talking about right now, except what nobody seems to take into consideration, is that an analyst only has two eyes. The administration piece of it is huge. It allows us to not just look and get the information, but also cipher it, which is actionable. Looking at logs all day is great, but you can stare in the matrix so long before you want to get in the game. This single pane of glass allows us to look at information that's actionable. View full review »
Shiven Singh says in an A10 Networks Thunder ADC review
Network Manager at a university with 1,001-5,000 employees
We send all of our production web traffic through our A10. We have a major website, which is our school's website. On the website, there are many different applications and sites, so being able to balance that between our on-premise resources as well as our public cloud with AWS is a huge feature. The solution's security features are excellent. It actively helped us mitigate a DDoS attack in October of 2018. You can do SSL offloading. You can use the A10 to terminate your SSL connectivity, meaning that you can install all your public certificates on the A10 box itself. It just has a wealth of security features. Being a public entity and having a public website, which is highly visible with a lot of traffic, we are a target for DDoS. Within the last year, we have had a couple of DDoS attacks which could have affected our web traffic and taken down certain parts of our website. This did not happen because the A10 was able to mitigate the attacks using rate limiting that can be configured for DDoS mitigation on the box. The single pane of glass traffic management is a nice feature. It allows us to be able to delegate access to different groups of people. This means that I can provide a front line support (a help desk) a certain level of access to be able to look at things, a second level support a little more access, and then engineers can have full access. It is very useful to have a simple dashboard where you can login and look into what your traffic patterns are, then look and see what times of day you're experiencing the heaviest traffic. You can quickly identify if you are possibly having a security issue or security breach. It makes it very easy to use the box. Troubleshooting traffic flows is fairly easy on the box, as you can do packet captures or tcpdumps directly on the A10 itself. So, you can do a trace and see what the A10 is doing with certain traffic. E.g., if I have a client somewhere out in the world who is coming into my A10 box and reporting some weird behavior, or saying, "Hey, I can't get to this application on your website," or "I'm getting blocked for this reason. I can't look at the A10 and figure it out." I could then go into the traffic flows, run a tcpdump, and do a traffic capture. At this point, I can immediately identify where the traffic is coming from and why it is not getting through the box. I have a very technical background and was a network engineer for many years before I became a manager. For me, it is a very easy to use product. The web GUI makes it very easy to configure. The CLI is not very difficult to use, along with the syntax. The command line is very easy to learn. View full review »
John Taisto says in a HAProxy review
Unix System Administrator at a financial services firm with 1,001-5,000 employees
The most valuable feature is the TCP load balancing. It solves a problem for me where I can build files, not based on the health of the check, but rather the speed of the check. I found that functionality to be quite useful. View full review »
Girisha R says in a F5 BIG-IP review
Associate Manager - IT Operations at a tech vendor with 10,001+ employees
I found the most valuable feature to be the SSL VPN. View full review »
OMKaewsaenchai says in a Citrix NetScaler ADC review
Total Solution System Engineer at AMR Asia Co., Ltd.
It mobilizes everything in and out, leading over bandwidth and manages all of the applications. We use it for front-end crafting. View full review »
Samar Choudhury says in a Citrix NetScaler ADC review
Assistant Vice President at Nagarro
The most valuable feature is the capability of performing load balancing in a virtual environment. View full review »
Flight9875 says in a Citrix NetScaler ADC review
User at a logistics company with 1,001-5,000 employees
I can turn on features without actually owning a license. I can test them out, I can use them for a while, and then I can be licensed up. That's awesome. I don't have to have a license immediately before I can start to deploy things rapidly, rapid deployment is a plus. When I compare it to F5 from a hardware or software perspective, they both have their glitches. From a software perspective, either one is not without code bugs. View full review »
Vitor Arruda says in a Citrix NetScaler ADC review
IT Infrastructure Analyst at WEG
The most valuable feature is the management and application delivery for Layer 7 traffic. View full review »
Network8776 says in a F5 BIG-IP review
Network Presales Manager at a comms service provider with 201-500 employees
F5 BIG-IP is used with good applications and functions as an application firewall with additional features. I've been building F5 BIG-IP. We will not use any feature or any service unless there is a business case and there is a need for business implementation. View full review »
Shejoor Kulangara says in a Citrix NetScaler ADC review
Solution Architect at Diyar United Company
There are multiple features that I have found to be valuable including load balancing, supply authentication, web for application firewall, and the reverse proxy. View full review »
ShivSingh says in a F5 BIG-IP review
Sr. Advisor at a healthcare company with 10,001+ employees
* Cloud templates * Declarative onboarding * API service gateway * Policy-based security management. View full review »
reviewer996537 says in a HAProxy review
DevOps-Infrastructure Team Leader at a tech company with 201-500 employees
With each new release, I find very useful features and love each addition. Recently, the seamless reload feature was much needed and very helpful. View full review »
it_user626721 says in an A10 Networks Thunder ADC review
Security Consultant & IT Professional at Sistemas Aplicativos, SISAP
The load balancing, proxies, and internal proxies are valuable features. View full review »
Luis Henriquez says in a F5 BIG-IP review
Hewlett Packard Enterprise Solution Architect at a tech services company with 11-50 employees
* Application security * Automation * Orchestration * It is a fast and available solution. View full review »
Technicab017 says in a F5 BIG-IP review
Technical Team Leader at a tech services company with 1-10 employees
* The web application firewall. * The configuration and integration into the AWS environment was pretty easy. View full review »
Develope0fe0 says in a F5 BIG-IP review
Developer at a tech vendor with 51-200 employees
* Load balancing * Being able to adjust headers. * Request response headers. * Patching issues in the load balancer that we don't want in the application layer. View full review »
Solutiond87c says in a F5 BIG-IP review
Solutions Architect at a tech services company with 5,001-10,000 employees
We had a problem where customers were doing transactions in our system, pulling health records, and the system had to be shut down for maintenance. Unfortunately, we wouldn't know that the system was being shut down, and we would lose that information. Then, the customer would get upset. Using the F5, we were able to build rules to detect that the shutdown was occurring, then begin to route people elsewhere, so we didn't have any outages or downtime. This made customers a lot happier, and it made us a lot happier. View full review »
Joshua Cruz says in a F5 BIG-IP review
Associate Systems Engineer at Frontline Education
The most valuable feature is being able to manipulate the iRules, so you can send traffic to different avenues. View full review »
Sign Up with Email